Sign In
Upload
Manuals
Brands
Lucent Manuals
Control Unit
STGRRT-CM-IP2000-F
Lucent STGRRT-CM-IP2000-F Manuals
Manuals and User Guides for Lucent STGRRT-CM-IP2000-F. We have
1
Lucent STGRRT-CM-IP2000-F manual available for free PDF download: Configuration Manual
Lucent STGRRT-CM-IP2000-F Configuration Manual (476 pages)
ip control module
Brand:
Lucent
| Category:
Control Unit
| Size: 5.37 MB
Table of Contents
Customer Service
3
Table of Contents
5
About this Guide
21
Chapter 1 Introduction
29
Stinger IP DSLAM Network Features
29
Table 1-1 Overview of Network Features
29
Introduction to the Stinger IP2000 Control Module
31
IP2000 Model Numbers and Platform Support
31
Table 1-2 IP2000 Model Numbers and Platform Support
31
IP2000 Support for up to 2048 Trunk Terminated Calls
32
Features Not Currently Supported by the IP2000
33
Introduction to the Stinger IP2100 Control Module
33
Table 1-3 IP2100 Control Module Enhancements
33
Figure 1-1 IP2100 Control Module Basic Architecture
34
Model Numbers and Platform Support
34
Table 1-4 IP2100 Model Numbers and Platform Support
34
IP2100 Memory Modes
35
Maximizing the Number of User Connections
35
Additional Connections Created for Trunk-Terminated Connections
36
Notice of OAM Limitation with more than 5000 User Pvcs
36
Overview of OAM-CONFIG Profile Settings
36
Required IP2100 Memory Mode to Maximize User Connections
36
Configurable IP2100 Port Managers
37
Fixed-Rate and Nonfixed-Rate Bandwidth
37
System-Generated Profiles
37
Table 1-5 NP Port Manager Profiles
37
Configurable NP-PORT Profile Settings
38
Caution about Modifying NP-PORT Bandwidth Allocations
40
How to Recover from a Bandwidth Starvation Condition
41
Protection against Exceeding Line Capacity in NP-PORT Configurations
41
Sample HB LIM NP-PORT Configuration
41
Features Not Currently Supported by the IP2100
43
Network Architecture Overview
43
Multicast Video
43
Internet and Voice Access
44
Figure 1-2 Sample Setup Showing Multicast and Unicast Video Services
44
Figure 1-3 Sample Setup Showing Internet Access and Voice over ATM
44
Multiplexing Multiple IP Flows on a Single ATM VCC
45
Figure 1-4 Sample Setup Showing Multiple IP Flows to a CPE Router
45
Table 1-6 Default Classification and Prioritization
45
Chapter 2 Gigabit Ethernet Configuration
47
Configuring Gigabit Ethernet Interfaces
47
Configuring Gigabit Ethernet Interfaces
48
Enabling Layer 2 Bridging for VLAN Operations
49
Verifying the Gigabit Ethernet Interface Setup
49
Checking the Routing Table
50
Verifying IP Packet Transfer on the Interface
50
Verifying the Network Processor Setup for the Interface
50
Verifying the SAR Setup for the Interface
50
Configuring Gigabit Ethernet Port Redundancy
51
Stinger® IP Control Module Configuration Guide
51
Configuring a Soft IP Interface for Gigabit Ethernet Redundancy
52
Configuring Gigabit Ethernet Redundancy for RFC 2684 (Ipoa) Connections
52
Figure 2-1 Gigabit Ethernet Redundancy for RFC 2684 Connectivity
52
Configuring Gigabit Ethernet Redundancy for VLAN Bridging
53
Configuring a Redundant LAN MBONE
54
Figure 2-2 Gigabit Ethernet Redundancy for a LAN MBONE
54
Configuring LACP on Gigabit Ethernet Ports (IP2100 Only)
55
ETHER-GROUP Settings
56
LACP Configuration Overview
56
Virtual ETHERNET Profile Settings for a LAG
56
ETHERNET Profile Settings for Physical Ports in a LAG
58
LACP Profile Settings
59
Configuring a Routed VLAN on the Aggregated Bandwidth
60
Sample Link Aggregation Configuration
60
Configuring an MBONE Interface on the Aggregated Ports
61
Configuring an N:1 Bridged VLAN that Uses the Aggregated Bandwidth
61
LACP Implementation Details
62
LACP-Related Diagnostics
63
Configuring STP on Gigabit Ethernet Ports (IP2100 Only)
63
Primary Application with this Software Version
63
Configuration Overview
64
Figure 2-3 Redundant Uplinks for a VLAN
64
Limitations with this Software Version
64
Bridge-Level STP Settings in the ETHER-GROUP Profile
65
Port-Level STP Settings in each Port's ETHERNET Profile
66
Sample Configuration with Transparent Bridging
67
Routing Implications for STP-Enabled Ports
70
Administrative Tools for Gigabit Ethernet
71
Table 3-1 Definition of VLAN Terms
73
Chapter 3 VLAN Configuration
74
IP Filters for Ethernet-Encapsulated Bridged IP Datagrams
74
Configuring 1:1 VLAN Bridging
74
Figure 3-1 Bridging VLAN: One PVC to One VLAN (1:1)
74
Overview of VLAN-ETHERNET and CONNECTION Settings
75
Figure 3-2 Sample 1:1 VLAN Circuit
77
Sample 1:1 VLAN Bridging Configuration
77
Configuring N:1 VLAN Bridging
78
Creating and Configuring Bridge Groups
78
Figure 3-3 Bridging Multiple Pvcs to a VLAN
78
Overview of BRIDGE-GROUP Settings
79
Sample BRIDGE-GROUP Configuration with MAC Address Aging
81
Sample BRIDGE-GROUP Configuration with Port Blocking
81
Table 3-2 Traffic Restrictions When Port Blocking Is Enabled
81
Sample BRIDGE-GROUP Configuration with IGMP Snooping
82
Table 3-3 IGMP Control Packet Handling with IGMP Snooping Enabled
82
VLAN and Connection Settings
83
How Address Limiting Works
83
Table 3-4 Maximum Number of Learned MAC Addresses Per Module
83
Sample N:1 VLAN Bridging Configuration with Address Limiting
84
Figure 3-4 Sample N:1 VLAN Bridging
84
Configuring DHCP and Pppoe Snooping for DSL Line Identification
86
Structure of Identifiers Added to DHCP and Pppoe Discovery Packets
86
Figure 3-5 Format When an Interface IP Address (If-Ip) Is Used
87
Figure 3-6 Format When a Text String (Vendor-Option-String) Is Used
87
Figure 3-7 Format When Sending Only the Hostname (Send-Only-Hostname)
87
Configuring DHCP Snooping
88
Figure 3-8 DHCP Snooping Example
89
Figure 3-9 Contents of Fields with Sample DHCP Snooping Configuration
91
Configuring Pppoe Snooping for Line Identification of Pppoe Clients
92
Table 3-5 Packet Handling with Pppoe Snooping
92
Figure 3-10 Pppoe Vendor-Specific Tag Format
93
Figure 3-11 Pppoe Snooping Example
95
Configuring Stacked Vlans
96
Figure 3-12 Contents of Fields with Sample Pppoe Snooping Configuration
96
Bridging Untagged Frames to Stacked Vlans
97
Figure 3-13 Stacked VLAN: Bridging Untagged Frames from DSL Interfaces
97
Overview of VLAN Stacking Settings for Untagged Frames
97
Sample Configuration Bridging Untagged Frames
98
Bridging Enterprise VLAN Tagged Frames to Stacked Vlans
99
Figure 3-14 Stacked VLAN: Bridging Enterprise VLAN-Tagged Frames
100
Overview of VLAN Stacking Settings for Tagged Frames
100
Sample Configuration for Mapping Tagged Frames
102
Table 3-6 Enterprise VLAN Tagged Frames Mapped to a Stacked VLAN
102
Configuring Routed Vlans
104
Creating a Virtual IP Interface for a Routed VLAN
104
Figure 3-15 Sample Routed VLAN
104
Sample Routed VLAN Configuration
105
Figure 3-16 Sample Routed VLAN
105
Applying an IP Filter to a Routed VLAN
107
Assigning a Virtual Router to a Routed VLAN
107
VLAN Bridging of Ipoa Traffic to an Upstream BRAS
108
Upstream Packet Processing
108
Figure 3-17 Terminating Ipoa Traffic on an Upstream BRAS
108
Downstream Packet Processing
109
Configuration Overview
109
Overview of the BRAS Profile
109
Overview of CONNECTION Profile Settings
110
Configuring VLAN Bridged Ipoa
111
Figure 3-18 Sample 1:1 VLAN Circuits for Bridging Ipoa
111
Configuring Bridged Ipoa to Multiple BRAS with the same IP Address
113
Figure 3-19 Two BRAS with the same IP Address in Different Vlans
113
Caveat When Configuring an Unnumbered Interface for Bridged Ipoa
115
Figure 3-20 Not Recommended with Unnumbered Interfaces
115
Sample Profiles
115
Sample VLAN Configuration
115
Possible Proxy ARP Problems with the Sample Configuration
116
Conclusions about the Sample Configuration
117
VLAN-Based ARP Table
117
Adding VLAN ARP Entries Statically
117
How the VLAN ARP Entries Are Updated Dynamically
117
Table 3-7 ARP Request Packet Contents on a Configured VLAN
117
Pppoa Bridging in 1:1 and N:1 VLAN
118
Upstream Network Element Configuration Requirements
118
Pppoa Bridging in N:1 Vlans
119
Figure 3-21 Sample Transparent-Bridged Pppoa Configuration
119
Required Settings to Enable Pppoa Bridging in a Bridge Group
119
Downstream CPE Configuration Considerations
120
Sample Configuration Enabling Pppoa Bridging in a Bridge Group
120
Pppoa Bridging in 1:1 Vlans
122
Figure 3-22 Sample PVC-To-VLAN Bridged Pppoa Configuration
122
Required Setting to Enable Pppoa Bridging in a 1:1 VLAN
122
Downstream CPE Configuration Considerations
123
Sample Configuration Enabling Pppoa Bridging in a 1:1 VLAN Circuit
123
Administrative Tools for VLAN
125
Table 3-8 VLAN ID Argument Added to Arptable Command
125
IP Routing Configuration
127
Chapter 4 IP Routing Configuration
127
Introduction to the IP Router Software
128
Routes and Interfaces
128
Displaying the Routing Table
128
Displaying the Interface Table
129
IP Control Module Performance Statistics
130
IP Address Syntax
130
Table 4-1 Decimal Subnet Masks and Corresponding Prefix Lengths
131
Configuring IP-INTERFACE Profiles for Ethernet Ports
132
Overview of Typical Local Interface Settings
132
Table 4-2 Profiles for Configuring Logical IP Interfaces for Ethernet Ports
132
Configuring a Local IP Interface
133
Defining a Local Virtual IP Interface
134
Defining a Soft Interface for Increased Accessibility
134
Disabling Directed Broadcasts to Protect against Denial-Of-Service
134
Configuring IP-GLOBAL Network Features
135
Setting a System Address
135
Configuring DNS
136
Overview of Typical DNS Settings
136
Specifying Domain Names for Lookups
136
Setting RIP Options
137
Limiting the Size of UDP Packet Queues
138
RIP Policy for Propagating Updates Back to the Originating Subnet
138
RIP Triggering
138
Ignoring Default Routes When Updating the Routing Table
139
Suppressing Host-Route Advertisements
139
Subscriber Profile Sharing
140
Equal Cost Multipath Routing
141
Caveat about Changing the Type of Load Balancing
141
Flow-Based ECMP
141
Packet-Based ECMP
141
Limitations of ECMP Load Balancing
142
Overview of ECMP Settings
142
Figure 4-1 Four DSL Links Using ECMP Routes
143
Sample Downstream ECMP Configuration
143
Example of Downstream Flow-Based ECMP
145
Figure 4-2 Two Routed VLAN Uplinks Using ECMP Routes
147
Sample Upstream ECMP through Routed VLAN Interfaces
147
Configuring and Using Address Pools
149
Overview of Settings for Defining Pools
149
Pool Requirements
149
Examples of Configuring Address Pools
152
Preventing the Use of Class Boundary Addresses
152
Example of Configuring Summarized Address Pools
153
Examples of Assigning an Address from a Pool
155
Figure 4-3 Remote CPE Requiring Dynamic IP Address Assignment
155
IP Pool Chaining
156
Slot-Based Address Assignment
162
Overview of Profile Settings
162
Figure 4-4 Example of a Pppoe Session Using Slot-Based Address Assignment
163
Sample Slot-Based Address Configuration Using the Global Router
163
Expanding the Sample Configuration to Use a Virtual Router
165
Configuring IP-ROUTE Profiles
166
Overview of Typical Static Route Settings
166
Offloading Routing Overhead to an External Router
167
Figure 4-5 Default Route to a Local IP Router
167
Creating a Static Route to a Subnet
168
Overview of Routed Subscriber Connection Features
168
Source Interface Local Addresses
168
Figure 4-6 Static Route to a Subnet
168
Packets that Use the Specified Source Address
168
CPE Client Considerations
169
Soft IP Interface Requirement
169
Overview of Configuration Settings
170
Sample Configuration with a Source Interface Address
170
Figure 4-7 Sample Configuration Using Two Soft IP Interface Addresses
171
Anti-Spoofing Protection for Ipoa, BIR, Pppoa, and Pppoe Connections
172
Overview of Anti-Spoofing Settings
173
Figure 4-8 Sample Network with Two Levels of Anti-Spoofing Protection
174
Sample Anti-Spoofing Configuration
174
Configuring Ipoa Subscriber Connections
175
Typical CONNECTION Atm-Options Settings for Terminating Pvcs
175
Typical CONNECTION Ip-Options Settings for Terminating Pvcs
176
Sample RFC 2684 (Ipoa) Terminating PVC
177
Figure 4-9 Router-To-Router IP Connection
177
Example of Using a Local-Address Setting for a Numbered Interface
178
Figure 4-10 a Numbered-Interface Connection
178
Example of Routing a Terminated PVC Across Gigabit Ethernet
179
Figure 4-11 Forwarding Terminating Pvcs on the Gigabit Ethernet Interface
179
Example of Using IP Routing to Aggregate Pvcs Onto a Trunk VC
181
Figure 4-12 Aggregating Pvcs Onto a Single Virtual Circuit Using IP Routing
181
Configuring BIR Subscriber Connections
182
Overview of CONNECTION Bir-Options and Ip-Options Settings
182
Figure 4-13 BIR Interface on a LIM Port
182
Sample Subnet (BIR/24) Configuration
183
Figure 4-14 BIR Subnet Configuration on LIM Interface
183
Sample Host Route (BIR/32) Configurations
184
Figure 4-15 BIR/32 Configurations
185
Sample BIR Connection on a VDSL Port
186
Sample Use of Filters with BIR Connections
187
Figure 4-16 Bidirectional Filtering on a BIR Interface
187
Configuring Multiple WAN Virtual IP Interfaces on a BIR Connection
188
Overview of Multiple IP Address Settings
189
Figure 4-17 Sample BIR Connection with Four Static IP Addresses
190
Sample Configuration of Multiple Addresses on a BIR Connections
190
How Routes Are Created for WAN Virtual Interfaces
191
Configuring DHCP Relay for Ipoa and BIR Connections
192
RFC Compliance and Caveats
192
DHCP Option 82
192
WAN Virtual Interfaces on DHCP-Configured BIR Connections
192
DHCP IP Address Lease Time for WAN Virtual Interfaces
193
IP Address Assignments on DHCP-Configured WAN Virtual Interfaces
193
When WAN Virtual Interfaces Are Activated
193
Deactivating and Deleting WAN Virtual IP Interfaces
194
How the System Selects an Interface for Incoming Packets
194
DHCP Relay Configuration Settings
194
Overview of IP-GLOBAL DHCP Relay Settings
194
Overview of DHCP Relay Agent Settings
195
Overview of DHCP Option 82 Suboption Settings
196
Overview of IP-INTERFACE and CONNECTION DHCP Settings
198
Per-Connection Control of the DHCP Relay Giaddr Field
199
Overview of How to Use Per-Connection Giaddr Contents
199
Samples of How Various Settings Affect Giaddr Contents
200
Sample DHCP Relay Configurations for Ipoa Connections
200
Figure 4-18 DHCP Relay for an Ipoa Terminated PVC
200
Sample Configuration Using DHCP Relay Without Option 82
200
Table 4-3 Settings that Affect Contents of the Giaddr Field in DHCP Packets
200
Sample Configuration Using DHCP Relay with Option 82
201
Sending Only a Hostname in the Suboption Fields
201
Allowing Non-Standard DHCP Source Ports
202
Interoperation with DHCP Servers that Zero-Delimit Suboption Fields
202
DHCP Issues on LAN Management Interfaces
202
Figure 4-19 Option 82 Information Field Formats
202
Figure 4-20 Sample DHCP Usage with LAN Management Interface
203
Sample DHCP Relay Configurations for BIR Connections
204
Figure 4-21 Sample DHCP Setup on BIR Connection
204
Sample Configuration with no DHCP Relay on a BIR Connection
204
Sample Configuration Enabling Relay Agent on a BIR Connection
205
Sample Configuration with Option 82
206
Sample Configuration with Option 82 and Multiple Interface Creation
207
Sample Configuration on a VDSL Port with Option 82 and Multiple Interface Creation
208
Sample Using the Soft Interface Address in the Giaddr Field
208
Sample Configuration Using the DHCP Router Option
209
Sample Configuration that Sends Only a Hostname
210
Configuring Broadband RAS Subscriber Access
211
Recommended Call-Type Setting for PPP Sessions
211
Overview of Pppoa and Pppoe Topologies
212
Figure 4-22 Pppoa Topology
212
Required Setup for Pppoa and Pppoe Connections
213
Configuring the ANSWER-DEFAULTS Profile for PPP Sessions
213
Figure 4-23 Pppoe Topology
213
Terminating Traffic on a LIM Internal Interface
215
Pppoa and Pppoe Encapsulation Types in the Underlying ATM Circuit
215
The Underlying ATM Circuit Required to Terminate Traffic
215
Configuring an ATM Circuit to Terminate Pppoa
216
Table 4-4 Required Encapsulation Types for Pppoa and Pppoe
216
Configuring an ATM Circuit to Terminate Pppoe
217
Example of Configuring a Pppoa Connection
217
Figure 4-24 Example of a Pppoa Session on a DSL Interface
217
Overview of Pppoa CONNECTION Settings
218
Sample Pppoa Connection with Bidirectional CHAP Authentication
219
Pppoa over LLC
220
Verifying the Encapsulation Type
220
Example of Configuring a Pppoe Connection
221
Figure 4-25 Example of a Pppoe Session on a DSL Interface
221
Overview of Pppoe CONNECTION Settings
221
Sample Pppoe Connection Using PAP Authentication
222
Sample Pppoe Connection on a VDSL Port
223
Enabling LCP Keepalives
224
Table 4-5 Configurable LCP Echo Interaction with LQM
226
Enabling Magic-Number Negotiation When LQM Is Disabled
227
Enabling Support for Pppoe Service Names
227
Details of the Service-Name Negotiation Process
227
Configuration Overview
228
Sample Pppoe Server Configuration Using Local Profiles
231
Sample Pppoe Server Configuration Using RADIUS
232
Table 4-6 Permanent RADIUS Pppoe Server Profiles
233
Administrative Tools for IP Routing
235
Chapter 5 Ethernet and IP Qos
237
Overview of the Qos Implementation
237
Figure 5-1 Qos Subsystems
237
Overview of the Qos Implementation
238
Packet Classification Subsystem
238
Table 5-1 Descriptions of Qos Support for Routed, Bridged, and VLAN Traffic
238
Packet Marking Engine
239
Rate-Limiting, Prioritization, and Scheduling Subsystem
239
Configuration Steps
240
Table 5-2 Packet Marking Supported on Egress Interfaces
240
What the System Does at the Output Interface
240
Default IP Qos Configuration
241
Introduction to PACKET-FLOWS Profile Settings
241
Layer 2 Classifiers
242
Packet Classifiers
243
Caveat about Fragmented IP Packets
245
Details of Packet Classifier Comparison Passes
245
Table 5-3 Comparison Passes Performed on Inbound Packet Flows
245
Comparisons of IP Addresses
246
Comparisons of IP TOS Values
246
Comparisons of Port Numbers
247
How Nonmatching Packets Are Prioritized (the Default Rule)
247
Scheduling and Rate Limiting
248
Table 5-4 Rate Limiting Terminology
248
Token Buckets in the Single-Rate Three Color Policing Algorithm
249
Notes on the Policing Implementation
250
Rate Limiting on VLAN Bridged Interfaces
250
Table 5-5 Flow-Based Rate Limiting Configurations
250
Using a Single Rate Two-Color Algorithm
250
Example of Rate Limiting on a BIR Connection
251
Example of Rate Limiting on a 1:1 Bridged VLAN
252
Packet Marking
252
Ethernet P-Bit Marking for Bridged or Routed VLAN Traffic
253
Figure 5-2 Sample Deployment with VLAN P-Bit Marking
253
Qos Packet Marking for Routed Traffic
253
Overview of Packet Marking Settings
254
Example of IP Tos Marking on a Routed VLAN Interface
255
Example of Ethernet P-Bit Marking
256
Example of Mapping ATM Qos to a Packet Marking Value
257
Qos-Related Connection and Interface Settings
258
Applying a PACKET-FLOWS Profile to an Output Interface
259
Inheritance of PACKET-FLOWS Configurations on Virtual IP Interfaces
259
ATM Qos and IP Qos Considerations
260
Virtual IP Interfaces and Interface Grouping
260
Configuring Ethernet IP Traffic Shaping
260
Configuring VLAN Ethernet Traffic Shaping
261
Qos-Related Settings in the SYSTEM Profile
261
Performance Recommendations
261
Table 5-6 VLAN Traffic Shaping Configurations
261
Configurable Queue Size for IPTV Traffic on DSL Links
262
Tracking Rate Adaptation for Downstream Traffic Shaping
262
How Traffic Shaping Typically Occurs
263
How Rate Adaptation Affects Traffic Shaping
263
How to Enable the Rate-Tracking Optimization
263
How this Feature Works on the ADSL2+ HB LIM
263
How this Feature Works on the VDSL LIM
263
Examples of Configuring Qos
264
Prioritizing IP Packet Flows Based on DSL Service Contracts
265
Figure 5-3 Using Interface Grouping to Prioritize Traffic by Service Level
265
Prioritizing Different Kinds of IP Traffic on an ATM PVC
266
Figure 5-4 Unicast and Multicast Video Share the same Priority
267
Table 5-7 Sample IP Traffic Types and Priorities Across an ATM PVC
267
Prioritizing Traffic Using both IP and ATM Qos
268
Figure 5-5 Prioritizing Traffic at the Connection Level and Flow Level
268
Table 5-8 Sample IP Traffic Types and Priorities Across Two Pvcs
268
Table 5-9 Sample Bandwidth Limitations
269
Configuring Bridging VLAN Ethernet Qos
272
Figure 5-6 Stacked VLAN Requiring P-Bit Remarking on the Output Interface
272
Table 5-10 Ethernet P-Bit Remarking Table
272
Configuring Traffic Shaping and Rate Limiting for a N:1 VLAN Bridging
273
Figure 5-7 Sample N:1 VLAN Bridging with Traffic Shaping and Rate Limiting
273
Configuring Rate Limiting and Traffic Shaping with VLAN Stacking
275
Figure 5-8 Stacked VLAN with Rate Limiting and Traffic Shaping
275
Configuring Rate Limiting and Traffic Shaping for 1:1 VLAN Bridging
278
Figure 5-9 1:1 Bridging VLAN with Rate Limiting and Traffic Shaping
278
Configuring a Pppoe Connection with and Without Line-Rate Tracking
280
Configuring a BIR Connection with Line-Rate Tracking
282
Administrative Tools for Monitoring IP Qos
282
Example of Monitoring Routed Traffic Onto Gigabit Ethernet
283
Applying a PACKET-FLOWS Profile to the Ethernet IP Interface
283
Creating a Terminating Routed Connection
283
Enabling Monitoring on the Ethernet IP Interface
284
Obtaining the Ethernet Interface Number
284
Example of Monitoring Bridged VLAN Traffic (Transparent Bridging)
285
Creating a Bridged VLAN Interface and PACKET-FLOWS Profile
285
Creating a Bridged Subscriber Interface and PACKET-FLOWS Profile
286
Enabling Monitoring for the Bridged VLAN Interface
287
Obtaining the Interface Numbers
287
Enabling Monitoring for the Bridged Subscriber Interface
288
Example of Monitoring 1:1 VLAN Bridged Traffic
289
Creating the Subscriber-Side Profiles
289
Creating the VLAN-Side Profiles
290
Obtaining the Interface Numbers
290
Enabling Monitoring in the Upstream Direction
291
Enabling Monitoring in the Downstream Direction
292
Example of Monitoring Stacked VLAN Bridged Traffic
293
Enabling Qos Monitoring on an NSP VLAN Interface
293
Enabling Qos Monitoring on a Stacked VLAN WAN Connection
294
Example of Displaying a Connection's Traffic Shaping Parameters
295
Displaying a Connection's Traffic Shaping Parameters on the IP2000
295
Displaying a Connection's Traffic Shaping Parameters on the IP2100
296
Limitations with the Current Software Version
297
Figure 6-1 L2TP Tunneling
299
Chapter 6 L2TP Tunneling Configuration
300
Overview of L2TP Tunneling
300
Links to LNS Servers
300
Links to PPP Clients
300
L2TP-Related Network Settings
301
L2TP-Related RADIUS Configuration
301
Overview of L2TP Tunnel Authentication
301
Table 6-1 Network Settings Related to L2TP
301
How the System Finds a Matching Tunnel
302
System Name Used for Tunnel Authentication
302
Examples of How Client-Auth-ID Settings Create Parallel Tunnels
303
Table 6-2 Existing Tunnels to the same LNS
303
Table 6-3 Tunnels Created for Clients Based on Profile Settings
303
Configuring L2TP Global Options
304
Enabling L2TP Operations and Authentication
304
Table 6-4 Tunnels Created When User1 Dials in First (Error Not Detected)
304
Table 6-5 Tunnels Created When User2 Dials in First (Error Shown)
304
Setting L2TP Timers and Other Variables
305
Retry Timers
307
CSN Encoding for RADIUS Accounting
308
Sample Global Tunneling Configuration
308
Configuring Client Connections with PPP Authentication
309
Overview of Mobile Client Connection Settings
309
Sample PPP-Authenticated Client Connection
311
Figure 6-2 Bringing up a Tunnel Using PPP Authentication
311
Sample PPP-Authenticated Connection with Two LNS Systems
312
Figure 6-3 Primary and Secondary Tunnel End Points
313
Configuring Connection-Based Tunnel Authentication
314
Example of Connection-Based Tunnel Authentication
315
Figure 6-4 Connection-Based Tunnel Authentication
315
Configuring Server-Based Tunnel Authentication
316
Overview of Server-Based Tunnel Authentication Settings
317
Example TUNNEL-SERVER Password Configuration
318
Sample Server-Based Authentication Configuration
319
Figure 6-5 Server-Based Tunnel Authentication
319
Using Tunnel Assignment Ids
320
Overview of Tunnel Assignment Settings
320
Example of Configuring Tunnel Assignment Ids
321
Figure 6-6 Tunnel Assignment Ids
321
Administrative Tools for Monitoring L2TP
324
Displaying Traffic Statistics for Open UDP/TCP Ports
324
Displaying L2TP Statistics
324
Displaying Pppoe Statistics
325
Limitations with this Software Version
325
Impact of L2TP Data Sequencing Limitation
326
Impact of L2TP IP Qos Limitation
326
Chapter 7 Virtual Router Configuration
327
Overview of Virtual Routing
327
Figure 7-1 Simple Diagram of Three Virtual Domains (Virtual Routers)
327
Applicability and Limitations
328
How Virtual Routers Affect the Routing Table
328
Interconnecting Virtual Domains
328
Creating a Virtual Router
329
Overview of VROUTER Profile Settings
329
Example of Defining a Virtual Router
330
Defining Address Pools for a Virtual Router
333
Assigning Interfaces to a Virtual Router
333
Overview of Interface Virtual Router Settings
333
Examples of Assigning Virtual Router Membership to Interfaces
334
Defining Virtual Router Static Routes
334
Overview of Static Route Settings
334
Examples of Defining a Route on a Per-Virtual-Router Basis
335
Specifying an Inter-Virtual-Router Route
335
Configuring Virtual Router DNS Servers
336
Example of a Typical Virtual Router DNS Configuration
337
Overview of Virtual Router DNS Settings
337
Deleting a Virtual Router
338
Administrative Tools for Virtual Routers
338
Table 7-1 Administrative Commands Showing Optional Vrouter Arguments
338
Chapter 8 OSPF Configuration
341
Overview of Supported OSPF Features
341
Limited Border Router Capability
342
One Active IP Interface Per Port
342
Authentication
342
Support for Variable-Length Subnet Masks
342
Exchange of Routing Information
343
Table 8-1 Description of LSA Types
343
Designated and Backup Designated Routers on Broadcast Networks
344
Figure 8-1 OSPF Broadcast Network on Gigabit Ethernet
344
Routing Across NBMA Interfaces
345
Configurable Cost Metrics
345
Figure 8-2 OSPF Costs for Different Types of Links
345
Hierarchical Routing (Areas)
346
Figure 8-3 Dividing an OSPF Autonomous System into Areas
346
Link-State Routing Algorithms
347
Figure 8-4 Sample OSPF Topology
347
Enabling OSPF Systemwide
348
Table 8-3 Shortest-Path Tree and Resulting Routing Table for Router-1
348
Table 8-4 Shortest-Path Tree and Resulting Routing Table for Router-2
348
Table 8-5 Shortest-Path Tree and Resulting Routing Table for Router-3
348
Configuring OSPF on Gigabit Ethernet
349
Overview of IP-INTERFACE OSPF Settings
349
Sample Gigabit Ethernet Interface Configuration
352
Figure 8-5 OSPF on a LAN Interface
352
Configuring OSPF on an ATM Trunk Interface
353
Overview of CONNECTION OSPF Settings
353
Sample OSPF Point-To-Point Configuration
354
Sample Configuration of NBMA Across Point-To-Point
354
Figure 8-6 OSPF over ATM Point to Point
354
Overview of Additional NBMA Settings
354
Example of an NBMA Configuration
355
Figure 8-7 OSPF NBMA over ATM Point to Point
355
Configuring Global Route Options that Apply to OSPF
356
Example of Importing a Summarized Pool as an ASE
357
Example of Setting ASE Preferences
357
Configuring IP-ROUTE OSPF Options
357
Example of Configuring a Type 7 LSA in an NSSA
358
Example of Assigning a Cost to a Static Route
359
Administrative Tools for OSPF Routing
359
Chapter 9 IP Multicast Configuration
361
IP Multicast Forwarding
361
Figure 9-1 Multicast Video Sample Setup
361
Figure 9-2 Multiple MBONE Interfaces on Trunk or LAN Interfaces
362
LIM-Side Multicast Client Interfaces
362
Network-Side MBONE Interfaces
362
Notice about Gigabit Ethernet Redundancy for a LAN MBONE
362
IP2100 and IP2000 Maximum Limits on Multicast and Bridge Groups
363
Configuring MBONE Interfaces
363
Table 9-1 Maximum Multicast Groups, Multicast Users, and Bridge Groups
363
Overview of Multiple MBONE Configuration
364
Figure 9-3 Sample Configuration with Multiple MBONE Interfaces
365
Sample Configuration with Multiple MBONE Interfaces
365
Sample MBONE Configuration on Gigabit Ethernet Vlans
366
Figure 9-4 Sample Configuration of VLAN MBONE Interface
367
Managing Multicast Group Memberships
368
Overview of MCAST-SERVICE Settings
368
Sample Multicast Address Filters
369
Sample Multicast Address Range Filter
370
Configuring Multicast Client Interfaces
371
Overview of Multicast Client CONNECTION Settings
371
Setting IGMP-V2 Timers (Local Profiles Only)
373
Example of Using Multiple Multicast Filters
374
Sample Multicast Video Configuration with Filters
375
Configuring Multicast Client Pvcs
376
Configuring the Local MBONE Interface
376
Figure 9-5 DSL Video Application with a Local MBONE Interface
376
Applying a Filter that Restricts the Gige Interface to Video Traffic Only
377
An Alternative Filter to Restrict each Client Interface
378
Sample Multicast Video Configuration with a Remote MBONE Interface
379
Figure 9-6 IPTV Video Sample Configuration
379
ATM Qos When both Multicast and Unicast Clients Are Supported
381
Table 9-2 Sample Multicast and Unicast Client Requirements
381
Multicast Server Virtual Circuits
382
Figure 9-7 One VC Per Multicast Group for Incoming Multicast Data Streams
382
Overview of Multicast Server VC Settings
383
Sample Configuration of Multicast Server Vcs
384
Configuring the Multicast Server Vcs
384
Enabling the Multicast Server VC Feature
384
Figure 9-8 Multicast Server Vcs on a Trunk Interface
384
Distributed Multicast with HB Lims (IP2100 Only)
385
Benefits of Distributed Multicast
385
Configuring the Terminating Connections for DSL Users
385
Conceptual Overview
386
Figure 9-9 FFW Interfaces on Multicast-Capable Modules
386
MBONE and Multicast Client Interactions on FFW Interfaces
387
Figure 9-10 Two IGMP Join Requests for the same Multicast Group
387
Table 9-3 FFW Interfaces Registered as MBONE or Multicast Client
387
What Happens When a CPE Joins a Multicast Group
387
What Happens When a CPE Leaves a Multicast Group
388
Multicast-Capable HB LIM Considerations
388
Downstream Traffic Processing
388
Figure 9-11 Two IGMP Leave Requests for the same Multicast Group
388
Changes in Packet-Flow Prioritization with Distributed Multicast
389
Table 9-4 Packet Flow with Multicast Traffic as the Highest Priority Flow
389
Table 9-5 Packet Flow with Unicast Traffic as the Highest Priority Flow
389
Scheduling Priority of the HB LIM FFW Interface
390
Table 9-6 Packet Flow with Interleaving Priorities (Unicast/Multicast)
390
Table 9-7 Packet Flow with Interleaving Priorities (Multicast/Unicast)
390
ATM Qos for Unicast Traffic on the HB LIM
391
Statistics and Diagnostics for the Multicast-Capable HB LIM
391
Administrative Tools for IGMP Operations
391
Chapter 10 PIM-SM V2 Configuration
393
PIM-SM Features Supported with this Software Version
394
Overview of PIM-SM Configuration
394
Table 10-1 Current Level of Support for PIM-SM Functionality
394
Enabling Multicast and PIM
395
Overview of Settings in the IP-GLOBAL Profile
395
Example Showing BSR Election and Dynamic Group-RP Mappings
396
Configuring Static Mappings between Groups and Rendezvous Points
397
Configuring PIM on Gigabit Ethernet or Trunk Interfaces
398
PIM Options in the IP-INTERFACE and CONNECTION Profiles
399
Example of Enabling PIM on the Gigabit Ethernet Interface
401
Example of Enabling PIM on a Trunk Interface
402
Sample PIM-SM System Configuration
402
Figure 10-1 PIM-SM on Gigabit Ethernet and Trunk Interface
402
Administrative Tools for PIM-SM Routing
403
Chapter 11 Filter Configuration
405
Filter Overview
405
Table 11-1 Default Filtering Behavior
405
Explicit Default Filter Rules
406
Filter Rules
406
Defining IP Filters
406
Stinger® IP Control Module Configuration Guide
406
Overview of IP Filter Settings
406
Details of IP Filter Comparison Passes
408
Filtering on Source or Destination IP Addresses
408
Filtering on Port Numbers
409
TCP-Established Filters
410
Sample IP Filters
411
Preventing Address Spoofing
412
Sample TCP-Established Filter
412
An IP Filter for more Complex Security Issues
413
Sample Filter with no Explicit Default Rule
414
Sample Filter Using a Generic Explicit Default Rule
415
Sample Filter with Explicit Default Rule
415
Defining ICMP Filters
416
Overview of Profile Settings
416
Blocking Incoming Echo-Request Packets
418
Sample ICMP Filter Configurations
418
Blocking Echo-Requests to a Specific IP Address
420
Stopping Echo-Request Packets from Being Forwarded Upstream
420
Defining Route Filters
421
Overview of Route Filter Settings
421
Sample Route Filter that Excludes a Route
422
Sample Route Filters
422
Sample Route Filter that Configures a Route's Metric
423
Defining Ethernet Input Filters
423
Overview of Ethernet Filter Settings
423
Sample Pppoe and MAC Address Filter
424
Applying a Filter to an Interface
425
Applying Filters to a CPE Interface
425
Profile Settings for Applying a Filter
425
Applying a Filter to a VLAN Ethernet Interface
426
Applying a Filter to an Ethernet Interface
426
Applying an Ethernet Filter to a VLAN Bridging Connection
427
Administrative Tools for Filters
427
Appendix A IP Control Module Diagnostics
429
Enabling the Debug Environment
430
Gigabit Ethernet Diagnostics
430
IGMP Diagnostics
432
PIM-SM Diagnostics
438
VLAN-Related Diagnostics
441
SAR-Related Diagnostics
447
Network Processor-Related Diagnostics
448
Multicast-Capable High-Bandwidth LIM Diagnostics
455
SNMP MIB for GMAC and VLAN Statistics
457
History Maintained at 15-Minute Intervals
457
Gigabit Ethernet (Gige) Statistics Tables
457
Gigabit Ethernet Configuration
458
Interval Transmit Statistics
458
Total Transmit Statistics
458
Table A-1 Gigeconfigtable MIB Objects
458
Table A-2 Gigetxintervaltable MIB Objects
458
Table A-3 Gigetxtotaltable MIB Objects
459
Interval Receive Statistics
460
Total Receive Statistics
460
Table A-4 Gigerxintervaltable MIB Objects
460
Table A-5 Gigerxtotaltable MIB Objects
461
VLAN Statistics Tables
462
VLAN Statistics
462
Table A-6 Gigevlanstattable MIB Objects
462
VLAN Clear Statistics
463
Pimv2 MIB Support
463
Table A-7 Gigevlanclearstattable MIB Objects
463
Index
467
Advertisement
Advertisement
Related Products
Lucent STGR-CM-IP2000-F
Lucent STGR-SFP-SX
Lucent STGR-SFP-LX
Lucent STGRRT-SFP-LX
Lucent STGR-CM-IP2100-F
Lucent Stinger
Lucent Stinger FS
Lucent Stinger FS+
Lucent Stinger RT
Lucent Stinger MS+
Lucent Categories
Control Unit
Switch
Telephone
Network Router
Server
More Lucent Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL