Multi-DMZ, Virtual Server mapping, and VPN pass-through. Because of rapid growth of network, virtual LAN has become one of the major new areas in internetworking industry. PROSCEND 6200 support port-based VLAN and IEEE 802.1q VLAN over ATM network.
Easy configuration and management with password control for various application environments Efficient IP routing and transparent learning bridge to support Internet broadband services Virtual LANs (VLANs) offer significant benefit in terms of efficient use of bandwidth, flexibility, performance and security ...
Page 7
ALARM (Red) Bridging and VLAN IEEE 802.1D Transparent Learning Bridge IEEE 802.1Q and Port Based VLAN Spanning Tree Protocol (STP) Up to 2K Mac Address Routing Static routing and RIP v1/v2(RFC 1058/2453) ...
Page 8
Configurable Idle times for timeout 802.1P Tag IPv4 TOS/DiffServ Class-based Prioritization Class-based Traffic Shaping Class-based DSCP Mark Up to 8 priority queues IP Precedence Alternation IPSec (RFC2411) up to 4 Tunnels ...
Page 9
Management Web and Telnet management via LAN ports CLI via serial console port Support SSH (RFC4250/4251/4252/4253/4254/4255/4256) SNMP v1/v2c/v3 (RFC 1157/1901//1905) MIB II (RFC 1213/1493) Syslog with Remote Logging support Firmware Upgrade via TFTP ...
LED status of VPN Router: LEDs Active Description The power adaptor is connected to this device SHDSL.bis line 1 connection is established LINK 1 SHDSL.bis line 1 handshake Blink Transmit or received data over SHDSL.bis link 1 SHDSL.bis line 2 connection is established LINK 2 SHDSL.bis line 2 handshake Blink...
Connector Description DC-IN Power adaptor inlet: Input voltage from 9V to 12VDC CONSOLE RJ-45 for system configuration and maintenance Reset button for reboot or load factory default LAN (1,2,3,4) 10/100BaseT auto-sensing and auto-MDIX for LAN port (RJ-45) USB ports ( for 6200-2W/U, 6200-4W/U and 6200-2W/U only) G.SHDSL .Bis interface for WAN port (RJ-45) Frame Ground / Protective earth...
The VPN Router have one port for WAN port connection, this is a G.SHDSL .Bis interface. The pin assignments for SHDSL line cable are: For 2-wire (one pair) model , Loop1 has been used. For 4-wire (two pair) model, Loop1 and 2 have been used. For 8-wire (four pair)model, Loop1, 2, 3 and 4 have been used.
Page 14
T-568A Straight-Through Ethernet Cable T-568B Straight-Through Ethernet Cable Both the T-568A and the T-568B standard Straight-Through cables are been used.
The VPN Router have four LAN ports. Those ports are auto-negotiating, auto-crossover. In 10/100Mbps Fast Ethernet, the speed can be 10Mbps or 100Mbps and the duplex mode can be half duplex or duplex. The auto-negotiating ports can detect and adjust to the optimum Ethernet speed (10/100 Mbps) and duplex mode (full duplex or half duplex) of the connected device.
The pin assignment of RJ-45 modular jack on the Console cable: Pin Number Abbrev. Description Figure DCE ready Received Line Signal Detector DTE ready Signal Ground Received Data Front View Transmitted Data Clear to Send Top View Request to Send Only for with USB ports models.
The marked lug or terminal should be connected to the building protective earth bus. The function of protective earth does not serve the purpose of providing protection against electrical shock, but instead enhances surge suppression on the DSL lines for installations where suitable bonding facilities exist. The connector type is M3 machine screw.
There are three methods to configure the VPN Router: serial console, Telnet and Web Browser. Users have to choose one method to configure the VPN Router. This following guide is designed to lead users through Web Configuration of G.shdsl.bis VPN Router in the easiest and quickest way possible.
Connection with VPN Router Make sure that Ethernet Adapter had been installed in PC or NB used for configuration of the modem. TCP/IP protocol is necessary for web configuration, so please check the TCP/IP protocol whether it has been installed. The VPN Router provides a browser interface that allows you to configure and manage this device.
The console port is a RJ-45 connector that enables a connection to a PC for monitoring and configuring the VPN Router. Use the supplied serial cable with a female DB-9 connector to serial port of PC and RJ-45 module jack connector to VPN Router’s console port. Start your terminal access program by terminal emulation program or Hyper Terminal and configure its communication parameters to match the following default characteristics of the console port: Parameter...
Start your telnet client with a command window or VT100 terminal emulation by key in “192.168.0.1”, which is the management IP address of Proscend 6200 series VPN router, and wait for the login page prompts up. Then, key in the user name and the password once the login page shows. The login page is shown as the following screen shot.
This section introduces the configuration and functions of the web-based management. It is an HTML-based management interface that allows users to setup and manage Proscend 6200 VPN routers. This configuration system offers all monitoring and management features which allow users to access VPN routers from anywhere on the network with a standard browser, such as, Internet Explorer or Firefox.
Quick Setup System Mode Bridge Router WAN IP WAN Netmask Protocol Disable EoA + NAT IPoA IPoA + NAT PPPoA PPP User PPP Password PPPoA Confirm Password PPP Connection Type PPPoE PPPoE Primary DNS Secondary DNS DHCP mode Disable Server Relay SHDSL.bis STU-R...
Page 24
IPoA PPPoA PPP User, PPP Password, PPP PPPoE Connection type ENCAP VPI-VCI QoS Class QoS PCR QoS SCR Gateway 3.5G Backup Mode Location Manufacture Dial Number Keep-alive Interval Keep-alive Server Primary Secondary DHCP Mode Disable Server Relay DHCP Server Mode Subnet Netmask IP Range...
Page 25
Bridge Mode Mode Aging Time VLAN Router Mode Not available Bridge Mode Mode Disable 802.1Q Tag-Based VLAN Port-Based VLAN Static Route Destination Netmask Gateway Interface Mode Traffic Classify Mode Class ID Protocol Src IP Src Netmask Src Port Dst IP Dst Netmask Dst Port 802.1P...
Page 26
Protocol Public Port Private IP/Port Bridge Mode Not available Router Mode Mode WAN I/F Host IP Bridge Mode Not available DDNS Mode Provider Host Name User Name Password IGMP IGMP Proxy / Snooping Security Firewall Router Mode Mode Bridge Mode Not available Router Mode IPSEC...
Page 27
Filter IP Filter Mode Default Policy Entry(1~16) Mode Action Protocol Source IP/ Mask Source Start/ End Port Destination IP/ Mask Destination Start/ End Port MAC Filter Mode Default Policy Entry(1~16) Mode Action Management SNTP Sync With PC SNTP Mode Time Server Time Zone SNMP SNMPv3...
Page 28
Connection Request Username Connection Request Password Retry Times UPnP Mode Sys Log Remote Server Mode Remote Server Address Remote Server Port Telnet Mode Port Mode Port Refresh Time Service Port Show Information Hardware MCSV Software MCSV Software Version DSL Chip Name DSL Phy Firmware Version DSL IDC Firmware Version Serial No...
Page 29
Ping IP Address Size Count Update Trace Route Host name or IP Packet Datagram Update Interval...
“Quick Setup” function guides users to setup their VPN routers step by step. This VPN Router can be set as a bridge or a router. The following sections show how to setup a bridge mode or a router mode. “System Mode” allows users to decide this VPN router should be a bridge device or a router device. “Router mode”...
Page 31
Click on “Router” to assign this VPN router to be a router device. Once “System Mode” is set to “Router”, more setups will be shown as the screen shot above. WAN Section Fill up WAN port information for the VPN router as the router mode. 1.
Page 32
2. Protocol Nine options are available for this setup: Disable: if protocol is “Disable”, WAN will be closed; hence, the information of WAN IP and WAN Netmask will not be effective. EoA EoA + NAT IPoA ...
In the circled area, you are able to set PPP user, PPP password, and PPP connection type. In addition, the connection type can be set as either “Always on” or “On demand”. There are two SHDSL.bis modes: STU-C and STU-R. “STU-C” means the terminal of central office (CO) and “STU-R”...
In both “Bridge” mode and “Router” mode, there are four parts of information should be provided, SHDSL.bis mode, LAN IP and subnet mask, default gateway IP address, and WAN encapsulation type and VPI/VCI values. Please provide the information of LAN IP and subnet mask in the circled area. For encapsulation type, VC-Mux (Virtual Circuit Multiplexing) and LLC (Logical Link Control) are available.
Click on “Submit” button to save all settings. After saving all settings, the following screen shots will be shown to confirm the configurations. For bridge mode For router mode...
Page 37
Click on “Apply” to activate these configurations. The VPN router will be rebooted as the following screen shot.
Network section allows users to setup the following functions. 1. SHDSL 2. Interfaces 3. 3.5G Backup 4. DNS 5. DHCP 6. NAT Please check the sections for detail information on how to use these functions. “SHDSL” function allows you to change SHDSL parameters. 1.
Page 39
example: 6200-2W and 6200-2W/U (2-wire model) can select 2-wire line type only. 6200-4W and 6200-4W/U (4-wire model) can select 2-wire and 4-wire line types. 6200-8W and 6200-8W/U (8-wire model) can select 2-wire, 4-wire or 8-wire line types. 3. Annex There are four Annex types, Annex A, Annex B, Annex A/F and Annex B/G. Please confirm with your ISP.
“Interfaces” function provides a tool to change LAN settings, WAN settings, and the default gateway after the initial setups were completed. Please remember to reboot your VPN router after any changes are made. You are able to change LAN configurations in “Interfaces” function. Once you change the settings, please click on “Submit”...
Page 41
The screen shot above will be shown once you select a VC to configure. Fill up IP address, subnet mask, gateway, encapsulation type, and VPI/VCI information. Then, setup QoS class (UBR, CBR, VBR-RT and VBR-NRT), QoS PCR (Peak Cell Rate), and QoS SCR (Substained Cell Rate) information. For Bridge mode, “Protocol”...
Page 42
If you choose “PPPoA” or “PPPoE” type for protocol parameter, four more information fields will be needed. Default gateway information can be changed in “Interfaces” section.
Insert SIM card into 3G/3.5G modem card, and connect the modem card with one of USB ports of VPN router. Proscend 6200 VPN Router will recognize a 3G/3.5G modem card or SIM card automatically when a 3G/3.5G device is connected to one of VPN Router’s USB ports. No additional setup procedure is required. Only one Internet connection (either 3G/3.5G wireless or DSL wired) can be used at the same time.
input Dial Number APN (Access Point Name), please those items provided by telecomm service provider. After finish type those items, then click ‘APPLY’ button. Note: Different ISP’s require Dial Number and APN for connecting to the Internet, please check with your ISP as to the type of connection it requires.
DHCP (Dynamic Host Configuration Protocol) is a communication protocol that allows network administrators to manage centrally and assigns IP addresses in an organization's network automatically. “DHCP” feature provides three DHCP modes: “Disable”, “Server” and “Relay”. Disable: Disable DHCP Server. Server: Enable DHCP Server and assign IP addresses. Relay: Enable DHCP Server and pass through original IP addresses.
Page 46
First, please make sure you set “Mode” to “Server”. Then, choose a DHCP server (there are five DHCP servers available in this configuration system.) and configure its details by click on the number. The following screen shot is the detail setups of a DHCP server.
Page 47
Please make sure choose “Relay” mode first. Then, please provide the information of DHCP server IP address and assign a WAN port.
NAT (Network Address Translation) is a set of rules for translating an intranet IP address, such as, a company network, to a public IP address. Note: NAT is only available in “Router” mode. First, you need to choose whether you want to enable or disable NAT. Then, if you want to enable NAT and click on “Enable”...
“Advance” menu provides nine functions: 1. STP 2. VLAN 3. Static Route 4. QoS 5. RIP 6. Virtual Server 7. DMZ 8. DDNS 9. IGMP Note: The advanced functions are only for advanced users to setup advanced functions. The incorrect setting of advanced function will affect the performance or system error, even disconnection.
VLAN (Virtual Local Area Network) allows a physical network to be partitioned into multiple logical networks. Devices on a logical network belong to one group. A device can belong to more than one group. With VLAN, a device cannot directly talk to or hear from devices that are not in the same group. When properly configured, VLAN prevents one subscriber from accessing the network resources of another on the same LAN.
Page 51
Click on “802.1Q Tag-Based VLAN” to show more configuration as the following screen shot. Assign each group’s VID and which port should be in a group. Then, assign PVID to the port you need and its link type, un-tag or tag. Then, click on “Apply” to set your VPN router with 802.1Q Tag-Based VLAN policy.
“Static route” is a path in the router that indicates how it will reach a certain subnet by taking a specific path. A static route is one that is manually installed by your network administrator. Static routes have advantages and disadvantages as compares to dynamic routes. Advantages of Static Routes ...
QoS(Quality of Service) refers to both a network’s ability to deliver data with minimum delay, and the networking methods used to control the use of bandwidth. Without QoS, all traffic date is equally likely to be dropped when the network is congested. This can cause a reduction in network performance and mark the network inadequate for time-critical application such as video-on-demand.
Page 54
Click on the number to configure each entry’s details.
Page 55
Click on “802.1P” tag and show the screen shot above. Click on the number of an entry to configure a queue’s class ID. User priority is giving eight ( 2 = 8 ) priority levels (class IDs). Priority Level Traffic Type 0 (default) Best Effort Background...
Page 56
Video, less than 100 milliseconds latency and jitter Voice, less than 10 milliseconds latency and jitter Network Control The DSCP value used to identify 64 levels (2 =64) of service determines the forwarding behavior that each packet gets across the DiffServ network. Based on the marking rule different kinds of traffic can be marked for different priorities of forwarding.
Page 57
Click on the number of each entry to configure details. Fill up the information of mark mode, DSCP type, ToS value, the minimum rate and the maximum rate for the selected entry. Then, click on “Save” to change the configurations. Traffic policing can propagates bursts.
The RIP (Routing Information Protocol) is a dynamic routing protocol used in local and wide area networks. It’s a very simple protocol, based on distance-vector routing algorithms. As such it is classified as an IGP (interior gateway protocol). RIP function can be defined by the following parts. 1.
This feature allows you to make servers on your LAN accessible to Internet users. Normally, Internet users would not be able to access a server on your LAN because: (1) Your server does not have a valid external IP address. (2) Attempts to connect to devices on your LAN are blocked by the firewall in this device IP address seen by Internet users To Internet users, all virtual servers on your LAN have the same IP address.
DMZ (demilitarized zone) is a physical or logical sub-network that contains and exposes an organization's external services to a larger distrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's LAN (Local Area Network). In DMZ feature, three parameters needed to build up a DMZ function for a WAN port.
DDNS (Dynamic DNS Free) is a method, protocol or network service that provides the capability for a networked device, such as, a router, to notify a DNS name server to change the active DNS configuration of its configured hostnames, addresses or other information. 1.
IGMP (Internet Group Management Protocol) proxy can be used to implement multicast routing. It works by IGMP frame forwarding. VPN Router’s IGMP proxy supports IGMP version 2 (RFC2236). IGMP proxy works in router mode (Layer 3); in the other hand, IGMP snooping works in bridge mode (Layer 2). When IGMP function is “Enable”, the received IGMP packets will be forwarded to the intranet devices which need to receive IGMP packets.
“Security” section includes three features: 1. Firewall 2. VPN 3. Filter The following sections will guide you some details of these features. A firewall is a set of related programs that protects the resources of a private network from other networks. It prevents hackers to access its own private data resource accidentally.
A VPN (Virtual Private Network) provides a secured connection between 2 points in an insecure network. The secured connection is called a VPN Tunnel. 6200 VPN Router supports three main types of VPN: IPSEC, L2TP and PPTP. Note: “VPN” function is only available in “Router” mode. IPSEC is a near-ubiquitous VPN security standard, designed for use with TCP/IP networks.
Page 65
Click on the number of each entry and the configuration page will be shown as below. IPSec configuration parameters: 1. Mode: to disable or enable the selected IPSEC policy. 2. Name: IPSEC policy name. 3. WAN: to select a WAN port to apply this policy. 4.
Page 66
Example: Configuring a IPSec LAN-to-LAN VPN Connection Network Configuration and Security Plan Branch Office Head Office Local Network ID 192.168.0.0/24 192.168.1.0/24 Local Router IP 69.1.121.30 69.1.121.3 Remote Network ID 192.168.1.0/24 192.168.0.0/24 Remote Router IP 69.1.121.3 69.1.121.30 IKE Pre-shared Key 12345678 12345678 VPN Connection Type Tunnel mode...
Page 67
L2TP (Layer 2 Tunneling Protocol) is a tunneling protocol used to support VPNs. It doesn’t provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy. L2TP configuration parameters: 1.
Page 68
Example: Configuring L2TP LAN-to-LAN VPN Connection The branch office establishes a L2TP VPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch office accordingly. Both office LAN networks must in different subnet with LAN to LAN application. Functions of Pre-shared Key, VPN Connection Type and Security Algorithm must be identically set up on both sides.
Page 69
PPTP (Point-to-Point Tunneling Protocol) is a private network of computers that uses the public Internet to connect some nodes. Because the Internet is essentially an open network, the PPTP is used to ensure that messages transmitted from one VPN node to another are secured. With PPTP, users can dial in to their corporate network via the Internet.
Page 70
Example: Configuring a PPTP LAN-to-LAN VPN Connection The branch office establishes a PPTP VPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch office accordingly. Both office LAN networks MUST in different subnet with LAN to LAN application. Configuring PPTP VPN in the Head Office The IP address 192.168.1.254 will be assigned to the router located in the branch office.
There are two features in “Filter” function: “IP Filter” and “MAC Filter”. “IP Filter” allows users to filter packets by IP address. Two sections are in “IP Filter” feature. The first section includes “Mode”, which allows user to enable or disable IP filter feature, and “Default Policy”, include “Deny”, “Permit”...
Page 72
In the second section, you are able to configure each entry by clicking on the number on the table. Then, a configuration page as the following screen shot will be shown. Six elements are included in this configuration page: 1. Mode: to enable or disable this policy entry. 2.
Page 74
“MAC Filter” function refers to a security access control methodology whereby the 48-bit address (XX:XX:XX:XX:XX:XX) assigned to each network device is used to determine access to the network. MAC addresses are uniquely assigned to each network device, so using MAC filtering on a network permits and denies network access to specific devices through the use of black lists and white lists.
“Management” section provides eight features: 1. SNTP 2. SNMP 3. TR069 4. UPnP 5. Sys Log 6. Telnet 7. SSH 8. Web Time synchronization is an essential element for any business, which relies on the IT system. The reason for this is that these systems all have clock that is the source of timer for their filing or operations.
Page 76
“Sync with PC” allows the VPN router to synchronize with computer’s internal timer. Click on “Sync” button in order to start synchronization. “SNTP” features allow you to synchronize the time with the time server you provided. In order to make this feature works, you need to provide the following parameters.
Simple Network Management Protocol (SNMP) provides for the exchange of messages between a network management client and a network management agent for remote management of network nodes. These messages contain requests to get and set variables that exist in network nodes in order to obtain statistics, set configuration parameters, and monitor network events.
Page 78
In this configuration page, you need to enable or disable this policy entry, provide a name in “Community” text box, and assign access mode from the drop-down menu of “Access”. Click “Save” button to finish this configuration section. “SNMPv3” feature lets you to fill up the detail information, such as, password, for SNMPv3 function by click on the number of each policy entry.
Page 79
Once you fill up all the information needed, click on “Save” to finish this configuration. With “Trap” feature, the VPN router is able to support SNMP Trap function. You are able to disable or enable this feature by click on the radio buttons of “Mode”. Then, if you would like to modify each policy in the table, please click on the number.
TR-069 (Technical Report 069) is a DSL Forum technical specification entitled CPE WAN Management Protocol (CWMP). It defines an application layer protocol for remote management of end-user devices. As a bidirectional HTTP based protocol, it provides the communication between CPE (customer premises equipment) and ACS (Auto Configuration Servers).
4. ACS Password 5. Periodic Inform Enable 6. Periodic Inform Interval: the duration in seconds of the interval, for which the CPE attempts to connect with the ACS and call the Inform method. 7. Periodic Inform Time 8. Connection Request IP: two options: automatic or manual (if you choose “Manual”, please fill up the IP address.) 9.
Syslog is a standard method of centralizing various logs. You can use a syslog server to store your server’s logs in a remote location for later perusal or long-term storage. To send logs to the LOG server, please provide the following information. 1.
2. Port: the default port number is 23. Please fill in a number from 1 to 65535 if you want to change another port number. SSH (or Secure Shell) is a protocol that can be used to log into a remote machine (your Virtual Server) and provide secure encrypted communications between your VPN Router and your local computer.
Page 84
2 seconds. 2. Service Port: the default port number is 80. You are able to change this port number to a new one and please make sure you login with this new port number next time.
Three functions are available in “Show” section. 1. Information 2. Sys Log 3. Script “Information” feature shows the general system information, such as, hardware and software MCSV (the Manufacture's Concurrent Software Version), software version, etc. (Note: please include a screen shot of this page when you request any technical support!) 1.
8. Serial No. 9. Present Time 10. System Uptime: the total time the VPN router is on. “Sys Log” feature shows all of system logs. “Script” presents the VPN router’s system setups in script manner. Clicking on “Export” button will generate a file, includes all configurations of the VPN router.
For 8-wire models: If the VPN router have connected to remote side, it can also show the performance information of remote side. Click “Clear CRC” button will clear the CRC error count. “WAN” feature presents all information of eight WAN interfaces.
Routing table contains a list of IP address. Each IP address identifies a remote router (or other network gateway) that the local router is configured to recognize. For each IP address, the routing table additionally stores a network mask and other data that specifies the destination IP address ranges that remote device will accept.
Page 90
InOctets The field shows the number of received bytes on this port InPactets The field shows the number of received packets on this port OutOctets The field shows the number of transmitted bytes on this port OutPactets The field shows the number of transmitted packets on this port InDrops The field shows the discarded number of received packets on this port OutDrops...
There are five features in “Utilities” function: 1. Upgrade 2. Config Tool 3. Users 4. Ping 5. Trace Route “Upgrade” features allows user to upgrade firmware. Click on “Browser” button and browse to the file you wish to upgrade in your computer. Then, click on “Upgrade” button to commence the firmware upgrade.
This configuration tool has three functions: 1. Default: to load the factory default settings to the VPN router. 2. Backup: to backup the current setups of the VPN router. The default file name is “config1.log” 3. Restore: to restore the VPN router’s configuration from a selected file. You are able to choose which function you will do from the drop-down menu of “Mode”...
1. Name: the user name 2. Level: three levels are available, administrator, normal and guest. Functions will be shown according to users’ authorization level. 3. Password 4. Password Confirm Ping test determines whether your VPN router can communicate with another computer or other web sites over the network.
1. IP Address : Which IP address you want to ping 2. Size : Size of byte packets to the destination, default is 56 3. Count : Ping count number, default is 3 4. Update : Updated time, default is 2 Once you click on “Ping”, you will see the following screen shot.
Page 95
2. Packet Datagram: the packet type, UDP or IGMP. 3. Update Interval: for the refresh interval. Once you click on “Trace Route” button, you will see the following screen shot.
Abbreviation Full Name Meaning Auto Configuration Server The management server TR-069 compliant Customer Premises Equipment. Access Point Name APN identifies an IP packet data network (PDN), that a mobile data user wants to communicate with. addition to identifying a PDN, an APN may also be used to define the type of service, (eg.
Page 97
same IP address. Demilitarized Zone In computer security, DMZ is a physical or logical sub-network that contains exposes organization's external services to a larger distrusted network, usually the Internet. The term is normally referred to as a DMZ by IT professionals. It is sometimes referred to as a Perimeter Network.
Page 98
commonly installed technical variety of DSL. service is delivered simultaneously with regular telephone on the same telephone line. This is possible because DSL uses a higher frequency. Ethernet-over-ATM EoA protocol is commonly used to carry data between local area networks that use the Ethernet protocol and wide-area networks that use the ATM protocol.
Page 99
the user changes ports and needs access to the same VLAN, the network administrator must manually make a port-to-VLAN assignment for the new connection. PPPoA Point-to-Point Protocol PPPoA and PPPoE are authentication and connection over ATM protocols used by many service providers broadband Internet access.
Page 100
and the OSI protocol IS-IS. RIP has also been adapted for use in IPv6 networks, a standard known as RIPng (RIP next generation), published in RFC 2080 (1997). Sustained Cell Rate The sustained rate at which you expect to transmit data, voice and video.
Page 101
Spanning-Tree Protocol STP, defined in the IEEE 802.1D, is a link management protocol that provides path redundancy while preventing undesirable loops in the network. For an Ethernet network to function properly, only one active path can exist between two stations. STU-C Central Office or CO.
Page 102
User Datagram Protocol UDP (User Datagram Protocol) offers only a minimal transport service (non-guaranteed datagram delivery) and gives applications direct access to the datagram service of the IP layer. UDP is used by applications that do not require the level of service of TCP or that wish to use communications services (e.g., multicast or broadcast delivery) not available from TCP.
Page 103
done through software instead of physically relocating devices. Virtual Path Identifier For set up ATM Permanent Virtual Channels (PVC). Virtual Private Network A virtual private network (VPN) is a network that uses a public telecommunication infrastructure and their technology such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
Choose MGMT, LAN1 and WAN1 for entry 1 as one group for all configurations. Configuration 1: PVID Link Type LAN1 Un-tag WAN1 Case 1 Ingress Port = LAN1 (un-tag) Egress Port = WAN1 (tag) Incoming Packet without VID VID = 20 LAN1 6200 VPN Router WAN1...
Page 105
Case 2 Ingress Port = LAN1 (un-tag) Egress Port = WAN1 (tag) Incoming Packet with VID = 20 VID = 20 LAN1 6200 VPN Router WAN1 The packet will be dropped since the VID (20) is not matched with the VID (1) of the Egress port. Case 3 Ingress Port = LAN1 (un-tag) Egress Port = WAN1 (tag)
Page 106
Case 5 Ingress Port = WAN1 (tag) Egress Port = LAN1 (un-tag) Incoming packet with VID = 1 VID = 1 WAN1 6200 VPN Router LAN1 The VID will be removed and the packet will be forwarded.
Page 107
Configuration 2 PVID Link Type LAN1 Un-tag WAN1 Case 1 Ingress Port = LAN1 (Un-tag) Egress Port = WAN1 (Tag) Incoming Packet with no VID LAN1 6200 VPN Router WAN1 The packet is dropped because the VID is not matched with WAN1 VID (10).
Page 108
Case 2 Ingress Port = LAN1 (Un-tag) Egress Port = WAN1 (Tag) Incoming Packet with VID = 10 VID = 10 VID = 10 LAN1 6200 VPN Router WAN1 Case 3 Ingress Port = LAN1 (Un-tag) Egress Port = WAN1 (Tag) Incoming Packet with VID = 30 VID = 30 LAN1...
Page 109
Case 5 Ingress Port = WAN1 (Tag) Egress Port = LAN1 (Un-tag) Incoming Packet with VID = 30 VID = 30 WAN1 6200 VPN Router LAN1 The packet is dropped because the packet’s VID (30) is not matched with VID (10). Case 6 Ingress Port = WAN1 (Tag) Egress Port = LAN1 (Un-tag)
Port-Based VLANs are VLANs where the packet forwarding decision is based on the destination MAC address and its associated port. When using the port-based VLAN, the port is assigned to a specific VLAN independent of the user or system attached to the port. This means all users attached to the port should be members in the same VLAN. The network administrator typically performs the VLAN assignment.
Page 111
The DSCP value used to identify 64 levels (2 =64) of service determines the forwarding behavior that each packet gets across the DiffServ network. Based on the marking rule different kinds of traffic can be marked for different priorities of forwarding. Resources can then be allocated according to the DSCP values and the configured policies.
Page 112
Reliability Normal Reliability High The standardized DiffServ field of the packet is marked with a value so that the packet receives a particular forwarding treatment at each network node. RFC 2597 defines the assured forwarding (AF) classes. There are four AF classes, AF1x through AF4x. Within each class, there are three drop probabilities.
Page 113
Interactive e-learning, games, e-arts Multimedia AF31,AF32, 011010 (26), 011100 Streaming video and audio on demand Streaming AF33 (28), 011110 (30) Broadcast Video 011000 (24) Broadcast TV & live events Low-Latency Data AF21,AF22, 010010 (18), 010100 Transactional applications, database AF23 (20), access, interactive data applications 010110 (22) High-Throughput...
Need help?
Do you have a question about the 6200 SERIES and is the answer not in the manual?
Questions and answers