Nortel Networks Versalar 8000 User Manual 2

Nortel Secure Router 8000 Series
Configuration -WAN Access
Release: Document Revision:
5.3
01.01
NN46240-503 324557-A Rev01
Nortel Secure Router 8000 Series Release: 5.3 Publication: NN46240-503 Document Revision: 01.01 Document status: Standard Document release date: 30 March 2009
Copyright © 2009 Nortel Networks All Rights Reserved.
Printed in Canada, India, and the United States of America LEGAL NOTICE
While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject to change without notice.
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks. All other trademarks are the property of their respective owners.
ATTENTION
For information about the safety precautions, read "Safety messages" in this guide. For information about the software license, read "Software license" in this guide.
Nortel Secure Router 8000 Series Configuration -WAN Access

Contents

About this document.......................................................................................................................1
1 WAN access overview ...............................................................................................................1-1
1.1 Introduction.................................................................................................................................................1-2
1.1.1 WAN interface types .........................................................................................................................1-2
1.1.2 Link layer protocols of WAN............................................................................................................1-4
1.2 Configuring WAN interface parameters...................................................................................................... 1-6
1.2.1 Establishing the configuration task ...................................................................................................1-6
1.2.2 Entering the WAN interface view......................................................................................................1-7
1.2.3 Configuring interface description......................................................................................................1-7
1.2.4 Configuring interval of flow statistics...............................................................................................1-8
1.2.5 Enabling the WAN interface..............................................................................................................1-9
1.2.6 Checking the configuration...............................................................................................................1-9
1.3 Maintaining interfaces...............................................................................................................................1-10
1.3.1 Clearing interface statistics .............................................................................................................1-10
1.3.2 Debugging interfaces.......................................................................................................................1-10
2 Serial interface configuration ..................................................................................................2-1
2.1 Introduction.................................................................................................................................................2-2
2.1.1 Synchronous serial interface .............................................................................................................2-2
2.1.2 HSSI interface...................................................................................................................................2-2
2.2 Configuring the synchronous serial interface..............................................................................................2-3
2.2.1 Establishing the configuration task ...................................................................................................2-3
2.2.2 Configuring link layer protocol type.................................................................................................2-4
2.2.3 Configuring baud rate........................................................................................................................ 2-4
2.2.4 Configuring clock inversion..............................................................................................................2-5
2.2.5 Configuring DCD or DSR signal detection.......................................................................................2-5
2.2.6 Configuring link coding mode ..........................................................................................................2-6
2.2.7 Configuring idle mark between frames.............................................................................................2-7
2.2.8 Configuring the MTU........................................................................................................................2-7
2.2.9 Configuring the parity bit..................................................................................................................2-8
2.2.10 Checking the configuration.............................................................................................................2-9
2.3 Configuring the HSSI interface.................................................................................................................2-10
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
i
Nortel Secure Router 8000 Series
2.3.1 Establishing the configuration task .................................................................................................2-10
2.3.2 Configuring the link layer protocol.................................................................................................2-10
2.3.3 Configuring the MTU......................................................................................................................2-11
2.3.4 Configuring the parity bit................................................................................................................2-11
2.3.5 Configuring the loopback mode......................................................................................................2-12
2.3.6 Checking the configuration.............................................................................................................2-12
2.4 Maintaining serial interface.......................................................................................................................2-12
2.4.1 Resetting interface statistics............................................................................................................2-12
2.4.2 Setting loopback to detect whether the interface is normal.............................................................2-13
Configuration -WAN Access
3 E-Carrier and T-carrier interface configuration ...................................................................3-1
3.1 Introduction.................................................................................................................................................3-2
3.1.1 E-carrier and t-carrier........................................................................................................................3-2
3.1.2 Related concepts................................................................................................................................3-2
3.1.3 Introduction to E1 interface...............................................................................................................3-3
3.1.4 Introduction to CE1 interface............................................................................................................3-3
3.1.5 Introduction to CT1 interfaces ..........................................................................................................3-4
3.1.6 Introduction to CE3 Interfaces..........................................................................................................3-5
3.2 Configuring E1 interfaces............................................................................................................................3-5
3.2.1 Establishing the configuration task ...................................................................................................3-5
3.2.2 Configuring working mode of E1 interface.......................................................................................3-6
3.2.3 Configuring coding or decoding format of E1 interface....................................................................3-6
3.2.4 Configuring clock mode of E1 interface...........................................................................................3-7
3.2.5 Configuring timeslot binding of E1 interface.................................................................................... 3-8
3.2.6 Configuring cable mode of E1 interface............................................................................................3-8
3.2.7 Checking the configuration...............................................................................................................3-9
3.3 Configuring CE1 interfaces.........................................................................................................................3-9
3.3.1 Establishing the configuration task ...................................................................................................3-9
3.3.2 Configuring working mode of CE1 interface..................................................................................3-10
3.3.3 Configuring coding or decoding format of CE1 interface...............................................................3-11
3.3.4 Configuring clock mode of CE1 interface.......................................................................................3-12
3.3.5 Configuring frame format of CE1 interface....................................................................................3-12
3.3.6 Configuring timeslot binding of CE1 interface...............................................................................3-13
3.3.7 Configuring cable mode of CE1 interface.......................................................................................3-13
3.3.8 Checking the configuration.............................................................................................................3-14
3.4 Configuring CT1 interfaces.......................................................................................................................3-14
3.4.1 Establishing the configuration task .................................................................................................3-15
3.4.2 Configuring working mode of CT1 interface..................................................................................3-16
3.4.3 Configuring coding or decoding format of CT1 interface...............................................................3-16
3.4.4 Configuring clock mode of CT1 interface.......................................................................................3-17
3.4.5 Configuring frame format of CT1 interface....................................................................................3-17
3.4.6 Configuring timeslot binding of CT1 interface...............................................................................3-18
ii
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration -WAN Access
3.4.7 Configuring cable mode of CT1 interface.......................................................................................3-18
3.4.8 Checking the configuration.............................................................................................................3-19
3.5 Configuring CE3 interfaces.......................................................................................................................3-20
3.5.1 Establishing the configuration task .................................................................................................3-20
3.5.2 Configuring working mode of CE3 interface..................................................................................3-20
3.5.3 Configuring clock mode of CE3 interface.......................................................................................3-21
3.5.4 Configuring national bit of CE3 interface.......................................................................................3-21
3.5.5 Checking the configuration.............................................................................................................3-22
3.6 Configuring CE1channels of CE3 interfaces.............................................................................................3-22
3.6.1 Establishing the configuration task .................................................................................................3-22
3.6.2 Configuring working mode of CE1 channel....................................................................................3-23
3.6.3 Configuring clock mode of CE1 channel........................................................................................3-24
3.6.4 Configuring Frame Format of CE1 Channel...................................................................................3-24
3.6.5 Disabling or enabling CE1 channel.................................................................................................3-25
3.6.6 Checking the configuration.............................................................................................................3-25
3.7 Configuring synchronous serial interfaces ................................................................................................3-26
3.7.1 Establishing the configuration task .................................................................................................3-26
3.7.2 Configuring attribute parameters of synchronous serial interface...................................................3-27
3.7.3 Configuring link layer protocol of synchronous serial interface.....................................................3-28
3.7.4 Configuring hold-interval of the link layer protocol of the synchronous serial interface................3-28
3.7.5 Checking the configuration.............................................................................................................3-29
3.8 Maintaining e-carrier and t-carrier interface..............................................................................................3-30
3.8.1 Resetting interface statistics............................................................................................................3-30
3.8.2 Setting loopback to detect whether the interface is normal.............................................................3-30
3.9 Configuration examples.............................................................................................................................3-30
3.9.1 Example for configuring communication over CE1 interfaces bundle...........................................3-31
3.9.2 Example for configuring communication over E1 interfaces Bundle.............................................3-34
3.9.3 Example for configuring CE3 interfaces.........................................................................................3-38
4 POS and CPOS interface configuration.................................................................................4-1
4.1 Introduction.................................................................................................................................................4-2
4.1.1 SONET..............................................................................................................................................4-2
4.1.2 SDH...................................................................................................................................................4-2
4.1.3 POS ...................................................................................................................................................4-6
4.1.4 CPOS.................................................................................................................................................4-6
4.2 Configuring POS interfaces.........................................................................................................................4-9
4.2.1 Establishing the configuration task ...................................................................................................4-9
4.2.2 Configuring link layer protocol.......................................................................................................4-10
4.2.3 Configuring clock mode ..................................................................................................................4-10
4.2.4 Configuring overhead bytes ............................................................................................................4-11
4.2.5 Configuring frame format ...............................................................................................................4-11
4.2.6 Configuring scramble function........................................................................................................4-12
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
iii
Nortel Secure Router 8000 Series
4.2.7 Configuring check word length of CRC..........................................................................................4-12
4.2.8 Configuring MTU ...........................................................................................................................4-13
4.2.9 Checking the configuration.............................................................................................................4-14
4.3 Configuring STM-1 CPOS interfaces........................................................................................................4-15
4.3.1 Establishing the configuration task .................................................................................................4-15
4.3.2 Configuring clock mode ..................................................................................................................4-15
4.3.3 Configuring frame format ...............................................................................................................4-16
4.3.4 Configuring overhead bytes ............................................................................................................4-17
4.3.5 Configuring AUG multiplexing route .............................................................................................4-17
4.3.6 Checking the configuration.............................................................................................................4-18
4.4 Configuring E1/T1 channels of the CPOS interface..................................................................................4-18
4.4.1 Establishing the configuration task .................................................................................................4-18
4.4.2 Creating E1/T1 channels.................................................................................................................4-19
4.4.3 Configuring frame format ...............................................................................................................4-20
4.4.4 Configuring clock mode ..................................................................................................................4-21
4.4.5 Disabling or enabling the E1/T1 channel........................................................................................4-21
4.4.6 Checking the configuration.............................................................................................................4-22
4.5 Configuring synchronous serial interfaces ................................................................................................4-23
4.5.1 Establishing the configuration task .................................................................................................4-23
4.5.2 Configuring attribute parameters of synchronous serial interface...................................................4-24
4.5.3 Configuring link layer protocol of synchronous serial interface.....................................................4-24
4.5.4 Configuring hold-interval of the link layer protocol for synchronous serial interface....................4-25
4.5.5 Checking the configuration.............................................................................................................4-25
4.6 Maintaining POS and CPOS interface.......................................................................................................4-26
4.6.1 Resetting interface statistics............................................................................................................4-26
4.6.2 Setting loopback to detect whether the interface is normal.............................................................4-26
4.7 Configuration examples.............................................................................................................................4-27
4.7.1 Example for directly connecting routers through POS interfaces...................................................4-27
4.7.2 Example for configuring STM-1 CPOS interfaces..........................................................................4-29
4.8 Troubleshooting.........................................................................................................................................4-34
4.8.1 Physical status of POS interfaces is Down......................................................................................4-34
4.8.2 Line protocol status of POS interfaces is Down..............................................................................4-35
4.8.3 Severe packet loss on a POS interface.............................................................................................4-35
Configuration -WAN Access
5 Logical interface configuration ...............................................................................................5-1
5.1 Introduction.................................................................................................................................................5-2
5.1.1 Sub-interface overview......................................................................................................................5-2
5.1.2 Virtual template and virtual access interface.....................................................................................5-3
5.1.3 Virtual ethernet interface...................................................................................................................5-3
5.1.4 Loopback interface............................................................................................................................5-4
5.1.5 Null interface.....................................................................................................................................5-4
5.2 Creating sub-interfaces................................................................................................................................5-4
iv
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration -WAN Access
5.2.1 Establishing the configuration task ...................................................................................................5-4
5.2.2 Creating FR sub-interfaces................................................................................................................5-5
5.2.3 Creating X.25 sub-interfaces.............................................................................................................5-6
5.2.4 Creating ATM sub-interfaces.............................................................................................................5-7
5.2.5 Checking the configuration...............................................................................................................5-7
5.3 Configuring the virtual template..................................................................................................................5-8
5.3.1 Establishing the configuration task ...................................................................................................5-8
5.3.2 Creating a VT....................................................................................................................................5-9
5.3.3 Setting maximum number of links supported by a VT......................................................................5-9
5.3.4 Checking the configuration.............................................................................................................5-10
5.4 Configuring virtual ethernet interfaces......................................................................................................5-11
5.4.1 Establishing the configuration task .................................................................................................5-11
5.4.2 Creating a VE interface...................................................................................................................5-12
5.4.3 Configuring a MAC address for a VE interface..............................................................................5-12
5.4.4 Checking the configuration.............................................................................................................5-13
5.5 Configuring a loopback interface..............................................................................................................5-13
5.5.1 Establishing the configuration task .................................................................................................5-13
5.5.2 Creating a loopback interface and configuring its IP address..........................................................5-14
5.5.3 Checking the configuration.............................................................................................................5-14
5.6 Configuring a null interface.......................................................................................................................5-15
5.6.1 Establishing the configuration task .................................................................................................5-15
5.6.2 Entering the null interface view ......................................................................................................5-15
5.6.3 Checking the configuration.............................................................................................................5-16
5.7 Configuration examples.............................................................................................................................5-16
5.7.1 Example for configuring the sub-interface......................................................................................5-16
5.7.2 Example for configuring the virtual template..................................................................................5-18
5.7.3 Example for configuring the loopback interface.............................................................................5-18
5.8 Troubleshooting.........................................................................................................................................5-20
6 PPP and MP configuration .......................................................................................................6-1
6.1 Introduction.................................................................................................................................................6-3
6.1.1 PPP....................................................................................................................................................6-3
6.1.2 MP.....................................................................................................................................................6-5
6.1.3 references..........................................................................................................................................6-6
6.2 Encapsulating an interface with PPP and MRU negotiation........................................................................6-7
6.2.1 Establishing the configuration task ...................................................................................................6-7
6.2.2 Encapsulating the interface with PPP................................................................................................6-8
6.2.3 Enabling PPP MRU negotiation........................................................................................................6-8
6.2.4 Checking the configuration...............................................................................................................6-9
6.3 Configuring unidirectional PAP ..................................................................................................................6-9
6.3.1 Establishing the configuration task ...................................................................................................6-9
6.3.2 Configuring a local router to authenticate iIts peer in PAP mode....................................................6-10
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
v
Nortel Secure Router 8000 Series
Configuration -WAN Access
6.3.3 Configuring the peer to be authenticated by the local router in PAP mode.....................................6-11
6.3.4 Checking the configuration.............................................................................................................6-11
6.4 Configuring unidirectional CHAP.............................................................................................................6-12
6.4.1 Establishing the configuration task .................................................................................................6-12
6.4.2 Configuring a local router with user a name to authenticate its peer in CHAP mode .....................6-13
6.4.3 Configuring a local router without user name to authenticate its peer in CHAP mode...................6-15
6.4.4 Checking the configuration.............................................................................................................6-17
6.5 Configuring PPP optional parameters........................................................................................................6-17
6.5.1 Establishing the configuration task .................................................................................................6-17
6.5.2 Configuring the call back................................................................................................................6-19
6.5.3 Configuring packet or packet header compression..........................................................................6-20
6.5.4 Configuring the timeout period of negotiation................................................................................6-22
6.5.5 Configuring the timeout period of polling.......................................................................................6-22
6.5.6 Configuring DNS server address negotiation..................................................................................6-23
6.5.7 Configuring the PPP link quality detection .....................................................................................6-23
6.5.8 Configuring peer host router to be suppressed for adding into the local end direct routing table...6-24
6.5.9 Checking the configuration.............................................................................................................6-25
6.6 Configuring MP direct binding through the VT........................................................................................6-26 T
6.6.1 Establishing the configuration task .................................................................................................6-26
6.6.2 Creating a VT and assigning an IP address .....................................................................................6-27
6.6.3 Directly binding the interface to an existing VT.............................................................................6-27
6.6.4 Checking the configuration.............................................................................................................6-28
6.7 Configuring MP authentication binding through the VT...........................................................................6-29
6.7.1 Establishing the configuration task .................................................................................................6-29
6.7.2 Creating a VT..................................................................................................................................6-30
6.7.3 Configuring a PPP interface to work in MP mode ..........................................................................6-31
6.7.4 Checking the configuration.............................................................................................................6-32
6.8 Configuring MP binding using the MP-group...........................................................................................6-33
6.8.1 Establishing the configuration task .................................................................................................6-33
6.8.2 Adding an interface to an MP-group...............................................................................................6-34
6.8.3 Disabling the endpoint discriminator negotiation............................................................................6-36
6.8.4 Checking the configuration.............................................................................................................6-37
6.9 Configuring MP limiting parameters.........................................................................................................6-38
6.9.1 Establishing the configuration task .................................................................................................6-38
6.9.2 Configuring the MTU of the MP group...........................................................................................6-39
6.9.3 Configuring the maximum number of MP bundled links................................................................6-39
6.9.4 Configuring the minimum number of MP bundled links ................................................................6-40
6.9.5 Configuring the damping of the MP bundled links.........................................................................6-41
6.9.6 Checking the configuration.............................................................................................................6-41
6.10 Configuring MP fragment function.........................................................................................................6-42
6.10.1 Establishing the configuration task ...............................................................................................6-42
6.10.2 Configuring the minimum packet length of the fragment of the outbound packet........................6-43
vi
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration -WAN Access
6.10.3 Disabling the re-group of the fragments of the MP packets..........................................................6-43
6.10.4 Configuring the packet order guarantee function on the MP-group interface...............................6-44
6.10.5 Checking the configuration...........................................................................................................6-45
6.11 Maintaining PPP and MP.........................................................................................................................6-46
6.12 Configuration examples...........................................................................................................................6-47
6.12.1 Example for configuring PAP authentication................................................................................6-47
6.12.2 Example for configuring unidirectional CHAP authentication .....................................................6-50
6.12.3 Example for configuring bidirectional CHAP authentication .......................................................6-52
6.12.4 Example for binding MPs into the MP-group...............................................................................6-54
6.12.5 Example for configuring MP direct binding using the VT............................................................6-59
6.12.6 Example for configuring MP authentication binding using the VT...............................................6-62
6.13 Troubles hoot ing.......................................................................................................................................6-68
6.13.1 Physical link is not in the up state .................................................................................................6-68
6.13.2 Link is always in the down state....................................................................................................6-69
6.13.3 CHAP authentication of a PPP link fails .......................................................................................6-69
6.13.4 MP configured through the VT works abnormally ........................................................................6-70
7 LAPB and X.25 configuration...................................................................................................7-1
7.1 Introduction.................................................................................................................................................7-3
7.1.1 X.25...................................................................................................................................................7-3
7.1.2 X.25 Principle....................................................................................................................................7-4
7.1.3 LAPB.................................................................................................................................................7-5
7.1.4 X.25 switching function....................................................................................................................7-6
7.1.5 X.25 load balancing...........................................................................................................................7-6
7.1.6 XOT ..................................................................................................................................................7-8
7.2 LAPB configuration....................................................................................................................................7-9
7.2.1 Establishing the configuration task ...................................................................................................7-9
7.2.2 Configuring the link layer protocol of an interface as LAPB..........................................................7-10
7.2.3 Configuring LAPB parameters........................................................................................................7-10
7.2.4 Checking the configuration.............................................................................................................7-12
7.3 Configuring an X.25 interface...................................................................................................................7-12
7.3.1 Establishing the configuration task .................................................................................................7-12
7.3.2 Configuring X.25 attributes.............................................................................................................7-13
7.3.3 Configuring X.25 interface supplementary parameter ....................................................................7-18
7.3.4 Configuring an X.25 sub-interface..................................................................................................7-21
7.3.5 Checking the configuration.............................................................................................................7-22
7.4 Configuring X.25 datagram transmission..................................................................................................7-22
7.4.1 Establishing the configuration tTask...............................................................................................7-22
7.4.2 Configuring X.25 datagram transmission........................................................................................7-23
7.4.3 Configuring supplementary parameters of X.25 datagram Transmission .......................................7-25
7.4.4 Configuring X.25 switching............................................................................................................7-29
7.4.5 Checking the configuration.............................................................................................................7-30
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
vii
Nortel Secure Router 8000 Series
7.5 Configuring load balancing.......................................................................................................................7-31
7.5.1 Establishing the configuration task .................................................................................................7-31
7.5.2 Enabling or disabling X.25 switching.............................................................................................7-32
7.5.3 Configuring X.25 hunt group ..........................................................................................................7-32
7.5.4 Configuring X.25 switching route...................................................................................................7-33
7.5.5 Checking the configuration.............................................................................................................7-33
7.6 Configuring XOT......................................................................................................................................7-34
7.6.1 Establishing the configuration task .................................................................................................7-34
7.6.2 Starting X.25 switching...................................................................................................................7-34
7.6.3 Configuring local switching (SVC).................................................................................................7-35
7.6.4 Configuring XOT route...................................................................................................................7-35
7.6.5 Configuring optional keepalive and Xot-source attributes..............................................................7-36
7.6.6 Checking the configuration.............................................................................................................7-37
7.7 Maintaining LAPB and X.25.....................................................................................................................7-37
7.7.1 Clearing the serial interface LAPB statistics...................................................................................7-37
7.7.2 Debugging X.25..............................................................................................................................7-38
7.8 Configuration examples.............................................................................................................................7-38
7.8.1 Example for configuring LAPB......................................................................................................7-39
7.8.2 Example for directly connecting two routers by Using X.25..........................................................7-41
7.8.3 Example for connecting routers to an X.25 public packet network.................................................7-44
7.8.4 Example for configuring the VC range...........................................................................................7-48
7.8.5 Example for transmitting IP datagrams through X.25 PVC............................................................7-50
7.8.6 Example for configuring X.25 sub-interfaces.................................................................................7-52
7.8.7 Example for configuring the SVC function of XOT.......................................................................7-57
7.8.8 Example for configuring the PVC function of XOT.......................................................................7-61
7.8.9 Example for configuring the X.25 load balancing...........................................................................7-65
7.8.10 Example for configuring the X.25 load balancing carrying IP Datagrams....................................7-69
7.8.11 Example for configuring the TCP/IP header compression ............................................................7-73
7.9 Troubleshooting.........................................................................................................................................7-75
7.9.1 LAPB is always disconnected.........................................................................................................7-75
7.9.2 LAPB protocol is up, VC cannot be established .............................................................................7-75
7.9.3 X.25 Protocol cannot enter the up status.........................................................................................7-76
7.9.4 X.25 Protocol is up, VC cannot be established ...............................................................................7-76
7.9.5 Frequently reset or cleared during data transmission......................................................................7-77
7.9.6 Request to set PVCs is rejected.......................................................................................................7-77
7.9.7 After SVC application of XOT is configured, the ping fails ...........................................................7-78
7.9.8 After PVC application of XOT is configured, the ping fails ...........................................................7-78
Configuration -WAN Access
8 Frame relay configuration ........................................................................................................8-1
8.1 Introduction.................................................................................................................................................8-3
8.1.1 FR protocol and related concepts...................................................................................................... 8-3
8.1.2 PVC standby of frame relay switching..............................................................................................8-7
viii
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration -WAN Access
8.1.3 Frame relay compression...................................................................................................................8-8
8.1.4 multilink frame relay.........................................................................................................................8-8
8.1.5 References.........................................................................................................................................8-9
8.2 Configuring frame relay..............................................................................................................................8-9
8.2.1 Establishing the configuration task ...................................................................................................8-9
8.2.2 Configuring frame relay UNI interworking.....................................................................................8-10
8.2.3 Configuring frame relay NNI interworking.....................................................................................8-12
8.2.4 Configuring frame relay sub-interfaces capability..........................................................................8-13
8.2.5 Checking the configuration.............................................................................................................8-14
8.3 Configuring frame relay static address mapping.......................................................................................8-14
8.3.1 Establishing the configuration task .................................................................................................8-14
8.3.2 Configuring frame relay static address mapping.............................................................................8-15
8.3.3 Checking the configuration.............................................................................................................8-16
8.4 Configuring MFR......................................................................................................................................8-16
8.4.1 Establishing the configuration task .................................................................................................8-16
8.4.2 Creating and configuring an MFR interface....................................................................................8-17
8.4.3 Bundling an interface to the MFR interface....................................................................................8-19
8.4.4 Checking the configuration.............................................................................................................8-20
8.5 Configuring frame relay LMI type and related parameters.......................................................................8-21
8.5.1 Establishing the configuration task .................................................................................................8-21
8.5.2 Configuring frame relay LMI and related parameters of DTE........................................................8-21
8.5.3 Configuring frame relay LMI and related parameters of DCE........................................................8-22
8.5.4 Checking the configuration.............................................................................................................8-23
8.6 Configuring frame relay switching............................................................................................................8-23
8.6.1 Establishing the configuration task .................................................................................................8-23
8.6.2 Configuring frame relay switching route.........................................................................................8-24
8.6.3 Configuring the PVC used for frame relay switching.....................................................................8-25
8.6.4 Checking the configuration.............................................................................................................8-25
8.7 Configuring PVC standby groups of frame relay switching......................................................................8-26
8.7.1 Establishing the configuration task .................................................................................................8-26
8.7.2 Configuring the switching PVC backup function............................................................................8-27
8.7.3 Configuring the automatic switching mode.....................................................................................8-28
8.7.4 Configuring the manual switching mode.........................................................................................8-29
8.7.5 Checking the configuration.............................................................................................................8-29
8.8 Configuring frame relay over an IP network.............................................................................................8-30
8.8.1 Establishing the configuration task .................................................................................................8-30
8.8.2 Configuring frame relay switching route.........................................................................................8-31
8.8.3 Configuring frame relay switching PVC.........................................................................................8-32
8.8.4 Checking the configuration.............................................................................................................8-32
8.9 Configuring frame relay FRF.9 compression ............................................................................................8-32
8.9.1 Establishing the configuration task .................................................................................................8-32
8.9.2 Configuring FRF.9 compression on a point-to-point sub-interface.................................................8-33
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
ix
Nortel Secure Router 8000 Series
8.9.3 Configuring FR FRF.9 compression on a main-interface or a point-to-multipoint sub-interface....8-34
8.9.4 Checking the configuration.............................................................................................................8-35
8.10 Configuring frame relay IP header compression .....................................................................................8-36
8.10.1 Establishing the configuration task ...............................................................................................8-36
8.10.2 Configuring IPHC on an frame relay main interface.....................................................................8-37
8.10.3 Configuring IPHC on an freame relay P2MP sub-interface..........................................................8-37
8.10.4 Checking the configuration...........................................................................................................8-38
8.11 Configuring MFR bundle and MFR bundle Link....................................................................................8-38
8.11.1 Establishing the configuration task................................................................................................8-38
8.11.2 Configuring MFR bundle identifier...............................................................................................8-39
8.11.3 Configuring MFR bundle link identifier........................................................................................8-40
8.11.4 Configuring hello packet parameters of MFR bundle link............................................................8-40
8.11.5 Checking the configuration ...........................................................................................................8-41
8.12 Configuring MFR restriction parameters.................................................................................................8-41
8.12.1 Establishing the configuration task ...............................................................................................8-41
8.12.2 Configuring the MFR fragment size..............................................................................................8-42
8.12.3 Configuring the MFR sliding window size...................................................................................8-43
8.12.4 Checking the configuration...........................................................................................................8-44
8.13 Maintaining frame relay and MFR..........................................................................................................8-44
8.13.1 Clearing the statistics of frame relay and dynamic address mapping entries ................................8-44
8.13.2 Debugging frame relay and MFR..................................................................................................8-45
8.14 Configuration examples...........................................................................................................................8-45
8.14.1 Example for connecting LANs through the frame relay network..................................................8-46
8.14.2 Example for connecting LANs through the private line................................................................8-49
8.14.3 Example for configuring frame relay switching routes.................................................................8-51
8.14.4 Example for configuring the frame realy switching PVC .............................................................8-55
8.14.5 Example for configuring the PVC backup of frame relay switching.............................................8-58
8.14.6 Example for configuring the backup of frame relay over IP.........................................................8-61
8.14.7 Example for configuring frame relay over IP................................................................................8-66
8.14.8 Example for configuring the frame relay frf9 compression..........................................................8-69
8.14.9 Example for configuring MFR......................................................................................................8-71
8.15 Troubles hoot ing.......................................................................................................................................8-73
8.15.1 Failure of binding MFR interface to a specified interface.............................................................8-73
8.15.2 Failure of pinging the peer after configuring the frame relay........................................................8-74
8.15.3 Failure of pinging the peer after configuring the frame relay switch over IP................................8-74
8.15.4 Only one end can ping through the other end after configuring the frame relay PVC..................8-75
Configuration -WAN Access
9 HDLC configuration..................................................................................................................9-1
9.1 Introduction.................................................................................................................................................9-2
9.2 Configuring HDLC......................................................................................................................................9-2
9.2.1 Establishing the configuration task ...................................................................................................9-2
9.2.2 Encapsulating an interface with HDLC.............................................................................................9-2
x
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration -WAN Access
9.2.3 Configuring the IP address of the interface.......................................................................................9-3
9.2.4 Setting the Polling Interval................................................................................................................9-4
9.2.5 Checking the configuration...............................................................................................................9-4
9.3 Maintaining HDLC......................................................................................................................................9-4
9.3.1 Clearing HDLC statistics...................................................................................................................9-5
9.3.2 Debugging HDLC.............................................................................................................................9-5
9.4 Configuration examples...............................................................................................................................9-5
9.4.1 Example for configuring HDLC........................................................................................................9-6
9.4.2 Example for configuring IP address unnumbered for HDLC............................................................9-8
10 Low-speed ATM configuration...........................................................................................10-1
10.1 Introduction.............................................................................................................................................10-3
10.1.1 ATM protocol stack.......................................................................................................................10-3
10.1.2 A TM interface................................................................................................................................10-4
10.1.3 A TM OAM....................................................................................................................................10-5
10.1.4 ATM a pplications..........................................................................................................................10-5
10.1.5 references......................................................................................................................................10-6
10.2 Configuring ATM interfaces....................................................................................................................10-7
10.2.1 Establishing the configuration task ...............................................................................................10-7
10.2.2 Configuring the parameters of ATM OC-3/STM-1 interfaces.......................................................10-7
10.2.3 Configuring the parameters of the ATM E3 interface .................................................................10-10
10.2.4 Checking the configuration .........................................................................................................10-12
10.3 Configuring ATM-classes......................................................................................................................10-13
10.3.1 Establishing the configuration task .............................................................................................10-13
10.3.2 Creating an ATM-class................................................................................................................10-13
10.3.3 Applying the ATM-class..............................................................................................................10-14
10.3.4 Checking the configuration .........................................................................................................10-15
10.4 Configuring the IPoA application..........................................................................................................10-16
10.4.1 Establishing the configuration task .............................................................................................10-16
10.4.2 Configuring IPoA mapping on a PVC.........................................................................................10-16
10.4.3 Checking the configuration .........................................................................................................10-17
10.5 Configuring the IPoEoA application .....................................................................................................10-18
10.5.1 Establishing the configuration task .............................................................................................10-18
10.5.2 Configuring IPoEoA mapping on a PVC ....................................................................................10-18
10.5.3 Checking the configuration .........................................................................................................10-19
10.6 Configuring the PPPoA application.......................................................................................................10-20
10.6.1 Establishing the configuration task .............................................................................................10-20
10.6.2 Configuring PPPoA mapping on a PVC......................................................................................10-20
10.6.3 Checking the configuration .........................................................................................................10-21
10.7 Configuring the PPPoEoA application ..................................................................................................10-22
10.7.1 Establishing the configuration task .............................................................................................10-22
10.7.2 Configuring PPPoEoA mapping on a PVC .................................................................................10-22
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
xi
Nortel Secure Router 8000 Series
10.7.3 Checking the configuration .........................................................................................................10-23
10.8 Creating a PVC-group and configuring the PVC service mapping.......................................................10-24
10.8.1 Establishing the configuration task .............................................................................................10-24
10.8.2 Creating a PVC-group and configuring PVC service mapping...................................................10-25
10.8.3 Checking the configuration .........................................................................................................10-26
10.9 Configuring the service type of PVC and the OAM parameters ...........................................................10-26
10.9.1 Establishing the configuration task .............................................................................................10-26
10.9.2 Configuring the service type of a PVC........................................................................................10-28
10.9.3 Configuring the OAM F5 loopback ............................................................................................10-28
10.9.4 Checking the configuration .........................................................................................................10-29
10.10 Maintaining ATM ................................................................................................................................10-29
10.10.1 Clearing the ATM interface statistics ........................................................................................10-29
10.10.2 Setting loopback to detect if the interface is normal.................................................................10-29
10.10.3 Debugging A T M........................................................................................................................10-30
10.11 Configuration examples.......................................................................................................................10-31
10.11.1 Example for configuring IPoA ..................................................................................................10-31
10.11.2 Example for configuring IPoEoA..............................................................................................10-34
10.11.3 Example for configuring PPPoA...............................................................................................10-36
10.11.4 Example for configuring PPPoEoA...........................................................................................10-38
10.12 Troubl eshoot ing...................................................................................................................................10-41
10.12.1 ATM Interface is down..............................................................................................................10-41
10.12.2 Interfaces cannot successfully ping each other..........................................................................10-42
10.12.3 PVC is down though the ATM interface is up...........................................................................10-42
10.12.4 Pinging the peer fails though PVC is UP ..................................................................................10-43
10.12.5 Severe packet dropping and CRC errors occur though the ping succeeds.................................10-44
10.12.6 Link is not up when using IPoA or PPPoA ...............................................................................10-44
10.12.7 Packet loss caused by the deletion of some PVCs in the PVC-group .......................................10-45
Configuration -WAN Access
11 High-speed ATM configuration..........................................................................................11-1
11.1 Introduction .............................................................................................................................................11-2
11.1.1 ATM protocol stack.......................................................................................................................11-2
11.1.2 ATM interface................................................................................................................................11-3
11.1.3 ATM applications ..........................................................................................................................11-4
11.1.4 references.......................................................................................................................................11-4
11.2 Configuring ATM interfaces....................................................................................................................11-4
11.2.1 Establishing the configuration task................................................................................................11-4
11.2.2 Configuring the clock mode..........................................................................................................11-5
11.2.3 Configuring the frame format........................................................................................................11-6
11.2.4 Configuring the overhead byte ...................................................................................................... 11-6
11.2.5 Configuring the scrambling...........................................................................................................11-7
11.2.6 Configuring the loopback mode....................................................................................................11-8
11.2.7 Checking the configuration ...........................................................................................................11-8
xii
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration -WAN Access
11.3 Configuring the IPoA application............................................................................................................11-9
11.3.1 Establishing the configuration task................................................................................................11-9
11.3.2 Configuring IPoA mapping on a PVC.........................................................................................11-10
11.3.3 Checking the configuration .........................................................................................................11-11
11.4 Configuring the service type of PVC and PVP......................................................................................11-11
11.4.1 Establishing the configuration task.............................................................................................. 11-11
11.4.2 Configuring the service type of a PVC........................................................................................11-12
11.4.3 Configuring the service type of a PVP ........................................................................................11-13
11.4.4 Checking the configuration .........................................................................................................11-13
11.5 Maintaining ATM ..................................................................................................................................11-14
11.6 Configuration example of IPoA............................................................................................................. 11-14
12 PPPoE configuration..............................................................................................................12-1
12.1 Introduction.............................................................................................................................................12-2
12.1.1 Concept of PPPoE.........................................................................................................................12-2
12.1.2 Phase of discovery.........................................................................................................................12-2
12.1.3 Phase of PPP session.....................................................................................................................12-3
12.2 Configuring basic PPPoE functions ........................................................................................................12-3
12.2.1 Establishing the configuration task ...............................................................................................12-3
12.2.2 Enabling PPPoE ............................................................................................................................12-4
12.2.3 Configuring the PPPoE service name at the server side................................................................12-4
12.2.4 Checking the configuration ...........................................................................................................12-5
12.3 Configuring PPPoE parameters...............................................................................................................12-5
12.3.1 Establishing the configuration task ...............................................................................................12-5
12.3.2 Configuring to log the state changes of PPPoE users....................................................................12-6
12.3.3 Setting the maximum number of sessions available on a local MAC address ..............................12-6
12.3.4 Setting the maximum number of sessions available on a peer MAC address ...............................12-7
12.3.5 Setting the maximum number of sessions available on the local system ......................................12-7
12.3.6 Checking the configuration ...........................................................................................................12-7
12.4 Maintaining PPPoE .................................................................................................................................12-8
12.5 Configuration examples...........................................................................................................................12-8
12.6 Troubles hooti ng.....................................................................................................................................12-10
13 Medium-MIB configuration ................................................................................................13-1
13.1 Introduction.............................................................................................................................................13-2
13.2 Configuring attributes of the medium-MIB.............................................................................................13-2
13.2.1 Establishing the configuration task ...............................................................................................13-2
13.2.2 Enabling the MIB collecting of the interface ................................................................................13-3
13.2.3 Enabling the router to send the trap packet ...................................................................................13-3
A Glossary .................................................................................................................................... A-1
B Acronyms and Abbreviations ................................................................................................B-1
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
xiii
Nortel Secure Router 8000 Series
Configuration -WAN Access
Index ................................................................................................................................................ i-1
xiv
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration -WAN Access
Figures
Figure 3-1 CE1 interfaces binding..................................................................................................................3-31
Figure 3-2 E1 interfaces binding....................................................................................................................3-35
Figure 3-3 Schematic diagram of CE3 interface configuration......................................................................3-38
Figure 4-1 STM-N frame structure...................................................................................................................4-3
Figure 4-2 Process of multiplexing E1 to STM-1.............................................................................................4-4
Figure 4-3 Process of multiplexing T1 to STM-1.............................................................................................4-4
Figure 4-4 Sequence of arrangem e nt of TUG-3, TUG-2 and TU-12 in VC-4..................................................4-5
Figure 4-5 Networking diagram of connecting routers directly through POS interfaces ...............................4-27
Figure 4-6 Networking diagram of using STM-1 CPOS interface.................................................................4-30
Figure 5-1 Networking diagram of configuring the sub-interface..................................................................5-16
Figure 5-2 Networking diagram of configuring the loopback interface .........................................................5-18
Figure 6-1 PPP link operation process..............................................................................................................6-4
Figure 6-2 Networking diagram of PAP or CHAP authentication..................................................................6-47
Figure 6-3 Networking diagram of the MP-group binding.............................................................................6-54
Figure 6-4 Networking diagram of the MP binding .......................................................................................6-59
Figure 6-5 Networking diagram of the MP configuration..............................................................................6-70
Figure 7-1 X.25 network m ode l........................................................................................................................7-3
Figure 7-2 X.25 protocol Lay er........................................................................................................................7-4
Figure 7-3 X.25 packet and LAPB frame.........................................................................................................7-5
Figure 7-4 Interrelationship between LAPB, X.25 and X.25 switching...........................................................7-6
Figure 7-5 Diagram of X.25 network load balancing .......................................................................................7-7
Figure 7-6 XOT typical application diagram....................................................................................................7-8
Figure 7-7 X.25 channel divis i on...................................................................................................................7-16
Figure 7-8 LAN interconnection through X.25..............................................................................................7-24
Figure 7-9 X.25 switching networking diagram.............................................................................................7-30
Figure 7-10 Direct connection betwee n tw o ro ut ers through serial interfaces (LAPB)..................................7-39
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
xv
Nortel Secure Router 8000 Series
Configuration -WAN Access
Figure 7-11 Direct connection of two routers through serial interface (X.25)................................................7-41
Figure 7-12 Connecting routers to an X.25 public packet network................................................................7-45
Figure 7-13 Networking diagram for configuring VC....................................................................................7-48
Figure 7-14 X.25 PVC bearing IP datagram...................................................................................................7-50
Figure 7-15 One VC consisting of several LCs..............................................................................................7-51
Figure 7-16 Diagram of X.25 sub-interface configuration.............................................................................7-53
Figure 7-17 SVC application networking diagram of XOT ...........................................................................7-57 T
Figure 7-18 Networking diagram of typical configuration of X.25 hunt group..............................................7-65
Figure 7-19 X.25 hunt group carry i n g IP data transmission...........................................................................7-69
Figure 7-20 Direct connection of two routers through serial interfaces (X.25)..............................................7-73
Figure 8-1 FR interface type.............................................................................................................................8-3
Figure 8-2 Schematic diagram of switching in a PVC standby group..............................................................8-7
Figure 8-3 Schematic diagram of bundle and bundle links ..............................................................................8-9
Figure 8-4 Typical application diagram of FR over IP...................................................................................8-30
Figure 8-5 Interconnecting LANs through FR network..................................................................................8-46
Figure 8-6 Connecting LANs through private line .........................................................................................8-49
Figure 8-7 Networking diagram of FR switching routes................................................................................8-51
Figure 8-8 Networking diagram of PVC standby groups of FR switching.....................................................8-59
Figure 8-9 Networking diagram of the FR standby groups over IP................................................................8-61
Figure 8-10 Networking diagram of FR over IP.............................................................................................8-66
Figure 8-11 Networking diagram of FR compression....................................................................................8-69
Figure 8-12 Networking diagram of MFR bundle configuration....................................................................8-71
Figure 8-13 Diagram of configuring the FR PVC..........................................................................................8-75
Figure 9-1 Networking diagram of the HDLC functions..................................................................................9-6
Figure 9-2 Networking diagra m of the HDLC basic function..........................................................................9-8
Figure 10-1 ATM protocol model...................................................................................................................10-4
Figure 10-2 Networking diagram for IPoA configuration............................................................................10-31
Figure 10-3 Networking diagram of IPoEoA configuration .........................................................................10-34
xvi
Figure 10-4 PPPoA configuration networking diagram................................................................................10-36
Figure 10-5 PPPoEoA configuration networking diagram...........................................................................10-39
Figure 1 1-1 ATM protocol model ...................................................................................................................11-3
Figure 1 1-2 Networking diagram for IPoA configuration ............................................................................11-15
Figure 12-1 PPPoE networking diagram........................................................................................................12-8
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration -WAN Access
Tables
Table 1-1 Command line views and prompts of WAN physical interfaces.......................................................1-2
Table 1-2 Command line views and prompts of WAN logical interfaces.........................................................1-3
Table 1-3 Interface numbering..........................................................................................................................1-6
Table 2-1 Index mode of the synchronous serial interface................................................................................2-2
Table 7-1 Description of X.25 channel rang e deli mitation parameters...........................................................7-16
Table 7-2 X.25 layer 3 timer........................................................................................................................... 7-19
Table 8-1 Meanings of FR LMI protocol parameters.......................................................................................8-5
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
xvii
Nortel Secure Router 8000 Series Configuration -WAN Access
Contents
About this document.......................................................................................................................1
Issue 5.3 (
30 March 2009)
Nortel Networks Inc.
i
Nortel Secure Router 8000 Series Configuration -WAN Access About this document
About this document
Overview
This chapter describes the organization of this document, product version, intended audience, conventions, and update history.
Related versions
The following table lists the product versions related to this document.
Product Name Version
Nortel Secure Router 8000 Series V200R005
Intended audience
The intended audiences of this document are:
z
Network operators
z
Network administrators
z
Network maintenance engineers
Organization
This document consists of thirteen chapters and is organized as follows.
Issue 5.3 (
Chapter Description
1 WAN Access Overview
2 Serial Interface Configuration
30 March 2009)
This chapter describes the concepts of the physical interface and the logical interface, and the protocols in the link layer supported by SR8000.
This chapter describes synchronous serial interfaces and HSSI interface. It also describes the configuration steps of serial interface, along with typical examples.
Nortel Networks Inc.
1
About this document
Nortel Secure Router 8000 Series
Configuration -WAN Access
Chapter Description
3 E-Carrier and T-Carrier Interface Configuration
4 POS and CPOS Interface Configuration
5 Logical Interface Configuration
6 PPP and MP Configuration
This chapter describes E-Carrier and T-Carrier interface related concepts including digital carrier system and channelized, unchannelized and clear channel modes. It also describes the configuration steps of various interfaces including E1, CE1, CT1, CE3, along with typical examples.
This chapter describes Synchronous Digital Hierarchy (SDH), Synchronous Optical Network (SONET), Packet over SONET/SDH (POS), and Channelized POS interface (cPOS interface) related concepts. It also describes the configuration steps of various interfaces including POS, STM-1 cPOS, E1/T1 channels of the cOS interface, along with typical examples.
This chapter describes various logical or virtual interfaces including sub-interface, virtual ethernet, virtual template, mp-group, loopback and null interface. It also describes their configuration steps, along with typical examples.
This chapter describes Point-to-Point Protocol (PPP) and MultiLink PPP (MP) related concepts including authentication and link operation. It also describes configuration steps for PAP authentication, CHAP authentication, MP direct binding through the virtual template, MP authentication binding through the virtual template, MP Binding using MP-group, MP limiting parameters configuration, along with typical examples.
7 LAPB and X.25 Configuration
This chapter describes the rationale of the X.25 AND LAPB table, the configuration procedure and the configuration examples.
8 Frame Relay Configuration
This chapter describes frame relay related concepts and configuration steps for frame relay compression, LMI type, frame relay switching, PVC standby groups, MFR, hello packet parameters of the MFR bundle link, MFR bundle identifier and MFR bundle link identifier, MFR restriction, along with typical examples.
9 HDLC Configuration This chapter describes how to encapsulate an interface with
HDLC protocol and how to set the polling interval.
10 Low-speed ATM Configuration
This chapter describes Asynch ronous Transfer Mode (ATM) broadband networking technologies and configuration steps for low-speed ATM interface, IPoA application, IPoEoA application, PPPoA application, PPPoEoA application, PVC-group, and service type of a PVC, along with typical examples.
11 High-speed ATM Configuration
This chapter describes Asynch ronous Transfer Mode (ATM) broadband networking technologies and configuration steps for ATM interface, IPoA application, and service type of a PVC or a PVP, along with typical examples.
2
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration -WAN Access About this document
Chapter Description
12 PPPoE Configuration
13 Medium-MIB Configuration
Appendix A Glossary & Appendix B Acronyms and Abbreviations
Index This chapter collates important keywords used in this manu al
Conventions
Symbol conventions
This section describes Point-to-Point Protocol over Ethernet (PPPoE) basic configuration and the procedure to configure maximum number of sessions available on a local MAC address, on a peer MAC address, on the local system, along with typical examples.
This section describes the basic concepts of the medium-MIB and the medium-MIB configuration procedure
This chapter collates glossary and frequently used acronyms and abbreviations in this manual.
to help the reader to access the required information quickly.
The symbols that may be found in this document are defined as follows.
Symbol Description
General conventions
Convention Description
Indicates a hazard with a high level of risk that, if not avoided, will result in death or serious injury.
Indicates a hazard with a medium or low level of risk which, if not avoided, could result in minor or moderate injury.
Indicates a potentially hazardous situation that, if not avoided, could cause equipment damage, data loss, and performance degradation, or unexpected results.
Indicates a tip that may help you solve a problem or save time. Provides additional information to emphasize or supplement
important points of the main text.
Issue 5.3 (
Times New Roman Normal paragraphs are in Times New Roman.
30 March 2009)
Nortel Networks Inc.
3
About this document
Nortel Secure Router 8000 Series
Configuration -WAN Access
Convention Description
Boldface
Italic Book titles are in italics.
Courier New
Command conventions
Convention Description
Boldface
Italic Command arguments are in italics. [ ] Items (keywords or arguments) in square brackets [ ] are
{ x | y | ... } Alternative items are grouped in braces and separated by
[ x | y | ... ] Optional alternative items are grouped in square brackets and
Names of files, directories, folders, and users are in boldface. For example, log in as user root.
Terminal display is in Courier New.
The keywords of a command line are in boldface.
optional.
vertical bars. One is selected.
separated by vertical bars. One or none is selected.
{ x | y | ... } * Alternative items are grouped in braces and separated by
[ x | y | ... ] *
&<1-n> The parameter before the & sign can be repeated 1 to n times. # A line starting with the # sign is comments.
GUI conventions
Convention Description
Boldface
> Multi-level menus are in boldface and separated by the ">"
vertical bars. A minimum of one or a maximum of all can be selected.
Optional alternative items are grouped in square brackets and separated by vertical bars. Many or none can be selected.
Buttons, menus, parameters, tabs, windows, and dialog titles are in boldface. For example, click OK.
signs. For example, choose File > Create > Folder.
4
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration -WAN Access About this document
Keyboard operation
Format Description
Key Key 1+Key 2
Key 1, Key 2 Press the keys in turn. For example, pressing Alt, A means the
Mouse operation
Action Description
Click Select and release the primary mouse button without moving
Double-click Press the primary mouse button twice continuously and
Drag Press and hold the primary mouse button and move the pointer
Press the key. For example, press Enter and press Tab. Press the keys concurrently. For example, pressing
Ctrl+Alt+A means the three keys should be pressed concurrently.
two keys should be pressed in turn.
the pointer.
quickly without moving the pointer.
to a certain position.
Update history
Updates between document versions are cumulative. This document version contains all updates made to previous versions.
Updates in issue 01 (2008-06-06)
This document is the first commercial release.
Issue 5.3 (
30 March 2009)
Nortel Networks Inc.
5
Nortel Secure Router 8000 Series Configuration -WAN Access
Contents
1 WAN access overview ...............................................................................................................1-1
1.1 Introduction...................................................................................................................................................1-2
1.1.1 WAN interface types............................................................................................................................1-2
1.1.2 Link layer protocols of WAN...............................................................................................................1-4
1.2 Configuring WAN interface parameters........................................................................................................1-6
1.2.1 Establishing the configuration task ......................................................................................................1-6
1.2.2 Entering the WAN interface view ........................................................................................................1-7
1.2.3 Configuring interface description ........................................................................................................1-7
1.2.4 Configuring interval of flow statistics..................................................................................................1-8
1.2.5 Enabling the WAN interface ................................................................................................................1-9
1.2.6 Checking the configuration..................................................................................................................1-9
1.3 Maintaining interfaces.................................................................................................................................1-10
1.3.1 Clearing interface statistics................................................................................................................1-10
1.3.2 Debugging interfaces.........................................................................................................................1-10
Issue 5.3 (
30 March 2009) Nortel Networks Inc. i
Nortel Secure Router 8000 Series Configuration -WAN Access
Tables
Table 1-1 Command line views and prompts of WAN physical interfaces.........................................................1-2
Table 1-2 Command line views and prompts of WAN logical interfaces...........................................................1-3
Table 1-3 Interface numbering............................................................................................................................1-6
Issue 5.3 (
30 March 2009) Nortel Networks Inc. iii
Loading...
+ 456 hidden pages