Printed in Canada, India, and the United States of America
LEGAL NOTICE
While the information in this document is believed to be accurate and reliable, except as otherwise expressly
agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF
ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are
subject to change without notice.
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
All other trademarks are the property of their respective owners.
ATTENTION
For information about the safety precautions, read "Safety messages" in this guide.
For information about the software license, read "Software license" in this guide.
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
Contents
About this document.......................................................................................................................1
1.3.1 File system ......................................................................................................................................1-10
1.3.4 High Availability.............................................................................................................................1-11
1.3.6 Link layer protocols ........................................................................................................................1-12
1.3.7 IP services.......................................................................................................................................1-12
3.8 Outputting the display ...............................................................................................................................3-10
3.8.1 V iewing the display.........................................................................................................................3-10
3.8.2 Filtering the display.........................................................................................................................3-10
3.9 Filtering information through regular expressions ....................................................................................3-10
4.1.1 Extension of command levels............................................................................................................4-2
4.1.2 Extension of user levels.....................................................................................................................4-2
ii
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
4.2 Configuring the basic system environment.................................................................................................4-2
4.2.1 Establishing the configuration task ...................................................................................................4-2
4.2.2 Configuring the device name ............................................................................................................4-3
4.2.3 Configuring the system clock............................................................................................................4-4
4.2.4 Configuring the header text...............................................................................................................4-4
4.2.5 Configuring the password for switching user levels..........................................................................4-5
4.2.6 Switching user levels.........................................................................................................................4-5
4.2.7 Locking the user interface.................................................................................................................4-6
5.1.1 User interface view............................................................................................................................5-2
5.1.2 User management..............................................................................................................................5-3
5.2 Configuring a user interface........................................................................................................................5-4
5.2.1 Establishing the configuration task ...................................................................................................5-4
5.2.2 Transmitting m essages between user interfaces................................................................................5-6
6.1.1 File system ........................................................................................................................................6-2
6.2.1 Establishing the configuration task ...................................................................................................6-2
6.2.2 Viewing the current directory............................................................................................................6-3
6.2.3 Switching the directory .....................................................................................................................6-3
6.2.4 Displaying the files in a directory .....................................................................................................6-4
6.2.5 Creating a directory...........................................................................................................................6-4
6.2.6 Deleting a directory...........................................................................................................................6-4
6.3.1 Displaying the contents of a file........................................................................................................6-5
6.3.2 Copying a file....................................................................................................................................6-6
6.3.3 Moving a file.....................................................................................................................................6-6
6.3.4 Renaming a file.................................................................................................................................6-6
6.3.5 Deleting a file....................................................................................................................................6-7
6.3.6 Deleting files in the recycle bin.........................................................................................................6-7
7.1.2 Configuration files and current configurations..................................................................................7-2
7.2 Displaying the configuration of the router...................................................................................................7-2
7.2.1 Viewing the intial configuration........................................................................................................7-2
7.2.2 Viewing the current configuration.....................................................................................................7-3
7.2.3 Viewing the running configuration in the current view.....................................................................7-3
7.3 Saving the current configuration .................................................................................................................7-3
7.4 Clearing the running information................................................................................................................7-3
iv
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
9.3.1 Establishing the configuration task ...................................................................................................9-8
9.3.2 Configuring SSH for the VTY user interface....................................................................................9-9
9.3.3 Generating the local RSA key pair..................................................................................................9-10
9.3.4 Authenticating the SSH client through the password......................................................................9-10
9.3.5 Authenticating the SSH client through RSA ...................................................................................9-11
9.3.6 Configuring basic authentication information for the SSH user......................................................9-12
9.3.7 Authorizing the SSH user through the command line interface ......................................................9-12
9.3.8 Checking the configuration.............................................................................................................9-12
9.4 Maintaining Telnet and SSH......................................................................................................................9-13
10.2 Powering off the FIC/HIC.......................................................................................................................10-2
10.2.1 Establishing the configuration task ...............................................................................................10-2
10.2.2 Powering off the FIC/HIC.............................................................................................................10-3
10.2.3 Checking the configuration ...........................................................................................................10-3
10.3 Managing the device operation................................................................................................................10-4
10.3.1 Establishing the configuration task ...............................................................................................10-4
10.3.2 Specifying the slave RPU..............................................................................................................10-5
vi
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
10.3.3 Restarting the router......................................................................................................................10-5
10.3.4 Performing the master/slave switchover........................................................................................10-6
10.4 Monitoring the router status ....................................................................................................................10-7
10.4.1 Displaying the basic device information.......................................................................................10-7
10.4.2 Displaying the system version information...................................................................................10-7
12.2 Checking the system for running patches................................................................................................12-3
12.2.1 Establishing the configuration task ...............................................................................................12-3
12.2.2 Checking for a running patch on the RPU.....................................................................................12-3
12.3 Uploading a patch....................................................................................................................................12-4
12.3.1 Establishing the configuration task ...............................................................................................12-4
12.3.2 Uploading a patch to the root directory of the flash of the master RPU........................................12-4
12.3.3 Copying a patch to the root directory of the flash of the slav e RPU .............................................12-5
12.4 Installing a patch on the RPU..................................................................................................................12-5
12.4.1 Establishing the configuration task ...............................................................................................12-5
12.4.2 Uploading the RPU patch..............................................................................................................12-6
12.4.3 Activating the RPU patch.............................................................................................................. 12-6
12.4.4 Running the RPU patch................................................................................................................. 12-6
12.5 Canceling the RPU patch.........................................................................................................................12-6
12.5.1 Establishing the configuration task ...............................................................................................12-6
12.5.2 Deactivating the RPU patch ..........................................................................................................12-7
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
vii
Nortel Secure Router 8000 Series
12.6 Removing the RPU patch........................................................................................................................12-7
12.6.1 Establishing the configuration task ...............................................................................................12-7
12.6.2 Deleting the RPU patch.................................................................................................................12-8
Configuration Guide - Basic Configuration
A Glossary .................................................................................................................................... A-1
B Acronyms and abbreviations .................................................................................................B-1
Index ................................................................................................................................................ i-1
viii
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
Figure 2-1 Networking diagram of logging on through the console port.........................................................2-8
Figure 2-2 New connection..............................................................................................................................2-8
Figure 2-3 Setting the port................................................................................................................................2-9
Figure 2-4 Setting the port communication parameters....................................................................................2-9
Figure 2-5 Establishing the configuration environment through the wide area network (WAN) ...................2-10
Figure 2-6 Running the Telnet program on the PC.........................................................................................2-11
Figure 2-7 Establishing the remote configuration environment .....................................................................2-11
Figure 8-1 Using FTP to download files......................................................................................................... 8-16
Figure 8-3 Configuring the FTP client............................................................................................................8-19
Figure 8-4 Using TFTP to download files......................................................................................................8-21
Figure 8-5 Setting the base directory of the TFTP server...............................................................................8-21
Figure 8-6 Specifying the file to send.............................................................................................................8-23
Figure 9-3 Usage of Telnet shortcut keys .........................................................................................................9-3
Figure 9-4 Establishing an SSH channel in a LAN ..........................................................................................9-5
Figure 9-5 Establishing an SSH channel in a WAN..........................................................................................9-5
Figure 9-6 Networking diagram for Telnet mode...........................................................................................9-14
Figure 9-7 Networking diagram of SSH password authentication .................................................................9-16
Figure 9-8 Accessing the router from the client software...............................................................................9-17
Figure 9-9 Networking di agram of RSA ........................................................................................................9-18
Figure 12-1 Conversion of patch status..........................................................................................................12-2
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
ix
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
Tables
Table 1-1 System service features.....................................................................................................................1-3
Table 3-1 Command line views........................................................................................................................3-5
Table 3-2 Common CLI error messages...........................................................................................................3-8
Table 3-3 Access the command history.............................................................................................................3-8
Table 5-1 Examples of absolute numbering......................................................................................................5-2
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
xi
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
Contents
About this document....................................................................................................................... 1
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
i
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration About this document
About this document
Overview
This section describes the organization of this document, product version, intended audience,
conventions, and update history.
Related versions
The following table lists the product versions related to this document.
Product name Version
Nortel Secure Router 8000 Series Nortel Secure Router 8000 Series
Intended audience
This document is intended for the following audience:
z
network operators
z
network administrators
z
network maintenance engineers
Organization
This document consists of twelve chapters and is or ga ni zed as follow s.
Chapter Content
1 Product overview This chapter describes the architecture, features, and main
2 Establishment of the
Configuration Environment
Issue 5.3 (30 March 2009)
functions of the Nortel Secure Router 8000 Series.
This chapter describes the procedures to set up the
configuration environment through the console port, Telnet,
and the AUX port.
Nortel Networks Inc.
1
About this document
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
Chapter Content
3 CLI overview This chapter describes the command line interface (CLI),
command levels, command views, and hot keys.
4 Basic configuration This chapter describes how to configure the basic system
environment on the router.
5 User management This chapter describes the basic concepts of the user
interface and user management.
6 File System This chapter describes the file system and its configuration.
7 Management of
Configuration Files
8 FTP, TFTP, and
Xmodem
9 Telnet and SSH This chapter provides an overv iew of Telnet and Secure
10 Router maintenance This chapter describes the principles and concepts of router
11 System software
upgrade
12 Patch management This chapter describes the principles and concepts of patch
Appendix A Glossary and
Appendix B Acronyms and
Abbreviations
Index This chapter lists important key words used in this manual
This chapter describes how to manage the configuration
file.
This chapter describes how to configure the basic functions
of the File Transfer Protocol (FTP) server, and how to
upload and download files through FTP, Trivial File
Transfer Protocol (TFTP), and Xmodem.
Shell (SSH) and describes how to log on to the router
through Telnet and configure the router.
maintenance.
This chapter describes the principles and concepts of
system software upgrades.
management.
This chapter contains a glossary and list of frequently used
acronyms and abbreviations.
to help you access information quickly.
Conventions
This section describes the symbol and text conventions used in this document.
Symbol conventions
The following table describes the symbols that are used in this document.
Symbol Description
2
Indicates a hazard with a high level of risk that, if not avoided,
can result in death or serious injury.
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration About this document
Symbol Description
Indicates a hazard with a medium or low level of risk that, if
not avoided, can result in minor or moderate injury.
Indicates a potentially hazardous situation that, if not avoided,
can cause equipment damage, data loss, and performance
degradation, or unexpected results.
General conventions
Convention Description
Times New Roman Normal paragraphs are in Times New Roman font.
Boldface
Italic Book titles are in italics.
Courier New
Command conventions
Convention Description
Indicates a tip that may help you solve a problem or save time.
Provides additional information to emphasize or supplement
important points of the main text.
Names of files, directories, folders, and users are in
boldface. For example, log on as the user root.
Terminal display is in Courier New font.
Boldface
Italic Command arguments are in italics.
[ ] Items (keywords or arguments) in square brackets [ ] are
{ x | y | ... } Alternative items are grouped in braces and separated by
[ x | y | ... ] Optional alternative items are grouped in square brackets
{ x | y | ... } * Alternative items are grouped in braces and separated by
[ x | y | ... ] *
Issue 5.3 (30 March 2009)
The keywords of a command line are in boldface.
optional.
vertical bars. You select one item.
and separated by vertical bars. You select one item or no
item.
vertical bars. You can select a minimum of one item or a
maximum of all items.
Optional alternative items are grouped in square brackets
and separated by vertical bars. You can select no item or
multiple items.
Nortel Networks Inc.
3
About this document
Convention Description
&<1-n> The parameter before the ampersand sign (&) can be
# A line starting with the number sign (#) contains comments.
GUI conventions
Convention Description
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
repeated 1 to n times.
Boldface
> Multilevel menus are in boldface and separated by the
Keyboard operation
Format Description
Key
Key 1+Key 2
Key 1, Key 2 Press the keys in turn. For example, Alt, A means press the
Mouse operation
Buttons, menus, parameters, tabs, windows, and dialog box
titles are in boldface. For example, click OK.
right-angled bracket sign (>). For example, choose File >
Create > Folder.
Press the key. For example, press Enter and press Tab.
Press the keys concurrently. For example, Ctrl+Alt+A
means press the three keys concurrently.
two keys in turn.
4
Action Description
Click Select and release the primary mouse button without
moving the pointer.
Double-click Press the primary mouse button twice continuously and
quickly without moving the pointer.
Drag Press and hold the primary mouse button and move the
pointer to a new position.
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration About this document
Update history
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Updates in Issue 01(2008-06-06)
This is the first release of this document.
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
5
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
1.3.4 High Availability................................................................................................................................1-11
1.3.6 Link layer protocols ...........................................................................................................................1-12
1.3.7 IP services..........................................................................................................................................1-12
1.3.10 MPLS features .................................................................................................................................1-14
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
Tables
Table 1-1 System service features ......................................................................................................................1-3
Issue 5.3 (30 March 2009) Nortel Networks Inc.
v
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuratio n 1 Product overview
1 Product overview
About this
chapter
Tle shows the con
he following tabtents of this chapter.
Section Description
1.1 Introductionaracteristics of the Secure This section describes the ch
Router 8000 Series.
1.2 Functional featuress the functional features of the
1.3 FunctionsThis section describes the main functions of the Secure
This section describe
Secure Router 8000 Series.
Router 8000 Series.
Issue 5.3 (30 March 2009) Nortel Networks Inc.
1-1
1 Product overview
1.1 Introduction
This section describes the characteristics of the Secure Router 8000 Series:
z
Secure Router 8000 Series
z
Architecture
z
Versatile Routing Platform
1.1.1 Secure Router 8000 Series
The Secure Router 8000 Series routers are grouped into SR8002, SR8004, SR8008, and
SR8012 routers based on the number of slots. The equipment structure and the system of the
SR8012 are similar to the SR8008. All of the routers have a modular architecture and provide
optional multifunctional interface modules such as the High-speed Interface Card (HIC) and
Flexible Interface Card (FIC).
The Secure Router 8000 Series routers provide a coherent network interface, user interface,
and management interface, as well as flexibility and configurability. The routers integrate
technologies such as Multiprotocol Label Switching (MPLS), Virtual Private Network (VPN),
Quality of Service (QoS), traffic engineering, multicast, and user management. The routers
also support link layer protocols. In networking applications, as high-performance
convergence devices, the routers can provide overall service processing capacity and flexible
network solutions, thus improving network value and reducing costs.
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
1.1.2 Architecture
Based on the TCP/IP structure model, the Secure Router 8000 Series supports multiple data
link layer protocols, network layer protocols, and application layer protocols, as shown in
Figure 1-1.
Nortel Networks Inc. Issue 5.3 (15 January 2009)
1-2
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuratio n 1 Product overview
Figure 1-1 Architecture
Service Control Plane(SCP)
Protocol Client
AAA/Local-MCM
Data Forwarding Plane(DFP)
FE API
FEC
FE DRV
FE
General Control Plane(GCP)
Routing
URP4/6 MRP4/6
VPN_ExTE_Ex
RM4/6
IP Stack
Application Layer
Socket Layer
TCP4/6 UDP4/6
IP4/6 ICMP4/6
Net Interface
IFNET/PPP/ETH/
ATM/Tunnel
System Service Plane(SSP)
OSAL
Operating System
L2VPN/L3VPN
CSPF/CR-LDP/
RSVP-TE
Security
FireWall/ACL/
BW-M/QoSM/
RPC
IPC
VPN
MPLS
NAT
QoS
RSVP
System Manage
Plane(SMP)
Config Management
CLI/SNMP/WebUI
CMO
Information
Management
Trace/State Multi
Languages
Device
Management
Hot Plug
Switch Over
1.1.3 Versatile Routing Platform
Versatile Routing Platform (VRP) is a proprietary network operating system platform,
developed for Nortel data communication products. VRP has a modular architecture and can
provide rich functional features and scalability based on applications.
With TCP/IP as its core protocol suite, VRP performs the following functions:
z
integrates routing, QoS, VPN, security, and IP voice in the operating system
z
provides enhanced data forwarding capabilities for routing equipment by using IP
TurboEngine technology
z
provides various hardware platforms with a consistent network interface, user interface,
and management interface
z
provides users with flexible application solutions
1.2 Functional features
This section describes the functional features of the Secure Router 8000 Series.
Table 1-1 System service features
Service features Description
Network
interconnection
Issue 5.3 (30 March 2009) Nortel Networks Inc.
LAN
protocol
Ethernet
VLAN
1-3
1 Product overview
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
Service features Description
Network protocol
Link layer
protocol
PPP and MP
HDLC (High-level Data Link Control)
Frame Relay
ATM
PPPoE, IPoA, PPPoA, and PPPoEoA
IP service ARP
Domain name resolution
NAT
IP unnumbered address
DHCP relay and DHCP server
IP policy-based routing
IP packet filtering
Protocol
stacks
IPv4 and IPv6 dual protocol stacks
IPv6 forwarding through the hardware