Intel ER8100STUS - Express 8100 Router Reference Manual

Reference manual
Table of Contents

Advertisement

Quick Links

Intel Express 8100 Router
Reference Manual

Advertisement

Table of Contents
loading

Summary of Contents for Intel ER8100STUS - Express 8100 Router

  • Page 1 Intel Express 8100 Router Reference Manual...
  • Page 2 Copyright © 1998, Intel Corporation. All rights reserved. Intel Corporation, 5200 NE Elam Young Parkway, Hillsboro, OR 97124-6497 Intel Corporation assumes no responsibility for errors or omissions in this manual. Nor does Intel make any commitment to update the infor- mation contained herein.
  • Page 3: Table Of Contents

    ISDN Services ..........20 Integrated Services Digital Network (ISDN) in the Intel Express 8100 Router .
  • Page 4 Forwarding Tables ......... . . 95 Operation of the Bridge in the Intel Express 8100 Router ... 101...
  • Page 5 Spanning Tree Concept ........109 Spanning Tree in the Intel Express 8100 Router ....111 Bridge Spoofing .
  • Page 6 Preface The following products are covered in this manual: Products covered Express 8100 Router with Frame Relay Express 8100 Router with X.25 Express 8100 Router with an ISDN S/T port Express 8100 Router with an ISDN U port BACP Bandwidth Allocation Protocol Acronyms Bridging Control Protocol BECN...
  • Page 7 Network Address Translation Network Control Protocol Password Authentication Protocol PING Packet InterNet Groper Function Public Data Network Primary Rate Access Primary Rate Interface PSDN Packet Switched Data Network Permanent Virtual Circuit Routing Information Protocol RSVP ReSerVation Protocol Service Advertising Protocol SLIP Serial Link Internet Protocol SNAP...
  • Page 8 Transmission of IP Datagrams Over Public Data Networks RFC 877 Broadcasting Internet Datagrams. RFC 919 Broadcasting Internet Datagrams in the Presence of Subnets. RFC 922 Internet Standard Subnetting Procedure. RFC 950 Bootstrap Protocol. RFC 951 Using ARP to Implement Transparent Subnet Gateways. RFC 1027 Serial Link Internet Protocol (SLIP).
  • Page 9 Password Authentication Protocol (PAP) RFC 1334 Multiprotocol Interconnect on X.25 RFC 1356 Multiprotocol Interconnect over Frame Relay Data Terminal Equipment (DTE), 1993. RFC 1490 Definition of Managed Objects for Bridges. RFC 1493 Internetwork Packet Exchange Protocol Control Protocol (IPXCP) for the Point-to-Point Protocol (PPP).
  • Page 10 Point-to-Point Protocol (PPP) Encryption RFC 1968 Point-to-Point Protocol (PPP) Stac Data Compression RFC 1974 Point-to-Point Protocol (PPP) Multilink RFC 1990 Challenged Handshake Authentication Protocol (CHAP) RFC 1994 Triggered RIP RFC 2091 High-level Data Link Control. ISO/IEC 3309 Link Access Procedure, Balanced (LAPB) ISO/IEC 7776 X.25 Packet Layer Protocol for Data Terminal Equipment (DTE).
  • Page 11 DSS1 — Core Aspects of Frame Protocol for use with Frame Relay Bearer Ser- vice, 1991. ANSI T1.618 Frame Relay Bearer Services, 1991. ITU-T (CCITT) Recommendation I.233.1 Congestion Management in Frame Relaying Networks, 1991. ITU-T (CCITT) Recommendation I.370 Basic User-Network Interface — Layer 1 Specification, 1993. ITU-T (CCITT) Recommendation I.430 Usage of Cause and location in the Digital Subscriber Signalling System No.
  • Page 12 Part I LAN and WAN Links and Services...
  • Page 13: Lan And Wan Services In The Router

    Intel Express 8100 Router versions, and the common facilities available of the different WAN services. WAN services include leased line, PPP, Frame Relay, ISDN and X.25 services. The different WAN services available in the Intel Express 8100 Router are de- scribed in the following chapters. LAN Services...
  • Page 14: Wan Services

    LAN and WAN Services in the Router WAN Services LAN Services concept The following illustration indicates how LAN Services are embedded in the Intel Express 8100 Router. ROUTING (TCP/IP & IPX) and Bridging LAN SERVICES LAN Link Control Protocol Identification...
  • Page 15: Wan Services And Protocols Available

    Chapter 6 “PPP Multilinks”, p. 39 Internet Tunnels for routing data via the internet—described in Chapter 7 “Internet Tunnels”, p. 41 The Intel Express 8100 Router supports up to 5 WAN links (Frame Relay, ISDN Number of WAN links or X.25). supported...
  • Page 16 LAN and WAN Services in the Router WAN Services Data compression Data compression is available for all WAN link types to improve the throughput. PPP and Frame Relay For PPP links (leased lines, dial-up links and ISDN links) and Frame Relay links, data compression rates of up to 4:1 can be achieved for text data.
  • Page 17 WAN link, that is the main WAN link and the backup WAN considerations link must run between the same routers as shown in the figure below: LAN 1 LAN 2 Primar y WAN Link Intel Express Router 9200 Intel Express Router 9200 ® ® WAN 1 WAN 2...
  • Page 18 In the above example, link 4 is used if the primary link (link 2) should fail, link 5 is used if link 4 should fail and link 6 is used if link 5 should fail. The Intel Express 8100 Router implements Timer Profiles which offer extensive Timer Profiles facilities to restrict WAN link activity according to a user-defined time profile.
  • Page 19 Access allowed Mon-Fri between 7.30 and 17.30 1290 The Intel Express 8100 Router has a Daily Activity Limit function which can be Daily Activity Limit used to control the use, and therefore the cost of operation, of dial-up WAN Links. The alarm generates an SNMP Trap and can also be set up to close and lock the associated WAN link when it has been in the Up (for both call directions) state for the configured time-period within a day (midnight to midnight).
  • Page 20: Leased Lines Links

    Note ISDN). This chapter gives an introduction to the Point-to-Point Protocol (PPP) and de- scribes the features of the protocol offered by the Intel Express 8100 Router. Point-to-Point Protocol (PPP) The Point-to-Point Protocol (PPP) was designed to enable simultaneous transfer Introduction to PPP of network-layer protocols across a point-to-point link.
  • Page 21 Leased Lines Links Point-to-Point Protocol (PPP) PPP provides transport services for data packet delivery with low overheads and high throughput. Frame checking at the link-level offers error detection, but error recovery is taken care of by higher-layer network protocols. The following diagram shows how the various PPP protocols are embedded: PPP protocols Compression Internet Protocol...
  • Page 22 Call-Back. When the home connection needs to communicate with the office, they call in to the office Intel Express 8100 Router with a request for call back and then closes the connection.
  • Page 23: Data Compression

    PPP and Frame Relay links. This offers security in case of intercep- tion by an unauthorized source. Data encryption is only available in certain models of the Intel Express Note 8100 Router which are not available in some countries.
  • Page 24: Peer Authentication Using The Challenge Handshake Authentication Protocol (Chap)

    Leased Lines Links Point-to-Point Protocol (PPP) which means that the algorithm is used across the entire data stream including the packet header containing the address and protocol identification, and not only on a fixed block (packet) size. The Blowfish encryption algorithm is described in: Reference for the encryption algorithm Bruce Schneier...
  • Page 25 Local replies to CHAP requests In the Intel Express 8100 Router, a list of passwords for User IDs can be defined for both the router (global) and for individual PPP links. The passwords in the global list can be used in reply to CHAP requests from peers on any of the PPP links to the router.
  • Page 26 Leased Lines Links Point-to-Point Protocol (PPP) Challenge handshake The procedure used to authenticate a peer over a PPP link is as follows: authentication procedure The device which is authenticating the peer (Device 1) generates a random text file (random characters and a random length), and transmits it to the device to be authenticated (Device 2) over the PPP link.
  • Page 27: Peer Authentication Using The Password Authentication Protocol (Pap)

    PAP can however be used when it is the only authentication protocol supported by the remote device. A device (for example the Intel Express 8100 Router) always tries to reply to a Replies to PAP requests request for authentication from a peer, using the password defined for the User...
  • Page 28 Leased Lines Links Point-to-Point Protocol (PPP) PAP requests from the When PAP requests are enabled, the Intel Express 8100 Router authenticates the peer over the PPP link whenever the link is established. For on-demand router (switched) PPP links including ISDN links, the router authenticates the peer whenever the link is brought up.
  • Page 29: Frame Relay Services

    Frame Relay services. As Frame Relay uses Permanent Virtual Circuits, a number of Frame Relay links can be made via the same Frame Relay port. The Intel Express 8100 Router sup- ports up to 5 Frame Relay links. This chapter gives an introduction to Frame Relay services in the Intel Express 8100 Router.
  • Page 30 Frame Relay Services increased interoperability as it complies with international standards Each data packet contains a circuit number, also called a Data Link Connection Addressing Identifier (DLCI), showing which logical channel that the information belongs to. Frame Relay packets are routed to their destination on the basis of the circuit numbers contained in the packet.
  • Page 31 Both routers over the Frame Relay link must support and be configured for Frame Relay data compression before data compression is used. Intel Express 8100 Routers use the Stac algorithm developed by Stac Electronics Inc. Typical compression rates of 4:1 are achieved for text data.
  • Page 32: Isdn Services

    Express 8100 Router with an ISDN U port which establishes a Basic Rate Interface (BRI) via an ISDN U interface directly to the incomming ISDN line. The link protocols used over ISDN links by the Intel Express 8100 Router is the Point-to-Point Protocol (PPP) Point-to-Point Protocol (PPP).
  • Page 33: Isdn Concept

    ISDN. In most countries, Primary Rate Access has 30 B-channels (56 kbps or 64 kbps) and one D-channel (64 kbps). In the USA and Japan a 23B+D ar- rangement is used. The Intel Express 8100 Routers offer Basic Rate Access (BRA) only. Note...
  • Page 34: Isdn Services

    ISDN Services ISDN Services ISDN Services ISDN services are divided into three categories: Three types of service Bearer Services Tele Services Supplementary Services Bearer Services These are the basic transport services which transfer information between the ter- minal/net interface. That is a connection must be set up between two routers be- fore communication can take place.
  • Page 35 ISDN Services ISDN Services Telex Provides interactive text communication. It is the same as the existing Telex ser- vice. The advantage of using it via ISDN is that it can be provided over an inter- face shared with other services. Message Handling System (MHS) Allows you to send and receive electronic mail via a “post box”.
  • Page 36: Isdn Numbering And Addressing

    ISDN Services ISDN Numbering and Addressing Call Hold (HOLD) Allows you to interrupt a call and return to it later. Line Hunting (LH) Allows incoming calls to a specific number to be distributed over a group of lines. Call Forwarding (CF) Causes an incoming call to be sent to another number.
  • Page 37 ISDN Services ISDN Numbering and Addressing Sub Address (SA) This consists of between 1-40 digits. An incoming call can contain the following address fields: Addressing Calling Party Number Local Address of the router (address corresponds to the Remote Ad- Calling dress of the router).
  • Page 38: Bra And Pra Numbering

    ISDN Services ISDN Numbering and Addressing If a is not defined for an ISDN link, all incoming addresses are Local Address accepted by the link (the address check is not performed). Similarly, if a Local is not defined for an ISDN link, all incoming sub-addresses are Sub-address accepted by the link (the sub-address check is not performed).
  • Page 39: Msn (Multiple Subscriber Number)

    ISDN number. An Intel Express 8100 Router with multi- ple ISDN links must have a separate sub-address for each ISDN link. In order to specify a particular terminal or an ISDN link in the Intel Express 8100 String supplied by caller Router, the caller supplies the appropriate character string to the network when the call is made.
  • Page 40: Permanent Isdn

    Signalling ISDN links operate on Layer-1 only—Layer-2 and Layer-3 are not used by Per- manent ISDN. The Permanent ISDN link types available in the Intel Express 8100 Routers with Permanent ISDN link a Basic Rate Interface (BRI) are: types available in the...
  • Page 41 National ISDN-1 standard. A number of country-specific variants of ISDN are currently in use around the ISDN protocol variants world. The ISDN variants supported by the Intel Express 8100 Router are: supported Euro ISDN (ETSI) EuroISDN is used in many countries throughout Europe and Asia Pacific and in Australia.
  • Page 42: Isdn Network Interface Reference Configurations

    ISDN. Reference points (R, S and T) are connections between functional groups. The Intel Express 8100 Router with an ISDN S/T port contains the following physical interfaces: The Intel Express 8100 Router with an ISDN U portcontains the following phys-...
  • Page 43 - TE1 has an ISDN interface and terminates an ISDN call - TE2 is similar to TE1 but does not conform to ISDN recommendations TA (Terminal Adapter—not required for the Intel Express 8100 Router) Allows a TE2 to be connected to the ISDN. It performs a conversion between the signalling and user information formats at the R interface and the ISDN interface.
  • Page 44: X.25 Services

    The WAN port must be configured as an X.25 port before it can be used for X.25 services. As X.25 uses virtual circuits, a number of links (virtual circuits) can be made via the same X.25 port. This chapter gives an introduction to X.25 services in the Intel Express 8100 Router. X.25 Characteristics Introduction to X.25 X.25 is an internationally agreed protocol for communications between a LAN...
  • Page 45 Link Access Procedure (LAP) or Link Access Procedure, Bal- anced (LAPB) where LAPB is the preferred link layer protocol and is the proto- col implemented in the Intel Express 8100 Router. X.25 network layer (also known as packet layer) services give X.25 its virtual cir- Network layer cuit characteristics.
  • Page 46: X.25 Services And Features

    X.25 Services X.25 Services and Features X.25 Services and Features X.25 allows two basic service access types to a PSDN: Service types available Switched Virtual Circuits (SVCs) An SVC is a temporary association between two DTEs. This requires that the link between the DTEs through the PSDN must first be established by making what is known as a Virtual Call.
  • Page 47: X.25 Packets And Virtual Calls

    X.25 Services X.25 Packets and Virtual Calls X.25 Packets and Virtual Calls In addition to data packets, X.25 uses special supervisory packets to: Supervisory packets establish Virtual Calls clear Virtual Calls negotiate packet and window sizes maintain and supervise logical channels across the PSDN recover from error conditions Many of these X.25 supervisory packets are only used by SVCs.
  • Page 48 X.25 Services X.25 Packets and Virtual Calls 4. The remote DCE forwards the call Accepted Packet across the PSDN to the local DCE which then passes it to the calling DTE. Again, only the Logical Channel Identifier from the local DCE to the calling DTE is included in the packet.
  • Page 49: X.25 Addressing

    X.25 Services X.25 Addressing Encapsulation Data packets for transmission over an X.25 link must be encapsulated. The Intel Express 8100 Router supports the following encapsulation types: Single-protocol Encapsulation of Datagrams The Intel Express 8100 Router allows single-protocol encapsulation of IP or IPX datagrams for transmission over an X.25 link as specified in RFC 1356.
  • Page 50 X.25 Services X.25 Addressing Network Terminal Number (NTN) Network addresses within a DNIC (a particular data network provider within a particular country) are called Network Terminal Numbers (NTNs). NTNs iden- tify a DTE/DCE interface and are assigned by the data network provider. NTNs can be of variable length up to 10 digits, depending on the network provider.
  • Page 51: Ppp Multilinks

    Chapter 6 PPP Multilinks This chapter gives an introduction to PPP Multilinks in the Intel Express 8100 In this chapter Router. The ISDN Intel Express 8100 Routers implements PPP Multilink facilities which Introduction allow multiple PPP links between two sites to be used as a single route. A PPP Multilink allows links to be added dynamically (for bandwidth-on-demand) or statically and has almost the combined bandwidth of the individual links.
  • Page 52 PPP Multilinks Operating modes The slave links that make a PPP Multilink can be used in two basic operating modes: Bandwidth-on-Demand (BOD) Mode When a slave link of a PPP Multilink is used in Bandwidth-on-Demand mode, the link is dynamically allocated when the data traffic volume requires its use, and closed down when not required.
  • Page 53: Internet Tunnels

    The throughput of the Internet Tunnel is dependent on the Internet so can be quite slow at certain times of the day. It is strongly recommended that you use the Setup Wizard in Intel Note Device View for Windows to set up your first Internet Tunnel. If other Internet Tunnels require configuring, use the tunnel configured by the...
  • Page 54 The use of data encryption over Internet Tunnels is highly recommended. Private data being transferred over the public Internet should always be encrypted for se- curity. Data encryption is only available in certain models of the Intel Note Express 8100 Router which are available in some countries.
  • Page 55 Internet Tunnels IP routing services then use the best link to the remote IP network (the link via the Internet Service Provider). For example, this could be an ISDN link, in which case the full structure would be IP routing IPX routing Bridging IP static host route...
  • Page 56 Internet Tunnels configured on the X.25 link to the IP address of the remote router (see “Static Routes”, p. 68). Routing and bridging for data over the link are then configured on the Internet Tunnel. X.25 port (WAN port configured for X.25) X.25 link (PVC or SVC) - Up to 2 links - Static IP route to the IP address of the router over the...
  • Page 57 Part II IP, Novell IPX and Bridging Services...
  • Page 59: Ip Routing

    In private networks, where connections to other IP networks are not desired, lo- Private networks cally assigned network addresses can be used. In the current IP Routing implementation in the Intel Express 8100 Routers the BootP broadcasts only only broadcast packets forwarded are BootP broadcasts.
  • Page 60: Ip Addresses Structure

    IP Routing IP Concept Frame types and type IP Frame types are described in Appendix D “IP Frame Formats”, p. 126. The following Ethernet type codes are used in IP environment, also see Appendix C codes “Ethernet Type Codes”, p. 121: Type field Description...
  • Page 61: Ip Subnets

    IP Routing IP Concept Class C address The class C address comprises a 21-bit network number and a 8-bit local address. The three highest-order bits are set to . This allows 2,072,640 class C net- 1 1 0 works. 7 6 5 4 3 2 1 0 7 6 5 4 3 2 1 0 7 6 5 4 3 2 1 0 7 6 5 4 3 2 1 0 1 1 0 Network Local Address The class D address is used as a multicast address.
  • Page 62 IP Routing IP Concept Characteristics An IP subnet functions as an independent network. To a remote network it ap- pears to be a single discrete network. To create a subnet you must impose a hierarchy on host addresses which allows How to create for multiple subnets to exist within a single class A, B or C network.
  • Page 63: Address Resolution

    (for example, hosts which have just been switched on and added to the network). When the Intel Express 8100 Router receives an IP data packet which has to be transmitted to a local un-...
  • Page 64: Internet Control Messages

    ICMP Echo Reply message to the ICMP Echo message source. work IP Filters—Firewall Protection The Intel Express 8100 Router implements comprehensive IP filters to restrict Filtering in the Intel access between networks (firewall protection) and to reduce unnecessary inter- Express 8100 Router network data traffic to save bandwidth.
  • Page 65 IP Routing IP Concept IP packets filtered IP traffic to and from the router can consist of packets being forwarded (routed) via the LAN and WANs and IP packets to the router itself (RIP, TELNET, SN- MP, TFTP, and so on). Both of these kinds of IP packets can be discarded by the filters.
  • Page 66 IP Routing IP Concept Filter criteria Each filter in the Intel Express 8100 Router can be setup to pass or discard IP packets based on the following criteria: IP Protocol A filter can process packets based on all IP protocols, User Data Protocol (UDP), Transmission Control Protocol (TCP).
  • Page 67: Ip Filter Example

    For packets which are logged, the packet details are recorded in the System Log for the router which cabn be displayed for Intel Device View for Windows. The details logged are the source and destination address and port and the IP protocol.
  • Page 68 Host 1 Host 2 TELNET command. Filters are required in Intel Express 8100 Router 1 to protect LAN 1 from unau- Filters Required thorized access and so that only Host 1 is allowed to establish a TELNET session onto Host 2.
  • Page 69: Network Address Translation (Nat)

    IP Routing IP Concept Tx Filter on WAN 1 of Intel Express 8100 Router 1 This filter only allows TCP access to the WAN link from Host 1 to Host 2, with a source port of greater than 1023 (unassigned ports used by TELNET Client) and a TELNET Server destination port.
  • Page 70 IP Routing IP Concept Mapping methods NAT can use one of the following mapping methods: Static Mapping Static Mapping can be used to translate an internal network to an equal sized ex- ternal network (for example a class B network to a class B network). Static Map- ping, can also be used to translate individual internal IP addresses to external IP addresses.
  • Page 71 IP Routing IP Concept NAT and routing For IP packets transmitted from the router, the packet is first routed to the appro- priate LAN or WAN link using the destination address included in the packet from the source then translated using the NAT table for that link. For packets from the external network, the IP addresses are translated as they en- ter the router.
  • Page 72: Static Mapping

    IP Routing IP Concept Static Mapping When using Static Mapping of network addresses, addresses are simply convert- Static Mapping of ed by translating the network part of the IP address between the internal and ex- network addresses ternal address. The host part of the address remains the same, for example, an internal class B network address 10.10.4.8 (where 10.10 is the network part of the address) could be translated to the external class B network address 177.4.4.8.
  • Page 73 IP Routing IP Concept up to 256 addresses. In this case, the entire internal address (network and host part) must be translated to an assigned external address. External addresses are therefore assigned sequentially as they are required. When using Dynamic Mapping, only internal networks can initiate Note communications with external devices.
  • Page 74: Examples Of Use

    IP Routing IP Concept is restarted following every communication. After 1 hour, the address can be re- used for another address translation if required but remains available until it is reused for another translation. When using Dynamic Mapping, only internal devices can initiate communica- Static Mapping to tions with external devices.
  • Page 75 IP Routing IP Concept NAT between networks When using NAT, it is possible to have a number of networks which use the same network number. In this case, an artificial network number must be created to with the same network which packets are addressed.
  • Page 76: Routing Information Protocol (Rip)

    If a router does not receive an update from an adjacent router for 180 seconds or more, it marks the routes served by the adjacent router as unusable. The Intel Express 8100 Router supports both RIP-1 and RIP-2. RIP-1 is the orig- RIP-1 and RIP-2 inal standard as defined by RFC 1058.
  • Page 77 RIP version. Different links on a router can use different RIP versions. In this case, Note the router performs conversion between the two RIP versions. Router Router Intel Express Router 9200 Intel Express Router 9200 ® ® WAN 1 WAN 2...
  • Page 78: Rip Metrics

    Routing Information Protocol (RIP) RIP implementation in RIP-1 or RIP-2 is selected on an IP-link basis within the Intel Express 8100 Rout- er during configuration. That is, RIP-1 or RIP-2 is selected for each router link the Intel Express 8100 configured for IP routing services during configuration.
  • Page 79: Triggered Rip

    When a device is using triggered RIP, all paths between networks are stored and secondary paths can be used if the primary path should fail. This is shown in the following example: Router 2 (triggered RIP) Intel Express Router 9200 ® Link 1 WAN 1 WAN 2 System...
  • Page 80: Static Routes

    IP Routing Static Routes Static Routes A static route is a permanent entry in the routing table. Definition The purpose of setting a static route is to create a permanent route to an IP net- Purpose work or host. This can be done for the following reasons: to eliminate Routing Information Protocol (RIP) overheads from a link Eliminating RIP overheads from a link maximizes the available bandwidth for data transfers.
  • Page 81 If a remote device (a device connected via a WAN link) is being booted via the router, a static route must be assigned to the network of the device being booted. Subnet 1 Intel Express Router 9200 ® WAN 1...
  • Page 82: Static Routes Example

    17.0.0.0, 75.0.0.0 and 126.0.0.0 via router X is possible at this point as router X does not run RIP. Internetworks 126.0.0.0 17.0.0.0 75.0.0.0 Router X Intel Express Router 9200 ® (89.0.1.3) WAN 1 WAN 2 System Subnet 1...
  • Page 83: Novell Ipx Routing

    Chapter 9 Novell IPX Routing This chapter describes Novell IPX/SPX Routing services in the Intel Express In this chapter 8100 Router. Novell Routing Concept Concept description Novell IPX routing is based upon a Routing Information Protocol (RIP) and Ser- vice Advertising Protocol (SAP).
  • Page 84: Internetworking Packet Exchange (Ipx)

    Novell IPX Routing Novell Routing Concept A short description of these protocols is given here: Protocol Description The Internetwork Packet eXchange protocol is based on a net- work layer datagram without delivery guarantee. This protocol is used by all the protocols described above. The Routing Information Protocol is used to gain access to remote networks and to exchange routing topology information.
  • Page 85: Novell Metrics

    Novell IPX Routing Novell Routing Concept Network number A globally unique network number must be assigned to each network connection of a NetWare* server. Servers and router links attached to the same physical net- assignment work must be configured with the same network number. To simplify network management, only servers and routers must be configured with a network num- ber, as workstations automatically get their network number assigned by the server (connection to local server) or router (connection to remote server).
  • Page 86 Novell IPX Routing Novell Routing Concept The hops are also used to discard packets in case of looping, see “Looping pack- ets” in “Data Transmission”, p. Separate metrics (tics and hops) are calculated for dynamic routes (established Metrics for RIP and SAP using IPX RIP) and dynamic services (established using IPX SAP).
  • Page 87: Data Transmission

    In the Novell metrics example, a data packet is sent from net 1 to net 4 via net 2 and 3, as the Delay (transmission time) is less (transmission speed on Ethernet 10 Mbps) than over the link with a baud rate of 9600 bps. 9600 baud Intel Express Router 9200 Intel Express Router 9200 ® ®...
  • Page 88: Ipx Over Wan Links

    WAN link—see the following section. IPX WAN Protocol The Intel Express 8100 Router supports the IPX WAN 2 protocol as defined by IPX WAN 2 Protocol Novell in Novell NetWare Link Services Protocol Specification Rev 1.0, Chapter 3—IPX WAN Version 2, Novell part No.
  • Page 89: Ipx Watchdog Packets

    Novell IPX Routing Novell Routing Concept Negotiation over a WAN When the WAN link is initialized, the IPX WAN protocol running in the routers at either end of the WAN Link negotiates various parameters to ensure that the link routers are communicating on the same terms. Negotiation proceeds as follows: 1.
  • Page 90 In addition, if the link is brought down for some other reason, the client sessions may be terminated prematurely. Watchdog Novell responses Server Watchdog packets Intel Express Router 9200 Intel Express Router 9200 ® with an on-demand ® Clients WAN 1 WAN 2...
  • Page 91: Ipx Serialization Packets

    Express 8100 Router ing costs can therefore be excessive. For this reason, IPX Serialization Packets are discarded by the Intel Express 8100 Router. Sequenced Packet Exchange (SPX) SPX is a transport layer protocol which runs on top of the Internetwork Packet...
  • Page 92 Session 2 Session 2 devices devices SPX Keep-alive Responses SPX Keep-alive Packets Session 3 Session 3 SPX Keep-alive Responses Intel Express Router 9200 Intel Express Router 9200 ® ® with an on-demand WAN 1 WAN 2 System WAN 1 WAN 2...
  • Page 93 Network devices devices Session 3 Session 3 SPX keep-alive SPX keep-alive responses responses SPX keep-alive SPX keep-alive Intel Express Router 9200 ® Intel Express Router 9200 ® with an on-demand packets packets WAN 1 WAN 2 System WAN 1 WAN 2...
  • Page 94: Ipx Data Filters

    Novell IPX Routing Novell Routing Concept IPX Data Filters IPX data filters are defined on a link basis in the Intel Express 8100 Router, and IPX data filters separate filters are implemented for transmit (for restricting IPX packets leaving the router on a link), and receive (for restricting IPX packets entering the router from a link).
  • Page 95 Novell IPX Routing Novell Routing Concept Filter criteria Each filter in the Intel Express 8100 Router can be setup to pass or discard IPX packets based on the following criteria: All the filter criteria defined is used. Note Destination Network Addresses...
  • Page 96: Ipx Filters Example

    WAN links to become saturated. It is therefore sometimes desirable to eliminate these diagnostics from WAN links, and this can be done using the IPX data filters implemented in the Intel Express 8100 Router. IPX ping may be affected by these filters, depending on whether the...
  • Page 97: Routing Information Protocol (Rip)

    Responds to requesting routers informs about the latest internetwork configuration informs about any topology changes in the internetwork The Intel Express 8100 Router uses ISO-9577 (SNAP) encapsulation when com- Encapsulation municating over WAN Links. When talking to other routers via a WAN Link, they must also use (or be configured for) ISO-9577 (SNAP) encapsulation.
  • Page 98: Rip Filtering

    RIP Filtering Routing information entering and leaving a Intel Express 8100 Router can be fil- Introduction tered to remove unwanted routing information. For example, this may be done to:...
  • Page 99: Service Advertising Protocol (Sap)

    A SAP agent is part of an IPX router/server. SAP Filtering Service information entering and leaving a Intel Express 8100 Router can be fil- Introduction tered to remove unwanted services. For example, this may be done to:...
  • Page 100: Static Routes And Services

    Novell IPX Routing Static Routes and Services Implementation SAP filters are implemented for both WAN and LAN router links, and are imple- mented for both received (Rx) and transmitted (Tx) service access information. SAP Rx Filters can be used to remove selected incoming service access informa- SAP Rx Filters tion before it is entered into the service information table for the router.
  • Page 101 1 and 2. In addi- Backup Route tion, the PC on network 2 requires access and backup access to the server on net- work 1: Intel Express 8100 Router Intel Express 8100 Router Intel Express 8100 Router...
  • Page 102 Novell IPX Routing Static Routes and Services Example description The above example is configured as follows: The primary link from network 1 to network 2 is the main route between net- work 1 and 2. This link uses dynamic routing (RIP and SAP). The secondary link between router 1 and router 3 is used as a static backup route between network 1 and 2 which is only used if the primary route fails.
  • Page 103: Configuration Example-Cost-Reduced Wan

    An example of a cost reduced WAN example using RIP and SAP is described Cost-reduced WAN using following. RIP and SAP example Server LAN A Network 00000001 Router 1 Intel Express Router 9200 ® WAN 1 WAN 2 System Link 1 Intel Express Router 9200 ®...
  • Page 104 Novell IPX Routing Configuration Example—Cost-Reduced WAN The parameter settings for a cost-reduced WAN using RIP and SAP for Router 1 and Router 2 is provided below. LAN configuration is a basic configuration. — Parameters Router 1 -WAN Router 2 Network number unnumbered unnumbered RIP Triggered Updates Disabled...
  • Page 105: Wan Bridging Services

    Introduction to WAN Bridging WAN Bridging The Intel Express 8100 Router can bridge packets between the LAN and a WAN link or between the two WAN links—this is known as WAN Bridging. It is assumed that you have a basic knowledge of the terminology used in bridged Background knowledge environments.
  • Page 106: How Bridging Works

    Otherwise the packet is bridged. and when are they bridged? The Intel Express 8100 Router is normally set up to route TCP/IP and Novell Bridging TCP/IP and IPX. If routing of these protocols is disabled, the router automatically bridges Novell IPX them if bridging services are enabled.
  • Page 107: Forwarding Tables

    A full description of bridging using the forwarding tables is given in “Operation of the Bridge in the Intel Express 8100 Router”, p. 101. Forwarding tables are de- scribed in the “Forwarding Tables”, p.
  • Page 108 WAN Bridging Services How Bridging Works Destination Forwarding There are two destination Forwarding Tables implemented in the router—a Uni- cast Destination Forwarding Table and a Multicast Destination Forwarding Ta- Tables ble. These tables consist of the network access rights for associated destination MAC addresses—Unicast addresses in the Unicast Forwarding Table and Multi- cast addresses in the Multicast Forwarding Table.
  • Page 109 WAN Bridging Services How Bridging Works can only be when the outgoing link is None Static entries are defined together for the Unicast and Multicast Destination Forwarding Tables and not in the separate tables. The bridge can be set up to either forward to all links (default) or discard packets Default bridge action for received for bridging which do not appear in the Unicast or Multicast Destination unknown destinations...
  • Page 110 WAN Bridging Services How Bridging Works Default static Multicast A number of factory default entries are included in the Multicast Destination For- warding Table. These default entries are set to reject certain packets and packets destinations used by routing and bridging protocols and are:. The default entries can be re- moved during configuration of the router.
  • Page 111 WAN Bridging Services How Bridging Works Source Forwarding Table The Source Forwarding Table contains the network access rights for associated source MAC addresses. Each entry in the table consist of a source MAC address, the incoming link and allowed outgoing link. For example: Source Forwarding Table (example) Source MAC Address Incoming Link...
  • Page 112 WAN Bridging Services How Bridging Works The Default Action in the central site router is set to , and Discard Multicast the MAC addresses of the remote routers are allowed to pass by filter entries. This allows necessary remote Multicast packets (using the MAC address of the router) to be forwarded by the router while all local Multicasts are discarded without being transmitted on the WAN links.
  • Page 113: Operation Of The Bridge In The Intel Express 8100 Router

    A packet which is allowed to pass by one Forwarding Table can therefore be rejected by another Forwarding Table. Operation of the Bridge in the Intel Express 8100 Router When a packet is received for bridging, a check is performed to determine if the Loop-Back check packet was bridged to the network segment by the router itself—this is called a...
  • Page 114 WAN Bridging Services How Bridging Works If the packet does not correspond to the entries in any of the Forwarding Tables, it can be forwarded on all the links except the link from which it was received or discarded, depending on the configured destination, source and packet type de- fault bridging function.
  • Page 115 WAN Bridging Services How Bridging Works Processing by the Packets which are passed by the Destination Forwarding Table are then checked by the Source Forwarding Table as follows: Source Forwarding Table If a table entry for both the Source MAC address and the incoming link exist, the packet is labelled for forwarding on the outgoing link(s) allowed by both the Destination and Source Forwarding Tables.
  • Page 116 WAN Bridging Services How Bridging Works If no entry is found corresponding to both the Ethernet packet type and the Default Action of the Type Forwarding Table is set to Pass, the packet is forwarded on the link(s) defined during processing by the Destination and Source Forwarding Tables.
  • Page 117 WAN Bridging Services How Bridging Works Forwarding example 2 An incoming packet is received by the router for bridging on the LAN link. The packet has a destination MAC address of 010080111111, a source MAC address of 000080222222 and a packet type code of 4321. It is processed as follows: 1.
  • Page 118: Controlled Bridging

    The above diagram represents the data forwarded (unshaded area) of the total number of packets received for bridging. The Intel Express 8100 Router allows packets which do not appear in the for- Controlled bridging warding tables to be discarded. In addition, the learning function can be disabled so that the bridge forwarding tables only contains the defined static entries.
  • Page 119 WAN Bridging Services How Bridging Works The above diagram represents the data forwarded (unshaded area) of the total number of packets received for bridging. This way of controlling bridged data traffic can be used for security purposes and to restrict the bridged data traffic over expensive WAN links. It is still possible to have controlled bridging with bridge learning enabled.
  • Page 120: Spanning Tree Algorithm

    The following figure shows a simple Local Area Network built up of 3 segments Problem with connected via 2 bridges. conventional bridges Bridge A Bridge B 1043 In the case of the Intel Express 8100 Router, a bridge between two Note LAN segments consists of two routers connected via a WAN link.
  • Page 121: Spanning Tree Concept

    WAN Bridging Services Spanning Tree Algorithm If either of the two bridges fails, one of the network segments is isolated. To re- duce the possibility of one of the bridges becoming isolated, it is common prac- tice to add a third bridge—if any one of the bridges fails, all three network segments are still accessible via the other two bridges.
  • Page 122 WAN Bridging Services Spanning Tree Algorithm Bridging loop detection Within the Spanning Tree Algorithm, bridges connected in a LAN must be capa- ble of detecting potential “bridge loops”, and of removing these loops as they oc- and removal cur by blocking the appropriate links to other bridges. This is illustrated in the following diagram: Bridge A Bridge B...
  • Page 123: Spanning Tree In The Intel Express 8100 Router

    Blocked by Bridge B Bridge C 1047 Spanning Tree in the Intel Express 8100 Router Bridges and links Each bridge is identified by a Bridge ID, and each link on a bridge is identified by a Port ID. Bridge links can be either disabled or enabled. links which are enabled can be in...
  • Page 124 WAN Bridging Services Spanning Tree Algorithm Bridge ports and router In bridging, “port” is used to describe each connection to the bridge. In the router, “port” used to describe the physical LAN and WAN ports, and WAN and ports links can support more than one WAN link.
  • Page 125 WAN Bridging Services Spanning Tree Algorithm Packet propagation By enforcing this strict hierarchy, and by only forwarding packets between Root Ports and Designated Ports, the possibility of bridging loops is removed. Root Port Designated Port Designated Port Blocking Root Root Ports Designated Bridge Port...
  • Page 126: Bridge Spoofing

    To counteract the problem of Configuration BPDU packets taking up excessive WAN link bandwidth the Intel Express 8100 Router implements Bridge Spoof- ing. When Bridge Spoofing is set up at the bridges at either side of a WAN link,...
  • Page 127: Non-Bpdu Spoofing

    When Bridge Spoofing is enabled on the bridges, no Non-BPDU packets (of any type) are forwarded to a Blocking Port. Enabling Bridge Spoofing Bridge Spoofing can only be used between two Intel Express 8100 Routers. When can Bridge Bridge Spoofing cannot be used on WAN links connected to routers/bridges Spoofing be used...
  • Page 128: Appendices

    Appendices...
  • Page 129: Protocol Bandwidth Overheads And Requirements

    WAN links which generally have a more restricted bandwidth. This appendix allows you to calculate the bandwidth requirements for your net- work. Many facilities are built into the Intel Express 8100 Router to restrict Note these network overheads (e.g., triggered RIP updates, configurable IPX RIP and SAP updates over WAN links, IPX watchdog and SPX keep- alive spoofing and bridge BPDU spoofing).
  • Page 130 Protocol Bandwidth Overheads and Requirements each IPX RIP packet can only contain 50 entries, i.e., if more than 50 sta- tions are transmitted, 2 or more packets must be used each IPX SAP packet can only contain 7 entries, i.e., if more than 7 stations are transmitted, 2 or more packets must be used IPX RIP and SAP updates are sent every 60 seconds For 50 IPX networks, the IPX RIP protocol requires 52 bit/s of link bandwidth.
  • Page 131: Tcp And Udp Port Numbers

    Appendix B TCP and UDP Port Numbers Ports are used by the Transport Control Protocol (TCP) and User Data Protocol Introduction (UDP) to name the ends of logical connections which carry long-term associa- tions. For the purpose of providing services to unknown callers, a service contact port is defined.
  • Page 132 TCP and UDP Port Numbers Decimal Keyword Protocol Description SNMP Trap UDP Simple Network Management Protocol Traps. Routing Information Protocol. 2049 Network File Servers.
  • Page 133: Ethernet Type Codes

    Appendix C Ethernet Type Codes The following table lists the known Ethernet type codes. Ethernet Type Codes Type field Description 0000-5DC IEEE 802.3 length field 0101-01FF Experimental—for development (conflicts with 802.3 length field) 0200 Xerox PUP conflicts with IEEE 802.3 length field 0201 Xerox PUP Address Translation (conflicts with IEEE 802.3 length field)
  • Page 134 Ethernet Type Codes Type field Description 0BAF Banyan VINES Echo 1000 Berkeley trailer negotiation 1001-100F Berkeley trailer encapsulation for IP 1600 VALID system protocol 4242 PCS Basic Block Protocol 5208 BBN Simnet Private 6000 DEC unassigned 6001 DEC Maintenance Operation Protocol (MOP) Dump/Load Assistance 6002 DEC MOP Remote Console...
  • Page 135 Ethernet Type Codes Type field Description 8015 Silicon Graphics reserved type (obsolete) 8016 Silicon Graphics XNS NameServer, bounce server (obsolete) 8019 Apollo Domain 802E Tymshare 802F Tigan, Inc. 8035 Reverse Address Resolution Protocol RARP 8036 Aeonic Systems 8038 DEC LANBridge Management 8039 DEC unassigned 803A...
  • Page 136 Ethernet Type Codes Type field Description 806C ComDesign 806D Compugraphic Corporation 806E-8077 Landmark Graphics Corporation 807A Matra (France) 807C Merit Internodal 807D-8080 Vitalink Communications 8080 Vitalink TransLAN III Management 8081-8083 Counterpoint Computers 8088-808A Xyplex 809B Kinetics EtherTalk (AppleTalk over Ethernet) 809C-809E Datability 809F...
  • Page 137 Ethernet Type Codes Type field Description 80F2 Retix 80F3 Kinetics AppleTalk Address Resolution Protocol (AARP) 80F4-80F5 Kinetics 80F7 Apollo Computer 80FF-8103 Wellfleet Communications 8069 AT&T 807B Dansk Data Electronik A/S 8107 Symbolics Private 8108 Symbolics Private 8109 Symbolics Private 8130 Waterloo Microsystems Inc.
  • Page 138: Ip Frame Formats

    Appendix D IP Frame Formats The frame format of an IP packet is as follows: IP packets IP header Version 4 bits Internet Header Length (ILH) 4 bits Type of service 1 byte Total length 2 bytes Identification 2 bytes Flags 3 bits Fragment offset...
  • Page 139: Novell Ipx Frame Formats

    Appendix E Novell IPX Frame Formats Novell IPX supports different frame types—the frame type supported depends on Introduction the Novell driver. This appendix describes the different frame type supported by Novell IPX. IPX packets The frame format of an IPX packet is as follows: IPX header (802.3, 802.2, SNAP, Ethernet Type) Checksum 2 bytes = FFFF...
  • Page 140 Novell IPX Frame Formats IPX Ethernet 802.2 An IPX Ethernet 802.2 (also called LSAP) header looks like this: header Destination Address 6 bytes Source Address 6 bytes Length 2 bytes DSAP 1 byte = E0 SSAP 1 byte = E0 Control field 1 byte An IPX SNAP header looks like this:...
  • Page 141 Novell IPX Frame Formats Route Control Direction 1 byte Route Designator 1 2 bytes ..2 bytes Route Designator n 2 bytes DSAP 1 byte = E0 SSAP 1 byte = E0 Control 1 byte = 03 The DSAP and SSAP contained in a Token Ring SNAP packet indicates SNAP Token Ring SNAP encapsulation.
  • Page 142: Novell Ipx Service Types

    Appendix F Novell IPX Service Types The following table indicates different kinds of Novell services and associated Service and Object types objects that are currently known: Service Object User User Group Print Queue File Server Job Server Gateway Print Server Archive Queue Archive Server Job Queue...
  • Page 143 Novell IPX Service Types Service Object Btrieve VAP 5.0 SQL VAP/NLM Xtree Nw Version BTRIEVE VAP 4.xx Print Queue user EICON Router ARCserver 3.0 WANcopy utility TES Netware VMS Emerald Backup NetWare Access Server Portable NetWare PowerChute Compaq IDA Status Monitor RSPX Server CSA MUX CSA LCA...
  • Page 144 Novell IPX Service Types Service Object Compaq SNMP Agent HP Laserjet ARCserve 4.0 NW SQL Sitelock 4808 Intel Netport (Print Server) 8002 WordPerfect Network v. 8888 Wildcard FFFF...
  • Page 145 Index Index Numerics Destination Forwarding Tables 7 hop limit (bridging) ....113 - description ......96 Destination Forwarding Tables - operation of .
  • Page 146 Compression Dotted decimal notation ....48 Frame Relay ......19 Dynamic PPP .
  • Page 147 RIP-1 and RIP-2 ..... 64 Hops (Novell IPX) static routes ......68 description .
  • Page 148 Internet Tunnel ..... . 41 data transmission process ... . . 75 ISDN .
  • Page 149 number assignments (TCP/IP) ..119 Routing states in the Spanning Tree Algorithm . 111 and Bridging comparison ... . . 94 table (Novell IPX) ....85 call back .
  • Page 150 Routes and Static Backup Routes (Novell Dial-up (switched) links ....3 IPX) ....... 89 general facilities available .

This manual is also suitable for:

Express 8100

Table of Contents