Panasonic NN46240-501 User Manual

Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
Release: Document Revision:
5.3
01.01
www.nortel.com
NN46240-501 324555-A Rev01
Nortel Secure Router 8000 Series Release: 5.3 Publication: NN46240-501 Document Revision: 01.01 Document status: Standard Document release date: 30 March 2009
Copyright © 2009 Nortel Networks All Rights Reserved.
Printed in Canada, India, and the United States of America LEGAL NOTICE
While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject to change without notice.
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks. All other trademarks are the property of their respective owners.
ATTENTION
For information about the safety precautions, read "Safety messages" in this guide. For information about the software license, read "Software license" in this guide.
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration

Contents

About this document.......................................................................................................................1
1 Product overview........................................................................................................................1-1
1.1 Introduction.................................................................................................................................................1-2
1.1.1 Secure Router 8000 Series ................................................................................................................1-2
1.1.2 Architecture.......................................................................................................................................1-2
1.1.3 Versatile Routing Platform................................................................................................................1-3
1.2 Functional features......................................................................................................................................1-3
1.3 Functions.....................................................................................................................................................1-9
1.3.1 File system ......................................................................................................................................1-10
1.3.2 SNMP configuration........................................................................................................................1-10
1.3.3 Terminal services.............................................................................................................................1-10
1.3.4 High Availability.............................................................................................................................1-11
1.3.5 Interfaces.........................................................................................................................................1-12
1.3.6 Link layer protocols ........................................................................................................................1-12
1.3.7 IP services.......................................................................................................................................1-12
1.3.8 Unicast routing protocols ................................................................................................................1-13
1.3.9 Multicast routing protocols .............................................................................................................1-14
1.3.10 MPLS features...............................................................................................................................1-14
1.3.11 VPN services.................................................................................................................................1-15
1.3.12 QoS................................................................................................................................................1-15
1.3.13 Security features............................................................................................................................1-17
2 Configuration environment setup ..........................................................................................2-1
2.1 Introduction.................................................................................................................................................2-2
2.1.1 Console port configuration................................................................................................................2-2
2.1.2 Telnet configuration ..........................................................................................................................2-2
2.1.3 AUX port configuration.....................................................................................................................2-3
2.2 Establishing the local configuration environment through the console port................................................2-3
2.2.1 Establishing the configuration task ...................................................................................................2-3
2.2.2 Establishing the physical connection.................................................................................................2-4
2.2.3 Configuring terminals........................................................................................................................2-4
2.2.4 Logging on to the router....................................................................................................................2-4
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
i
Nortel Secure Router 8000 Series
2.3 Establishing the configuration environment through Telnet........................................................................2-4
2.3.1 Establishing the configuration task ...................................................................................................2-4
2.3.2 Establishing the physical connection.................................................................................................2-5
2.3.3 Configuring logon user parameters...................................................................................................2-5
2.3.4 Logging on from the Telnet client.....................................................................................................2-5
2.4 Establishing the configuration environment through the AUX port............................................................2-6
2.4.1 Establishing the configuration task ...................................................................................................2-6
2.4.2 Establishing the physical connection.................................................................................................2-6
2.4.3 Initializing and configuring the modem on the interface...................................................................2-7
2.4.4 Configuring the connection between the remote terminal and the router..........................................2-7
2.4.5 Logging on to the router....................................................................................................................2-7
2.5 Configuration examples...............................................................................................................................2-7
2.5.1 Example of logging on through the console port..............................................................................2-7
2.5.2 Example of logging on through Telnet............................................................................................2-10
2.5.3 Example of logging on through the AUX port................................................................................2-11
Configuration Guide - Basic Configuration
3 CLI overview...............................................................................................................................3-1
3.1 Introduction.................................................................................................................................................3-2
3.1.1 CLI characteristics.............................................................................................................................3-2
3.1.2 Command levels................................................................................................................................3-3
3.1.3 Command line views.........................................................................................................................3-3
3.1.4 Regular expressions...........................................................................................................................3-3
3.2 Configuring the command line view...........................................................................................................3-4
3.3 CLI online Help...........................................................................................................................................3-7
3.4 CLI error messages......................................................................................................................................3-8
3.5 Command history........................................................................................................................................3-8
3.6 Editing characteristics .................................................................................................................................3-9
3.7 Display characteristics.................................................................................................................................3-9
3.8 Outputting the display ...............................................................................................................................3-10
3.8.1 V iewing the display.........................................................................................................................3-10
3.8.2 Filtering the display.........................................................................................................................3-10
3.9 Filtering information through regular expressions ....................................................................................3-10
3.10 Shortcut keys...........................................................................................................................................3-11
3.10.1 Classifying shortcut keys...............................................................................................................3-11
3.10.2 Defining shortcut keys...................................................................................................................3-13
3.10.3 Using shortcut keys.......................................................................................................................3-13
3.11 Configuration examples...........................................................................................................................3-14
3.11.1 Example for using shortcut keys ...................................................................................................3-14
4 Basic configuration ....................................................................................................................4-1
4.1 Introduction.................................................................................................................................................4-2
4.1.1 Extension of command levels............................................................................................................4-2
4.1.2 Extension of user levels.....................................................................................................................4-2
ii
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration
4.2 Configuring the basic system environment.................................................................................................4-2
4.2.1 Establishing the configuration task ...................................................................................................4-2
4.2.2 Configuring the device name ............................................................................................................4-3
4.2.3 Configuring the system clock............................................................................................................4-4
4.2.4 Configuring the header text...............................................................................................................4-4
4.2.5 Configuring the password for switching user levels..........................................................................4-5
4.2.6 Switching user levels.........................................................................................................................4-5
4.2.7 Locking the user interface.................................................................................................................4-6
4.2.8 Configuring command privilege levels.............................................................................................4-6
4.2.9 Displaying system status messages...................................................................................................4-6
5 User management.......................................................................................................................5-1
5.1 Introduction.................................................................................................................................................5-2
5.1.1 User interface view............................................................................................................................5-2
5.1.2 User management..............................................................................................................................5-3
5.2 Configuring a user interface........................................................................................................................5-4
5.2.1 Establishing the configuration task ...................................................................................................5-4
5.2.2 Transmitting m essages between user interfaces................................................................................5-6
5.2.3 Configuring asynchronous interface attributes..................................................................................5-6
5.2.4 Setting terminal attributes .................................................................................................................5-7
5.2.5 Configuring the user interface priority..............................................................................................5-7
5.2.6 Configuring modem attributes...........................................................................................................5-8
5.2.7 Configuring an auto-execute command.............................................................................................5-8
5.2.8 Configuring the redirection function.................................................................................................5-9
5.2.9 Configuring the call-in or call-out restrictions of the VTY user interface.........................................5-9
5.2.10 Configuring the maximum number of VTY user interfaces..........................................................5-10
5.2.11 Configuring the authentication timeout for VTY users .................................................................5-10
5.2.12 Disconnecting a user interface.......................................................................................................5-11
5.2.13 Checking the configuration...........................................................................................................5-11
5.3 Configuring user management...................................................................................................................5-11
5.3.1 Establishing the configuration task .................................................................................................5-11
5.3.2 Configuring the authentication mode..............................................................................................5-12
5.3.3 Configuring the authentication password ........................................................................................5-13
5.3.4 Configuring the user name and password for AAA local authentication.........................................5-13
5.3.5 Configuring the user priority...........................................................................................................5-14
5.3.6 Checking the configuration.............................................................................................................5-14
5.4 Configuring local user management..........................................................................................................5-14
5.4.1 Establishing the configuration task .................................................................................................5-14
5.4.2 Creating the local user account........................................................................................................5-15
5.4.3 Configuring the service type of the local user.................................................................................5-15
5.4.4 Configuring FTP directory authority for the local user...................................................................5-16
5.4.5 Configuring the local user status.....................................................................................................5-16
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
iii
Nortel Secure Router 8000 Series
5.4.6 Configuring the local user priority..................................................................................................5-17
5.4.7 Configuring the access restriction of the local user.........................................................................5-17
5.4.8 Checking the configuration.............................................................................................................5-17
5.5 Configuration examples.............................................................................................................................5-18
5.5.1 Example of logging on to the router through password authentication...........................................5-18
5.5.2 Example of logging on to the router through AAA.........................................................................5-19
Configuration Guide - Basic Configuration
6 File system management ..........................................................................................................6-1
6.1 Introduction.................................................................................................................................................6-2
6.1.1 File system ........................................................................................................................................6-2
6.1.2 Storage devices..................................................................................................................................6-2
6.1.3 Files...................................................................................................................................................6-2
6.1.4 Directories.........................................................................................................................................6-2
6.2 Managing directories...................................................................................................................................6-2
6.2.1 Establishing the configuration task ...................................................................................................6-2
6.2.2 Viewing the current directory............................................................................................................6-3
6.2.3 Switching the directory .....................................................................................................................6-3
6.2.4 Displaying the files in a directory .....................................................................................................6-4
6.2.5 Creating a directory...........................................................................................................................6-4
6.2.6 Deleting a directory...........................................................................................................................6-4
6.3 Managing files.............................................................................................................................................6-5
6.3.1 Displaying the contents of a file........................................................................................................6-5
6.3.2 Copying a file....................................................................................................................................6-6
6.3.3 Moving a file.....................................................................................................................................6-6
6.3.4 Renaming a file.................................................................................................................................6-6
6.3.5 Deleting a file....................................................................................................................................6-7
6.3.6 Deleting files in the recycle bin.........................................................................................................6-7
6.3.7 Restoring files...................................................................................................................................6-7
6.4 Configuring batch configuration .................................................................................................................6-8
6.5 Managing storage devices...........................................................................................................................6-8
6.6 Configuring prompt modes..........................................................................................................................6-9
6.7 Example of configuring directory management........................................................................................6-10
7 Configuration file management..............................................................................................7-1
7.1 Introduction.................................................................................................................................................7-2
7.1.1 Configuration file..............................................................................................................................7-2
7.1.2 Configuration files and current configurations..................................................................................7-2
7.2 Displaying the configuration of the router...................................................................................................7-2
7.2.1 Viewing the intial configuration........................................................................................................7-2
7.2.2 Viewing the current configuration.....................................................................................................7-3
7.2.3 Viewing the running configuration in the current view.....................................................................7-3
7.3 Saving the current configuration .................................................................................................................7-3
7.4 Clearing the running information................................................................................................................7-3
iv
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration
7.5 Comparing configuration files.....................................................................................................................7-4
8 FTP, TFTP, and Xmodem..........................................................................................................8-1
8.1 Introduction.................................................................................................................................................8-2
8.1.1 FTP....................................................................................................................................................8-2
8.1.2 TFTP .................................................................................................................................................8-2
8.1.3 Xmodem............................................................................................................................................8-2
8.2 Configuring the router to be the FTP server................................................................................................8-3
8.2.1 Establishing the configuration task ...................................................................................................8-3
8.2.2 Enabling the FTP server....................................................................................................................8-4
8.2.3 Configuring the timeout period.........................................................................................................8-4
8.2.4 Configuring the local user name and password.................................................................................8-4
8.2.5 Configuring service types and authorization information.................................................................8-5
8.2.6 Checking the configuration...............................................................................................................8-5
8.3 Configuring FTP ACL................................................................................................................................. 8-6
8.3.1 Establishing the configuration task ...................................................................................................8-6
8.3.2 Enabling the FTP server....................................................................................................................8-6
8.3.3 Configuring the basic ACL................................................................................................................8-7
8.3.4 Configuring the basic FTP ACL........................................................................................................8-7
8.4 Configuring the router to be the FTP client.................................................................................................8-8
8.4.1 Establishing the configuration task ...................................................................................................8-8
8.4.2 Logging on to the FTP server............................................................................................................8-8
8.4.3 Configuring the file transmission mode............................................................................................8-9
8.4.4 Viewing online Help for the FTP command......................................................................................8-9
8.4.5 Uploading or downloadi ng fil e s........................................................................................................8-9
8.4.6 Managing directories.......................................................................................................................8-10
8.4.7 Managing files.................................................................................................................................8-11
8.4.8 Changing logon users......................................................................................................................8-11
8.4.9 Disconnecting FTP..........................................................................................................................8-11
8.5 Configuring TFTP.....................................................................................................................................8-12
8.5.1 Establishing the configuration task .................................................................................................8-12
8.5.2 Downloading files through TFTP....................................................................................................8-12
8.5.3 Uploading files through TFTP.........................................................................................................8-13
8.6 Limiting access to the TFTP server...........................................................................................................8-13
8.6.1 Establishing the configuration task .................................................................................................8-13
8.6.2 Configuring the basic ACL..............................................................................................................8-14
8.6.3 Configuring the basic TFTP ACL....................................................................................................8-14
8.7 Configuring Xmodem................................................................................................................................8-14
8.7.1 Establishing the configuration task .................................................................................................8-14
8.7.2 Retrieving a file through Xmodem..................................................................................................8-15
8.8 Configuration examples.............................................................................................................................8-15
8.8.1 Example of configuring the FTP server...........................................................................................8-15
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
v
Nortel Secure Router 8000 Series
8.8.2 Example of configuring FTP ACL.................................................................................................. 8-17
8.8.3 Example of configuring the FTP client...........................................................................................8-19
8.8.4 Example of configuring TFTP.........................................................................................................8-20
8.8.5 Example of configuring XModem...................................................................................................8-22
Configuration Guide - Basic Configuration
9 Telnet and SSH...........................................................................................................................9-1
9.1 Introduction.................................................................................................................................................9-2
9.1.1 Overview of user logon.....................................................................................................................9-2
9.1.2 Telnet terminal services.....................................................................................................................9-2
9.1.3 SSH terminal services.......................................................................................................................9-4
9.2 Configuring Telnet terminal services...........................................................................................................9-6
9.2.1 Establishing the configuration task ...................................................................................................9-6
9.2.2 Establishing a Telnet connection.......................................................................................................9-7
9.2.3 Scheduling Telnet disconnection.......................................................................................................9-7
9.2.4 Checking the configuration...............................................................................................................9-8
9.3 Configuring SSH terminal services .............................................................................................................9-8
9.3.1 Establishing the configuration task ...................................................................................................9-8
9.3.2 Configuring SSH for the VTY user interface....................................................................................9-9
9.3.3 Generating the local RSA key pair..................................................................................................9-10
9.3.4 Authenticating the SSH client through the password......................................................................9-10
9.3.5 Authenticating the SSH client through RSA ...................................................................................9-11
9.3.6 Configuring basic authentication information for the SSH user......................................................9-12
9.3.7 Authorizing the SSH user through the command line interface ......................................................9-12
9.3.8 Checking the configuration.............................................................................................................9-12
9.4 Maintaining Telnet and SSH......................................................................................................................9-13
9.4.1 Debugging Telnet terminal services................................................................................................9-13
9.4.2 Debugging SSH termin al services...................................................................................................9-13
9.5 Configuration examples.............................................................................................................................9-14
9.5.1 Example of configuring Telnet terminal services............................................................................9-14
9.5.2 Example of configuring password authentication...........................................................................9-16
9.5.3 Example of configuring RSA authentication...................................................................................9-17
10 Router maintenance...............................................................................................................10-1
10.1 Introduction.............................................................................................................................................10-2
10.1.1 Device operation management......................................................................................................10-2
10.1.2 Electronic label..............................................................................................................................10-2
10.2 Powering off the FIC/HIC.......................................................................................................................10-2
10.2.1 Establishing the configuration task ...............................................................................................10-2
10.2.2 Powering off the FIC/HIC.............................................................................................................10-3
10.2.3 Checking the configuration ...........................................................................................................10-3
10.3 Managing the device operation................................................................................................................10-4
10.3.1 Establishing the configuration task ...............................................................................................10-4
10.3.2 Specifying the slave RPU..............................................................................................................10-5
vi
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration
10.3.3 Restarting the router......................................................................................................................10-5
10.3.4 Performing the master/slave switchover........................................................................................10-6
10.4 Monitoring the router status ....................................................................................................................10-7
10.4.1 Displaying the basic device information.......................................................................................10-7
10.4.2 Displaying the system version information...................................................................................10-7
10.4.3 Displaying RPU restart information..............................................................................................10-8
10.5 Configuring the electronic label.............................................................................................................. 10-9
10.5.1 Establishing the configuration task ...............................................................................................10-9
10.5.2 Querying the electronic label.........................................................................................................10-9
10.5.3 Backing up the electronic label.....................................................................................................10-9
11 System software upgrade .....................................................................................................11-1
11.1 Introduction .............................................................................................................................................11-2
11.1.1 System software upgrade...............................................................................................................11-2
11.1.2 License ..........................................................................................................................................11-2
11.2 Uploading the system software and license files.....................................................................................11-3
11.2.1 Establishing the configuration task................................................................................................11-3
11.2.2 Uploading the system software and license to the master RPU..................................................11-3
11.2.3 Copying the system software and license to the slave RPU..........................................................11-4
11.2.4 Checking the configuration ...........................................................................................................11-4
11.3 Specifying the system software for the next router startup......................................................................11-5
11.3.1 Establishing the cofiguration task..................................................................................................11-5
11.3.2 Specifying the system software for the next startup of the master RPU........................................11-5
11.3.3 Specifying the system software for the next startup of the slave RPU..........................................11-6
11.3.4 Checking the configuration ...........................................................................................................11-6
12 Patch management .................................................................................................................12-1
12.1 Introduction.............................................................................................................................................12-2
12.2 Checking the system for running patches................................................................................................12-3
12.2.1 Establishing the configuration task ...............................................................................................12-3
12.2.2 Checking for a running patch on the RPU.....................................................................................12-3
12.3 Uploading a patch....................................................................................................................................12-4
12.3.1 Establishing the configuration task ...............................................................................................12-4
12.3.2 Uploading a patch to the root directory of the flash of the master RPU........................................12-4
12.3.3 Copying a patch to the root directory of the flash of the slav e RPU .............................................12-5
12.4 Installing a patch on the RPU..................................................................................................................12-5
12.4.1 Establishing the configuration task ...............................................................................................12-5
12.4.2 Uploading the RPU patch..............................................................................................................12-6
12.4.3 Activating the RPU patch.............................................................................................................. 12-6
12.4.4 Running the RPU patch................................................................................................................. 12-6
12.5 Canceling the RPU patch.........................................................................................................................12-6
12.5.1 Establishing the configuration task ...............................................................................................12-6
12.5.2 Deactivating the RPU patch ..........................................................................................................12-7
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
vii
Nortel Secure Router 8000 Series
12.6 Removing the RPU patch........................................................................................................................12-7
12.6.1 Establishing the configuration task ...............................................................................................12-7
12.6.2 Deleting the RPU patch.................................................................................................................12-8
Configuration Guide - Basic Configuration
A Glossary .................................................................................................................................... A-1
B Acronyms and abbreviations .................................................................................................B-1
Index ................................................................................................................................................ i-1
viii
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration
Figures
Figure 1-1 Architecture.....................................................................................................................................1-3
Figure 2-1 Networking diagram of logging on through the console port.........................................................2-8
Figure 2-2 New connection..............................................................................................................................2-8
Figure 2-3 Setting the port................................................................................................................................2-9
Figure 2-4 Setting the port communication parameters....................................................................................2-9
Figure 2-5 Establishing the configuration environment through the wide area network (WAN) ...................2-10
Figure 2-6 Running the Telnet program on the PC.........................................................................................2-11
Figure 2-7 Establishing the remote configuration environment .....................................................................2-11
Figure 8-1 Using FTP to download files......................................................................................................... 8-16
Figure 8-2 FTP ACL.......................................................................................................................................8-18
Figure 8-3 Configuring the FTP client............................................................................................................8-19
Figure 8-4 Using TFTP to download files......................................................................................................8-21
Figure 8-5 Setting the base directory of the TFTP server...............................................................................8-21
Figure 8-6 Specifying the file to send.............................................................................................................8-23
Figure 9-1 Telnet client services.......................................................................................................................9-3
Figure 9-2 Telnet redirection services...............................................................................................................9-3
Figure 9-3 Usage of Telnet shortcut keys .........................................................................................................9-3
Figure 9-4 Establishing an SSH channel in a LAN ..........................................................................................9-5
Figure 9-5 Establishing an SSH channel in a WAN..........................................................................................9-5
Figure 9-6 Networking diagram for Telnet mode...........................................................................................9-14
Figure 9-7 Networking diagram of SSH password authentication .................................................................9-16
Figure 9-8 Accessing the router from the client software...............................................................................9-17
Figure 9-9 Networking di agram of RSA ........................................................................................................9-18
Figure 12-1 Conversion of patch status..........................................................................................................12-2
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
ix
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration
Tables
Table 1-1 System service features.....................................................................................................................1-3
Table 3-1 Command line views........................................................................................................................3-5
Table 3-2 Common CLI error messages...........................................................................................................3-8
Table 3-3 Access the command history.............................................................................................................3-8
Table 3-4 Editing functions...............................................................................................................................3-9
Table 3-5 Display functions............................................................................................................................3-10
Table 3-6 Metacharacters................................................................................................................................3-10
Table 3-7 System-defined shortcut keys.........................................................................................................3-12
Table 5-1 Examples of absolute numbering......................................................................................................5-2
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
xi
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration
Contents
About this document....................................................................................................................... 1
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
i
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration About this document
About this document
Overview
This section describes the organization of this document, product version, intended audience, conventions, and update history.
Related versions
The following table lists the product versions related to this document.
Product name Version
Nortel Secure Router 8000 Series Nortel Secure Router 8000 Series
Intended audience
This document is intended for the following audience:
z
network operators
z
network administrators
z
network maintenance engineers
Organization
This document consists of twelve chapters and is or ga ni zed as follow s.
Chapter Content
1 Product overview This chapter describes the architecture, features, and main
2 Establishment of the Configuration Environment
Issue 5.3 (30 March 2009)
functions of the Nortel Secure Router 8000 Series. This chapter describes the procedures to set up the
configuration environment through the console port, Telnet, and the AUX port.
Nortel Networks Inc.
1
About this document
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
Chapter Content
3 CLI overview This chapter describes the command line interface (CLI),
command levels, command views, and hot keys.
4 Basic configuration This chapter describes how to configure the basic system
environment on the router.
5 User management This chapter describes the basic concepts of the user
interface and user management. 6 File System This chapter describes the file system and its configuration. 7 Management of
Configuration Files 8 FTP, TFTP, and
Xmodem
9 Telnet and SSH This chapter provides an overv iew of Telnet and Secure
10 Router maintenance This chapter describes the principles and concepts of router
11 System software upgrade
12 Patch management This chapter describes the principles and concepts of patch
Appendix A Glossary and Appendix B Acronyms and Abbreviations
Index This chapter lists important key words used in this manual
This chapter describes how to manage the configuration
file.
This chapter describes how to configure the basic functions
of the File Transfer Protocol (FTP) server, and how to
upload and download files through FTP, Trivial File
Transfer Protocol (TFTP), and Xmodem.
Shell (SSH) and describes how to log on to the router
through Telnet and configure the router.
maintenance.
This chapter describes the principles and concepts of
system software upgrades.
management.
This chapter contains a glossary and list of frequently used
acronyms and abbreviations.
to help you access information quickly.
Conventions
This section describes the symbol and text conventions used in this document.
Symbol conventions
The following table describes the symbols that are used in this document.
Symbol Description
2
Indicates a hazard with a high level of risk that, if not avoided, can result in death or serious injury.
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration About this document
Symbol Description
Indicates a hazard with a medium or low level of risk that, if not avoided, can result in minor or moderate injury.
Indicates a potentially hazardous situation that, if not avoided, can cause equipment damage, data loss, and performance degradation, or unexpected results.
General conventions
Convention Description
Times New Roman Normal paragraphs are in Times New Roman font.
Boldface
Italic Book titles are in italics.
Courier New
Command conventions
Convention Description
Indicates a tip that may help you solve a problem or save time. Provides additional information to emphasize or supplement
important points of the main text.
Names of files, directories, folders, and users are in boldface. For example, log on as the user root.
Terminal display is in Courier New font.
Boldface
Italic Command arguments are in italics. [ ] Items (keywords or arguments) in square brackets [ ] are
{ x | y | ... } Alternative items are grouped in braces and separated by
[ x | y | ... ] Optional alternative items are grouped in square brackets
{ x | y | ... } * Alternative items are grouped in braces and separated by
[ x | y | ... ] *
Issue 5.3 (30 March 2009)
The keywords of a command line are in boldface.
optional.
vertical bars. You select one item.
and separated by vertical bars. You select one item or no item.
vertical bars. You can select a minimum of one item or a maximum of all items.
Optional alternative items are grouped in square brackets and separated by vertical bars. You can select no item or multiple items.
Nortel Networks Inc.
3
About this document
Convention Description
&<1-n> The parameter before the ampersand sign (&) can be
# A line starting with the number sign (#) contains comments.
GUI conventions
Convention Description
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
repeated 1 to n times.
Boldface
> Multilevel menus are in boldface and separated by the
Keyboard operation
Format Description
Key Key 1+Key 2
Key 1, Key 2 Press the keys in turn. For example, Alt, A means press the
Mouse operation
Buttons, menus, parameters, tabs, windows, and dialog box titles are in boldface. For example, click OK.
right-angled bracket sign (>). For example, choose File > Create > Folder.
Press the key. For example, press Enter and press Tab. Press the keys concurrently. For example, Ctrl+Alt+A
means press the three keys concurrently.
two keys in turn.
4
Action Description
Click Select and release the primary mouse button without
moving the pointer.
Double-click Press the primary mouse button twice continuously and
quickly without moving the pointer.
Drag Press and hold the primary mouse button and move the
pointer to a new position.
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration About this document
Update history
Updates between document versions are cumulative. Therefore, the latest document version contains all updates made to previous versions.
Updates in Issue 01(2008-06-06)
This is the first release of this document.
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
5
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration
Contents
1 Product overview........................................................................................................................1-1
1.1 Introduction...................................................................................................................................................1-2
1.1.1 Secure Router 8000 Series...................................................................................................................1-2
1.1.2 Architecture..........................................................................................................................................1-2
1.1.3 Versatile Routing Platform...................................................................................................................1-3
1.2 Functional features........................................................................................................................................1-3
1.3 Functions.......................................................................................................................................................1-9
1.3.1 File system.........................................................................................................................................1-10
1.3.2 SNMP configuration..........................................................................................................................1-10
1.3.3 Terminal services ...............................................................................................................................1-10
1.3.4 High Availability................................................................................................................................1-11
1.3.5 Interfaces............................................................................................................................................1-12
1.3.6 Link layer protocols ...........................................................................................................................1-12
1.3.7 IP services..........................................................................................................................................1-12
1.3.8 Unicast routing protocols...................................................................................................................1-13
1.3.9 Multicast routing protocols................................................................................................................1-14
1.3.10 MPLS features .................................................................................................................................1-14
1.3.11 VPN services....................................................................................................................................1-15
1.3.12 QoS..................................................................................................................................................1-15
1.3.13 Security features...............................................................................................................................1-17
Issue 5.3 (30 March 2009) Nortel Networks Inc.
i
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration
Figures
Figure 1-1 Architecture ......................................................................................................................................1-3
Issue 5.3 (30 March 2009) Nortel Networks Inc.
iii
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuration
Tables
Table 1-1 System service features ......................................................................................................................1-3
Issue 5.3 (30 March 2009) Nortel Networks Inc.
v
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuratio n 1 Product overview

1 Product overview

About this
chapter
T le shows the con
he following tab tents of this chapter.
Section Description
1.1 Introduction aracteristics of the Secure This section describes the ch
Router 8000 Series.
1.2 Functional features s the functional features of the
1.3 Functions This section describes the main functions of the Secure
This section describe Secure Router 8000 Series.
Router 8000 Series.
Issue 5.3 (30 March 2009) Nortel Networks Inc.
1-1
1 Product overview

1.1 Introduction

This section describes the characteristics of the Secure Router 8000 Series:
z
Secure Router 8000 Series
z
Architecture
z
Versatile Routing Platform
1.1.1 Secure Router 8000 Series
The Secure Router 8000 Series routers are grouped into SR8002, SR8004, SR8008, and SR8012 routers based on the number of slots. The equipment structure and the system of the SR8012 are similar to the SR8008. All of the routers have a modular architecture and provide optional multifunctional interface modules such as the High-speed Interface Card (HIC) and Flexible Interface Card (FIC).
The Secure Router 8000 Series routers provide a coherent network interface, user interface, and management interface, as well as flexibility and configurability. The routers integrate technologies such as Multiprotocol Label Switching (MPLS), Virtual Private Network (VPN), Quality of Service (QoS), traffic engineering, multicast, and user management. The routers also support link layer protocols. In networking applications, as high-performance convergence devices, the routers can provide overall service processing capacity and flexible network solutions, thus improving network value and reducing costs.
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
1.1.2 Architecture
Based on the TCP/IP structure model, the Secure Router 8000 Series supports multiple data link layer protocols, network layer protocols, and application layer protocols, as shown in Figure 1-1.
Nortel Networks Inc. Issue 5.3 (15 January 2009)
1-2
Nortel Secure Router 8000 Series Configuration Guide - Basic Configuratio n 1 Product overview
Figure 1-1 Architecture
Service Control Plane(SCP)
Protocol Client
AAA/Local-MCM
Data Forwarding Plane(DFP)
FE API
FEC
FE DRV
FE
General Control Plane(GCP)
Routing
URP4/6 MRP4/6
VPN_ExTE_Ex
RM4/6
IP Stack
Application Layer
Socket Layer
TCP4/6 UDP4/6
IP4/6 ICMP4/6
Net Interface
IFNET/PPP/ETH/
ATM/Tunnel
System Service Plane(SSP)
OSAL
Operating System
L2VPN/L3VPN
CSPF/CR-LDP/
RSVP-TE
Security
FireWall/ACL/
BW-M/QoSM/
RPC
IPC
VPN
MPLS
NAT QoS
RSVP
System Manage
Plane(SMP)
Config Management
CLI/SNMP/WebUI
CMO
Information
Management
Trace/State Multi
Languages
Device
Management
Hot Plug
Switch Over
1.1.3 Versatile Routing Platform
Versatile Routing Platform (VRP) is a proprietary network operating system platform, developed for Nortel data communication products. VRP has a modular architecture and can provide rich functional features and scalability based on applications.
With TCP/IP as its core protocol suite, VRP performs the following functions:
z
integrates routing, QoS, VPN, security, and IP voice in the operating system
z
provides enhanced data forwarding capabilities for routing equipment by using IP TurboEngine technology
z
provides various hardware platforms with a consistent network interface, user interface, and management interface
z
provides users with flexible application solutions

1.2 Functional features

This section describes the functional features of the Secure Router 8000 Series.
Table 1-1 System service features
Service features Description
Network interconnection
Issue 5.3 (30 March 2009) Nortel Networks Inc.
LAN protocol
Ethernet VLAN
1-3
1 Product overview
Nortel Secure Router 8000 Series
Configuration Guide - Basic Configuration
Service features Description
Network protocol
Link layer protocol
PPP and MP HDLC (High-level Data Link Control) Frame Relay ATM PPPoE, IPoA, PPPoA, and PPPoEoA
IP service ARP
Domain name resolution NAT IP unnumbered address DHCP relay and DHCP server IP policy-based routing IP packet filtering
Protocol stacks
IPv4 and IPv6 dual protocol stacks IPv6 forwarding through the hardware
IPv4 routing Static route management
Dynamic unicast routing protocols:
z
RIP-1/RIP-2
z
OSPF
z
IS-IS
z
BGP-4/MBGP/BGP VPN V4
Routing policies
IPv6 routing IPv4-to-IPv6 transition technologies: manual
tunnel configuration, automatic tunnel configuration, 6to4 tunnel, NAT-PT on the hardware
IPv6 static route, BGP4/BGP4+, RIPng, OSPFv3, and ISISv6 dynamic routing protocol
IPv6 MIB: ICMPv6 MIB, UDP6 MIB, TCP6 MIB, and IPv6 MIB
IP multicast protocols
IGMP PIM-DM, PIM-SM PIM-SSM MBGP MSDP
MPLS MPLS Basic MPLS forwarding
MPLS LDP MPLS TE MPLS QoS Hierarchy of PE (HoPE)
Nortel Networks Inc. Issue 5.3 (15 January 2009)
1-4
Loading...
+ 207 hidden pages