Sign In
Upload
Manuals
Brands
Enterasys Manuals
Network Router
X-Pedition XSR
Enterasys X-Pedition XSR Manuals
Manuals and User Guides for Enterasys X-Pedition XSR. We have
2
Enterasys X-Pedition XSR manuals available for free PDF download: Cli Reference Manual, User Manual
Enterasys X-Pedition XSR User Manual (466 pages)
Enterasys Security Router User's Guide
Brand:
Enterasys
| Category:
Network Router
| Size: 5.82 MB
Table of Contents
Regulatory Compliance Information
4
Product Safety
5
Declaration of Conformity
7
Table of Contents
13
Contents of the Guide
29
Conventions Used in this Guide
30
Getting Help
32
Chapter 1: Overview
33
Chapter 2: Managing the XSR
37
Utilizing the Command Line Interface
37
Connecting Via the Console Port on XSR Series
37
Using the Console Port for Dial Backup on the XSR 1800 Series
37
Using the Console Port to Remotely Control the XSR
38
Connecting a Serial Interface to a Modem
38
Terminal Commands
39
Connecting Via Telnet
39
Connecting Via SSH
39
Accessing the Initial Prompt
40
Synchronizing the Clock
40
Managing the Session
41
Remote Auto Install
41
RAI Features and Requirements
41
RAI Requirements on the XSR
43
How RAI Components Work
43
CLI Editing Rules
47
Setting CLI Configuration Modes
48
User EXEC Mode
50
Privileged EXEC Mode
50
Global Configuration Mode
50
Exiting from the Current Mode
50
Mode Examples
51
Observing Command Syntax and Conventions
51
CLI Command Limits
52
Describing Ports and Interfaces
52
Supported Physical Interfaces
52
Supported Virtual Interfaces
52
Supported Ports
53
Numbering XSR Slots, Cards, and Ports
53
Setting Port Configuration Mode
53
Setting Interface Type and Numbering
53
Configuration Examples
54
Entering Commands that Control Tables
56
Adding Table Entries
56
Deleting Table Entries
57
Modifying Table Entries
57
Displaying Table Entries
57
Managing XSR Interfaces
57
Enabling an Interface
58
Disabling an Interface
58
Configuring an Interface
58
Displaying Interface Attributes
58
Managing Message Logs
59
Logging Commands
59
Performing Fault Management
59
Fault Report Commands
60
Capturing Fault Report Data
60
Using the Real-Time Clock
61
Rtc/Network Clock Options
61
RTC Commands
61
Managing the System Configuration
61
Resetting the Configuration to Factory Default
62
Using the Default Button (XSR 1800/1200 Series Only)
62
Configuration Save Options
63
Using File System Commands
63
Bulk Configuration Management
63
Downloading the Configuration
63
Uploading the Configuration/Crash Report
64
Creating Alternate Configuration Files
64
Managing the Software Image
65
Creating Alternate Software Image Files
65
Bootrom Upgrade Choices
65
Loading Software Images
70
Using EOS Fallback to Upgrade the Image
70
Downloading with FIPS Security
72
Software Image Commands
72
Configuration Change Hashing
72
Displaying System Status and Statistics
73
Memory Management
73
Creating Resources
73
Network Management through SNMP
74
SNMP Informs
75
Shaping Trap Traffic
75
Statistics
75
Alarm Management (Traps)
76
Network Monitoring Via Service Level Agreement Agent
76
Measuring Performance Metrics
76
Configuration Examples
77
Using the SLA Agent in SNMP
79
Full Configuration Backup/Restore
79
Cabletron Ctdownload MIB
79
Enterasys Configuration Management MIB
79
Software Image Download Using Netsight
80
CLI Translator
80
Appending CLI Commands to Configuration Files Via SNMP
80
Accessing the XSR through the Web
81
Network Management Tools
81
Netsight Atlas Router Services Manager V2.0
81
Firmware Upgrade Procedures
81
Using the CLI for Downloads
82
Using SNMP for Downloads
82
Fault Reporting
82
Auto-Discovery
82
Chapter 3: Managing LAN/WAN Interfaces
83
Overview of LAN Interfaces
83
LAN Features
83
Configuring the LAN
84
MIB Statistics
84
Overview of WAN Interfaces
85
WAN Features
85
Configuring the WAN
86
Chapter 4: Configuring T1/E1 & T3/E3 Interfaces
89
Overview
89
T1/E1 Functionality
89
T3/E3 Functionality
89
Features
89
T1/E1 Mode
89
T3 Mode
90
E3 Mode
90
T1/E1 Subsystem Configuration
91
T3/E3 Subsystem Configuration
91
T1 Drop & Insert One-To-One DS0 Bypassing
92
Drop and Insert Features
92
Configuring Channelized T1/E1 Interfaces
93
Configuring Un-Channelized T3/E3 Interfaces
94
Troubleshooting T1/E1 & T3/E3 Links
95
T1/E1 & T3/E3 Physical Layer Troubleshooting
95
T1/E1 & T3/E3 Alarm Analysis
97
Receive Alarm Indication Signal (AIS - Blue Alarm)
97
Receive Remote Alarm Indication (RAI - Yellow Alarm)
98
Transmit Remote Alarm Indication (RAI - Yellow Alarm)
98
Transmit Sending Remote Alarm (Red Alarm)
98
Transmit Alarm Indication Signal (AIS - Blue Alarm)
98
T1/E1 & T3/E3 Error Events Analysis
99
Slip Seconds Counter Increasing
100
Framing Loss Seconds Increasing
101
Line Code Violations Increasing
101
Configuring the D&I NIM
101
Chapter 5: Configuring IP
103
Overview
103
General IP Features
103
ARP and Proxy ARP
106
Proxy DNS
106
BOOTP/DHCP Relay
106
Broadcast
107
Directed Broadcast
107
Local Broadcast
107
Icmp
107
Tcp
108
Udp
108
Telnet
108
Ssh
108
Trivial File Transfer Protocol (TFTP)
109
IP Interface
109
Secondary IP
109
Interface & Secondary IP
109
ARP & Secondary IP
110
ICMP & Secondary IP
110
Routing Table Manager & Secondary IP
111
OSPF & Secondary IP
111
RIP & Secondary IP
111
Unnumbered Interface & Secondary IP
111
NAT & Secondary IP
111
DHCP & Secondary IP
111
VPN & Secondary IP
111
VRRP & Secondary IP
112
Pppoe & Secondary IP
112
Maximum Transmission Unit (MTU)
112
Ping
112
Traceroute
112
IP Routing Protocols
112
Ripv1 and V2
113
Triggered-On-Demand RIP
114
How Triggered-On-Demand RIP Works
114
Ospf
116
LSA Type 3 and 5 Summarization
117
OSPF Database Overflow
117
OSPF Passive Interfaces
118
OSPF Troubleshooting
119
Null Interface
119
Route Preference
119
Static Routes
120
VLAN Routing
120
Forwarding VLAN, Pppoe over VLAN
121
VLAN Processing over the Xsr's Ethernet Interfaces
122
VLAN Processing: VLAN-Enabled Ethernet to Standard LAN Interfaces
122
VLAN Processing: VLAN-Enabled Ethernet to WAN Interfaces
123
VLAN Processing: WAN Interface to a VLAN-Enabled Ethernet Interface
123
Qos with VLAN
124
Policy Based Routing
124
Accessing the Global Routing Policy Table
124
Match Clauses
125
Set Clauses
125
PBR Cache
125
Default Network
126
Classless Inter-Domain Routing (CIDR)
126
Router ID
126
Real Time Protocol (RTP) Header Compression
127
Network Address Translation
128
Features
128
Virtual Router Redundancy Protocol
129
VRRP Definitions
130
How the VRRP Works
131
Different States of a VRRP Router
131
VRRP Features
132
Multiple Virtual IP Addresses Per VR
132
Multiple Vrs Per Router
132
Authentication
132
Load Balancing
133
ARP Process on a VRRP Router
133
Host ARP
133
Proxy ARP
133
Gratuitous ARP
133
Traffic Process on a VRRP Router
133
ICMP Ping
134
Interface Monitoring
134
Watch Group Monitoring
135
Physical Interface and Physical IP Address Change on a VRRP Router
135
Equal-Cost Multi-Path (ECMP)
136
Configuration Considerations
136
Configuring RIP Examples
137
Configuring Unnumbered IP Serial Interface Example
139
Configuring OSPF Example
139
Configuring NAT Examples
140
Basic One-To-One Static NAT
140
Configuring Static Translation
140
Dynamic Pool Configuration
141
Configuring Dynamic Pool Translation
141
Network Address and Port Translation
142
Configuring NAPT
142
Configuring NAPT
143
Multiple NAT Pools Within an Interface
143
Static NAT Within an Interface
144
NAT Port Forwarding
146
Configuring Policy Based Routing Example
146
Configuring VRRP Example
147
Router Xsra
147
Router Xsrb
147
Configuring VLAN Examples
148
Chapter 6: Configuring the Border Gateway Protocol
149
Features
149
Overview
149
Describing BGP Messages
150
Open
150
Update
151
Keepalive
151
Notification
151
Defining BGP Path Attributes
151
AS Path
152
Origin
152
Next Hop
153
Local Preference
153
Weight
155
Atomic Aggregate
155
Aggregator
156
Multi-Exit Discriminator
156
Community
157
BGP Path Selection Process
159
BGP Routing Policy
159
Access Control Lists
160
Filter Lists
160
Community Lists
160
Route Maps
160
Regular Expressions
161
Regular Expression Characters
161
Regular Expression Examples
161
Peer Groups
162
Initial BGP Configuration
163
Adding BGP Neighbors
163
Resetting BGP Connections
163
Synchronization
164
Address Aggregation
164
Route Flap Dampening
164
Recommendations for Route Flap Dampening
165
Capability Advertisement
165
Route Refresh
165
Scaling BGP
166
Route Reflectors
167
Confederations
168
Displaying System and Network Statistics
169
Configuring BGP Route Maps
170
Configuring BGP Neighbors
171
BGP Path Filtering by Neighbor Example
171
BGP Aggregate Route Examples
172
Configuring BGP Confederations
172
TCP MD5 Authentication for BGP Example
173
Configuring BGP Peer Groups
173
IBGP Peer Group Example
173
EBGP Peer Group Example
174
BGP Community with Route Maps Examples
174
Chapter 7: Configuring PIM-SM and IGMP
177
Features
177
Differences with Industry-Standard Approach
177
IP Multicast Overview
178
Defining Multicast Group Addressing
178
Outlining IGMP Versions
179
Comparing Multicast Distribution Trees
179
Forwarding Multicast Traffic
180
Describing the Xsr's IP Multicast Features
180
Group Membership Actions
181
Sending and Receiving Queries and Reports
181
Sending a Query
181
Receiving a Query
182
Receiving a Report
182
Source-Specific Forwarding Rules
182
Interoperating with Older IGMP Versions
182
Query Version Distinctions
182
Behavior of Group Members Among Older Version Queriers
182
Behavior of Group Members Among Older Version Group Members
183
Behavior of Multicast Routers Among Older Version Queriers
183
Behavior of Multicast Routers Among Older Version Group Members
183
Describing the Xsr's PIM-SM V2 Features
183
Phase 1: Building a Shared Tree
184
Phase 2: Building Shortest Path Tree between Sender & RP
184
Phase 3: Building Shortest Path Tree between Sender & Receiver
185
Neighbor Discovery and DR Election
186
PIM Register Message
187
PIM Join/Prune Message
187
Bootstrap & Rendezvous Point
187
Assert Processing
187
Source-Specific Multicast
188
PIM SM over Frame Relay
188
PIM Configuration Examples
189
Chapter 8: Configuring PPP
191
Overview
191
PPP Features
191
Link Control Protocol (LCP)
192
Network Control Protocol (NCP)
192
Authentication
193
Password Authentication Protocol (PAP)
193
Challenge Handshake Authentication Protocol (CHAP)
193
Microsoft Challenge Handshake Protocol (MS-CHAP)
193
Link Quality Monitoring (LQM)
194
Multilink PPP (MLPPP)
194
Multi-Class MLPPP
195
MLPPP Packet Fragmentation and Serialization Transmission Latency
196
Fragment Interleaving over the Link
197
Multilink Head Format Negotiation
197
Events and Alarms
198
IP Control Protocol (IPCP)
198
IP Address Assignment
199
PPP Bandwidth Allocation/Control Protocols (BAP/BAPC)
199
Configuring PPP with a Dialed Backup Line
200
Configuring a Synchronous Serial Interface
200
Configuring a Dialed Backup Line
201
Configuring the Dialer Interface
201
Configuring the Physical Interface for the Dialer Interface
201
Configuring the Interface as the Backup Dialer Interface
202
Configuring MLPPP on a Multilink/Dialer Interface
203
Multilink Example
203
Dialer Example
203
Configuring BAP
204
Dual Xsrs: One Router Using Dod with Call Request
204
XSR1 Configuration
204
XSR2 Configuration
205
Dual Xsrs: BAP Using Call/Callback Request
206
XSR1 Configuration
206
XSR2 Configuration
206
Chapter 9: Configuring Frame Relay
209
Overview
209
Virtual Circuits
209
Dlcis
209
Dtes
210
Dces
210
Frame Relay Features
211
Multi-Protocol Encapsulation
211
Address Resolution
212
Dynamic Resolution Using Inverse ARP
212
Controlling Congestion in Frame Relay Networks
212
Rate Enforcement (CIR) - Generic Traffic Shaping
212
Discard Eligibility (DE) Bit
213
Forward Explicit Congestion Notification (FECN)
213
Backward Explicit Congestion Notification (BECN)
213
Link Management Information (LMI)
215
Sub-Interfaces
215
FRF.12 Fragmentation
216
End-To-End Fragmentation
216
User Configuration Commands
216
Map-Class Configuration
217
Show Running Configuration
217
Displaying Statistics
217
Reports and Alarms
217
Clear Statistics
217
Interconnecting Via Frame Relay Network
218
Configuring Frame Relay
222
Chapter 10: Configuring Dialer Services
223
Overview of Dial Services
223
Dial Services Features
223
Asynchronous and Synchronous Support
224
AT Commands on Asynchronous Ports
224
V.25Bis over Synchronous Interfaces
224
DTR Dialing for Synchronous Interfaces
225
Time of Day Feature
225
Typical Use for Dial Services
225
Ethernet Backup
225
Implementing Dial Services
226
Dialer Profiles
226
Dialer Interface
227
Dialer Strings
227
Dialer Pool
227
Addressing Dialer Resources
227
Configuring Encapsulation
228
ISDN Callback
228
Configuring the Dialer Interface
232
Creating and Configuring the Dialer Interface
232
Configuring the Map Class
233
Configuring the Physical Interface for the Dialer Interface
233
Sample Dialer Configuration
233
Configuring ISDN Callback
234
Point-To-Point with Matched Calling/Called Numbers
234
Point-To-Point with Different Calling/Called Numbers
234
Point-To-Multipoint with One Neighbor
234
Point-To-Multipoint with Multiple Neighbors
234
Overview of Dial Backup
235
Dial Backup Features
235
Sequence of Backup Events
235
Link Failure Backup Example
236
Configuring a Dialed Backup Line
236
Configuring the Dialer Interface
236
Configuring the Physical Interface for the Dialer Interface
237
Configuring Interface as the Backup Dialer Interface
237
Sample Configuration
238
Overview of Dial on Demand/Bandwidth on Demand
239
Dialer Interface Spoofing
240
Dialer Watch
240
Dialer Watch Behavior
241
Caveat
242
Answering Incoming ISDN Calls
242
Incoming Call Mapping Example
243
Node a (Calling Node) Configuration
243
Node B (Called Node) Configuration
244
Node D (Calling Node) Configuration
244
Configuring Dod/Bod
245
PPP Point-To-Multipoint Configuration
246
Node a (Calling Node) Configuration
246
Node B (Called Node) Configuration
247
PPP Multipoint-To-Multipoint Configuration
247
Node a Configuration
247
Node B Configuration
248
PPP Point-To-Point Configurations
248
Dial-In Routing for Dial on Demand Example
249
Dial-Out Routing for Dial on Demand Example
249
PPP Point-To-Multipoint Configurations
250
Dial-Out Router Example
251
Dial-In Router Example
251
MLPPP Point-To-Multipoint Configuration
252
Node a (Calling Node) Configuration
252
Node B (Called Node) Configuration
253
MLPPP Point-To-Point Configurations
253
Dial-In Router Example
253
Dial-Out Router Example
254
MLPPP Point-To-Multipoint Configurations
254
Dial-Out Router Example
255
Dial-In Router Example
256
MLPPP Multipoint-To-Multipoint Configuration
256
Node a Configuration
256
Node B Configuration
257
Switched PPP Multilink Configuration
257
Bandwidth-On-Demand
257
Node a (Calling Node) Configuration
258
Node C (Called Node) Configuration
258
Backup Configuration
259
Backup Using ISDN
259
Node a (Backed-Up Node) Configuration
259
Node C (Called Node) Configuration
260
Configuration for Backup with MLPPP Bundle
261
Node a (Backed-Up Node) Configuration
261
Node C (Called Node) Configuration
262
Configuration for Ethernet Failover
262
Configuration for Frame Relay Encapsulation
263
Chapter 11: Configuring Integrated Services Digital Network
265
ISDN Features
265
BRI Features
266
PRI Features
266
Understanding ISDN
266
Basic Rate Interface
267
Primary Rate Interface
267
B-Channels
267
D-Channel
267
D-Channel Standards
268
D-Channel Signaling and Carrier Networks
268
ISDN Equipment Configurations
268
Bandwidth Optimization
269
Security
269
Call Monitoring
270
ISDN Trace
270
Trace Decoding
270
Q921 Decoding
270
Q931 Decoding
271
Decoded Ies
273
BRI NI-1, DMS100 & 5ESS SPID Registration
273
Terminal Endpoint Identifier (TEI) Management Procedures
273
ISDN Configuration
273
BRI (Switched) Configuration Model
274
PRI Configuration Model
276
Leased-Line Configuration Model
278
T1 Pri
279
Isdn Bri
279
More Configuration Examples
279
BRI Leased Line
280
BRI Leased PPP
280
BRI Leased Frame Relay
280
ISDN (ITU Standard Q.931) Call Status Cause Codes
280
Chapter 12: Configuring Quality of Service
283
Overview
283
Mechanisms Providing Qos
284
Traffic Classification
284
Describing the Class Map
285
Describing the Policy Map
285
Queuing and Services
286
Describing Class-Based Weight Fair Queuing
286
Configuring CBWFQ
287
Measuring Bandwidth Utilization
287
Describing Priority Queues
287
Configuring Priority Queues
287
Describing Traffic Policing
288
Configuring Traffic Policing
288
Class-Based Traffic Shaping
289
Traffic Shaping Per Policy-Map
290
Differences between Traffic Policing and Traffic Shaping
291
Traffic Shaping and Queue Limit
291
Congestion Control & Avoidance
292
Describing Queue Size Control (Drop Tail)
292
Describing Random Early Detection
292
Describing Weighted Random Early Detection
293
Configuration Per Interface
294
Suggestions for Using Qos on the XSR
295
Qos and Link Fragmentation and Interleaving (LFI)
295
Configuring Qos with MLPPP Multi-Class
295
Configuring Qos with FRF.12
296
Qos with VLAN
296
Traffic Classification
296
Describing VLAN Qos Packet Flow
297
VLAN Packet with Priority Routed out a Fast/Gigabitethernet Interface
297
VLAN Packet with Priority Routed out a Serial Interface
297
Non-VLAN IP Packet Routed out a Fast/Gigabitethernet Interface
298
Qos with VLAN Configuration Process
298
Qos on Input
299
Qos on VPN
299
Qos over VPN Features
300
Configuring Qos on a Physical Interface
300
Configuring Qos on a Virtual Tunnel Interface
300
Qos on a Virtual Interface Example
301
Qos and VPN Interaction
304
Configuring the Shaper on the VPN Interface
305
Qos Policy Configuration Examples
306
Simple Qos on Physical Interface Policy
306
Qos for Frame Relay Policy
307
Qos with MLPPP Multi-Class Policy
308
Qos with FRF.12 Policy
309
Qos with VLAN Policy
310
Input and Output Qos Policy
310
Input Qos on Ingress to the Diffserv Domain Policy
311
Chapter 13: Configuring ADSL
313
Overview
313
Features
313
PDU Encapsulation Choices
314
PPP over ATM
314
PPP over Ethernet over ATM (Routed)
315
Routed IP over ATM
316
ADSL Limitations
317
ADSL Hardware
317
NIM Card
317
ADSL on the Motherboard
318
DSP Firmware
318
ADSL Data Framing
318
ATM Support
318
Virtual Circuits
318
OAM Cells
319
Performance Monitoring
319
Class of Service
319
DSLAM Compatibility
319
Access Concentrator Restrictions
319
Inverse ARP
320
Qos
320
Snmp
320
Configuration Examples
320
Pppoe
320
Pppoa
321
Ipoa
322
Chapter 14: Configuring the Virtual Private Network
323
VPN Overview
323
Internet Security Issues
323
How a Virtual Private Network Works
324
Ensuring VPN Security with Ipsec/Ike/Gre
324
GRE over Ipsec
326
Defining VPN Encryption
327
Describing Public-Key Infrastructure (PKI)
327
Digital Signatures
327
Certificates
328
Machine Certificates for the XSR
328
CA Hierarchies
329
Certificate Chains
329
RA Mode
330
Pending Mode
331
Enroll Password
331
CRL Retrieval
331
Renewing and Revoking Certificates
331
DF Bit Functionality
331
VPN Applications
332
Site-To-Site Networks
333
Site-To-Central-Site Networks
333
NAT Traversal
333
Client Mode
334
Network Extension Mode (NEM)
334
Remote Access Networks
335
Using OSPF over a VPN Network
336
OSPF Commands
336
Configuring OSPF over Site-To-Central Site in Client Mode
336
Configuring OSPF over Site-To-Central Site in Network Extension Mode
338
Server 1
339
Client
339
Configuring OSPF with Fail over (Redundancy)
339
Server 1
340
Server 2
340
Client
340
Limitations
340
XSR VPN Features
340
VPN Configuration Overview
342
Master Encryption Key Generation
342
ACL Configuration Rules
343
Configuring Acls
343
Selecting Policies: Ike/Ipsec Transform-Sets
344
Security Policy Considerations
345
Configuring Policy
345
Creating Crypto Maps
346
Configuring Crypto Maps
346
Authentication, Authorization and Accounting Configuration
347
AAA Commands
348
Configuring AAA
348
PKI Configuration Options
349
Configuring PKI
350
PKI Certificate Enrollment Example
350
Interface VPN Options
353
VPN Interface Sub-Commands
354
Configuring a Simple VPN Site-To-Site Application
354
Configuring the VPN Using EZ-Ipsec
356
EZ-Ipsec Configuration
357
Configuration Examples
358
XSR with VPN - Central Gateway
358
Remote Access
359
GRE Tunnel for OSPF
362
Tunnel A: XSR-3250 VPN GRE Site-To-Site Tunnel
362
Tunnel B: XSR-1805 VPN GRE Site-To-Site Tunnel
364
Xsr/Cisco Site-To-Site Example
366
Cisco Configuration
366
XSR Configuration
367
Interoperability Profile for the XSR
368
Scenario 1: Gateway-To-Gateway with Pre-Shared Secrets
368
Scenario 2: Gateway-To-Gateway with Certificates
371
Chapter 15: Configuring DHCP
375
Overview of DHCP
375
Features
375
DHCP Server Standards
376
How DHCP Works
376
DHCP Services
377
Persistent Storage of Network Parameters for Clients
377
Temporary or Permanent Network Address Allocation
377
Lease
377
Assigned Network Configuration Values to Clients: Options
377
Provisioning Differentiated Network Values by Client Class
378
BOOTP Legacy Support
378
Nested Scopes: IP Pool Subsets
378
Scope Caveat
379
Manual Bindings
379
DHCP Client Services
380
Router Option
380
Parameter Request List Option
380
DHCP Client Interaction
380
Secondary Address Caveats
380
Interaction with Remote Auto Install (RAI)
381
DHCP Client Timeouts
381
DHCP CLI Commands
382
DHCP Set up Overview
383
Configuring DHCP Address Pools
383
Configuring DHCP - Network Configuration Parameters
383
Configuration Steps
383
Create an IP Local Client Pool
383
Create a Corresponding DHCP Pool
384
Configure DHCP Network Parameters
384
Enable the DHCP Server
384
Optional: Set up a DHCP Nested Scope
384
Optional: Configure a DHCP Manual Binding
384
DHCP Server Configuration Examples
385
Pool with Hybrid Servers Example
385
Manual Binding Example
385
Manual Binding with Class Example
385
BOOTP Client Support Example
386
DHCP Option Examples
386
Advertisement
Enterasys X-Pedition XSR Cli Reference Manual (684 pages)
Enterasys Security Router Reference Guide
Brand:
Enterasys
| Category:
Network Router
| Size: 6.2 MB
Table of Contents
Table of Contents
7
Preface
11
Conventions Used in this Guide
12
Getting Help
12
Chapter 1: Network Management
15
Observing Syntax and Conventions
15
Network Management Commands
15
General Network Management Commands
16
Ip Http Port
19
Ip Http Server
19
Ip Ssh Server
20
Ip Telnet Server
21
Sample Output
22
General Show Commands
28
Show Ip Http
29
Snmp-Server Commands
30
SNMP Show Commands
48
Show Snmp Engineid
49
Show Snmp Group
49
Show Snmp User
50
SLA Agent Commands
51
RTR-Mode Commands
57
RTR Show Commands
59
Chapter 2: Configuring T1/E1 and T3/E3 Subsystems
61
Observing Syntax and Conventions
61
T1/E1 & T3/E3 Commands
61
Clock Source
65
Dsu Mode
69
Interface Serial
74
National Bit
77
T1/E1 and T3/E3 Clear and Show Commands
80
Show Controllers
81
Parameter Descriptions
83
Drop and Insert Commands
86
Show Controller
87
Chapter 3: Configuring the XSR Platform
89
Observing Syntax and Conventions
89
Platform Commands
89
Clock Commands
90
Crypto Key Commands
91
Other Platform Commands
92
User Guidelines
95
SNTP Commands
97
Show Sntp
99
Platform Clear and Show Commands
100
Clear Logging
101
Show Clock
105
Show Logging
109
Show Logging File
109
Show Version
111
File System Commands
113
Show Reload
122
Bootrom Monitor Mode Commands
127
Chapter 4: Configuring Hardware Controllers
135
Observing Syntax and Conventions
135
Hardware Controller Commands
135
Hardware Controller Clear and Show Commands
144
Clear Interface Gigabitethernet
145
Chapter 5: Configuring the Internet Protocol
159
Observing Syntax and Conventions
159
IP Commands
159
OSPF Commands
160
Area Nssa
161
Area Range
162
Area Stub
163
Ip Ospf Cost
170
Ip Ospf Priority
173
Router Ospf
177
Timers Spf
179
OSPF Debug and Show Commands
180
Show Ip Ospf
185
Show Ip Ospf Database
187
Show Ip Ospf Interface
195
Show Ip Ospf Neighbor
196
RIP Commands
199
Ip Rip Authentication
201
Ip Rip Authentication Mode
202
Ip Rip Offset
204
Ip Rip Receive Version
205
Ip Rip Send Version
206
Router Rip
210
RIP Show Commands
212
RTP Header Compression Commands
213
Triggered on Demand RIP Commands
218
Policy-Based Routing Commands
221
Match Ip Address
223
PBR Clear and Show Commands
224
ARP Commands
225
Other IP Commands
227
IP Clear and Show Commands
244
Show Ip Arp
245
Show Ip Interface
246
Show Ip Irdp
249
Show Ip Route
250
Show Ip Traffic
253
Show Tcp
256
Network Address Translation Commands
258
Ip Local Pool
259
Show Ip Nat Translations
265
Virtual Router Redundancy Protocol Commands
267
VRRP Clear and Show Commands
273
Chapter 6: Configuring the Border Gateway Protocol
279
Observing Syntax and Conventions
279
BGP Configuration Commands
279
Bgp Confederation Identifier
284
Bgp Confederation Peers
285
Bgp Dampening
286
Distance Bgp
287
Neighbor Password
294
Neighbor Shutdown
298
Neighbor Timers
299
Neighbor Weight
301
Timers Bgp
305
Route Map Commands
306
Match Metric
308
BGP Set Commands
310
Set Community
311
Set Metric
315
Set Origin
316
Set Weight
317
BGP Clear and Show Commands
318
Clear Ip Bgp Dampening
319
Show Ip Bgp
320
Show Ip Bgp Community
321
Show Ip Bgp Neighbors
324
Show Ip Bgp Regexp
326
Show Ip Bgp Summary
327
BGP Debug Commands
328
Chapter 7: Configuring IP Multicast
331
Observing Syntax and Conventions
331
Ip Igmp Version
332
PIM Commands
337
IGMP Clear and Show Commands
343
Show Ip Igmp Interface
344
Show Ip Mroute
346
Chapter 8: Configuring the Point-To-Point Protocol
353
Observing Syntax and Conventions
353
PPP Commands
353
Encapsulation Ppp
354
Ppp Authentication
356
PPP Debug, Clear and Show Commands
367
Show Ppp
370
Multilink PPP Commands
378
Ppp Multilink
383
Ppp Multilink Endpoint
384
Multilink Show Commands
392
Chapter 9: Configuring Frame Relay
407
Observing Syntax and Conventions
407
Frame Relay Commands
407
Frame Relay Map Class Commands
419
Frame Relay Clear and Show Commands
426
Chapter 10: Configuring the Dialer Interface
437
Observing Syntax and Conventions
437
Dialer Interface Commands
437
Dialer Pool
438
Interface Dialer
441
Dialer Interface Clear and Show Commands
444
Dial Backup Commands
447
DOD/BOD Commands
450
Dialer Map
454
Dialer Watch Commands
457
Chapter 11: ISDN BRI and PRI Commands
461
Observing Syntax and Conventions
461
ISDN Commands
461
ISDN Debug and Show Commands
470
Chapter 12: Configuring Quality of Service
479
Observing Syntax and Conventions
479
Qos Commands
479
Policy-Map Commands
480
Class-Map Commands
497
Match Cos
499
Match Ip Dscp
499
Match Ip Precedence
500
Qos Show Commands
501
Chapter 13: Configuring ADSL
509
Observing Syntax and Conventions
509
ADSL Configuration Commands
509
CMV Commands
509
Other ADSL Commands
513
Interface Atm
514
Oam Retry
522
PPP Configuration Commands
525
ATM Clear and Show Commands
529
Chapter 14: Configuring the VPN
537
Observing Syntax and Conventions
537
VPN Commands
537
PKI Commands
538
CA Identity Mode Commands
538
Other Certificate Commands
544
IKE Security Protocol Commands
548
ISAKMP Protocol Policy Mode Commands
549
Remote Peer ISAKMP Protocol Policy Mode Commands
553
Remote Peer Show Commands
558
Ipsec Commands
560
Ipsec Clear and Show Commands
562
Crypto Map Mode Commands
564
Match Address
565
Set Peer
567
Crypto Transform Mode Commands
569
Crypto Show Commands
572
Interface CLI Commands
575
Interface VPN Commands
576
Tunnel Commands
581
Set User
585
Tunnel Clear and Show Commands
586
Additional Tunnel Termination Commands
588
Show Ip Local Pool
590
DF Bit Commands
591
Advertisement
Related Products
Enterasys Security Router X-PeditionTM
Enterasys X-Pedition XSR CLI
Enterasys X-Pedition Series
Enterasys XPEDITION XSR Series
Enterasys X-Pedition XSR-1850
Enterasys X-Pedition XSR-3250
Enterasys X-Pedition XSR-3150
Enterasys X-Series X8
Enterasys XSR-XPEDITION
Enterasys X-Pedition XSR-1805
Enterasys Categories
Switch
Network Router
Network Hardware
Wireless Access Point
Software
More Enterasys Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL