Paradyne BitStorm 4800 User Manual

Page 1
BitStorm™ 4800
User’s Guide
Document No. 4800-A2-GB20-10
July 2002
Page 2
Copyright © 2002 Paradyne Corporation. All rights reserved. Printed in U.S.A.
Notice
This publi cation is protected by federal copyri ght l aw. No part of this publication may be copied or di stributed, transmitt ed, tr anscri bed, stor ed in a retrie v al syst em, or tr anslat ed into an y human or comput er langu age in any form or by any mea ns, electronic, mechanical, magnetic, manual or otherwise, or disclosed to thir d parties without the express written permission of Paradyne Corporation, 8545 126th Ave. N., Larg o, FL 33773.
Par adyne Corporation makes no representation or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fit ness for a particular purpose. Further, Parady ne Corporat ion reserves the right to revise this publi cation and to make changes from ti m e to tim e in the contents hereof without obligation of Paradyne Corporation to notify any person of such revision or changes.
Changes and enhancements to the product and to the information herein will be documented and issued as a new release to this manual.
W arranty, Sales, Service, and Training Information
Contact yo ur loc al sales r eprese ntati v e, service r epresent ativ e , or dist ribut or di rec tly f or an y hel p need ed. F or addit ional informati on concerning warranty, sal es, service, repair, installation, docum entation, training, distributor locations, or Paradyne worldwide office locations, use one of the following methods:
Internet: Visit the Paradyne W orld Wide Web site at www.paradyne.com. (Be sure to regist er your warranty at
www.paradyne.com/warranty.) Telephone: Call our automated system to receive current information by fax or to speak with a company
representative.
Within the U.S.A., call 1-800- 870-2221Outside the U.S.A., call 1-727- 530-2340
Document Feedback
We welcome your comments and suggestions about this document. Please mail them to Technical Publications, Par adyne Corporation, 8545 126th A ve. N., Largo, FL 33773, or send e-mail to userdoc@paradyne.com. Include the number and title of this document in your correspondence. Please include your name and phone number if you are willing to pro vide additional clarificat ion.
Trademarks
ACCULINK, COMSPHERE, F rameSaver, Hotwire, MVL, NextEDGE, OpenLane, and Performance Wizard are registere d tr adem arks of Paradyne Corporat ion. BitStorm, EtherLoop, GrandVIEW , ReachDSL, StormPort, StormSystem, StormTracker, and TruePut are trademarks of Pa radyne Corporation. All other products and services mentioned herei n are the trademarks, service marks, re gistered trademarks, or regi stered service marks of their resp ective ow n ers.
A
Page 3
Contents
About This Guide
Document Purpose and Intended Audience . . . . . . . . . . . . . . . . . . . . vii
Document Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Product-Related Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Reference Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
1 BitStorm 4800 Overview
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
2 Terminology and Conventions
System Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
DSL Port ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Ethernet Port ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Reserved Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
3 Using the Command Line Interface
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Logging In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Command Line Prompts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Modes of Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Back Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Automatic Command Completion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Command History Buffer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
More Prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Command Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Keyboard Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Command Syntax Error Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
4800-A2-GB20-10 July 2002
i
Page 4
Contents
Automatic Logout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Configuring the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
4 Using the Web Interface
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Browsers Supported. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Logging In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Configuring the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Saving the Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Logging Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
5 Monitoring and Troubleshooting
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
System Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Viewing the System Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Message Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3
Front Panel LEDs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6
Show Commands and Web Interface Status Screens. . . . . . . . . . . . . 5-6
A CLI Command Descriptions
CLI Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1
Back. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2
Clear. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-3
Configure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-4
Configure Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-5
Configure Date. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-6
Configure Factory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-7
Configure Filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-8
Configure Filter-Binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-9
Configure Filter-Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-10
Configure Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-11
SNR Margin (DSL Interfaces) . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-22
Configure IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-23
Configure Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-24
Configure Scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-33
ii
July 2002 4800-A2-GB20-10
Page 5
Configure Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-35
IP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-38
Configure SNTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-39
Configure Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-40
Configure System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-41
Conf ig u re Sys t e m Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-42
Configure Uplink. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-44
Configure Uplink-Tag. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-45
Configure User-Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-46
Copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-47
End . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-47
Exit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-48
Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-48
Paging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-49
Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-50
Privilege . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-50
Restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-51
Save. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-51
Show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-52
Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-72
Contents
BSNMP Traps
C M IB Suppor t
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1
Locating MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2
Order for Loading MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-3
SNMPv2-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-5
System Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-5
sysDescr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-5
sysObjectID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-6
SNMP Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-6
RFC1213-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-7
PDN-HEADER-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-7
IP-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-8
IP Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-8
ENTITY-MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-9
entPhysicalIndex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-10
entPhysicalVendorType. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-12
4800-A2-GB20-10 July 2002
iii
Page 6
Contents
IF-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-13
Interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-14
ifTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-15
ifIndex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-16
ifDescr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-17
ifType. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-18
ifMtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-19
ifAdminStatus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-20
ifOperStatus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-21
ifXTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-22
ifName . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-22
ifLinkUpDownTrapEnable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-23
ifConnectorPresent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-24
ifStackTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-25
ATM-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-27
atmInterfaceTCTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-28
atmVclTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-28
ATM-FORUM-SNMP-M4-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-29
RS-232-MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-30
rs232Number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-30
rs232PortTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-31
rs232AsyncPortTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-31
rs232SyncPortTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-32
Ethernet-Like MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-33
dot3StatsTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-33
MAU-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-34
ifMauTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-34
ifJackType . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-35
ifMauNegTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-35
ADSL-LINE-MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-36
adslLineTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-37
adslAtucPhysTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-37
adslAturPhysTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-38
adslAtucChanTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-38
adslAturChanTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-38
adslAtucPerfDataTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-39
adslAturPerfDataTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-39
adslLineConfProfileTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-39
iv
July 2002 4800-A2-GB20-10
Page 7
ADSL-LINE-EXT-MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-41
adslLineExtTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-41
adslAtucPerfDataExtTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-42
adslAturPerfDataExtTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-43
adslConfProfileExtTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-43
BRIDGE-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-43
dot1dBase Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-44
dot1dBaseNumPorts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-44
dot1dTp Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-44
dot1dStaticTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-45
Q-BRIDGE-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-45
dot1qTpFdbTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-45
dot1qVlanCurrentTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-46
dot1qVlanStaticTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-46
PPP-LCP-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-47
pppLinkStatusTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-47
PDN-MPE-DEVICE-CONTROL-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . C-48
PDN-MPE-DSLAM-SYSTEM-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-48
PDN-MPE-HEALTH-AND-STATUS-MIB . . . . . . . . . . . . . . . . . . . . . . . C-48
PDN-MPE-ENTITY-SENSOR-MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . C-48
PDN-ARP-MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-49
pdnNetToMediaConfig Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-49
ipNetToMediaConfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-50
PDN-ATMSTATS-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-50
pdnAtmVclStat Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-50
pdnAtmStat Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-51
PDN-CONFIG-MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-51
devConfiguration Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-51
PDN-CONTROL-MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-52
devFileXferMIBObjects Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . C-52
PDN-IPSEC-MANUAL-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-53
PDN-IF-EXT-CONFIG-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-53
PDN-SECURITY-MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-54
securityMgrTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-54
PDN-SYNCPORTSTATS-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-55
PDN-DIAGNOSTICS-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-55
PDN-DSLAM-SYSTEM-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-55
sysDevConfig Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-56
PDN-ETHER-MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-57
Contents
4800-A2-GB20-10 July 2002
v
Page 8
Contents
PDN-FILTER-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-57
sysDevFilter Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-57
PDN-INET-CONFIG-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-58
pdnInetIpAddressTable Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . C-58
PDN-SYSLOG-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-59
PDN-UPLINK-TAGGING-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-59
PDN-STACKABLE-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-59
PDN-DEVICE-TIME-MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-59
D OID Cross Reference
OID Numbers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-1
E C LI to M IB O b je ct Cr oss Refe r enc e
F Reference Tables
Time Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-1
Ethertypes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-4
Index
vi
July 2002 4800-A2-GB20-10
Page 9
About This Guide
Document Purpose and Intended Audience
This guide contains information necessary for the use of the three user interfaces of the BitStorm 4800 IP DSLAM:
Command Line Interface (CLI)
Web Interface
SNMP Interface
It is designed for technicians who administer DSL multiplexers, especially those used in Multi-Tenant Unit (MTU)/Multi-Dwelling Unit (MDU) applications.
Document Summary
Section Description
Chapter 1, BitStorm 4800 Overview
Chapter 2, Terminology and Conventions
Chapter 3, Using the Command Line In te r face
Chapter 4,
Interface
Chapter 5,
Troubleshooting Appendix A, CLI Command
Descriptions Appendix B, SNMP Traps Appendix C, MIB Support Appendix D, OID Cross
Reference
Using the Web
Monitoring and
Provides an introduction to the capabilities of the BitStorm 4800.
Defines terms used in this manual and in the product ’s user interfaces.
Explains how to use the Co mman d Line Interface (CLI).
Exlains how to use the w eb int erface.
Describes tools for monitoring the system and diagnosing problems.
Provides detailed descriptions of all CLI commands.
Describes the SNMP traps supported. Describes the MIBs and objects supported. Lists supported MIB Object IDs by number.
4800-A2-GB20-10 July 2002
vii
Page 10
About This Guide
Section Description
Appendix E, CLI to MIB Object Cross Reference
Appendix F, Reference Tab les
Index
A master glossary of terms and acronyms used in Paradyne documents is available online at
Technical Glossary
Product-Related Documents
Complete documentation for this product is available online at
www.paradyne.com
Systems.
Document Number Document Title
4800-A2-GN10
Contains a tab le sho wing what MIB obje cts are us ed to implement CLI command s.
Contains tables used in CLI commands and web interf ace screens.
Lists key terms, concepts, and sections in alphabet ical order.
www.paradyne.com
. Select
Library → Technical Manuals →
.
. Select
Library → Technical Manuals → BitStorm DSL
BitStorm 4800 Management Module I nstallation Instructions
Describes how to instal l t he 4800 and 4804 Management Modules in the BitStorm 4800.
4821-A2-GN20
6051-A2-GZ40
BitStorm 4800 Installa ti on G uide
Describes the installation and cabling of th e Bit Storm 4800 IP DSLAM.
BitStorm 6051 POTS Splitter Installation Instructions
Describes how to install the POTS splitter car d and chassis used with the BitStorm 4800 in North America.
To order a paper copy of a Paradyne document:
Within the U.S.A., call 1-800-PARADYNE (1-800-727-2396)
Outside the U.S.A., call 1-727-530-8623
viii
July 2002 4800-A2-GB20-10
Page 11
Reference Documents
About This Guide
AF-NM-0095.001, ANSI T1.413-1998,
ATM Forum SNMP M4 Network Element View MIB
Network to Customer Installation Interfaces – Asymmetric
Digital Subscriber Line (ADSL) Metallic Interface
IEEE 802.1 D, IEEE 802.1 Q, IEEE 802.3 z, IETF draft-ietf-adslmib-adslext-07.txt,
Media Access Control (MAC) Bridges
Virtual Bridged Local Area Networks
Gigabit Ethernet
Definitions of Extention Managed Objects
for ADSL L ines
ITU-T 992.1,
Single-Pair High-Speed Digital Subscriber Line (SHDSL)
transceivers
ITU-T 992.2, RFC 1213, RFC 1471, RFC 1483, RFC 1659, RFC 1700, RFC 1907,
Asymmetrical digital subscriber line (ADSL) transceivers
MIB-II PPP/LCP MIB Bridge MI B
RS-232-Like MIB
Assigned Numbers
MIB for SNMPv2
RFC 2011, RFC 2096, RFC 2515, RFC 2662, RFC 2665, RFC 2668, RFC 2737, RFC 2863,
SNMPv2 MIB for IP IP Forwarding Table MIB
ATM MIB
ADSL L ine MI B
Ethernet-Link MIB
802.3 MAU MIB
Entity MIB Interfaces Group MIB
4800-A2-GB20-10 July 2002
ix
Page 12
About This Guide
x
July 2002 4800-A2-GB20-10
Page 13
BitStorm 4800 Overview
Overview
The BitStorm 4800 IP DSLAM is an access gateway that combines in one device:
Layer 2 switching
Aggregation
Element management
Provisioning
1
Digital Subscriber Line (DSL) support
The BitStorm 4800 is a replacement for and an alternative to multi-de vice solutions with switches, routers, and servers that require rewiring buildings, and expensive, downsized ATM DSLAMs not designed for Multi-T enant Unit (MTU)/Multi-Dwelling Unit (MDU) applications.
V
.3
5
/X
.2
1
A
L
A
R
4804
OK
ALARM
1
TEST
3
5
2
7
4
6
8
M
M
O
D
E
M
C
O
N
S
O
L
9
1
1
1
3
1
0
1
5
1
2
1
7
1
4
1
9
1
6
2
1
1
8
2
3
2
0
2
2
2
4
E
M
2
5
2
7
2
9
2
6
3
1
2
8
3
3
3
0
3
5
3
2
3
7
3
4
3
9
3
6
3
8
4
0
G
U
M
P
L
T
IN
K
G
ig
E
D
O
W
N
4
1
4
3
4
5
4
2
4
7
4
4
4
6
4
8
L
IN
K
G
ig
E
1
2
3
4
5
6
7
S
8
T
A
C
K
P
O
S
I
T
I
O
N
02-17063
Figure 1-1. BitStorm 4800 with 48 Ports and Model 4804 Management Module
4800-A2-GB20-10 July 2002
1-1
Page 14
1. BitStorm 4800 Overview
Figure 1-2 shows a typical application for the BitStorm 4800.
In-Building DSL
Phone
Filter
Splitter
ASDL
CPE
BitStorm 4800
Optional:
Adjunct Server
or Service Gateway
Figure 1-2. BitStorm 4800 Sample A p pl ication
Point of Presence (POP)
BLEC
Service
Management
System
Router
Building to
BLEC POP
Access
Voice
Gateway
Class
&
Switch
Internet
Private
Network
PSTN
02-17064
1-2
July 2002 4800-A2-GB20-10
Page 15
Features
1. BitStorm 4800 Overview
The BitStorm 4800 IP DSLAM has the following features:
Compact size (height = 1U)
Shelf-mountable (up to eight units high) and rack-mountable
Low price per port
Up to 48 ports per unit
Up to 384 ports per stack, with a single high-speed uplink
Multiple uplink options:
Gigabit Ethernet uplink using wire or fiberV.35, EIA-5 30-A, or X.21 uplink using Model 4804 Management Module
with suitable adapter
Little or no connection management and configuration (uses learning bridge
capabilities of Ethernet) IEEE 802.3x standards-based flow control for maximum performance and
minimu m pa cket l os s Auto-rating DSL technology to adjust to line conditions
Auto-sensing on all Ethernet ports to adjust automatically to the speed of
attached devices Automatic detection of full duplex or half duplex operation on all Ethernet ports
Automatic switchov er detection for Medium-Dependent Interface (MDI) and
MDI crossover (MDIX) connections, ensuring plug-and-play compatibility with hubs and endstations
Web-based server for management
Virtual Private Networking (VPN) for management, using the IPSec security
protocol Command Line Interface (CLI) like that of popular routers
Support for Simple Network Management Protocol (SNMP) Version 1 and
Version 2 Support for off-the-shelf Asynchronous DSL (ADSL) endpoints
Uplink VLAN tagging for billing and acce ss control
4800-A2-GB20-10 July 2002
1-3
Page 16
1. BitStorm 4800 Overview
1-4
July 2002 4800-A2-GB20-10
Page 17
Termi n ol ogy and Conventions
System Terminology
The following terms are used in this manual and the products user interfaces:
Port
Unit
Stack
Port
2
Unit
A port is one of the physical interfaces of a BitStorm 4800 or Management Module. These are :
ALARM
CONSOLE
DOWNLINK GigE (RJ45)
DOWNLINK GigE (SFP)
DSL Ports 1–24 (24-port model) or 1–48 (48-port model)
MGMT
MODEM
UPLINK GigE (RJ45)
UPLINK GigE (SFP)
V.35/X .21
A single BitStorm 4800 is referred to as a unit or chassis. The first or only unit is referred to as Unit 1.
Stack
Up to eight units may be interconnected, sharing a single uplink; this arrangement is called a stack.
4800-A2-GB20-10 July 2002
2-1
Page 18
2. Terminology and Conventions
DSL Port ID
There are several ways a DSL port can be identified in the BitStorm 4800. The term Port ID in this manual, in reference to a DSL port, refers to any of the possible identifiers for a DSL port.
Interface Number.
Port s 1–48 of the BitStorm 4800 can be referred to by the numbers 1–48 respectively. Port numbers 25–48 are invalid for the 24-port model.
Example:
IAC#configure interface dsl 24 line-code dmt
Interface Name.
You can use the
configure interface dsl name
command to
assign a name to the port, which you can then use instead of the number. See
Reserved Names
on page 2-3.
Example:
IAC#configure interface dsl room_401 line-code dmt
Unit Number/Port Number.
The port ID can be expressed as a combination of the BitStorm 4800 unit number and a port number. In the initial release, 1 is the only valid unit number.
Example:
IAC#configure interface dsl 1/47 line-code dmt
Unit Number/Port Name.
The unit number can be used with the DSL port
name to identify a port. Example:
IAC#configure interface dsl 1/room_401 line-code dmt
The keyword
All.
may be used to specify all DSL ports in a command that
all
refers only to DSL por ts. Example:
IAC#configure interface dsl all line-code dmt
Range.
Any of the port ID types may be used as an operator in a range specification. The only requirement is that the port used as the first operator in a range must have a lower interface number than the second operator.
Examples:
IAC#configure interface dsl room_401-room_424 line-code dmt IAC#configure interface dsl room_401-24 line-code dmt IAC#configure interface dsl 1-24 line-code dmt
2-2
July 2002 4800-A2-GB20-10
Page 19
Ethernet Port ID
2. Terminology and Conv entions
The Ethernet por t s on the BitStorm 4800 are identified by the following names:
– for the MGMT port
mgmt
Reserved Names
downlink uplink
– for the Ethernet DOWNLINK GigE port
– for the Ethernet UPLINK GigE port
These can be used alone or in combination with the unit number to identify the three ports. Unit number is described in
System Terminology
on page 2-1. The term Port ID in this manual, in reference to an Ethernet port, refers to any of the possible identifiers for an Ethern et port.
Example:
IAC#configure interface ethernet downlink mode auto IAC#configure interface ethernet 1/uplink mode auto
The following are reserved names and may not be assigned as DSL port names:
/ (slash)
all
dhcp
downlink
mgmt uplink v35
4800-A2-GB20-10 July 2002
2-3
Page 20
2. Terminology and Conventions
2-4
July 2002 4800-A2-GB20-10
Page 21
Using the Command Line Interface
Overview
The Command Line Interface (CLI) is accessible via either a directly connected terminal session or a Teln et connect ion. You can use the CLI to:
Change the operational characteristics of the device by setting configuration
values Display system status
Perform diagnostics
3
Access Levels
The system supports multiple simultaneous CLI sessions.
CLI users have one of two access levels:
User –
Administrator
The Administrator level requires a second password. At least one login ID and one password are internally stored for each user, and can
be modified by the administrator. If the user has administrator privileges, one login ID and two passwords are stored (one for User privilege and one for Administrator privilege). The passwords must be different for User level and Administrato r l evel access for th e same login ID.
The user may display cer t ain configuration and statu s information.
– The user has access to all commands.
4800-A2-GB20-10 July 2002
3-1
Page 22
3. Using the Command Line Interface
Logging In
When the CLI connection is first established, a login prompt is displayed:
Login>
Enter a user name. The first time you log in on a new unit, type the name and press Enter. The password prompt is displayed:
Password>
Enter the password associated with the user name. The default password for admin is null, so press Enter without typing anything. The following prompt is displayed:
IAC>
Type
privilege
show that you must enter the administrator privilege password. The first time you log in, just press Enter.
The following prompt is displayed:
IAC#
For security purposes, immediately establish new passwords for the user name admin. See
Command Line Prompts
The command line prompt shows the user access level, whether there are any unsaved configuration changes, and at what level you are in the command tree.
and press Enter. The password prompt is displayed again to
Configure User-Accounts
in Appendix A,
CLI Command Descriptions
admin
.
For the User access level, the following prompt is displayed:
IAC>
For the Administrator access level, the following prompt is displayed:
IAC#
If changes have been made to the configuration in this or a previous session that have not been changed, an exclamation point is added to the prompt. For example:
IAC#!
The next secti o n, tree further affects the prompt.
Modes of Operation
, shows how your position in the command
3-2
July 2002 4800-A2-GB20-10
Page 23
Modes of Op eration
You may enter CLI commands in their entirety on one line. For example:
3. Using the Command Line Interface
Back Command
IAC#!configure interface dsl 1/1 line-code dmt IAC#!configure interface dsl 1/1 latency fast
Alternatively, you may logically position the command interface at any point in the command tree structure by entering partial commands. The prompt shows where you are in the command structure. For example:
IAC#configure IAC(configure)#interface IAC(configure-interface)#dsl IAC(configure-interface-dsl)#1/1 IAC(configure-interface-dsl-1/1)#line-code dmt IAC(configure-interface-dsl-1/1)#!latency fast
You can move back up the command tree using the
The example, if DSL interface 1/1 is being configured, the following prompt is displayed:
command positions the CLI up one level in the command tree. For
back
back
command.
IAC(configure-interface-dsl-1/1)#
Each
IAC(configure-interface-dsl-1/1)#back IAC(configure-interface-dsl)#back IAC(configure-interface)#back IAC(configure)#_
command positions the interface one level higher :
back
Automatic Command Completion
Commands and keywords can be abbreviated to as few characters as are required to make them uniquely identifiable. For example,
configure
ambiguous. You can request automatic com pletion of a comman d or keyword you have
partially typed by pressing the T ab ke y. If the command or keyword you have typed is ambiguous, the Tab key displa ys the options for completion.
and
is a valid abbreviation for
cop
is a valid abbreviation for
con
, but the abbreviation
copy
co
is
4800-A2-GB20-10 July 2002
3-3
Page 24
3. Using the Command Line Interface
Command History Buffer
The last 15 commands are maintained in a command history buffer. You can use the Up Arrow and Down Arrow keys to scroll through and redisplay commands, then alter and resubmit a command maintained in the buffer.
Mor e Prompt
Command Help
The CLI lets you control the flow of text to the screen with a (see
Paging
If paging is disabled, text is sent to the screen without interruption. If paging is enabled, only 23 lines of text are displayed at a time. A on line 24 of your screen, and you can do the following:
To view the next screen of output, press the spacebar.
To view the next line of output, press the Enter key.
To return to the command line, press q or any other key besides the spacebar
and Enter key.
The paging command affects only the user who enters the command.
You can obtain help when you enter commands by using the following methods:
To list all commands for a specific level, enter a question mark (?) at the
system prompt:
To obtain a list of commands that start with a particular character set, enter an
abbreviated command immediately followed by a question mark:
in Appendix A,
IAC#?
CLI Command Descriptions
paging
).
More
command
prompt is displayed
To list a command's keywords or arguments, enter a question mark in place of
a keyword or argument on the command lin e:
3-4
July 2002 4800-A2-GB20-10
IAC#configure sys?
IAC#configure management ?
Page 25
Keyboard Definitions
The following table summarizes the special uses of keys in the CLI:
Press . . . To . . .
Ctrl-c Clear the current command line entry, exit a command line
Ctrl-z Terminate a privileged mode sessi on and conti nue the sessi on in
Down Arrow Recall commands from the command line history buffer starting
3. Using the Command Line Interface
prompt without answering, or abort the command in progress.
standard mode. If Ctrl-z i s entered by a user not in privileged mode, it places the user at the top of the command tree.
with the first command in the buffer.
Enter Submit the current command li ne, or, if a
displayed, display the next line of text.
q Abort a
(Pressing any key other than Enter or the spacebar has this
effect.) ? (Question Mark) Display the Help text for the current command. Spacebar Display the next page of output when a
on line 24 of your screen. Up Arrow Scroll to the prev ious v al id comm and li ne entry leavi ng the curs or
at the end of the entry.
Command Syntax Error Handling
The CLI checks the syntax of commands you enter. If an error is detected, the following prompt is displayed:
Syntax error - use '?' to see valid completions
The prompt returns to normal when you press the Enter key.
Automatic Logout
More
prompt is
More
prompt and return to the command line prompt.
More
prompt is displayed
The unit automatically terminates the CLI session if the Inactivity Timeout duration is exceeded. The Inactivity Timeout is configurable. See
Options
4800-A2-GB20-10 July 2002
in Appendix A,
CLI Command Descriptions
Configure System
.
3-5
Page 26
3. Using the Command Line Interface
Configuring the System
In order to configure the unit you must be at the Administrator access level. Configuration changes take effect immediately . Ho wev er , the changes are made to
the running configuration, which is in RAM (Random Access Memory). You must enter the NVRAM (Non-Volatile RAM).
If there are unsaved changes, an exclamation point (!) is added to the prompt to remind you, or other administrators, of the outstanding changes. The changes remain in RAM and can be saved until the unit is powered off or reset.
For informat ion abou t what elements of the system you can configure, see the
configure
Configure Bridge
save
command to save your changes to the startup configuration in
commands in Appendix A,
on page A-5.
CLI Command Descriptions
, beginning with
3-6
July 2002 4800-A2-GB20-10
Page 27
Using the Web Interface
Overview
The BitStorm 4800 supports a Web interface that can be used with a Web browser to perform the same functions as the command line interface:
Change the operational characteristics of the device by setting configuration
values Display system status
Perform diagnostics
4
Web interface users have one of two access levels:
User –
Administrator
The unit configuration can be changed only by a user with Administrator level access.
Browsers Supported
The Web interface can be used with Internet Explorer version 4 or above, and Netscape 4.7 and above, under Windows or Unix. Under Windows, version 6 or above of either browser is recommended.
The user may display cer t ain configuration and statu s information.
– The user has access to all screens and functions.
4800-A2-GB20-10 July 2002
4-1
Page 28
4. Using the Web Interface
Navigation
All main screens of the Web interface can be reached by clicking on hyperlinks in the four menu boxes on the left side of the screen:
Status
memory. The Status screen of a 48-port model is shown.
Diagnostics
– Use the Status screens to display statistics, status, and contents of
– Use the DIagnostics screens to start and stop tests.
4-2
July 2002 4800-A2-GB20-10
Page 29
4. Using the Web Interface
Configuration
interfaces, and filters.
– Use the Configuration screens to configure the system,
System
– Use the System screens to display system information, download
firmware, back up configurations, and modify users.
For more information, click on the Help button on any screen.
4800-A2-GB20-10 July 2002
4-3
Page 30
4. Using the Web Interface
Logging In
When you first connect to the BitStorm 4800 (by opening its IP address in your Web browser), a password dialog box appears. Enter and enter nothing in the Password field. Click on OK.
For best security, use the System/Users screen to immediately change the default password for the admin user.
Configuring the System
for the User Name,
admin
Use the
Use the
Click on Apply in each screen to save your selections to the running configuration.
Configuration
Bridge tab le Filters Interfaces Management Security Subscriber Management Syst em Virtual Local Area Network System log
System
Date and time System options and identification
screens to configure the following:
screens to configure the following:
4-4
July 2002 4800-A2-GB20-10
Page 31
Saving the Co nfiguration
Procedure
To save your configuration to non-volatile RAM:
1. Go to the System/Save and Restore screen.
2. Click on Save Running Config.
4. Using the Web Interface
Logging Out
To end a session, close your Web browser. This prevents an unauthorized user from accessing the system using your user name and password.
4800-A2-GB20-10 July 2002
4-5
Page 32
4. Using the Web Interface
4-6
July 2002 4800-A2-GB20-10
Page 33
Monitoring and Troubleshoot ing
Overview
The chapter describes ways to monitor the status of the BitStorm 4800, and to diagnose problems. These include:
5
System Log
Front Panel LEDs
Show Commands and Web Interface Status Screens
on page 5-2
on page 5-6
on page 5-6
4800-A2-GB20-10 July 2002
5-1
Page 34
5. Monitoring and Troubleshooting
System Log
The system log (syslog) contains messages of up to eight different levels of importance. From high to low, they are:
Emergency
Alert
Critical
Error
Warning
Notice
Informational
Debug
– Action must be taken immediately to prevent serious problems.
– The system is unusable.
– Critical condition.
– Error condition.
– Warning condition.
– Normal but noteworthy condition.
– Messages pert aining to command processing.
– Debug-level messages for developers.
The level of messages written to the log can be set using command of the Command Line Interface, or the
Configuration/Syslog
the Web interface. The levels are:
emergency
alert
informational
– Alert and emergency mess ages are logged.
– Only emergency messages are logged.
– Informational, notice, warning, error, critical, alert, and
emergency messages are logged.
– All messages are logged.
debug
configure syslog
screen of
Viewing the System Log
You can view the system log using the Line Interface, or the
Message Format
System log messages have the format:
For example:
show syslog
Status/Syslog
Priority: Month/Day: HH:MM:SS
screen of the Web interface.
:
Message
ALERT Jun 5 00:14:59 Link Down on Por t 2
command of the Command
5-2
July 2002 4800-A2-GB20-10
Page 35
Messages
5. Monitoring and Troubleshooting
The following are the system log messages of greatest impor tance. Messages may be associated with SNMP traps. See Appendix B,
Table 5-1. System Log Messages (1 of 3)
Message Priority Meaning
Bootp Obtained Mgmt IP Address Address :
address
address
address
address
address
, Mask=
, Mask=
, Mask=
;
, Mask=
, Mask=
mask
mask
mask
mask
mask
Address= Gateway=
Bootp Obtained Mgmt IP Address Address : Address= Gateway= replaced by Bootp Obtained Mgmt IP Address Address : Address= Gateway=
Bootp Obtained Mgmt IP Address Address : Address= Gateway= replaced by Statically Configur ed M gm t IP Address Address : Address= Gateway=
address
address
address
address
address
Alert BOOTP obtain ed the di splayed
management IP address and gateway
,
Alert BOOTP replaced the management IP
,
,
Alert An administrator has replaced the
,
,
address.
address and gateway address.
management IP address and gateway address obtained by BOOTP.
SNMP Traps
.
Cold Start Completed - System Operational.
DSL Port DSL Port
Fan overheating.
Fan Ftp Session Log :
UserName : UserAcct : Cmd Exec : Cmd Status : Log On Time : Log Off Time : Ftp Server IP :
GigE Down Link: Unit Down.
GigE Down Link: Unit
Unit u Link Down. Alert The specified DSL interface is down.
p
Unit u Link Up. Alert The specified DSL interface has come
p
has Failed, unit at risk of
f
is Restored. Alert The specified fan (1–3) has restarted.
f
user
acct
exec
status
time time
address
: Link
u
: Link Up. Alert The specified GigE Downlink port has
u
Alert The system has success fully started
after a hardware reset.
up.
Alert The specified fan (1–3) has failed.
Notify your service representative.
Alert An FTP session has occurred with the
displayed characteristics.
Alert The specified GigE Downli nk port has
gone down.
come up.
4800-A2-GB20-10 July 2002
5-3
Page 36
5. Monitoring and Troubleshooting
Table 5-1. System Log Messages (2 of 3)
Message Priority Meaning
GigE Up Link: Unit u: Link Down. Al ert The specified GigE Uplink port has
gone down.
GigE Up Link: Unit
MAC Address and Physical Port Mismatch: Unauthorized User (
user
) on DSL port u by
Management Port: Unit Down.
Management P ort: Unit Pow er On Self T est FAILED . Alert One or more of the hardwar e self -tes ts
Statically Configur ed M gm t IP Address Address : Address= Gateway= replaced by Bootp Obtained Mgmt IP Address Address : Address= Gateway=
address
address
address
address
u
: Link Up. Alert The specified GigE Uplink port has
come up.
Alert The hardware address of the user on
the specified port has changed,
access
.
u
: Link
u
: Link Up. Alert The MGMT port has come up.
, Mask=
, Mask=
mask
mask
Alert The MGMT port has gone down.
Alert The manually set managem ent IP
,
,
possibly signaling a security breach.
failed. If possible, use the show
system self-tes t CLI command or the System/Self-Test Results Web
interfa ce screen to determine the area of failure. Notify your service representative.
address and gateway address have been replaced by tho se obtained from a BOOTP request.
Statically Configur ed M gm t IP Address Address : Address= Gateway= replaced by Statically Configur ed M gm t IP Address Address : Address= Gateway=
Statically Configur ed M gm t IP Address Address : Address= Gateway=
System Fault communication with Subsystem
System Restored communication with Subsystem
Temperature has fallen below 70 degrees Celsius.
address
address
address
address
address
address
subsystem
subsystem
, Mask=
, Mask=
;
, Mask=
;
.
mask
mask
mask
.
,
,
,
Alert An administrator has replaced the
displayed management IP address and gatewa y address.
Alert An administra tor has set the displ ayed
management IP address and gateway address.
Alert A system fault occurred. Notify your
service representative.
Alert The system recovered from a system
fault.
Alert The unit temperature, which had risen
above 70° C , has fallen below that threshold.
5-4
July 2002 4800-A2-GB20-10
Page 37
5. Monitoring and Troubleshooting
Table 5-1. System Log Messages (3 of 3)
Message Priority Meaning
Temperature has ri sen above 70 degrees Celsius, unit at risk of Overheating.
Temperature has ri sen above 75 degrees Celsius, unit at risk of SHUTTING DOWN.
Test Agent POST results fr om
subsystem
Time Client unable to locat e NTP Server.
V.35 Link: Unit
V.35 Link: Unit V.35 Loopbac k Test Activated.
Duration is V.35 Loopback Test Terminated. Alert The test on the V.35/X.21 port was
Failed.
u
: Link Down. Alert The V.35/X.21 inter face has gone
u
: Link Up. Alert The V.35/X.21 interface has come up.
n
seconds.
Alert The unit temperature has risen above
70° C. Shut down the unit as soon as possible, and notify your service representative.
Emergency The unit temperature has risen above
75° C. Shut down the unit as soon as possible, and notify your service representative.
Alert The Power-On Self-Test of the
specified s ubsystem fai led. Notify y our service representative.
Alert The SNTP server is not respon ding, so
the system date and time are not set and updated automatic all y.
down.
Alert A test has been initiated on the
V.35 /X.21 po rt .
terminated.
4800-A2-GB20-10 July 2002
5-5
Page 38
5. Monitoring and Troubleshooting
Front Panel LE D s
If you have access to the unit, check the front panel LEDs. These are described in the
BitStorm 4800 Installatio n Guide
.
If an LED that should be lit during normal operation is not lit, verify that it is functional by using the
Diagnostics/Test LEDs
test leds
screen of the Web interface.
command of the Command Line Interface or the
Show Commands and Web In terface Status Screens
The
command of the Command Line Interface and various screens of the
show
Web interface show the condition of the unit and its interfaces, including error statistics for the ports. The following table shows how to access the informat ion.
Table 5-2. How to Locate Status Information
For Information About . . . Use the CLI Command . . .
Bridge show bridge Status/Bridge Filters show filter Configuration/Filter Filter Bindings show filter-binding Configuration/Binding Filter Rules show filter- rule Configuration/Rul e Console Port show interface console Configurat ion/Console DSL Ports show interface dsl Ethernet Ports show interf ace ethernet Modem Port show interface modem Configurat ion/Modem V.35/X.21 Port sho w interface v35 Status/V.35 Statistics Management (IP) show management ip Configuration/Management/
port_id
port_id
Use the Web Interfac e Screen . . .
Status/DSL Port Statistics Status/Ethernet Statistics
Address Management (IPsec) show management ipsec Configurat ion/IPsec Management (SNMP) show management snmp Confi guration/SNMP Self-Test Results show system selft est System/Self-Test Results Syslog show syslog St atus/Syslog System show system st atus Status/System Information Users sho w user-accounts Status/Users
5-6
July 2002 4800-A2-GB20-10
Page 39
CLI Command Descriptions
CLI Commands
The BitStorm 4800 can be managed with text commands from the Command Line Interface (CLI). The CLI can be accessed:
Locally via a PC or asynchronous terminal connected to the CONSOLE port.
Remotely via a Telnet session.
The following conventions are used in descriptions of the commands:
A
Convention Meaning
[ ]
{ }
|
x
y
[{ }]
Helvetica It alic
Courier Bold
Underscore
x.x.x.x
xx-xx-xx-xx-xx-xx
Commands are shown in this appendix in alphabetical order, regardless of function or access level required.
A choice of optional parameters. Command par ameters enclosed in neither brackets nor braces are required.
A choice of required parameters. Command par am eters enclosed in neither brackets nor braces are required.
Mutually exclusive elements. Enter one element only (either x or y in this example).
A required choice within an optional element. A variable. A command and its key wor ds. I t is nec essa ry to type only as much
of a command or ke yword as is required to distin guish it from others. The CLI soft ware automatically fills in the rest.
If a keyword is underscored, it is the default value f or the command.
IP address or subnet mask. Each x denotes a decimal value 0–255.
MAC address . Each x denotes a hexadecimal digit 0–f.
For general information abou t using the CLI, see Chapter 3,
Line Interface
4800-A2-GB20-10 July 2002
Using the Command
.
A-1
Page 40
A. CLI Command Descriptions
Back
The
command logically positions the CLI in the command structure.
back
Ta ble A-1. Back Command
back
Minimum Access Level:
back
The DSL interface 1/1 i s being configured, the fol lowing prompt is displayed:
IAC(configure-interface-dsl-1/1)#
The back command retu rns the di splay to the prompt
Example:
IAC(configure-interface-dsl-1/1)# IAC(configure-interface-dsl)# IAC(configure-interface)#_
command positions access up one level in the command tree. For example, if
.
User
iac-configure-interface-dsl#
back
back
A-2
July 2002 4800-A2-GB20-10
Page 41
Clear
A. CLI Command Descriptions
The
command empties the specified object.
clear
Table A-2. Clear Command
clear management snmp nms-address { [
ip_address_8
Minimum Access Level:
clear management snmp nms-a ddress
The eight NMS management stations.
ip_address_1.. . ip_address_8
Example:
clear management snmp nms-address 137.70.92.192
IAC#
]
Administrator
– Specifies one or more NMS addresses .
clear management snmp nms-traps {
ip_address_8
[
Minimum Access Level:
clear management snmp nms-traps
The eight NMS trap managers.
ip_address_1.. . ip_address_8
Example:
clear management snmp nms-traps 137.70.92.2
IAC#
]
Administrator
command clears the IP addresses of up to
– Specifies one or more trap manager addresses.
ip_address_1
command clears the IP addresses of up to
ip_address_1
}...
}...
clear syslog
Minimum Access Level:
clear syslog
The Example:
clear syslog
IAC#
command clears all entries in the system log.
Administrator
4800-A2-GB20-10 July 2002
A-3
Page 42
A. CLI Command Descriptions
Configure
The
configure
command causes the CLI to enter configuration mode, from which
you can specify what element of the system you would like to configure.
Tabl e A-3. Configure Command
configure
Minimum Access Level:
configure
The
IAC(configure)#
subcommands. Example:
configure
IAC# IAC(configure)# IAC(configure-interface)# IAC(configure-interface-bridge)# IAC(configure-interface-bridge)#! IAC(configure-interface-bridge)#
command causes the CLI to enter configuration mode . Once the
Administrator
prompt is displayed, you can ent er one of the configuration
interface
bridge
mode sw it ch
save
A-4
July 2002 4800-A2-GB20-10
Page 43
Configure Bridge
A. CLI Command Descriptions
The
configure bridge
command configures the handling of the bridge table.
Table A-4. Configure Bridge Command
configure bridge clear
Minimum Access Level:
configure bridge clear
The Static entries are not affected.
Example:
configure bridge clear
IAC#
Administrator
command deletes learned entries fr om the bri dge table.
configure bridge mode {mux | sms | switch | uplink-tag}
Minimum Access Level:
configure bridge mode
The
mux
– Multiplexing forwarding mode. The system treats each DSL port as if it were a
private network connected to the uplink, and never forwards data on another DSL port.
sms
– Subscriber Management System (SMS) mode . The system treats each DSL port as if it were a priv ate net work conne cted to t he upli nk, and never forwards data on another DSL port. In addition, a managem ent Vi rtual Local Area Network (VL AN) is cr eated on t he uplink for use by the SMS.
switch
– Switched mode. The syst em acts as a transparent learning bridge. Thi s is the
default.
uplink-tag
unique VLAN tag. The system therefore treats each DSL port as if it were a priv ate network connected to the uplink, and never forwards data on another DSL port.
Example:
IAC#
– UpLink Tagging mode. All traffic from the DSL subscriber ports is given a
configure bridge mode mux
Administrator
command specifies the mode the bridge will operate in.
configure bridge timeout {
Minimum Access Level:
configure bridge timeout
The learned entry may exist in the bridge table without apearing as the source address of a received fram e.
time
– The amount of time, in seconds, that an entry may exist. The valid range is 10–1000000 seconds, or 0 (zero, which specifies that no timeouts will occur). The default is 300.
Example:
configure bridge timeout 0
IAC#
4800-A2-GB20-10 July 2002
Administrator
command specifies the maximum amount of time a
time
}
A-5
Page 44
A. CLI Command Descriptions
Configure Date
The
configure date
command sets the date, time, and time zone in the
BitStorm 4800. When it is first powered on, the unit attempts to obtain the date and time from an
NTP server on the Internet. If it fails, the units date is set to Januar y 1, 2001, and the time is set to 00: 00: 00.
Table A-5. Configure Date Command
configure date [
Minimum Access Level:
configure date
The
mm/dd/yy or dd/mm/yy
date format is set by the
Configure System Options Com m and ); the default order i s mo nth, day, and year.
hh:mm
– Specifies the time in hours (0–23) and minutes (0–59).
Example:
configure date 03/21/02 13:05
IAC#
mm/dd/yy
Administrator
command sets the date and time.
– specifies the month, day, and year, each as two digits. The
configure system options
configure date-timezone {
Minimum Access Level:
configure date-timezone
The relati ve to.
time_zone
and time represent. Ho urs before GMT are expressed as negative number s and hours after GMT are expressed as positive numbers (with or without a plus sign). Half hours are supported as decimals. Valid values are –12 through 12.
Offsets are listed in Table F-1, Time Zone Names, in Appendix F, can also obtain a list of time zone offsets using the command:
configure date-timezone ?
The unit does not adjust f or Daylight Savings Time. Examples:
IAC# IAC# IAC#
– Specifies the of fset in hours from Greenwich Mean Time (GMT) that the date
configure date-timezone +2 configure date-timezone 9 configure date-timezone -3.5
Administrator
|
dd/mm/yy
time_zone
command specifies the t ime zone the date and time are
] [
hh:mm
command (see Table A-18,
]
}
Reference Tables
. You
A-6
July 2002 4800-A2-GB20-10
Page 45
Configure Factory
A. CLI Command Descriptions
The
configure factory
command loads the factory default parameters into the running configuration. The default parameters take immediate effect, but are not saved. Execute the Save command to save the parameters to Non-Volatile Random-Access Memory (NVRAM).
Factory defaults include a management address of 10.10.10.10, so if you are managing the BitStorm 4800 using Telnet over a different address, your connection is terminated upon execution of the
configure factory
command. It is therefore recommended that this command be executed from the Console or Modem port.
Tabl e A-6. Configure Factory Command
configure factory
Minimum Access Level:
configure factory
The Example:
configure factory
IAC#
Administrator
command loads factory default parameters.
4800-A2-GB20-10 July 2002
A-7
Page 46
A. CLI Command Descriptions
Configure Filter
Filters restrict select types of user data on a particular interface. There are three steps to implementing a filter in the BitStorm 4800:
Define filter rules (see
Define a named filter comprising one or more rules (see Table A-7, Configure
Configure Filter-Rule
on page A-10)
Filter Command)
Bind the filter to an interface (see
The
configure filter
command creates and deletes filters.
Configure Filter-Binding
on page A-9)
Tabl e A-7. Configure Filter Command
configure filter create [
rule_name_1
Minimum Access Level:
configure filter cr eate
The
filter_name
characters.
forward
conditions specified in the rule or rules are matched.
discard
in the rule or rules are matched.
rule_name_1
must be already defined using the
Configure Filter-Rule Command).
Example:
IAC#
– Specifies that a packet is to be forwarded to the user when none of the
– Specifie s that a pac ke t is to be discar ded when no ne of the co nditi ons speci fied
configure filter create no_at_or_ipx forward no_at no_ipx
]... [
– Specifies the filter to be created. The name may contain up to 32 printable
through
rule_name_16
Administrator
command creates a filter based on existing filter rules.
rule_name_16
filter_name
]
– Specifies up to 16 different rule names. These
configure filter-rule
{forward | discard}
command (see Table A-9,
configure filter delete
Minimum Access Level:
configure filter delete
The
filter_name
delete a binding, use the
Filter-Binding Com man d).
Example:
IAC#
A-8
July 2002 4800-A2-GB20-10
– Specifies the filter to be deleted. It must not be bound to an interface. T o
configure filter delete no_decnet
Administrator
command deletes a filter.
configure filter-binding
filter_name
command (see Table A-8, Configure
Page 47
Configure Filter-Binding
A. CLI Command Descriptions
The configure
filter-binding
command associates a filter with a particular port, or
removes such an association.
Tabl e A-8. Configure Filter-Binding Command
configure filter-binding create
{
outbound
Minimum Access Level:
configure filter -binding create
The
filter_name
Configure Filter
outbound inbound both
Specifies that traffic both to and from the port is affect ed by the filter .
port_id
Example:
configure filter-binding create no_at_or_ipx 1/1
IAC#
|
inbound | both
Administrator
– Specifies the filter to be associated with a port. It must exist . (See
on page A-8.)
Specifies that traff ic from the port is affected by the fi lter.
Specifies that traffic to the port is affected by the filter.
Specifies the DSL port whose traffic is to be fi lt ered.
}
port_id
command associates a filter to a port.
configure filter-binding delete
{
outbound
Minimum Access Level:
|
inbound | both
Administrator
}
port_id
filter_name
filter_name
configure filter -binding delete
The port.
filter_name
remains intact.
outbound
be de lete d.
inbound
deleted.
both
is to be del eted.
port_id
Example:
IAC#
Specifies the filter whose association is to be deleted. The fil ter itself
Specifies that traff ic from the port is affected by the filter whose binding is to
Specifies that traffic to the port is affected by the filter whose binding is to be
Specifies tha t tr affi c both t o and fro m the po rt is aff ected b y t he filt er who se bindi ng
Specifies the DSL port whose filter is to be delet ed.
configure filter-binding delete no_at_or_ipx 1/1
command removes the association of a filter to a
4800-A2-GB20-10 July 2002
A-9
Page 48
A. CLI Command Descriptions
Configure Filt er-Rule
The configure
filter-rule
command creates and deletes rules for filtering traffic on
the DSL ports.
Tabl e A-9. Configure Filter-Rule Command
configure filter-rule create
{
ether | ether-snap
Minimum Access Level:
configure filter -rule create
The
rule_name
printable characters.
forward discard ether ether-snap
(SNAP ) tra ffic.
ethertypes
value ranges for Ethertypes as li sted in RFC 1700 are vali d. These Ethertypes are shown in Table F-2, Ethertypes, in Appendix F,
Values in value ranges mu st be separated by a hy phen. Examples:
IAC# IAC#
– The name of the rule to be created. The name may contain up to 32
– If a packet matche s the rule it is forwarded.
– If a packet matches the rule it is discarded.
– Specifies that the rule applies to Layer 2 Ethernet traffic.
– Specifies that the rule applies to Layer 2 SubNetwork Access Protocol
– Specifies the Ethertype the rule is in ef fect for. Hexadecimal values and
confi gu re filter-rule create DecNetdrop discard et he r 60 03 confi gu re filter-rule create IPXdrop discard ether 813 7- 81 38
} [
ethertypes
Administrator
command creates a rule for filtering traffi c.
{
rule_name
]
Reference Tables
} {
forward
.
|
discard
}
configure filter-rule delete
Minimum Access Level:
configure filter -rule delete
The
rule_name
Example:
IAC#
– The name of the rule to be deleted.
confi gu re filter-rule delete IPXdrop
Administrator
command deletes a rule for filtering traff ic.
{
rule_name
}
A-10
July 2002 4800-A2-GB20-10
Page 49
Configure Interface
A. CLI Command Descriptions
The
configure interface
command sets parameters for the Console, DSL,
Ethernet, Modem, and V.35/X.21 interfaces.
Table A-10. Configure Interface Command (1 of 11)
configure interface console data-bits {7 | 8}
Minimum Access Level:
configure interface console data-bits
The byte on the Console port.
data-bits
Example:
IAC#
– Valid choi ces are 7 and 8. The default is 8.
configure interface console data-bits 7
Administrator
command sets the number of data bits in a
configure interface console parity {even | none | odd}
Minimum Access Level:
configure interf ace console parity
The port.
parity
– Valid choices are none, odd, and even. The default is none.
Example:
configure interface console parity even
IAC#
Administrator
command sets t he parity bi t ty pe f or the Consol e
configure interface console rate {1200 | 2400 | 4800 | 9600 | 19200 | 38400 | 57600 | 115200}
Minimum Access Level:
configure inter face console rate
The
rate
– Valid rates are 1200, 2400, 4800, 9600, 19200, 38400, 57600, and 115200. The
default is 9600bps. Example:
configure interface console rate 57600
IAC#
Administrator
command sets th e rate of the Console port in bps.
configure interface console show
Minimum Access Level:
configure interface console show
The port without leaving confi guration mode.
Example:
configure interface console show
IAC#
Administrator
command displa ys parameters for the Console
4800-A2-GB20-10 July 2002
A-11
Page 50
A. CLI Command Descriptions
Table A-10. Configure Interface Command (2 of 11)
configure interface console stop-bits {1 | 2}
Minimum Access Level: Administrator The configure interface console stop-bits command sets the number of stop bits
delimiting a byte on the Console port. stop-bits V alid choices are 1 and 2. The def ault is 1. Example:
IAC#
configure interface console stop-bits 1
configure interface dsl {
Minimum Access Level: Administrator The configure interface dsl atm data-connection command specifies, by VPI /VCI , the
virtual circuit used for data.
port_id
described in atm data-connection – Valid input is the VPI/VCI for the data connection. The default is
0/35. The valid range for VPI is 0–15. The valid range for VCI is 32–255. Examples:
IAC#
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
configure interface dsl 1/1 atm data-connection 1/35
configure interface dsl {
port_id
in Chapte r2,
port_id
atm encapsulation {llc-bridged
Minimum Access Level: Administrator The configure interface dsl atm encapsulation command specifies whether the port
uses Logical Link Control (LLC) or Virtual Channel Multiplex ing (VCM) bridged encapsulation.
port_id
described in atm encapsulation Valid choices are:
Example:
IAC#
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
llc-bridged – The interface uses LLC bridged encapsulation. This is the default.vcm-bridged – The interface uses VCM bridged encapsulation.
configure interface dsl 1/1 atm encapsulation vcm-bridged
in Chapte r2,
} atm data-connection {
Terminology and Conventions
.
}
| vcm-bridged}
Terminology and Conventions
.
vpi/vci
}
A-12
July 2002 4800-A2-GB20-10
Page 51
Table A-10. Configure Interface Command (3 of 11)
A. CLI Command Descriptions
configure interface dsl {
Minimum Access Level: Administrator The configure interface dsl behavior command specifies whether the port will adapt i ts
rate to line condit ions.
port_id
described in behavior Valid choices are:
Example:
IAC#
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
– adaptive – The rate automatically adapts to line conditions at startup. This is the
default.
– fixed – Only one rate is allo wed downstream or upstream, defined by
max-downstream-speed and max-upstream-speed.
confi gu re interface dsl 1/48 behavior fixed
configure interface dsl { latency {fast
Minimum Access Level: Administrator The configure interface dsl latency command spec ifies whether an interleave buffer i s
used.
port_id
described in latency Valid choices are:
Example:
IAC#
Identifies the port to be configured. The poss ible forms of the identif ier are
fast No interleave buffer is used. This is the default.interleaved – This port uses an interleave buffer .
confi gu re interface dsl 1/24 latency interleaved
| interleaved}
Sys tem Termin ol ogy
port_id
in Chapte r2,
port_id
in Chapte r2,
} behavior {adaptive | fixed}
Terminology and Conventions
.
}
Terminology and Conventions
.
configure interface dsl { line-code {ansi | dmt | g.lite | multimode
Minimum Access Level: Administrator The configure interface dsl line-code command spe cifies the line code for a DSL port.
port_id
described in line-code Valid choices are:
Example:
IAC#
4800-A2-GB20-10 July 2002
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
ansi The port uses ANSI T1.413-1998.dmt The port uses G.dmt (G.992.1).g.lite The port uses G.lite (G.992.2).multimode – The port automatical ly senses the line code in accordance wi th
G.994.1. This is the default.
confi gu re interface dsl 1/24 line-code ansi
in Chapte r2,
port_id
}
}
Terminology and Conventions
.
A-13
Page 52
A. CLI Command Descriptions
Table A-10. Configure Interface Command (4 of 11)
configure interface dsl {
port_id
linkupdown-trap {disabled | enabled
Minimum Access Level: Administrator The configure interf ace dsl linkupdown-trap command specifies whether an SNMP
trap should be sent upo n li nk up and li nk down events.
port_id
described in linkupdown-trap Valid choices are:
Example:
IAC#
configure interface dsl {
Minimum Access Level: Administrator The config ure in terf ace dsl max-downstream-speed command speci fies the maximu m
rate, in Kbps, available for traffic from the port toward the CPE. If behavior is set to fixed, this is the only downst ream rate.
port_id
described in
rate
Example:
IAC#
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
disabled No traps are sent upon link up and link down events.enabled – A trap is sent upon a link up or link down event. This is the default.
configure interface dsl 1/1 linkupdown-trap disabled
in Chapte r2,
port_id
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
– Valid rates are:
For dmt and ansi: 64 to 8128 Kbps in 32 Kbps increments. The default is 8128.For g.lite: 64 to 4000 Kbps in 32 Kbps increments. The default is 4000.
configure interface dsl 1/2 max-downstream-speed 512
in Chapte r2,
}
}
Terminology and Conventions
.
} max-downstream-speed {
Terminology and Conventions
.
rate
}
configure interface dsl {
Minimum Access Level: Administrator The configure interface dsl max-upstream-speed com m and specifies the maximum
rate, in Kbps, available for traffic to ward the port from the CPE. If behavior is set to fixed, this is the only upstr eam rat e.
port_id
described in
rate
Example:
IAC#
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
– Valid rates are 32 to 1024 Kbps in 32 Kbps increments. The default is 1024.
configure interface dsl 1/1 max-upstream-speed 128
port_id
in Chapte r2,
} max-upstream-speed {
Terminology and Conventions
.
rate
}
A-14
July 2002 4800-A2-GB20-10
Page 53
Table A-10. Configure Interface Command (5 of 11)
A. CLI Command Descriptions
configure interface dsl {
Minimum Access Level: Administrator The configure interface dsl min-downstream-speed command specifies the minimum
rate, in Kbps, t o adapt to for traffic from the port toward the CPE.
port_id
described in min-downstream-speed Valid rates are:
Example:
IAC#
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
For dmt and ansi: 64 to 8128 Kbps in 32 Kbps increments. The default is 128.For g.lite: 64 to 4000 Kbps in 32 Kbps increments. The default is 128.
configure interface dsl 1/2 min-downstream-speed 96
configure interface dsl {
Minimum Access Level: Administrator The configure interface dsl min-snr-margin command specifies the minimum SNR
margin, in dB, required for the port. See more information.
port_id
described in
margin
Examples:
IAC#
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
– Valid choices are 0–15 dB in 1 dB increments. The default is 0.
configure interface dsl 1/1 min-snr-margin 9
port_id
in Chapte r2,
port_id
in Chapte r2,
} min-downstream-speed {
Terminology and Conventions
} min-snr-margin {
SNR Ma rg in (D S L In te rface s )
Terminology and Conventions
rate
.
margin
on page A-22 for
}
.
}
configure interface dsl {
Minimum Access Level: Administrator The configure interface dsl min-upstream-speed com m and specifies the minimum
rate, in Kbps, t o adapt to for traffic toward the port from the CPE.
port_id
described in
rate
Example:
IAC#
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
– Valid rates are 32 to 1024 Kbps in 32 Kbps increments. The default is 64.
configure interface dsl 1/2 min-upstream-speed 64
configure interface dsl {
Minimum Access Level: Administrator The configure interface dsl name command specifies a unique name for this port.
port_id
described in name May be up to 16 printabl e characters. The name may not include a forw ard slash
(/) or the following keywords: all, dhcp, downlink, mgmt, uplink, or v35. Example:
IAC#c on fi gure interface dsl 1/1 name Room_100
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
port_id
in Chapte r2,
port_id
in Chapte r2,
} min-upstream-speed {
Terminology and Conventions
} name {
Terminology and Conventions
port_name
}
.
.
rate
}
4800-A2-GB20-10 July 2002
A-15
Page 54
A. CLI Command Descriptions
Table A-10. Configure Interface Command (6 of 11)
configure interface dsl [
Minimum Access Level: Administrator The configure i nterface dsl show comm and displays parameters for a DSL port without
leaving configuration mode.
port_id
the port currently in configur ation mode, if any, is display ed. Examples:
IAC# IAC(configure-interface-dsl-1/7)#
– Identifies t he port whose configuration is to be displayed. If no port is specif ied,
confi gu re interface dsl 1/7 show
configure interface dsl {
Minimum Access Level: Administrator The configure interface dsl state command specifies the availability of a DSL port.
port_id
described in state Specifies the availability of the port. Valid choices are disabled and enabled. The
default is enabled. Example:
IAC#
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
confi gu re interface dsl 1/24 state enabled
configure interface dsl {
port_id
port_id
in Chapte r2,
port_id
target-downstream-margin {
] show
show
} state {disabled | enabled}
Terminology and Conventions
}
margin
}
.
Minimum Access Level: Administrator The configure interface dsl target-downstream-margin command specifies the Signal
to Noise Ratio (SNR) margin, in dB, required at startup for traffic from the port toward the CPE. See
port_id
described in
margin
Example:
IAC#
SNR Ma rg in (D S L In te rface s )
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
– Valid choices are 2–15 dB in 1 dB increments. The default is 6.
configure interface dsl 1/1 target-downstream-margin 3
configure interface dsl { target-upstream-margin {
Minimum Access Level: Administrator The configure interface dsl target-upstream -margin command specifi es the SNR
margin, in dB, requi red at startup for traffic toward the port from the CPE. See
Margin (DS L Interfaces)
port_id
described in
margin
Example:
IAC#
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
– Valid choices are 2–15 dB in 1 dB increments. The default is 6.
configure interface dsl 1/1 target-upstream-margin 3
on page A-22 for more in formation.
on page A-22 for more information.
in Chapte r2,
port_id
margin
in Chapte r2,
Terminology and Conventions
}
}
Terminology and Conventions
.
SNR
.
A-16
July 2002 4800-A2-GB20-10
Page 55
Table A-10. Configure Interface Command (7 of 11)
A. CLI Command Descriptions
configure interface ethernet {
port_id
}
connector {rj45 | fiber}
Minimum Access Level: Administrator The configure interf ace ethernet connector command spec ifies the physical interface
to be used when both interfaces are active at the sam e time. Ordinarily the BitStorm 4800 uses the fiber optic port if an SFP transceiver is detected , so this command provides a way to force the use of the 8-position modul ar jack even if a transceiver is ins talled.
port_id
are described in connector Valid choices are:
Example:
IAC#
configure interface ethernet { flow-control {enabled
Minimum Access Level: Administrator The configure interface ethernet flow-control command specifi es whether flow control
should be used on the port.
port_id
are described in flow-control Valid choice s are disabled and enabled. The default is enab led. Example:
IAC#
– Identifies the Ethernet port to be configured. The poss ibl e fo rms of the identifi er
Ethernet Port ID
rj45 The BitStorm 4800 uses the 8-position modular jack for the fiber The BitStorm 4800 uses the fiber optic port for the
configure interface ethernet 1/uplink connector rj45
in Chapte r2,
Terminology and Conventions
port_id
port_id
}
.
port_id
interface.
| disabled}
– Identifies the Ethernet port to be configured. The poss ibl e fo rms of the identifi er
Ethernet Port ID
configure interface ethernet 1/mgmt flow-control enabled
in Chapte r2,
Terminology and Conventions
.
interface.
configure interface ethernet { mode {auto
Minimum Access Level: Administrator The configure interface ethernet mode command specif ies whether the duplex mode
and rate are automatically set, and the crosso ver type automatical ly sensed.
port_id
are described in
mode Val id choices are:
auto The BitStorm 4800 automatically senses the rat e and duplex mode. This is
the default .
– manual – The administrator must set the rat e and duplex mode.
Example:
confi gu re interface ethernet 1/mgmt mode manual
IAC#
| manual}
– Identifies the Ethernet port to be configured. The poss ibl e fo rms of the identifi er
Ethernet Port ID
in Chapte r2,
port_id
}
Terminology and Conventions
.
4800-A2-GB20-10 July 2002
A-17
Page 56
A. CLI Command Descriptions
Table A-10. Configure Interface Command (8 of 11)
configure interface ethernet {
port_id
} rate {10full | 10half | 100full | 100half | 1000full | 1000half}
Minimum Access Level: Administrator The configure interface ethernet rate command specifies the duple x mode and rate if
mode is set to manual.
port_id
are described in rate Valid choices are:
Example:
IAC#c on fi gure interface ethernet 1/mgmt rate 100fu ll
configure interface ethernet [
Minimum Access Level: Administrator The configure interface ethernet show command displays parameters for an Ethernet
port without leaving confi guration mode.
port_id
the port currently in configur ation mode, if any, is display ed. Examples:
IAC(configure-interface-ethernet-1/uplink)# IAC#
– Identifies the Ethernet port to be configured. The poss ibl e fo rms of the identifi er
Ethernet Port ID
10full 10 Mbps and full duplex10half 10 Mbps and half duplex100full 100 Mbps and full duplex100half 100 Mbps and half duplex1000full 1000 Mbps and ful l duplex 1000half 1000 Mbps and half duplex
Identifies t he port whose configuration is to be displayed. If no port is specif ied,
confi gu re interface ethernet 1/uplink show
in Chapte r2,
Terminology and Conventions
port_id
] show
show
.
configure interface ethernet {
Minimum Access Level: Administrator The configure interface ethernet xover com ma nd specifies the crossov er type when
mode is set to manual.
port_id
are described in xover V alid choices are:
Example:
IAC#
A-18
July 2002 4800-A2-GB20-10
– Identifies the Ethernet port to be configured. The poss ibl e fo rms of the identifi er
Ethernet Port ID
mdi – The port is connected to a Network Interface Card (NIC).mdix – The port is connected to a hub .
configure interface ethernet 1/mgmt xover mdi
in Chapte r2,
port_id
} xover {mdi | mdix}
Terminology and Conventions
.
Page 57
A. CLI Command Descriptions
Table A-10. Configure Interface Command (9 of 11)
configure interface modem data-bits {7 | 8}
Minimum Access Level: Administrator The configure interface modem data-bits command sets the number of data bits in a
byte on the Modem port. data-bits – V ali d choices are 7 and 8. The default is 8. Example:
configure interface modem data-bits 7
IAC#
configure interface modem parity {even | none | odd}
Minimum Access Level: Administrator The configure interface modem parity command sets the parity bit type for the Modem
port. parity – Val id choices are none, odd, and even. The default is none. Example:
confi gu re interface modem parity even
IAC#
configure interface modem rate {1200 | 2400 | 4800 | 9600 | 19200 | 38400 | 57600 | 115200}
Minimum Access Level: Administrator The configure interface modem rate command sets the rate of the Modem port in bps.
rate Valid rates are 1200, 2400, 4800, 9600, 19200, 38400, 57600, and 115200. The default is 9600 bps.
Example:
confi gu re interface modem rate 57600
IAC#
configure interface modem show
Minimum Access Level: Administrator The configure interface modem show command displays parameters for the Modem
port without leaving confi guration mode. Example:
confi gu re interface modem show
IAC#
configure interface modem stop-bits {1 | 2}
Minimum Access Level: Administrator The configur e interface modem com m and sets the n u mber of stop bits delimiting a byte
on the Modem port. stop-bits V alid choices are 1 and 2. The def ault is 1. Example:
confi gu re interface modem stop-bits 1
IAC#
4800-A2-GB20-10 July 2002
A-19
Page 58
A. CLI Command Descriptions
Table A-10. Configure Interface Command (10 of 11)
configure interface v35 clock-source {external | internal}
Minimum Access Level: Administrator The confi gure inter face v35 c lock -sour ce c ommand sp eci fies the sour ce of cl oc king for
the V.35/X.21 interface on a 4804 Manag eme nt Module. clock-source Valid choices are external and internal. The default is external. If
interfa ce-type is set to x21 (X.21), the only valid option is internal . Example:
IAC#
configure interface v35 flow-control {cts | dsr | none}
Minimum Access Level: Administrator The configure interface v35 flow-control command determines what lead, if any, is
used for flo w control. flow-control Valid choices are:
Example:
IAC#
confi gu re interface v35 clock-source internal
cts The CTS lead is monitored for flow control.dsr - The DSR lead is monitored for flow control.none - No hardware flow control is used. This is the def ault.
confi gu re interface v35 flow-control dsr
configure interface v35 idle-char {flag | mark}
Minimum Access Level: Administrator The configure interface v35 idle-char command specifies whether the port should
transmit the flag character (hexad ecimal 7E) or all ones (hexadecimal FF) between frames on the V.35/X.21 interface on a 4804 Management Module.
flag Valid choices are flag and mark. The default is flag. Example:
confi gu re interface v35 idle-char mark
IAC#
configure interface v35 invert-tx-clock {disabled
Minimum Access Level: Administrator The configure interface v35 invert-tx- clock command specifies whether the clock
supplied by the 4804 Management Module V.35/X.21 port on the TXC interchange circuit DB (ITU/T 114) is phase inv erted with respect to the Transmitted Data interchange circuit BA (ITU/T 103).
invert-tx-clock Invert Transmit Clock. Valid choices are disabled and enabled. The default is disabled.
Example:
confi gu re interface v35 invert-tx-clock enabled
IAC#
| enabled}
A-20
July 2002 4800-A2-GB20-10
Page 59
Table A-10. Configure Interface Command (11 of 11)
A. CLI Command Descriptions
configure interface v35 rate {
Minimum Access Level: Administrator The configure interface v35 rate command specifies the port rate in Kbps for the
V.35/X.21 interface on a 4804 Management Module. This value is ignored if clock-source is external.
rate – Valid rates are 64 to 8192 Kbps in 64 Kbps increments. The default is 2048. Example:
confi gu re interface v35 rate 1536
IAC#
rate
}
configure interface v35 show
Minimum Access Level: Administrator The configure in ter face v35 show command displays parameters for the V.35/X.21 port
without leaving configuration mode . Example:
confi gu re interface v35 show
IAC#
configure interface v35 state {disabled | enabled}
Minimum Access Level: Administrator The configure interface v35 state command specifies the availabi li ty of the V.35/X.21
interfa ce on a 4804 Managem ent Module. state Valid choices are disabled and enabled. The default is enabled. Example:
confi gu re interface v35 state disabled
IAC#
configure interface v35 type {eia530a | v35 | x21}
Minimum Access Level: Administrator The configu re inter face v35 t ype command sp eci fies t he elect rical int erf a ce used for the
V.35/X.21 port on a 4804 Management Module.
type Valid choices are:
eia530a The interface is EIA-530-A.v35 The interface is V.35. This is the default.x21 The interface is X.21.
Example:
confi gu re interface v35 type v35
IAC#
4800-A2-GB20-10 July 2002
A-21
Page 60
A. CLI Command Descriptions
SNR Margin (DSL Interfaces)
SNR (Signal-to-Noise Ratio) is the amplitude of the desired signal compared to the amplitude of noise on the line. Margin is the amount of noise that can be tolerated before a communication error or link establishment failure occurs. There are three settings in the BitStorm 4800 related to SNR margin:
min-snr-margin
target-downstream-margin
target-upstream-margin
If behavior is set to adaptive, the target-downstream-margin and target-upstream-margin settings determine the highest rates the modems can train to. These rates may be less than the maximum configured rates.
For example, if target-downstream-margin is set to 6, the modems will train (establish communication) at the highest rate downstream at which there is at least 6 dB of margin, or, if it is lower, the maximum configured rate (max-downstream-speed, in this case).
If behavior is set to fixed, the target margins determine the acceptabi lity of the signal at the selected fixed rate. If the margin is lower than the target margin at that rate, the modems train again.
The min-snr-margin setting is for the upstream direction only . I t causes the modem to retrain if the margin falls and remains below the setting for 60 seconds.
A-22
July 2002 4800-A2-GB20-10
Page 61
Configure IP
A. CLI Command Descriptions
The
configure IP
command is used to specify IP parameters.
Table A- 11. Co n figure I P C ommand
configure ip nhr {
Minimum Access Level:
configure ip nhr
The ports in the system.
ip_address
Example:
IAC#
– Specifies the IP address of the next-hop router.
configure ip nhr 135.75.90.112
ip_address
Administrator
command determines the Next- Hop Router (NHR) address for all
}
4800-A2-GB20-10 July 2002
A-23
Page 62
A. CLI Command Descriptions
Configure Management
The
configure management
command sets parameters for remote management
of the BitStorm 4800.
Table A-12. Configure Management Command (1 of 9)
configure management address {bootp | {{
Minimum Access Level:
configure management address
The BitStorm 4800, or specifies that it will be assigned using BOOT P (Bootstrap Protocol).
bootp
– Specifies that a BOOTP server will determine the management IP address.
Management addresses are cleared in anticipation of a BOOTP response.
ip_address subnet_mask
mask is 255.255.255.0.
default_gateway
default gat eway is 10.10.10.254. Examples:
configure management address bootp
IAC#
configure management address 137.90.127.3 255.255.255.0
IAC#
137.90.127.1
ip_address
– Specifies the managemen t IP address. The default address is 10.10.10.10.
– Specifies the subnet mask to be applied to the IP address. The default
– Specifies the management next hop or gatewa y IP address. The
} {
subnet_mask
Administrator
} {
default_gateway
command specifies the IP address of the
}}}
configure management ipsec {disable | enable}
Minimum Access Level:
configure management ipsec
The subject to IPsec.
disable
state, but they have no eff ect until IPsec is enab led. This is the default .
enable
Example:
IAC#
– Specifies that IPsec i s not used. IPsec parameters may be set while in this
– Specifies that IPsec is used to implement a Virtual Private Network (VPN).
configure management ipsec enable
Administrator
command determines whether management traffic is
A-24
July 2002 4800-A2-GB20-10
Page 63
A. CLI Command Descriptions
Table A-12. Configure Management Command (2 of 9)
configure management ipsec connection create {
connection_name
Minimum Access Level: Administrator The configure management ipsec connection create command creates a new IPsec
profile.
connection_name
from 1–16 printable characters.
remote_tunnel_address
tunnel.
remote_host_address
Example:
configure management ipsec connection create sec2
IAC#
135.90.200.200 10.10.2.2
} {
remote_tunnel_address
– Specifies the nam e of the connect ion pol icy to be cre ated. It ma y be
– Specifies the IP address of the remote end of the IPsec
– Specifies the IP address of the remote host using the tunnel.
} {
remote_host_address
}
configure management ipsec connection default ah-alg {sha1 | md5}
Minimum Access Level: Administrator The configure management ipsec connection default ah-alg command sets the
default Authentication Header protocol algorithm.
sha1 – Specifies that the default is the Secure Hash Algorithm. md5 – Specifies that the default is the Me ssage Digest 5 algorithm.
Example:
configure management ipsec connection default ah-alg md5
IAC#
configure management ipsec connection default ah-md5-key {
ahmd5key_string
Minimum Access Level: Administrator The configure management ipsec connection defaul t ah- md 5-key command sets the
default init ial key for the Authentication Header Message Digest 5 algorithm.
ahmd5key_string
digits (0–f). The default is 21aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa. Example:
configure management ipsec connection default ah-md5-key
IAC#
d2e4d3c1
}
– Defines the default key. This is a string of up to 32 hexadecimal
4800-A2-GB20-10 July 2002
A-25
Page 64
A. CLI Command Descriptions
Table A-12. Configure Management Command (3 of 9)
configure management ipsec connection default ah-sha1-key {
Minimum Access Level: Administrator The configur e management ipsec connect ion defaul t ah-sha1- key com mand sets th e
default init ial key for the Authentication Header Secure Hash Algorithm.
ahsha1_string
(0–f). The default is 21aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa. Example:
IAC#
d2e4d3c1
configure management ipsec connection default des-key {
Minimum Access Level: Administrator The configure management ipsec connection default des-key command sets the
default init ial key for the Data Encryption Standard algorithm.
deskey_string
(0–f). The default is 21aaaaaaaaaaaaaa. Example:
IAC#
ahsha1_string
configure management ipsec connection default ah-sha1-key
deskey_string
configure management ipsec connection default des-key d2e4d3c1
}
– Defines the default key. This is a string of up to 40 hex adecimal digits
}
– Defines the default key. This is a string of up to 16 hexadecimal digits
configure management ipsec connection default encryption {des | null}
Minimum Access Level: Administrator The configure management ipsec connection default encryption command sets the
default encryption algorithm.
des – Specifies that the default is the Data Encryption Standard (DES) algorithm. null – Specifies that the default is no encryption.
Example:
configure management ipsec connection default encryption des
IAC#
configure management ipsec connection default esp-alg {sha1 | md5}
Minimum Access Level: Administrator The configure management ipsec connection default esp-alg command sets the
default Encapsulating Security Payload protocol algorithm.
sha1 – Specifies that the default is the Secure Hash Algorithm. md5 – Specifies that the default is the Me ssage Digest 5 algorithm.
Example:
configure management ipsec connection default esp-alg md5
IAC#
A-26
July 2002 4800-A2-GB20-10
Page 65
A. CLI Command Descriptions
Table A-12. Configure Management Command (4 of 9)
configure management ipsec connection default esp-md5-key {
espmd5key_string
Minimum Access Level: Administrator The configure management ipsec connection default esp-md5-key command sets
the default initial key for the Encapsulating Security Payload protocol Message Digest 5 algorithm.
espmd5key_string
digits (0–f). The default is 21aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa. Example:
configure management ipsec connection default both esp-md5-key
IAC#
d2e4d3c1
}
– Defines the default key. This is a string of up to 32 hexadecimal
configure management ipsec connection default esp-sha1-key {
espsha1_string
Minimum Access Level: Administrator The configure management ipsec connection default esp-sha1-key command sets
the default initial key for the Encapsulating Security Payload protocol Secure Hash Algorithm.
espsha1_string
(0–f). The default is 21aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa. Example:
configure management ipsec connection default esp-sha1-key
IAC#
d2e4d3c1
}
– Defines the default key. This is a string of up to 40 he xadecimal digits
configure management ipsec connection delete {
connection_name
Minimum Access Level: Administrator The configure management ipsec connection delete command deletes an IPsec
profile.
connection_name
Example:
configure management ipsec connection delete sec2
IAC#
}
– Specifies the name of the connection policy to be deleted.
configure management ipsec connection modify
connection_name
{
Minimum Access Level: Administrator The configure management ipsec connection modify algori thm com m and sets the
algorithm for a specified connection.
connection_name
sha1 – Specifies that the default is the Secure Hash Algorithm. md5 – Specifies that the default is the Me ssage Digest 5 algorithm.
Example:
configure management ipsec connection modify sec1 algorithm
IAC#
md5
} algorithm {sha1 | md5}
– Specifies the name of the connection policy to modify.
4800-A2-GB20-10 July 2002
A-27
Page 66
A. CLI Command Descriptions
Table A-12. Configure Management Command (5 of 9)
configure management ipsec connection modify {
Minimum Access Level: Administrator The configure management ipsec connection modify authorization-key command
sets the key for a specified connec ti on.
connection_name key_string
Example:
IAC#
authorization-key d2e4d3c1
configure management ipsec connection modify {
Minimum Access Level: Administrator The configure management ipsec connection modify antirepla y command
determines whether the anti -replay feature is used.
connection_name
disable – Specifies that anti-replay is not in effect. enable – Specifies that anti-replay is in effect.
Example:
IAC#
enable
connection_name
– Defines the key. This is a string of up to 40 hexadecimal digits (0–f).
configure management ipsec connection modify sec1
connection_name
configure management ipsec connection modify sec1 antireplay
} authorization-key {
– Specifies the name of the connection policy to modify.
key_string
} antireplay {disable | enable}
– Specifies the name of the connection policy to modify.
}
configure management ipsec connection modify {
connection_name
Minimum Access Level: Administrator The configure management ipsec connection modify encryption com m and sets the
encryption standard for a specified connection.
connection_name
des – Specifies that the encryption standard is the Data Encryption Standard. null – Specifies that no encryption is used.
Example:
configure management ipsec connection modify sec1 encryption
IAC#
des
} encryption {des | null}
– Specifies the name of the connection policy to modify.
A-28
July 2002 4800-A2-GB20-10
Page 67
A. CLI Command Descriptions
Table A-12. Configure Management Command (6 of 9)
configure management ipsec connection modify {
connection_name
Minimum Access Level: Administrator The configure management ipsec connection modify encryption-key command sets
the encryption ke y for a specified connect ion.
connection_name key_string
Example:
IAC#
encryption-key d2e4d3c1
– Defines the key. This is a string of up to 16 hexadecimal digits (0–f).
configure management ipsec connection modify sec2
} encryption-key {
– Specifies the name of the connection policy to modify.
key_string
}
configure management ipsec connection modify {
connection_name
Minimum Access Level: Administrator The configure management ipsec connection modify protocol command sets the
IPsec encryption protcol for a specified connection.
connection_name
ah – Specifies that the protocol is Authentication Header. esp – Specifies that the pro tocol is Encapsulating Security Payload.
Example:
configure management ipsec connection modify sec2 protocol ah
IAC#
} protocol {ah | esp}
– Specifies the name of the connection policy to modify.
configure management ipsec connection modify {
connection_name
Minimum Access Level: Administrator The configure management ipsec connection modify remote-host-address
command changes the IP addr ess of the remote host using the IPsec tunnel for a specified connection.
connection_name remote_host
routable. It may be a single IP address or two IP addresses separated by a hyphen denoting a range of IP addresses.
Examples:
configure management ipsec connection modify sec1
IAC#
remot e- ho st-address 135.90.27.2
configure management ipsec connection modify sec2
IAC#
remot e- ho st-address 135.90.27.2-135.9 0. 27 .2 3
– Specifies the IP address of the remote host. It does not need to be
} remote-host-address {
– Specifies the name of the connection policy to modify.
remote_host
}
4800-A2-GB20-10 July 2002
A-29
Page 68
A. CLI Command Descriptions
Table A-12. Configure Management Command (7 of 9)
configure management ipsec connection modify {
Minimum Access Level: Administrator The configure management ipsec connection modify remote-tunnel-address
command changes the routable IP address of the IPsec tunnel at the remote end for a specified connection.
connection_name remote_host
Example:
IAC#
remot e- tu nnel-address 135.90.27.3
configure management ipsec connection modify {
Minimum Access Level: Administrator The configure management ipsec connection modify spi command sets the Security
Profile Index for the Encapsulating Security Payload protocol for a specif ied connection.
connection_name spi
in – The SPI is assigned to the inbound connection. out – The SPI is assigned to the outbound connection. both – The SPI is assigned to both the inbound and outbound connections. This is the
default. Example:
IAC#
connection_name
– Specifies the routable IP address of the IPsec tunnel at the remote end.
configure management ipsec connection modify sec1
connection_name
– The SPI number (1–65535).
configure management ipsec connection modify sec2 spi 27
} remote-tunnel-address {
– Specifies the name of the connection policy to modify.
} spi {
– Specifies the name of the connection policy to modify.
} [in | out | both]
spi
remote_host
}
configure management ipsec local-tunnel-address {
local_tunnel_address
Minimum Access Level: Administrator The configure management ipsec local-tunnel-address command defines the IP
address of the near end of the IPsec tunnel.
local_tunnel_address
Example:
configure management ipsec local-tunnel-address 10.10.10.12
IAC#
A-30
July 2002 4800-A2-GB20-10
}
– Specifies the IP address of the near end of the IPsec tunnel.
Page 69
A. CLI Command Descriptions
Table A-12. Configure Management Command (8 of 9)
configure management snmp access-validation {disabled
Minimum Access Level: Administrator The configure management snmp access-validation command specifies whether the
BitStorm 4800 validat es the IP ad dres s of inc oming SNMP (Simpl e Network Manag ement Protocol) messages.
disabled – No access validation occurs. This is the default. enabled – If the IP address of an SNMP packet is not one of those specif ied using the
configure management snmp nms-a ddress command, the packet is discarded.
Example:
configure management snmp access-validation enabled
IAC#
| enabled}
configure management snmp nms-address {
Minimum Access Level: Administrator The configure management snmp nms-address command specifies the IP addresses
of up to eight NMS (Network Management System) workstations allowed to access the BitStorm 4800. If SNMP Access Validation is disabled, these addresses have no effect.
nms_address1
workstations. Example:
configure management snmp nms-address 135.76.90.90 135.76.91.1
IAC#
nms_address1
...
nms_address8
}... [
– Specifies one to eight IP addres ses of NMS
nms_address8
]
configure management snmp nms-traps {
Minimum Access Level: Administrator The configure management snmp nms-traps command specifies the IP addresses of
up to eight trap managers to which traps are sent.
traps_address1
managers. Example:
configure management snmp nms-traps 135.76.90.90 135.76.91.1
IAC#
traps_address1
...
traps_address8
}... [
traps_address8
– Specifies one to eight IP addresses of traps
]
configure management snmp private-string {
Minimum Access Level: Administrator The configure management snmp private-string command specifies the community
string for read-write access.
private_community_string
up to 64 printable characters. The defa ult is public. Example:
configure management snmp private-string topsecret
IAC#
private_community_string
– Specifies the string used for read-write access. It may be
}
4800-A2-GB20-10 July 2002
A-31
Page 70
A. CLI Command Descriptions
Table A-12. Configure Management Command (9 of 9)
configure management snmp public-string {
Minimum Access Level: Administrator The configure management snmp public-string command specifies the community
string for read-only access.
public_community_string
to 64 printable characters. The default is public. Example:
IAC#
configure management snmp state {disabled | enabled}
Minimum Access Level: Administrator The configure management snmp state command specifies the availability of the
SNMP agent. state Valid choices are disabled and enabled. The default is disabled. Example:
IAC#
public_community_string
– Specifies the string used for read-only access. It may be up
configure management snmp public-string mediumsecret
configure management snmp state disabled
}
configure management vlan {
Minimum Access Level: Administrator The configure management vlan command specifies a VLAN tag to be added to
management traff ic. VL AN taggin g is enab l ed only i f the Bridge Mode i s sms o r uplink- ta g. See
Configure Brid ge
vlan_tag
Example:
IAC#
– Specifies the val ue of the VLAN tag. Vali d values are 1–15.
configure management vlan 12
on page A-5.
vlan_tag
}
A-32
July 2002 4800-A2-GB20-10
Page 71
Configure Scheduler
A. CLI Command Descriptions
The
configure scheduler
command sets parameters for automatic backup.
Table A-13. Configure Scheduler Command (1 of 2)
configure scheduler {disabled | enabled}
Minimum Access Level:
configure scheduler
The occurs.
disabled enabled
Example:
IAC#
– Specifies automatic configuration backup will not occur. This is the default.
– Specifies that auto ma tic configuration backup will occur .
configure scheduler enabled
configure scheduler dynamic [
Minimum Access Level:
configure schedule r dynamic
The backup will o cc u r a fte r ea c h con f ig u rat io n ch a nge.
hh:mm
– Specifies the amount of time aft er a configuration change t hat a conf iguration backup will automatically occur. Time is specified in hours (1–24) and minutes (0-59) separated by a colon. The default and minimum is 00:30 (30 minutes).
Example:
configure scheduler dynamic 24:00
IAC#
Administrator
command determines whether automati c config uration bac k up
hh:mm
Administrator
command specifies that automatic configuration
]
configure scheduler fixed {daily | monday | tuesday | wednesday | thursday | friday | saturday | sunday} {
Minimum Access Level:
configure schedul er fix ed
The backups will occur.
day_of_week
backup occurs every day.
hh:mm
and minutes (0–59) separated by a colon. Example:
configure scheduler sunday 00:00
IAC#
– Specifies the day of the week backups will occur. If daily is selected, a
– Specifies the time of da y the bac ku p will occur. Time is specifi ed in hour s (1–23)
Administrator
command specif ies th e fix ed ti mes at which conf igur ation
hh:mm
}
4800-A2-GB20-10 July 2002
A-33
Page 72
A. CLI Command Descriptions
Table A-13. Configure Scheduler Command (2 of 2)
configure scheduler ftp { {
filename
Minimum Access Level: Administrator The configure sche duler ftp command defines the FTP (File Transfer Protocol) server
used for automatic configuration backup.
ip_address user_name password filename
Example:
IAC#
}
– Specifies the network add ress of the FTP server. – Specifies a user name accepted by the FTP server.
– Specifies the password associated with the user name.
– Specifies the file contai ning the configuration backup.
confi gu re scheduler ftp 135.27.90.98 admin admnpas s ia c2 _b kup
ip_address
} {
user_name
} {
password
}
configure scheduler ftp timestamp {append | none}
Minimum Access Level: Administrator The configure sche duler ftp timestamp command determines whether a timestamp is
added to filenames to distinguish them from each other and prevent overwriting existing files.
append – Date and time are added to the filename. none – The filename is used as entered. This is the default.
Example:
configure scheduler ftp timestamp append
IAC#
A-34
July 2002 4800-A2-GB20-10
Page 73
Configure Security
A. CLI Command Descriptions
The
configure security
See
IP Security
on page A-38 for a detailed description of the IP security table.
command limits access to the system.
Table A-14. Configure Security Command (1 of 3)
configure security ip {
Minimum Access Level:
configure secur ity i p
The IP addresses associated with a DSL port. For more information see page A-38.
port_id
described in Chapter 2,
disabled
specified port. This is the default.
enabled
the specified port. The system must be in multiplex forwarding (mux) mode, else the following message is displayed:
See Table A-4, Configure Bridge Command for information about mux forwarding mode. Example:
IAC#
– Identifies the DSL port to be affected. The possible forms of the identifier are
– Specifies that ther e are no restrictions on the number of IP addresses on the
– Specifies that t here are restrictions on the number of IP addresses allo wed on
Comma nd not allowed: System must be in mux forwardin g mo de
configure security ip 1/1 enabled
Administrator
command determines whet her ther e is a l imit on the numbe r o f
Terminology and Conventions
port_id
} {disabled | enabled}
IP Security
.
on
configure security ip {
Minimum Access Level:
configure security ip add
The a particular DSL port. For more information see
port_id
described in Chapter 2,
ip_address
allowed IP addre sses already has the number of addres ses specified by the
security IP max-ip
nhr_address
default addr ess. Example:
IAC#
– Identifies the DSL port to be affected. The possible forms of the identifier are
– Specifies an IP address allowed to be active on the port. If the table of
Command not allowed: Too many static entries
– Specifies the address of the Next Hop Router for this port. It overrides the
configure security ip 1/1 add 135.27.90.2 135.27.90.21
Administrator
Terminology and Conventions
command, the following error message is displayed:
port_id
command specifes an IP address allowed to be active on
} add {
IP Secur ity
ip_address
on page A-38.
.
} {
nhr_address
}
configure
4800-A2-GB20-10 July 2002
A-35
Page 74
A. CLI Command Descriptions
Table A-14. Configure Security Command (2 of 3)
configure security ip {
Minimum Access Level: Administrator The configure security ip delete command deletes an IP address in the table of
addresses allo wed to be active on a particular DSL port.
port_id
described in Chapter 2,
ip_address
of addresses for this port. You can displa y the table using the config u re se cu rity ip show command.
Example:
IAC#
– Identifies the port to be affected. The possible forms of the identifier are
Terminology and Conventions
– Specifies an IP address to be deleted. The address must exist in the table
confi gu re security ip 1/1 delete 135.27.90.2
configure security ip {
Minimum Access Level: Administrator The configure security ip max-ip command specifes the number of IP addresses
allowed to be active on a particular DSL port. For more information see page A-38.
port_id
described in Chapter 2,
max_ip
range is 1–20. The default is 1. Example:
IAC#
– Identifies the port to be affected. The possible forms of the identifier are
Terminology and Conventions
– Specifies the maximum number of IP addresses allowed on the port. The valid
configure security ip 1/48 max-ip 2
port_id
port_id
} delete {
.
} max-ip {
.
ip_address
max_ip
}
}
IP Security
on
configure security ip {
Minimum Access Level: Administrator The configure security ip show command displays the table of addresses allowed for a
particular DSL port.
port_id
identifier are descri bed in Chapter 2, Example:
IAC#
– Identifies the port whose table is to be displayed. The possible forms of the
configure security ip 1/48 show
port_id
} show
Ter minology and Conventions
.
A-36
July 2002 4800-A2-GB20-10
Page 75
Table A-14. Configure Security Command (3 of 3)
A. CLI Command Descriptions
configure security mac {
Minimum Access Level: Administrator The configure security mac add command specifes a MAC address allowed to send
data to a particular DSL port. The address is added to a table of up to 20 entries.
port_id
described in Chapter 2,
mac_address
any other MAC add ress is dropped. Adding an address automatically enables the MAC address filtering feature for the port. The address must be in the form where each
Example:
IAC#
– Identifies the port to be affected. The possible forms of the identifier are
Terminology and Conventions
– Specifies a MAC address all owed to send data to the port. Traffic from
is a hexadecimal digit 0–f.
x
configure security mac 1/1 add 00-01-d2-e4-d3-c1
configure security mac {
Minimum Access Level: Administrator The configure security mac delete command deletes a MAC address in the table of
addresses allo wed to send data to a particular DSL port.
port_id
described in Chapter 2,
mac_address
table of address es fo r this port. You can display the tab le usi ng the co nfigure secu rity ma c show co m mand . The addre ss mu s t be i n the form hexadecim al digit 0–f.
all Specifies that all MA C addresses defined for the port are to be deleted. The MAC address filtering feature is disabl ed for the port.
Example:
IAC#
– Identifies the port to be affected. The possible forms of the identifier are
Terminology and Conventions
– Specifies a MAC address to be del eted. The address must exist in the
configure security mac 1/1 delete 00-01-d2-e4-d3-c1
port_id
port_id
} add {
mac_address
.
} delete {
.
xx-xx-xx-xx-xx-xx
}
xx-xx-xx-xx-xx-xx
mac_address
, where each x is a
,
| all}
configure security mac {
Minimum Access Level: Administrator The configure security mac show command displays the table of MAC addresses
allowed for a particular DSL port.
port_id
identifier are descri bed in Chapter 2, Example:
IAC#
4800-A2-GB20-10 July 2002
– Identifies the port whose table is to be displayed. The possible forms of the
configure security ip 1/48 show
port_id
} show
Ter minology and Conventions
.
A-37
Page 76
A. CLI Command Descriptions
IP Security
Entries in the table of allowed IP addresses are made in one of two ways:
Dynamic
entries are automatically learned by the unit by monitoring DHCP messages that pass through the unit between a subscriber's host and a DHCP server. Learning of dynamic entries in this manner is always active. Dynamic entries are not retained in non-volatile storage so they are lost when the unit is reset or loses power. Dynamic entries are removed if and when the lease on the DHCP-provided address expires or when the host relinquishes its lease on the address.
entries are entered by an administrator using the
Static
add
command
. Static entries are saved in non-volatile storage and can only be
configure security ip
removed by administrator action.
Entries in this table are used for two functions:
If the bridge mode is configured for multiplexing, entries in the table control the
flow of hardware (MAC) address information via ARP requests and responses passing through the unit.
If the unit is configured for multiplexing and there is not an entry in this table for a subscriber's host, that host will not be able to obtain MAC address information for other hosts on the subnet via the BitStorm 4800. In addition, hosts that are connected on the upstream side of the unit will not be able to obtain MAC information for this subscriber's host. (A host that is connected on the DSL side of the unit cannot obtain MAC address informat ion about any host other than the port's Next Hop Router when the unit is configured for multiplexing.)
For typical TCP/IP communications, the inability to obtain MAC address information effectively blocks communications. However, it may ha ve no effect at all on other protocols (such as PPPoE) that do not require the MAC address information that is obtained via ARP messages.
If IP Security is enabled for a DSL por t, the unit drops all messages that are
received at that port whose Ethertype is not either ARP or IP and whose source IP address is not found in the IP address table.
When IP Security is enabled for a DSL port, the restrictions on upstream data flow described above are enforced. In addition to restricting communication to only those addresses that are in the table, a maximum can be set on the number of addresses that can be in use on a port. This number is the sum of the static and dynamic entries for that port. If the limit is reached, the unit will block all requests for allocation of additional addresses via DHCP. This condition remains until one of the following happens:
The lease on an existing dynamic entry for this port expires
A subscriber's host connected to this por t releases its DHCP-assigned
address One or more entries are deleted from the table by an administrator
The limit on the number of entries is increased
IP Security is disabled on the port
A-38
July 2002 4800-A2-GB20-10
Page 77
Configure SNTP
A. CLI Command Descriptions
The
configure sntp
commands define the use of a Simple Network Time Protocol (SNTP) server to set and update the date in time in the unit. If SNTP is enabled, the unit makes an SNTP request at initialization and then periodically at the interval specified by the
configure sntp interval
command.
Table A-15. Configure SNTP Command
configure sntp {disable | enable}
Minimum Access Level:
configure sntp
The
disable enable
server. Example:
IAC#
– The unit does not make SNTP requests. Date and time must be set manually.
– The unit update s the date and time peri odical ly b y sending r eques ts to an SNTP
configure sntp disable
configure sntp address {
Minimum Access Level:
configure sntp addre ss
The
ip_address
Example:
IAC#
– The address of an SNTP server. The default is 192. 5.41.40.
configure sntp address 137.90.127.40
Administrator
command determines whether the unit makes SNTP requests .
ip_address
Administrator
command specifies the IP address of an SNTP server .
}
configure sntp interval {
Minimum Access Level:
configure sntp interval
The SNTP requests to update the date and t ime.
interval
default is 24. Example:
IAC#
– The period, in hours, between SNTP requests. Valid values are 1–24. The
configure sntp interval 12
Administrator
command specifies the frequency that the unit should make
interval
}
4800-A2-GB20-10 July 2002
A-39
Page 78
A. CLI Command Descriptions
Configure Syslog
The
configure syslog
command limits the messages written to the system log
file.
Table A-16. Configure Syslog Command
configure syslog rate-limiting {disabled | enabled}
Minimum Access Level:
configure syslog rate-l imiting
The are written to the system log.
disabled
log. This is the def ault.
enabled
more than five minutes apart. Example:
IAC#
– All messa ges ( sati sfyi ng the sy slog t hre shold se tti ng) are writte n to the sys tem
– Duplicate messages are written to the system log only if they are received
configure syslog rate-limiting disabled
Administrator
command determines whether dupl icate messages
configure syslog threshold {emergency | alert
Minimum Access Level:
configure syslog threshold
The written to the system log.
emergency alert information
log.
debug
system log. Example:
IAC#
– Only emergency messag e s are written to the system log.
– Emergency and alert messages are written to the system log. This is the default.
– Emergency, alert, and informati onal messages are written to the system
– Emergency, alert, informational, and debugging messages are writte n to th e
configure syslog threshold information
| information | debug}
Administrator
command specifies the levels of messages that are
A-40
July 2002 4800-A2-GB20-10
Page 79
Configure System Information
A. CLI Command Descriptions
The
configure system information
commands store a system name, location,
and description.
Table A-17. Configure System Information Command
configure system information system-location {
Minimum Access Level:
configure system information system-location
The the system.
location
Example:
IAC#
Building_C_First_Floor
– Up to 36 printable charac ters. No spaces are allow ed.
configure system information system-location
configure system information system-name {
Minimum Access Level:
configure system information system-name
The the system.
name
– Up to 36 printable characters. No spaces are allowed.
Example:
configure system information system-name Paradyne_IAC_8
IAC#
Administrator
command stores th e location of
name
Administrator
command stores a name identifying
location
}
}
4800-A2-GB20-10 July 2002
A-41
Page 80
A. CLI Command Descriptions
Configure System Options
The
configure system options
commands configure system-wide parameters for
the BitStorm 4800.
Table A-18. Configure System Options Command (1 of 2)
configure system options date-display-format {dd/mm/yy | mm/dd/yy
Minimum Access Level:
configure system options date-display-format
The format displayed and accepted by the system.
dd/mm/yy mm/dd/yy
Example:
IAC#
– The date displa y format is in the order day, month, year. – The date displa y format is in the order month, day, year. This is the default.
configure system options date-display-format dd/mm/yy
Administrator
configure system options inactivity-timeout {
Minimum Access Level:
configure syst em options inactivity-ti m eout
The session can exist with no activity before it is terminated by the system.
time
– Specifies the amount of time in minutes an inac ti ve telnet session can exist before it is terminated. The valid range is 1–20. The default is 5 minutes. A value of 0 (zero) disables the inactivity timeout.
Example:
configure system options inactivity-timeout 10
IAC#
Administrator
command specif ies how long a telnet
}
command determines the date
}
time
configure system options port-display-format {name | sle | unit/port
Minimum Access Level:
configure system options port-display-format
The ports are identified by the system. The va rio us ways of distinguishing ports are described in
System Terminology
name
– Ports are refe rr ed to by name.
sle
– Ports are referred to by Single Logical Enti ty ( S LE) number.
unit/port
Example:
IAC#
– Ports are referred to by unit number and port number. This is the default.
configure system options port-display-format sle
Administrator
in Chapter 2,
command determine s the way DSL
Term inology and Conventions
}
.
A-42
July 2002 4800-A2-GB20-10
Page 81
A. CLI Command Descriptions
Table A-18. Configure System Options Command (2 of 2)
configure system options test-timeout {
Minimum Access Level: Administrator The configure system options test-timeout command specifi es the maximum amount
of time a disruptive test is allowed to run.
time
– Specifies the amount of time in minutes a disruptive te st can run before it is terminated. The vali d range is 1–30. The default is 5 minutes.
Example:
configure system options test-timeout 2
IAC#
time
}
4800-A2-GB20-10 July 2002
A-43
Page 82
A. CLI Command Descriptions
Configure Uplink
The
configure uplink
command determines whet her the GigE Uplink port or the V.35/X .21 port on the Management Module is used for the uplink. If the Management Module has a V .35/X.21 port, the V .35/X.21 port is the default uplink. This command therefore allows you to override the default by specifying the GigE Uplink port as the uplink.
Table A-19. Configure Uplink Command
configure uplink {gige-uplink | module}
Minimum Access Level:
configure uplink
The
gige-uplink module
Example:
IAC#
– The uplink is the GigE Uplink Ethernet port.
– The uplink is the V.35/X.21 port on the Management Module.
configure uplink gige-uplink
Administrator
command determines the port used f or t he uplink.
A-44
July 2002 4800-A2-GB20-10
Page 83
Configure Uplink-Tag
A. CLI Command Descriptions
The
configure uplink-tag
commands assign a VLAN tag to every DSL port. The
range of numbers is determined by a base number and an index number:
Table A-20. VLAN Tag Ranges
Base Index 1 Index 2 Index 3 Index 4 Index 5
16
512 1024 1536 2048 2560 3072 3584
16 – 63 64 – 111 112 – 159 160 – 207 208 – 255
512 – 559 560 – 607 608 – 655 656 – 703 704 – 751 1024 –1071 1072 – 1119 1120 – 1167 1168 – 1215 1216 – 1263 1536 –1583 1584 – 1631 1632 – 1679 1680 – 1727 1728 – 1775
2048 – 2095 2096 – 2143 2144 – 2191 2192 – 2239 2240 – 2287 2560 – 2607 2608 – 2655 2656 – 2703 2704 – 2751 2752 – 2799 3072 – 3119 3120 – 3167 3168 – 3215 3216 – 3263 3264 – 3311 3584 – 3631 3632 – 3679 3680 – 3727 3728 – 3775 3776 – 3823
The default base value is 16 and the default index value is 1, so the default VLAN tags for DSL ports 1–48 of a unit are 16–63, respectively.
Table A-21. Configure Uplink-Tag Command
configure uplink-tag base {
Minimum Access Level:
configure uplink-tag base
The setting VLAN tags for the DSL ports.
base
– Specifies the base value used in setting the range of VLAN tags. Valid values are 16, 512, 1024, 1536, 2048, 2560, 3072, and 3584. The default is 16. See Table A-20,
VLAN Tag Ranges, to see the effect of the base on VLAN tag ranges.
Example:
configure uplink-tag base 1024
IAC#
Administrator
command determines the base value to be used for
configure uplink-tag index {
Minimum Access Level:
configure uplink-ta g index
The setting VLAN tags for the DSL ports.
index
– Specifies the inde x val ue use d in setting t he range of VLAN ta gs. Valid val ues are 1–5. The default is 1. See Table A-20, VLAN Tag Ranges, t o see the effect of the index on VLAN tag ranges.
Example:
configure uplink-tag index 2
IAC#
Administrator
command determines the index value to be used for
base
index
}
}
4800-A2-GB20-10 July 2002
A-45
Page 84
A. CLI Command Descriptions
Configure User-Accounts
The
configure user-accounts
commands create and delete user accounts for
managing the BitStorm 4800.
Table A-22. Configure User-Accounts Command
configure user-accounts create {
Minimum Access Level:
configure user- accounts create
The passwor ds for it. It also can be used to change passwords .
user
– Specifi es a user name of 1–15 print able characte rs. Spaces are not al lowed. If the
user already ex ists, the command modifies the password or passwords for the user.
login_password
allowed. A login password is required of al l users.
privilege_password
not allowed. The opti onal second password allows users to enter privileged mode to configure the system . The privilege passwor d mu st be different than the login password.
Example:
configure user-accounts create admin2 sesame vip
IAC#
configure user-accounts create admin2 sesame newpass
IAC#
configure user-accounts delete {
Minimum Access Level:
} {
user
login_password
Administrator
– Specifies a passw ord of 1–15 printable characters. Spaces are not
– Specifies a passw ord of 1–15 printable characters. Spaces are
Administrator
} [
privilege_password
command creates a user account and defines
}
user
]
configure user- accounts delete
The
user
– Specifies the user account to be deleted.
Example:
confi gu re user-accounts delete tempacct
IAC#
command deletes a user account.
A-46
July 2002 4800-A2-GB20-10
Page 85
Copy
A. CLI Command Descriptions
The
command saves and restores configurations.
copy
Table A-23. Copy Command
copy ftp {
ip_address
} {
user_name
} {
password
} {
filename
}
startup-config copy running-config startup-config copy startup-config ftp {
{
filename
}
ip_address
} {
user_name
} {
password
}
copy startup-config running-config
Minimum Access Level:
copy
The and recover configurations .
ftp
must be followed in order by:
running-config
volatile me mory. The running config uration is not permitted as the sour ce or dest inati on of an FTP operation.
startup-config
non-volatile memory. Example:
IAC#
command copies the configurati on of the BitStorm 4800. It can be used to save
– Specifies that the source or destination file is on an FTP server. The ftp keyword
ip_address
user_name
password
filename
copy ftp 135.90.28 .28 ftpuser ft ppw save.c onfig star tup-conf ig
– The password associated with the user name
– The name of the source or destinati on fi le
– Specifi es that the s ource or destinati on file is the configuration i n active
– Specifies that the sour ce or destination file is the configuration in
Administrator
– The IP address of the FTP server – A user name allowed on the FTP server
End
The
end
Ta ble A-24. End Command
end
Minimum Access Level:
end
The standard mode. If the end comm and is executed by a user not in privileged mode, it places the user at the top of the com m and tr ee li ke one or more
Example:
end
IAC# You are ending your privilege mode session IAC>_
4800-A2-GB20-10 July 2002
command terminates privileged mode.
Administrator
command terminates a privileged mode session and continu es the session in
back
commands.
A-47
Page 86
A. CLI Command Descriptions
Exit
Firmware
The
command terminates the user session.
exit
Tabl e A-25. Exit Command
exit
Minimum Access Level:
exit
The connection is dropped.
Example:
IAC#
The
command terminates the user sess ion. If the user session is by te lnet, the
exit
firmware
command downloads and applies new firmware to the
User
BitStorm 4800, and displays the version numbers of the active and alternate firmware.
Table A-26. Firmwar e Command (1 of 2)
firmware download {
ip_address
} {
user_name
} {
password
} {
filename
{no | yes}
}
Minimum Access Level:
firmware download
The optionally applies it immediately.
ip_address user_name password filename
no
– The file is downloaded to the alternate firmware area, but not applied or executed.
yes
– The file is downloade d and applied immediately. The BitStorm 4800 is reset.
Example:
IAC#
– Specifies the network add ress of the FTP server. – Specifies a user name accepted by the FTP server.
– Specifies the password associated with the user name.
– Specifies the file contai ning the configuration backup.
firmw ar e dow nload 135.27.90.98 admin admnpa ss fi rm 03 02.bin no
Administrator
command downloads ne w fi rmware to the BitStorm 4800, and
firmware download-status
Minimum Access Level:
firmware download-status
The firmware download.
Example:
firmw ar e dow nload-status
IAC#
Administrator
command displa ys the status of the active or last
A-48
July 2002 4800-A2-GB20-10
Page 87
Table A-26. Firmwar e Command (2 of 2)
firmware revision
A. CLI Command Descriptions
Paging
Minimum Access Level:
firmwar e revision
The running and alternate firmware maintained in memory.
Example:
firmware revision
IAC#
Administrator
command displa ys the revision numbers of the firmwar e currently
firmware switch
Minimum Access Level:
firmware switch
The resets the BitStorm 4800.
Example:
firmware switch
IAC# IAC#S wi tc h from firmware revision S01.02.03 to fir mw ar e revision S01.02.04? (yes/no) IAC#Firmware switched, system rebooting
The
paging
command enables and disables the More prompt.
Administrator
command loads and executes the alternative firmware file. This
yes
Tabl e A-27. Paging Command
paging {disabled | enabled}
Minimum Access Level:
paging
The affects onl y the user who enters the command.
disabled enabled
prompt is displayed on line 24. When
Press the space bar to view the next screen of outputPress the Enter key to view the next line of output
Example:
IAC>
command determines how a full screen of output is displayed. The selection
– Specifies that output is sent to the screen without interruption.
– Specifies that when 23 lines of output have been sent to the screen, a
paging enabled
User
More
is display ed, you can:
More
4800-A2-GB20-10 July 2002
A-49
Page 88
A. CLI Command Descriptions
Password
Privilege
The
password
If the
command changes the password at the current level:
password
command is executed while in privilege mode, the privilege
password is changed If the
password
command is executed while in user mode, the user password
is changed
Ta ble A-28. Password Command
password
Minimum Access Level:
password
The depending on which level is active.
Example:
password
IAC# enter old admin level password: enter new admin level password: enter new admin level password again: password changed IAC#
command changes the user or administrator (privilege) password,
User
**** ******
******
The
privilege
command switches the user to Administrator mode.
Table A-29. Privilege Command
privilege
Minimum Access Level:
privilege
The When the passwor d is entered correctly, the user is placed in Administrator (privileged) mode.
Example:
privilege
IAC> Password: IAC#
command causes the user to be prompted for an administrator passwor d.
******
User
A-50
July 2002 4800-A2-GB20-10
Page 89
Restart
A. CLI Command Descriptions
Save
The
restart
command restarts the unit.
Table A-30. Restart Command
restart unit {
Minimum Access Level:
restart unit
The and retrain the DSL ports.
Example:
restart unit 1
IAC#
The
command saves the running configuration to Non-Volatile Random
save
unit_number | unit_name
command restarts the unit, causing it to reload the startup configuration
Administrator
}
Access Memory (NVRAM).
Table A-31. Save Command
save
Minimum Access Level:
save
The startup configuration file, which is in nonvolatile memory.
The not yet been saved. It returns to
Example:
IAC#! IAC#_
command copies the running conf iguration, which is in v olatile memory, to the
IAC#
prompt changes to
save
Administrator
IAC#!
when the configur ation has been changed and has
IAC#
after the
save
command is ex ecuted.
4800-A2-GB20-10 July 2002
A-51
Page 90
A. CLI Command Descriptions
Show
The
command displays configuration options and statistics.
show
Table A-32. Show Command (1 of 20)
show bridge [
Minimum Access Level:
show bridge
The
port_id
Example:
IAC#
Displa y results:
– Specifies that the display should be limite d to entries for a single port.
show br id ge
Mode
The functional mode of the bridge: switched – Switched mode. The system acts as a transparent learning bridge.multiplexing The system treats each DSL port as if it were a private network
connected to the uplink, and never forwards data on another DSL port.
– sms – The system treats each DSL port as if it were a pri vate network connected to
the uplink, and never forwards data on another DSL port. In addition, a management VLAN is created on the uplink for use by the SMS.
Total Entries hardware address port-id
– The port ID of the entry .
status
The status of the entry: invalid – This learned entry has timed out but has not yet been deleted.learned This entry was learned.management This entry has a matching static address.other None of the other st atuses apply to this entry.self This entry is the BitStorm 4800.
port_id
command displays the MAC table .
– The number of entries currently in the table.
]
User
– The MAC address of the table entry.
show bridge timeout
Minimum Access Level:
show bridge timeout
The seconds.
Example:
show br id ge ti meout
IAC#
Displa y results:
timeout
A-52
July 2002 4800-A2-GB20-10
User
command displays the bridge table entry timeout value in
– The bridge table entry timeout value.
Page 91
A. CLI Command Descriptions
Table A-32. Show Command (2 of 20)
show date
Minimum Access Level: User The show date command di splays the system date, time, and time zone
Example:
show date
IAC#
Displa y results:
mm/dd/yy
hh/mm/ss
timezone – The offset from Greenwi ch Mean Time.
dd/mm/yy
or
– The date in the chosen system format.
– The time in hours, minutes, and seconds.
show filter [
filter_name
]
Minimum Access Level: User The show filter com m and displays configured data filters.
filter_name
– Specifies that the display should be limited to a sing le filter.
Example:
show fi lt er
IAC#
Displa y results:
filter-name
action
– The name of the filter.
– The action to be performed: – forward – Specifies that a packet is to be forwarded to the user when none of the
conditions specified in the rule or rules are matched.
– discard – Specifi es that a packet is to be discarded when none of the conditions
specified in the rule or rules are matched.
rule-name The name assigned to the rule or rules associated with th is filter.
type – The rule type:
ether The rule is based on Ethertypes. action The action to perform if the rule is satisfied:
forward The packet is forwar ded.discard The packet is discarded.
rule The rule criteria :
– The Ethertypes the rule affects.
4800-A2-GB20-10 July 2002
A-53
Page 92
A. CLI Command Descriptions
Table A-32. Show Command (3 of 20)
show filter-binding [filter [
Minimum Access Level: User The show filter-binding command displays the bindings of filters to interfaces.
filter – Specifies that output is sorted b y fi lt er name.
filter_name
port – Specifies that output is sorted by port number.
port_id
Example:
IAC#
Displa y results:
port-id The port the rule is bound to.
filter-name – The name of the filter.
direction – The direction of the data stream affected by this binding:
inbound Traffic towar d the port is affected.outbound Traffic from the port is affect ed.
show filter-rule [
Minimum Access Level: User
– Specifies that the display should be limited to a sing le filter.
– Specifies that the display should be limite d to a sin gle port.
show fi lt er- binding
rule_name
filter_name
]
]] | [port [
port_id
]]
The show filter-rule command displays configured filter rules.
filter_name
Example:
IAC#
Displa y results:
rule-name – The name assigned to the rule.
type – The rule type:
ether The rule is based on Ethertypes.ether-snap – The rule applies to Layer 2 SubNetwork Access Protocol (SNAP)
action The action to perform if the rule is satisfied:
forward The packet is forwar ded.discard The packet is discarded.
rule The rule criteria :
– The Ethertypes the rule affects.
– Specifies that the display should be limited to a sing le filter.
show fi lt er- rule
traffic.
A-54
July 2002 4800-A2-GB20-10
Page 93
A. CLI Command Descriptions
Table A-32. Show Command (4 of 20)
show interface console
Minimum Access Level: User The show interface console command di splays the co nfi guration of the Console port on
the 4800 or 4804 Management Module. Example:
show interface console
IAC#
Displa y results: Configuration parameters for the port. See the conf igure interface console commands
in Table A-10, Configure Interface Command, for information about the par am eters.
show interface dsl {
Minimum Access Level: User The show interfa ce dsl clear-stati stics command resets statistics for all DSL ports or a
specified DSL port.
port_id
specified, all statistics are cleared. clear-statistics – Resets to zero the st a tis tics for this se s si on . Th is affect s o nl y th e
statistics di spla y ed using the show command during this session . All stat isti cs conti nue to be maintained.
Example:
IAC#
– Specifies that the display should be limite d to thi s specified port. If all is
show interface dsl all clear-statistics
show interface dsl {
Minimum Access Level: User The show interfa ce dsl conf iguration command displays information about all DSL
ports or a specified DSL port.
port_id
specified, information is displayed for all ports. configuration Specifies that the ports configuration should be displayed. Example:
IAC#
– Specifies that the display should be limite d to thi s specified port. If all is
show interface dsl 1/1 configuration
port_id
port_id
} clear-statistics
} configuration
Displa y results: Configuration parameters for the port. See the conf igure interface dsl commands in
Table A-10, Configure Interface Com m and, for information about the parameters.
4800-A2-GB20-10 July 2002
A-55
Page 94
A. CLI Command Descriptions
Table A-32. Show Command (5 of 20)
show interface dsl {
Minimum Access Level: User The show interface dsl performance command displays performance information for all
DSL ports or a specified DSL port.
port_id
specified, information is displayed for all ports. performance Specifies that performance statistics for the specified port should be
displayed. Example:
IAC#
Displa y results:
– Specifies that the display should be limite d to thi s specified port. If all is
show interface dsl all performance
Status The status of the link:dormant The link has not yet trained up.down The link is down.notConnected The link is training.unknown The links status cannot be determined.up The link is enabled and ready to send packets.
Line Rate Up – The upstream data rate. Line Rate Down – The do wnstream data rate. Margin Up – The amount of distortion that can be tolerated, in dBm, upstream. Margin Down – The amount of dist ortion that can be tolerated, in dBm, downst ream. Attainable Rate – The maximum rate negotiated. Attenuation – The decrease of intensity of the signal across the link, in dB.
port_id
} performance
show interface dsl {
Minimum Access Level: User The show interface dsl rate command displays the data rate for all DSL ports or a
specified DSL port.
port_id
specified, information is displayed for all ports. rate Specifies that t he current rate of the specified port should be displayed. Example:
IAC#
– Specifies that the display should be limite d to thi s specified port. If all is
show interface dsl all rate
port_id
} rate
A-56
July 2002 4800-A2-GB20-10
Page 95
Table A-32. Show Command (6 of 20)
A. CLI Command Descriptions
show interface d sl rate,
continued
Displa y results:
Status The status of the link:
dormant The link has not yet trained up.down The link is down.notConnected The link is training.unknown The links status cannot be determined.up The link is enabled and ready to send packets.
Line Rate Up The upstream data rate.
Line Rate Down – The do wnstream data rate.
show interface dsl {
port_id
} statistics
Minimum Access Level: User The show interfa ce dsl statistics command displays statistics for all DSL ports or a
specified DSL port.
port_id
– Specifies that the display should be limite d to thi s specified port. If all is
specified, information is displayed for all ports. statistics – Specifes that the error stati stics for the speci fied port should be displayed. Example:
show interface dsl 1/1 statistics
IAC#
Displa y results:
dsl link The status of the link:
dormant The link has not yet trained up.down The link is down.notConnected The link is training.unknown The links status cannot be determined.up The link is enabled and ready to send packets.
current link up time The number of da ys, hour s, min ute s, and seco nds the interf ac e
has been active. line code The line code used on the port: DMT, ANSI, or G.lite.
latency – The buffer setting for the port: fast or interleaved.
4800-A2-GB20-10 July 2002
A-57
Page 96
A. CLI Command Descriptions
Table A-32. Show Command (7 of 20)
show interface dsl statistics,
continued
DSL Statistics (Up and Down denote values f or t he upstream and downstream directi ons):
margin The amount of noise margin that can be tolerated, in dB.
rate – The data rate.
attainable rate – An estimate of the maximum attainable rate.
attenuation – The decrease of intensity of the signal across the link, in dB.
errored second s – Seconds during which an error occurred.
severely errored seconds – Seconds during which there was a major error suc h as
an out of frame condition, or a bit error density greater than 10 unavailable seconds Seconds accrued after ten consecutive severely errored
–2
.
seconds. loss of power – Number of times the remote unit has been powered off.
ATM Statistics (Up and Down denote values for the upstream and downstream directions):
total cells rx – Total number of ATM cells received.
total cells tx – Total number of ATM cells sent.
total HEC – Number of cells from the CPE whose headers were corrected.
total OCD – Number of Out of Cell Delineation eve nts on the link from the CPE.
Ethernet Statistics:
total frames discarded Number of frames discarded due to errors.
total bytes rx – Number of bytes received on the port.
total b y tes tx – Number of bytes transmitted by the port.
total frames rx – Number of bytes received on the port.
total frames tx – Number of bytes transmitted by the port.
total rx errors – Number of frames received with error s.
total tx errors – Number of frames transmitted with er rors.
show interface ethernet {
port_id
} clear-statistics
Minimum Access Level: User The show interface ethernet clear- statistics command resets st atistics for all Ethernet
ports or a specified port.
port_id
– Specifies that the display should be limite d to thi s specified port. If all is
specified, information is displayed for all Ethernet ports. clear-statistics – Resets to zero the st a tis tics for this se s si on . Th is affect s o nl y th e
statistics di spla y ed using the show command during this session . All stat isti cs conti nue to be maintained.
Example:
show in te rfa ce ethernet 1/mgmt clear-statis tic s
IAC#
A-58
July 2002 4800-A2-GB20-10
Page 97
Table A-32. Show Command (8 of 20)
A. CLI Command Descriptions
show interface ethernet {
port_id
} configuration
Minimum Access Level: User The show int erface e the rnet conf i guratio n command displ a ys confi gurat ion i nf ormation
for all Ethernet ports or a specifi ed port.
port_id
– Specifies that the display should be limite d to thi s specified port. If all is
specified, information is displayed for all Ethernet ports. configuration Specifies that the ports configuration should be displayed. Example:
show in te rfa ce ethernet 1/mgmt configuratio n
IAC#
Displa y results:
current link up time The number of da ys, hour s, min ute s, and seco nds the interf ac e
has been active.
The remainder of the display shows configuration parameters for the port. See the configure interface ethernet commands in Table A-10, Configure Interface Command, for more inf ormation about the parameter s.
show interface ethernet {
port_id
} statistics
Minimum Access Level: User The show interface eth ernet statisti cs command disp la ys stati stic s f or all Ethernet ports
or a specified port.
port_id
– Specifies that the display should be limite d to thi s specified port. If all is
specified, information is displayed for all Ethernet ports. statistics – Specifes that the error stati stics for the speci fied port should be displayed. Example:
show in te rfa ce ethernet 1/mgmt statistics
IAC#
Displa y results:
ethernet link The status of the link:
dormant The link has no de vice attached.down The link is down.unknown The links status cannot be determined.up The link is enabled and ready to send packets.
current link up time The number of da ys, hour s, min ute s, and seco nds the interf ac e
has been active. rate The data rate of the port.
mode – The duplex mode: full duplex or half duplex.
connector type – The connector used for the link: rj 45 or fiber.
total bytes rx – Number of bytes received on the port.
total b y tes tx – Number of bytes transmitted by the port.
total frames rx – Number of bytes received on the port.
total frames tx – Number of bytes transmitted by the port.
total frames discarded – Number of frames discarded b y the port.
4800-A2-GB20-10 July 2002
A-59
Page 98
A. CLI Command Descriptions
Table A-32. Show Command (9 of 20)
show interface modem
Minimum Access Level: User The show interfa ce mode m command displays the confi guration of the Modem port on
the 4800 or 4804 Management Module. Example:
IAC#
Displa y results:
The remainder of the display shows configuration parameters for the port. See the configure int erface modem commands in Table A-10, Configure Int erf ac e Command , f or more information about the parameters.
show interface v35 clear-statistics
Minimum Access Level: User
show in te rfa ce modem
current link up time The number of da ys, hour s, min ute s, and seco nds the interf ac e has been active.
The show interf ace v35 c lea r -stat istics command r esets st atis tics for the V.35/X.21 port of the 4804 Management Module.
clear-statistics – Resets to zero the st a tis tics for this se s si on . Th is affect s o nl y th e statistics di spla y ed using the show command during this session . All stat isti cs conti nue to be maintained.
Example:
show interface v35 clear-statistics
IAC#
show interface v35 configuration
Minimum Access Level: User The show interfa ce v35 configuration command displays configuration information for
the V.35/X.21 port of the 4804 Management Module. configuration Specif ies that the V.35/X.21 ports configuration should be displayed. Example:
show interface v35 configuration
IAC#
Displa y results:
current link up time The number of da ys, hour s, min ute s, and seco nds the interf ac e
has been active.
The remainder of the display shows configuration parameters for the port. See the configure interface v35 commands in Table A-10, Configure Interface Comman d, for more information about the parameters.
A-60
July 2002 4800-A2-GB20-10
Page 99
A. CLI Command Descriptions
Table A-32. Show Command (10 of 20)
show interface v35 statistics
Minimum Access Level: User The show interfa ce v35 statistics command displays statistics for the V.35/X.21 port of
the 4804 Management Module. statistics – Specifes that the error stati stics for the V.35/X.21 port should be displayed. Example:
show interface v35 statistics
IAC#
Displa y results:
seria l li nk The status of the link:
dormant The link has no de vice attached.down The link is down.testing A test is in progress on the link.unknown The links status cannot be determined.up The link is enabled and ready to send packets.
current link up time The number of da ys, hour s, min ute s, and seco nds the interf ac e
has been active. link type The electrical interface:
eia530a The interface is EIA-530-A.v35 The interface is V.35.x21 The interface is X.21.
RTS The status of the Request To Send lead (on or off).
CTS – The status of the Clear To Send lead (on or off).
DSR – The status of the Data Set Ready lead (on or off).
DTR – The status of the Data Terminal Ready lead (on or off ).
LSD – The status of the Line Signal Detect lead (on or off).
HDLC Up lin k St at is ti cs :
total frames receiv ed – Total number of frames received.
total frames transmitted – Total number of frames sent.
total receive erro rs – Number of errors detected in i ncom ing data.
total transmit errors – Number of errors detected in outgoing data
PPP Uplink Statistics:
total receive bytes – Total number of bytes re ceived.
total transmit bytes – Total number of bytes sent.
total receive erro rs – Number of errors detected in i ncom ing data.
total transmit errors – Number of errors detected in outgoing data
4800-A2-GB20-10 July 2002
A-61
Page 100
A. CLI Command Descriptions
Table A-32. Show Command (11 of 20)
show ip nhr
Minimum Access Level: User The show ip nhr command displays the address of the Ne xt Hop Router.
Example:
IAC#
Displa y results:
show management arp
Minimum Access Level: User The show management arp command displays the ARP table for the management
interface. Example:
IAC#
show ip nhr
nhr address – The management Ne xt Hop Router IP address.
show ma na gem ent arp
Displa y results:
ip address The IP address of the entry.
mac addr es s – The hardware address of the entry.
type – The source of the add ress:
dynamic The address was learned.static The address was added to the table b y an adm inistrator.
show management ip
Minimum Access Level: User The show management ip command displays the Management Module settings.
Example:
show ma na gem ent ip
IAC#
Displa y results:
ip address The management IP address.
subnet mask – The subnet mask to be appl ied to the IP address.
gateway – The management next hop or gateway IP address.
A-62
July 2002 4800-A2-GB20-10
Loading...