Enterasys Networks Security Router X Peditiontm Users Manual UserGuide
X-PeditionTM to the manual b344a643-8e5a-40cd-b181-32d076304bf0
2015-02-04
: Enterasys-Networks Enterasys-Networks-Security-Router-X-Peditiontm-Users-Manual-366769 enterasys-networks-security-router-x-peditiontm-users-manual-366769 enterasys-networks pdf
Open the PDF directly: View PDF
Page Count: 466 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- X-Pedition™ Security Router XSR User's Guide
- Preface
- Overview
- Managing the XSR
- Utilizing the Command Line Interface
- Connecting via the Console Port on XSR Series
- Connecting via Telnet
- Connecting via SSH
- Accessing the Initial Prompt
- Synchronizing the Clock
- Managing the Session
- Remote Auto Install
- CLI Editing Rules
- Setting CLI Configuration Modes
- Global Configuration Mode
- Exiting From the Current Mode
- Mode Examples
- Observing Command Syntax and Conventions
- Describing Ports and Interfaces
- Numbering XSR Slots, Cards, and Ports
- Setting Interface Type and Numbering
- Entering Commands that Control Tables
- Managing XSR Interfaces
- Managing Message Logs
- Performing Fault Management
- Using the Real-Time Clock
- Managing the System Configuration
- Resetting the Configuration to Factory Default
- Configuration Save Options
- Bulk Configuration Management
- Managing the Software Image
- Displaying System Status and Statistics
- Memory Management
- Network Management through SNMP
- Accessing the XSR Through the Web
- Network Management Tools
- Utilizing the Command Line Interface
- Managing LAN/WAN Interfaces
- Configuring T1/E1 & T3/E3 Interfaces
- Configuring IP
- Overview
- General IP Features
- IP Routing Protocols
- RIPv1 and v2
- Triggered-on-Demand RIP
- OSPF
- OSPF Troubleshooting
- Null Interface
- Route Preference
- Static Routes
- VLAN Routing
- Policy Based Routing
- Default Network
- Classless Inter-Domain Routing (CIDR)
- Router ID
- Real Time Protocol (RTP) Header Compression
- Network Address Translation
- Virtual Router Redundancy Protocol
- VRRP Features
- Equal-Cost Multi-Path (ECMP)
- Configuring RIP Examples
- Configuring Unnumbered IP Serial Interface Example
- Configuring OSPF Example
- Configuring NAT Examples
- Configuring Policy Based Routing Example
- Configuring VRRP Example
- Configuring VLAN Examples
- Configuring the Border Gateway Protocol
- Features
- Overview
- Describing BGP Messages
- Defining BGP Path Attributes
- BGP Path Selection Process
- BGP Routing Policy
- Initial BGP Configuration
- Adding BGP Neighbors
- Resetting BGP Connections
- Synchronization
- Address Aggregation
- Route Flap Dampening
- Capability Advertisement
- Route Refresh
- Scaling BGP
- Displaying System and Network Statistics
- Configuring BGP Route Maps
- Configuring BGP Peer Groups
- Configuring PIM-SM and IGMP
- Features
- IP Multicast Overview
- Describing the XSR’s IP Multicast Features
- Describing the XSR’s PIM-SM v2 Features
- Phase 1: Building a Shared Tree
- Phase 2: Building Shortest Path Tree Between Sender & RP
- Phase 3: Building Shortest Path Tree Between Sender & Receiver
- Neighbor Discovery and DR Election
- PIM Register Message
- PIM Join/Prune Message
- Bootstrap & Rendezvous Point
- Assert Processing
- Source-Specific Multicast
- PIM SM over Frame Relay
- PIM Configuration Examples
- Configuring PPP
- Overview
- PPP Features
- Configuring PPP with a Dialed Backup Line
- Configuring a Synchronous Serial Interface
- Configuring a Dialed Backup Line
- Configuring MLPPP on a Multilink/Dialer interface
- Configuring BAP
- Configuring Frame Relay
- Configuring Dialer Services
- Overview of Dial Services
- Asynchronous and Synchronous Support
- Implementing Dial Services
- Overview of Dial Backup
- Sequence of Backup Events
- Link Failure Backup Example
- Configuring a Dialed Backup Line
- Overview of Dial on Demand/Bandwidth on Demand
- Dialer Interface Spoofing
- Dialer Watch
- Answering Incoming ISDN Calls
- Configuring DoD/BoD
- PPP Point-to-Multipoint Configuration
- PPP Multipoint-to-Multipoint Configuration
- PPP Point-to-Point Configurations
- PPP Point-to-Multipoint Configurations
- MLPPP Point-to-Multipoint Configuration
- MLPPP Point-to-Point Configurations
- MLPPP Point-to-Multipoint Configurations
- MLPPP Multipoint-to-Multipoint Configuration
- Switched PPP Multilink Configuration
- Backup Configuration
- Configuring Integrated Services Digital Network
- Configuring Quality of Service
- Overview
- Mechanisms Providing QoS
- Traffic Classification
- Queuing and Services
- Describing Traffic Policing
- Class-based Traffic Shaping
- Traffic Shaping per Policy-Map
- Differences Between Traffic Policing and Traffic Shaping
- Traffic Shaping and Queue Limit
- Congestion Control & Avoidance
- Configuration per Interface
- Suggestions for Using QoS on the XSR
- QoS and Link Fragmentation and Interleaving (LFI)
- QoS with VLAN
- QoS on Input
- QoS on VPN
- QoS Policy Configuration Examples
- Configuring ADSL
- Configuring the Virtual Private Network
- VPN Overview
- Ensuring VPN Security with IPSec/IKE/GRE
- Describing Public-Key Infrastructure (PKI)
- DF Bit Functionality
- VPN Applications
- XSR VPN Features
- VPN Configuration Overview
- Configuring a Simple VPN Site-to-Site Application
- Configuring the VPN Using EZ-IPSec
- Configuration Examples
- Interoperability Profile for the XSR
- Configuring DHCP
- Configuring Security on the XSR
- Features
- General Security Precautions
- AAA Services
- Firewall Feature Set Overview
- XSR Firewall Feature Set Functionality
- Firewall CLI Commands
- Firewall Limitations
- Pre-configuring the Firewall
- Steps to Configure the Firewall
- Configuration Examples
- Alarms/Events, System Limits, and Standard ASCII Table
- XSR SNMP Proprietary and Associated Standard MIBs
- Service Level Reporting MIB Tables
- BGP v4 MIB Tables
- Firewall MIB Tables
- VPN MIB Tables
- etsysVpnIkePeer Table
- etsysVpnIkePeerProposals Table
- etsysVpnIkeProposal Table
- etsysVpnIpsecPolicy Table
- etsysVpnIntfPolicy Table
- etsysVpnIpsecPolicyRule Table
- etsysVpnIpsecPolProposals Table
- etsysVpnIpsecProposal Table
- etsysVpnIpsecPropTransforms Table
- etsysVpnAhTransform Table
- etsysVpnEspTransform Table
- etsysVpnIpcompTransform Table
- ipCidrRouteTable for Static Routes
- Host Resources MIB Objects
- Enterasys Configuration Management MIB
- Enterasys Configuration Change MIB
- Enterasys SNMP Persistence MIB
- Enterasys Syslog Client MIB