Nokia IPSO 4.0 Manuals

Manuals and User Guides for Nokia IPSO 4.0. We have 1 Nokia IPSO 4.0 manual available for free PDF download: Reference Manual

Nokia IPSO 4.0 Reference Manual

Nokia IPSO 4.0 Reference Manual (510 pages)

Nokia Network Voyager Reference Guide  
Brand: Nokia | Category: Software | Size: 2.89 MB
Table of contents
Table Of Contents5................................................................................................................................................................
About The Nokia Network Voyager Reference Guide19................................................................................................................................................................
Conventions This Guide Uses21................................................................................................................................................................
Notices21................................................................................................................................................................
Text Conventions21................................................................................................................................................................
Menu Items22................................................................................................................................................................
Related Documentation22................................................................................................................................................................
About Network Voyager23................................................................................................................................................................
Software Overview23................................................................................................................................................................
Logging In To Network Voyager24................................................................................................................................................................
Logging Off24................................................................................................................................................................
Obtaining A Configuration Lock25................................................................................................................................................................
Navigating In Network Voyager26................................................................................................................................................................
Reloading26................................................................................................................................................................
Accessing Documentation And Help26................................................................................................................................................................
Viewing Hardware And Software Information For Your System28................................................................................................................................................................
Configuring Interfaces29................................................................................................................................................................
Interface Overview29................................................................................................................................................................
Ip2250 Management Ports30................................................................................................................................................................
Configuring Network Devices30................................................................................................................................................................
Configuring Ip Addresses31................................................................................................................................................................
Interface Status32................................................................................................................................................................
Configuring Tunnel Interfaces33................................................................................................................................................................
Ethernet Interfaces34................................................................................................................................................................
Configuring Ethernet Interfaces34................................................................................................................................................................
Link Aggregation35................................................................................................................................................................
Managing Link Aggregation Using Snmp36................................................................................................................................................................
Configuring Switches For Link Aggregation36................................................................................................................................................................
Static Link Aggregation37................................................................................................................................................................
Link Aggregation On The Ip225037................................................................................................................................................................
Configuring Link Aggregation39................................................................................................................................................................
Gigabit Ethernet Interfaces41................................................................................................................................................................
Point-to-point Over Ethernet43................................................................................................................................................................
Configuring Pppoe43................................................................................................................................................................
Configuring Mss Clamping46................................................................................................................................................................
Virtual Lan Interfaces46................................................................................................................................................................
Fddi Interfaces49................................................................................................................................................................
Isdn Interfaces51................................................................................................................................................................
Configuring Calling Line-identification Screening56................................................................................................................................................................
Dial-on-demand Routing (ddr) Lists58................................................................................................................................................................
Isdn Network Configuration Example61................................................................................................................................................................
Isdn Troubleshooting65................................................................................................................................................................
Token Ring Interfaces71................................................................................................................................................................
Token Ring Example73................................................................................................................................................................
Point-to-point Link Over Atm75................................................................................................................................................................
Atm Example78................................................................................................................................................................
Ip Over Atm (ipoa)79................................................................................................................................................................
Ipoa Example82................................................................................................................................................................
Serial (v.35 And X.21) Interfaces83................................................................................................................................................................
Serial Interface Example87................................................................................................................................................................
T1(with Built-in Csu/dsu) Interfaces88................................................................................................................................................................
T1 Interface Example94................................................................................................................................................................
E1 (with Built-in Csu/dsu) Interfaces96................................................................................................................................................................
Hssi Interfaces103................................................................................................................................................................
Unnumbered Interfaces107................................................................................................................................................................
Configuring Unnumbered Interfaces107................................................................................................................................................................
Configuring Ospf Over Unnumbered Interface110................................................................................................................................................................
Ospf Over Unnumbered Interfaces Using Virtual Links110................................................................................................................................................................
Cisco Hdlc Protocol111................................................................................................................................................................
Point-to-point Protocol112................................................................................................................................................................
Frame Relay Protocol114................................................................................................................................................................
Loopback Interfaces117................................................................................................................................................................
Gre Tunnels118................................................................................................................................................................
Configuring Gre Tunnels118................................................................................................................................................................
Gre Tunnel Example121................................................................................................................................................................
High Availability Gre Tunnels122................................................................................................................................................................
Ha Gre Tunnel Example122................................................................................................................................................................
Dvmrp Tunnels125................................................................................................................................................................
Dvmrp Tunnel Example126................................................................................................................................................................
Arp Table Entries128................................................................................................................................................................
Configuring Arp For Atm Interfaces130................................................................................................................................................................
Transparent Mode132................................................................................................................................................................
Limitations132................................................................................................................................................................
Transparent Mode Processing Details133................................................................................................................................................................
Configuring Transparent Mode In Vpn Environments134................................................................................................................................................................
Example Of Transparent Mode135................................................................................................................................................................
Configuring Transparent Mode136................................................................................................................................................................
Monitoring Transparent Mode Groups139................................................................................................................................................................
Transparent Mode And Check Point Ngx139................................................................................................................................................................
Virtual Tunnel Interfaces (fwvpn) For Route-based Vpn140................................................................................................................................................................
Creating Virtual Tunnel Interfaces142................................................................................................................................................................
Configuring System Functions145................................................................................................................................................................
Configuring Dhcp145................................................................................................................................................................
Configuring Dhcp Client Interfaces146................................................................................................................................................................
Dhcp Client Configuration146................................................................................................................................................................
Configuring The Dhcp Server147................................................................................................................................................................
Dhcp Server Configuration148................................................................................................................................................................
Changing Dhcp Service149................................................................................................................................................................
Adding Dhcp Address Pools149................................................................................................................................................................
Enabling Or Disabling Dhcp Address Pools150................................................................................................................................................................
Assigning A Fixed-ip Address To A Client150................................................................................................................................................................
Creating Dhcp Client Templates151................................................................................................................................................................
Configuring Dynamic Domain Name System Service153................................................................................................................................................................
Configuring The Domain Name Service154................................................................................................................................................................
Configuring Disk Mirroring154................................................................................................................................................................
Using An Optional Disk (flash-based Systems Only)155................................................................................................................................................................
Mail Relay156................................................................................................................................................................
System Failure Notification157................................................................................................................................................................
Configuring Mail Relay157................................................................................................................................................................
Sending Mail158................................................................................................................................................................
Setting The System Time158................................................................................................................................................................
Configuring Host Addresses159................................................................................................................................................................
Configuring System Logging160................................................................................................................................................................
Configuring Logging On Disk-based Systems160................................................................................................................................................................
Configuring Logging On Flash-based Systems161................................................................................................................................................................
Configuring Audit Logs163................................................................................................................................................................
Remote Core Dump Server On Flash-based Systems165................................................................................................................................................................
Changing The Hostname166................................................................................................................................................................
Managing Configuration Sets166................................................................................................................................................................
Scheduling Jobs167................................................................................................................................................................
Backing Up And Restoring Files168................................................................................................................................................................
Creating Backup Files169................................................................................................................................................................
Transferring Backup Files170................................................................................................................................................................
Restoring Files From Locally Stored Backup Files172................................................................................................................................................................
Managing Nokia Ipso Images173................................................................................................................................................................
Changing Current Image173................................................................................................................................................................
Deleting Images173................................................................................................................................................................
Installing New Images174................................................................................................................................................................
Testing A New Image175................................................................................................................................................................
Upgrading Nokia Ipso Images For A Cluster176................................................................................................................................................................
Downgrading Nokia Ipso Images176................................................................................................................................................................
Configuring Monitor Reports177................................................................................................................................................................
Managing Packages178................................................................................................................................................................
Installing And Enabling Packages178................................................................................................................................................................
Advanced System Tuning180................................................................................................................................................................
Tuning The Tcp/ip Stack180................................................................................................................................................................
Router Alert Ip Option181................................................................................................................................................................
Virtual Router Redundancy Protocol (vrrp)183................................................................................................................................................................
Vrrp Overview183................................................................................................................................................................
How Vrrp Works183................................................................................................................................................................
Understanding Monitored-circuit Vrrp186................................................................................................................................................................
Configuring Vrrp186................................................................................................................................................................
Selecting Configuration Parameters187................................................................................................................................................................
Before You Begin191................................................................................................................................................................
Configuring Monitored-circuit Vrrp192................................................................................................................................................................
Configuring Vrrpv2196................................................................................................................................................................
Configuring Check Point Ngx For Vrrp197................................................................................................................................................................
Configuring Vrrp Rules For Check Point Ngx199................................................................................................................................................................
Link Aggregation (ip2250 Systems Only)201................................................................................................................................................................
Monitoring Vrrp201................................................................................................................................................................
Monitoring The Firewall State203................................................................................................................................................................
Troubleshooting Vrrp203................................................................................................................................................................
General Configuration Considerations203................................................................................................................................................................
Firewall Policies204................................................................................................................................................................
Access Control Lists204................................................................................................................................................................
Switched Environments205................................................................................................................................................................
Configuring Clustering207................................................................................................................................................................
Ip Clustering Description207................................................................................................................................................................
Using Flash-based Platforms207................................................................................................................................................................
Example Cluster208................................................................................................................................................................
Cluster Management209................................................................................................................................................................
Cluster Terminology210................................................................................................................................................................
Clustering Modes212................................................................................................................................................................
Considerations For Clustering214................................................................................................................................................................
Protocol Network217................................................................................................................................................................
Upgrading Ipso In A Cluster217................................................................................................................................................................
For All Upgrades218................................................................................................................................................................
Upgrading From Ipso 3.7 Or Later218................................................................................................................................................................
Upgrading From Ipso 3.6218................................................................................................................................................................
Creating And Configuring A Cluster220................................................................................................................................................................
Configuration Overview220................................................................................................................................................................
Creating A Cluster220................................................................................................................................................................
Selecting The Cluster Mode221................................................................................................................................................................
Configuring The Work Assignment Method221................................................................................................................................................................
Configuring An Interface222................................................................................................................................................................
Configuring Firewall Monitoring223................................................................................................................................................................
Supporting Non-check Point Gateways And Clients223................................................................................................................................................................
Configuring Join-time Shared Features226................................................................................................................................................................
Making The Cluster Active229................................................................................................................................................................
Adding A Node To A Cluster229................................................................................................................................................................
Recommended Procedure230................................................................................................................................................................
Joining A System To A Cluster231................................................................................................................................................................
Managing A Cluster231................................................................................................................................................................
Using Cluster Voyager232................................................................................................................................................................
Synchronizing The Time On Cluster Nodes239................................................................................................................................................................
Configuring Ntp240................................................................................................................................................................
Configuring Ngx For Clustering241................................................................................................................................................................
Clustering Example (three Nodes)243................................................................................................................................................................
Configuring The Cluster In Voyager244................................................................................................................................................................
Configuring The Internal And External Routers245................................................................................................................................................................
Clustering Example With Non-check Point Vpn246................................................................................................................................................................
Configuring Snmp249................................................................................................................................................................
Snmp Overview249................................................................................................................................................................
Snmp Proxy Support For Check Point Mib252................................................................................................................................................................
Using The Check Point Mib253................................................................................................................................................................
Using Cpsnmp_start253................................................................................................................................................................
Enabling Snmp And Selecting The Version254................................................................................................................................................................
Configuring The System For Snmp255................................................................................................................................................................
Setting An Agent Address255................................................................................................................................................................
Configuring Traps256................................................................................................................................................................
Interpreting Error Messages260................................................................................................................................................................
Configuring Snmpv3262................................................................................................................................................................
Request Messages263................................................................................................................................................................
Managing Snmp Users263................................................................................................................................................................
Configuring Ipv6267................................................................................................................................................................
Ipv6 Overview267................................................................................................................................................................
Interfaces268................................................................................................................................................................
Ipv6 And Ipv4 Compatibility270................................................................................................................................................................
Configuring Ipv6 In Ipv4 Tunnels270................................................................................................................................................................
Configuring Ipv6 To Ipv4271................................................................................................................................................................
Configuring Ipv6 Over Ipv4271................................................................................................................................................................
Configuring Ipv4 In Ipv6 Tunnels272................................................................................................................................................................
Configuring An Ipv6 Default Or Static Route272................................................................................................................................................................
Routing Configuration273................................................................................................................................................................
Configuring Ospfv3273................................................................................................................................................................
Configuring Ripng273................................................................................................................................................................
Creating Ipv6 Aggregate Routes273................................................................................................................................................................
Creating Redistributed Routes274................................................................................................................................................................
Router Discovery275................................................................................................................................................................
Configuring Icmpv6 Router Discovery275................................................................................................................................................................
Vrrp For Ipv6277................................................................................................................................................................
Configuring Vrrp For Ipv6277................................................................................................................................................................
Using Vrrpv3278................................................................................................................................................................
Router Addresses Using Vrrpv3278................................................................................................................................................................
Setting A Virtual Mac Address For A Virtual Router280................................................................................................................................................................
Changing The Ip Address List Of A Virtual Router In Vrrpv3281................................................................................................................................................................
Removing A Virtual Router In Vrrpv3281................................................................................................................................................................
Creating A Virtual Router In Monitored Circuit Mode For Ipv6282................................................................................................................................................................
Virtual Router For Ipv6283................................................................................................................................................................
Traffic Management284................................................................................................................................................................
Security And Access Configuration285................................................................................................................................................................
Managing Security And Access287................................................................................................................................................................
Managing Passwords287................................................................................................................................................................
Managing User Accounts288................................................................................................................................................................
Adding And Deleting Users289................................................................................................................................................................
Managing And Using S/key290................................................................................................................................................................
Managing Groups292................................................................................................................................................................
Role-based Administration293................................................................................................................................................................
Managing Roles294................................................................................................................................................................
Assigning Roles And Access Mechanisms To Users295................................................................................................................................................................
Creating Cluster Administrator Users296................................................................................................................................................................
Configuring Network Access And Services297................................................................................................................................................................
Configuring A Modem On Com2, Com3, Or Com4298................................................................................................................................................................
Configuring Nokia Network Voyager Access300................................................................................................................................................................
Configuring Basic Nokia Network Voyager Options301................................................................................................................................................................
Generating And Installing Ssl/tls Certificates302................................................................................................................................................................
Secure Shell (ssh)304................................................................................................................................................................
Initial Ssh Configuration305................................................................................................................................................................
Configuring Advanced Options For Ssh306................................................................................................................................................................
Configuring Secure Shell Authorized Keys308................................................................................................................................................................
Changing Secure Shell Key Pairs309................................................................................................................................................................
Managing User Rsa And Dsa Identities310................................................................................................................................................................
Tunneling Http Over Ssh311................................................................................................................................................................
Network Voyager Session Management311................................................................................................................................................................
Enabling Enabling Or Disabling Session Management312................................................................................................................................................................
Configuring Session Timeouts312................................................................................................................................................................
Authentication, Authorization, And Accounting (aaa)313................................................................................................................................................................
Creating An Aaa Configuration313................................................................................................................................................................
Configuring Radius319................................................................................................................................................................
Configuring Tacacs321................................................................................................................................................................
Deleting An Aaa Authentication Server Configuration322................................................................................................................................................................
Changing An Aaa Configuration323................................................................................................................................................................
Deleting An Aaa Configuration327................................................................................................................................................................
Encryption Acceleration327................................................................................................................................................................
Enabling Encryption Accelerator Cards328................................................................................................................................................................
Monitoring Cryptographic Acceleration328................................................................................................................................................................
Ipsec Tunnels (ipso Implementation)328................................................................................................................................................................
Using Pki332................................................................................................................................................................
Ipsec Implementation In Ipso332................................................................................................................................................................
Ipsec Parameters334................................................................................................................................................................
Creating An Ipsec Policy335................................................................................................................................................................
Creating An Ipsec Tunnel Rule341................................................................................................................................................................
Transport Rule342................................................................................................................................................................
Ipsec Tunnel Rule Example344................................................................................................................................................................
Ipsec Transport Rule Example346................................................................................................................................................................
Endpoint Of An Ipsec Tunnel348................................................................................................................................................................
Removing An Ipsec Tunnel348................................................................................................................................................................
Miscellaneous Security Settings349................................................................................................................................................................
Configuring Routing351................................................................................................................................................................
Routing Overview351................................................................................................................................................................
Routing Protocols351................................................................................................................................................................
Route Maps353................................................................................................................................................................
Ospf353................................................................................................................................................................
Types Of Areas354................................................................................................................................................................
Area Border Routers355................................................................................................................................................................
High Availability Support For Ospf355................................................................................................................................................................
Configuring Ospf356................................................................................................................................................................
Virtual Ip Address Support For Vrrp366................................................................................................................................................................
Configuring Rip367................................................................................................................................................................
Configuring Rip Timers368................................................................................................................................................................
Configuring Auto-summarization369................................................................................................................................................................
Rip Example369................................................................................................................................................................
Configuring Virtual Ip Support For Vrrp371................................................................................................................................................................
Pim Support For Ip Clustering371................................................................................................................................................................
Configuring Dense-mode Pim373................................................................................................................................................................
Disabling Pim374................................................................................................................................................................
Setting Advanced Options For Dense-mode Pim (optional)375................................................................................................................................................................
Configuring Sparse-mode Pim376................................................................................................................................................................
Configuring High-availability Mode377................................................................................................................................................................
Candidate Rendezvous Point379................................................................................................................................................................
Configuring A Pim-sm Static Rendezvous Point380................................................................................................................................................................
Setting Advanced Options For Sparse-mode Pim (optional)381................................................................................................................................................................
Debugging Pim383................................................................................................................................................................
Igrp385................................................................................................................................................................
Generation Of Exterior Routes387................................................................................................................................................................
Aliased Interfaces388................................................................................................................................................................
Igrp Aggregation388................................................................................................................................................................
Configuring Igrp388................................................................................................................................................................
Dvmrp390................................................................................................................................................................
Configuring Dvmrp391................................................................................................................................................................
Configuring Dvmrp Timers391................................................................................................................................................................
Igmp392................................................................................................................................................................
Configuring Igmp393................................................................................................................................................................
Static Routes394................................................................................................................................................................
Adding And Managing Static Routes Example397................................................................................................................................................................
Backup Static Routes398................................................................................................................................................................
Route Aggregation398................................................................................................................................................................
Route Aggregation Example400................................................................................................................................................................
Route Rank401................................................................................................................................................................
Rank Assignments401................................................................................................................................................................
Routing Protocol Rank Example402................................................................................................................................................................
Support For Bgp-4403................................................................................................................................................................
Bgp Sessions (internal And External)404................................................................................................................................................................
Bgp Path Attributes404................................................................................................................................................................
Bgp Multi-exit Discriminator406................................................................................................................................................................
Bgp Interactions With Igps406................................................................................................................................................................
Inbound Bgp Route Filters407................................................................................................................................................................
Redistributing Routes To Bgp407................................................................................................................................................................
Communities407................................................................................................................................................................
Route Reflection408................................................................................................................................................................
Confederations409................................................................................................................................................................
Ebgp Multihop Support410................................................................................................................................................................
Route Dampening411................................................................................................................................................................
Tcp Md5 Authentication411................................................................................................................................................................
Bgp Support For Virtual Ip For Vrrp412................................................................................................................................................................
Bgp Support For Ip Clustering413................................................................................................................................................................
Bgp Memory Requirements413................................................................................................................................................................
Bgp Neighbors Example415................................................................................................................................................................
Path Filtering Based On Communities Example418................................................................................................................................................................
Bgp Multi Exit Discriminator Example419................................................................................................................................................................
Changing The Local Preference Value Example421................................................................................................................................................................
Bgp Confederation Example423................................................................................................................................................................
Route Reflector Example426................................................................................................................................................................
Bgp Community Example428................................................................................................................................................................
Ebgp Load Balancing Example: Scenario #1430................................................................................................................................................................
Ebgp Load Balancing Example: Scenario #2432................................................................................................................................................................
Adjusting Bgp Timers Example433................................................................................................................................................................
Tcp Md5 Authentication Example434................................................................................................................................................................
Bgp Route Dampening Example435................................................................................................................................................................
Bgp Path Selection436................................................................................................................................................................
Bgp-4++ Example436................................................................................................................................................................
Route Redistribution438................................................................................................................................................................
Redistributing Routes To Rip And Igrp440................................................................................................................................................................
Redistributing Ospf To Bgp Example443................................................................................................................................................................
Redistributing Routes With Ospf444................................................................................................................................................................
Inbound Route Filters445................................................................................................................................................................
Bgp Route Inbound Policy Example446................................................................................................................................................................
Bgp As Path Filtering Example448................................................................................................................................................................
Configuring Traffic Management449................................................................................................................................................................
Traffic Management Overview449................................................................................................................................................................
Packet Filtering Description449................................................................................................................................................................
Traffic Shaping Description449................................................................................................................................................................
Traffic Queuing Description450................................................................................................................................................................
Configuring Access Control Lists450................................................................................................................................................................
Configuring Acl Rules452................................................................................................................................................................
Modifying A Rule453................................................................................................................................................................
Configuring Aggregation Classes455................................................................................................................................................................
Configuring Queue Classes457................................................................................................................................................................
Configuring Atm Qos459................................................................................................................................................................
Configuring Common Open Policy Server461................................................................................................................................................................
Configuring A Cops Client Id And Policy Decision Point462................................................................................................................................................................
Configuring Security Parameters For A Cops Client Id462................................................................................................................................................................
Assigning Roles To Specific Interfaces463................................................................................................................................................................
Activating And Deactivating The Cops Client464................................................................................................................................................................
Configuration464................................................................................................................................................................
Deleting A Client Id464................................................................................................................................................................
Example: Rate Shaping465................................................................................................................................................................
Example: Expedited Forwarding466................................................................................................................................................................
Configuring Router Services469................................................................................................................................................................
Bootp/dhcp Relay469................................................................................................................................................................
Configuring Bootp/dhcp Relay470................................................................................................................................................................
Ip Broadcast Helper471................................................................................................................................................................
Router Discovery Overview473................................................................................................................................................................
Configuring Router Discovery473................................................................................................................................................................
Network Time Protocol (ntp)475................................................................................................................................................................
Monitoring System Configuration And Hardware479................................................................................................................................................................
Viewing System Utilization Statistics479................................................................................................................................................................
Cpu-memory Live Utilization479................................................................................................................................................................
Disk And Swap Space480................................................................................................................................................................
Monitoring Process Utilization480................................................................................................................................................................
Ipso Process Management481................................................................................................................................................................
Generating Monitor Reports482................................................................................................................................................................
Monitoring System Health483................................................................................................................................................................
Monitoring System Logs484................................................................................................................................................................
Viewing Cluster Status And Members485................................................................................................................................................................
Viewing Routing Protocol Information486................................................................................................................................................................
Displaying The Kernel Forwarding Table486................................................................................................................................................................
Displaying Route Settings486................................................................................................................................................................
Displaying Interface Settings487................................................................................................................................................................
Hardware Monitoring487................................................................................................................................................................
Using The Iclid Tool488................................................................................................................................................................
Iclid Commands488................................................................................................................................................................
Preventing Full Log Buffers And Related Console Messages494................................................................................................................................................................
Index497................................................................................................................................................................

Advertising

Share and save

Advertising