Enterasys Networks Security Router X Peditiontm Users Manual UserGuide
X-PeditionTM to the manual b344a643-8e5a-40cd-b181-32d076304bf0
2015-02-04
: Enterasys-Networks Enterasys-Networks-Security-Router-X-Peditiontm-Users-Manual-366769 enterasys-networks-security-router-x-peditiontm-users-manual-366769 enterasys-networks pdf
Open the PDF directly: View PDF 
Page Count: 466 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- X-Pedition™ Security Router XSR User's Guide
 - Preface
 - Overview
 - Managing the XSR
- Utilizing the Command Line Interface
- Connecting via the Console Port on XSR Series
 - Connecting via Telnet
 - Connecting via SSH
 - Accessing the Initial Prompt
 - Synchronizing the Clock
 - Managing the Session
 - Remote Auto Install
 - CLI Editing Rules
 - Setting CLI Configuration Modes
 - Global Configuration Mode
 - Exiting From the Current Mode
 - Mode Examples
 - Observing Command Syntax and Conventions
 - Describing Ports and Interfaces
 - Numbering XSR Slots, Cards, and Ports
 - Setting Interface Type and Numbering
 - Entering Commands that Control Tables
 - Managing XSR Interfaces
 - Managing Message Logs
 - Performing Fault Management
 - Using the Real-Time Clock
 - Managing the System Configuration
 - Resetting the Configuration to Factory Default
 - Configuration Save Options
 - Bulk Configuration Management
 - Managing the Software Image
 - Displaying System Status and Statistics
 
 - Memory Management
 - Network Management through SNMP
 - Accessing the XSR Through the Web
 - Network Management Tools
 
 - Utilizing the Command Line Interface
 - Managing LAN/WAN Interfaces
 - Configuring T1/E1 & T3/E3 Interfaces
 - Configuring IP
- Overview
 - General IP Features
 - IP Routing Protocols
- RIPv1 and v2
 - Triggered-on-Demand RIP
 - OSPF
 - OSPF Troubleshooting
 - Null Interface
 - Route Preference
 - Static Routes
 - VLAN Routing
 - Policy Based Routing
 - Default Network
 - Classless Inter-Domain Routing (CIDR)
 - Router ID
 - Real Time Protocol (RTP) Header Compression
 - Network Address Translation
 - Virtual Router Redundancy Protocol
 - VRRP Features
 - Equal-Cost Multi-Path (ECMP)
 
 - Configuring RIP Examples
 - Configuring Unnumbered IP Serial Interface Example
 - Configuring OSPF Example
 - Configuring NAT Examples
 - Configuring Policy Based Routing Example
 - Configuring VRRP Example
 - Configuring VLAN Examples
 
 - Configuring the Border Gateway Protocol
- Features
 - Overview
- Describing BGP Messages
 - Defining BGP Path Attributes
 - BGP Path Selection Process
 - BGP Routing Policy
 - Initial BGP Configuration
 - Adding BGP Neighbors
 - Resetting BGP Connections
 - Synchronization
 - Address Aggregation
 - Route Flap Dampening
 - Capability Advertisement
 - Route Refresh
 - Scaling BGP
 - Displaying System and Network Statistics
 
 - Configuring BGP Route Maps
 - Configuring BGP Peer Groups
 
 - Configuring PIM-SM and IGMP
- Features
 - IP Multicast Overview
 - Describing the XSR’s IP Multicast Features
 - Describing the XSR’s PIM-SM v2 Features
- Phase 1: Building a Shared Tree
 - Phase 2: Building Shortest Path Tree Between Sender & RP
 - Phase 3: Building Shortest Path Tree Between Sender & Receiver
 - Neighbor Discovery and DR Election
 - PIM Register Message
 - PIM Join/Prune Message
 - Bootstrap & Rendezvous Point
 - Assert Processing
 - Source-Specific Multicast
 - PIM SM over Frame Relay
 
 - PIM Configuration Examples
 
 - Configuring PPP
- Overview
 - PPP Features
 - Configuring PPP with a Dialed Backup Line
 - Configuring a Synchronous Serial Interface
 - Configuring a Dialed Backup Line
 - Configuring MLPPP on a Multilink/Dialer interface
 - Configuring BAP
 
 - Configuring Frame Relay
 - Configuring Dialer Services
- Overview of Dial Services
 - Asynchronous and Synchronous Support
 - Implementing Dial Services
 - Overview of Dial Backup
 - Sequence of Backup Events
 - Link Failure Backup Example
 - Configuring a Dialed Backup Line
 - Overview of Dial on Demand/Bandwidth on Demand
 - Dialer Interface Spoofing
 - Dialer Watch
 - Answering Incoming ISDN Calls
 - Configuring DoD/BoD
- PPP Point-to-Multipoint Configuration
 - PPP Multipoint-to-Multipoint Configuration
 - PPP Point-to-Point Configurations
 - PPP Point-to-Multipoint Configurations
 - MLPPP Point-to-Multipoint Configuration
 - MLPPP Point-to-Point Configurations
 - MLPPP Point-to-Multipoint Configurations
 - MLPPP Multipoint-to-Multipoint Configuration
 
 - Switched PPP Multilink Configuration
 - Backup Configuration
 
 - Configuring Integrated Services Digital Network
 - Configuring Quality of Service
- Overview
 - Mechanisms Providing QoS
- Traffic Classification
 - Queuing and Services
 - Describing Traffic Policing
 - Class-based Traffic Shaping
 - Traffic Shaping per Policy-Map
 - Differences Between Traffic Policing and Traffic Shaping
 - Traffic Shaping and Queue Limit
 - Congestion Control & Avoidance
 - Configuration per Interface
 - Suggestions for Using QoS on the XSR
 
 - QoS and Link Fragmentation and Interleaving (LFI)
 - QoS with VLAN
 - QoS on Input
 - QoS on VPN
 - QoS Policy Configuration Examples
 
 - Configuring ADSL
 - Configuring the Virtual Private Network
- VPN Overview
 - Ensuring VPN Security with IPSec/IKE/GRE
 - Describing Public-Key Infrastructure (PKI)
 - DF Bit Functionality
 - VPN Applications
 - XSR VPN Features
 - VPN Configuration Overview
 - Configuring a Simple VPN Site-to-Site Application
 - Configuring the VPN Using EZ-IPSec
 - Configuration Examples
 - Interoperability Profile for the XSR
 
 - Configuring DHCP
 - Configuring Security on the XSR
- Features
 - General Security Precautions
 - AAA Services
 - Firewall Feature Set Overview
 - XSR Firewall Feature Set Functionality
 - Firewall CLI Commands
 - Firewall Limitations
 - Pre-configuring the Firewall
 - Steps to Configure the Firewall
 - Configuration Examples
 
 - Alarms/Events, System Limits, and Standard ASCII Table
 - XSR SNMP Proprietary and Associated Standard MIBs
- Service Level Reporting MIB Tables
 - BGP v4 MIB Tables
 - Firewall MIB Tables
 - VPN MIB Tables
- etsysVpnIkePeer Table
 - etsysVpnIkePeerProposals Table
 - etsysVpnIkeProposal Table
 - etsysVpnIpsecPolicy Table
 - etsysVpnIntfPolicy Table
 - etsysVpnIpsecPolicyRule Table
 - etsysVpnIpsecPolProposals Table
 - etsysVpnIpsecProposal Table
 - etsysVpnIpsecPropTransforms Table
 - etsysVpnAhTransform Table
 - etsysVpnEspTransform Table
 - etsysVpnIpcompTransform Table
 
 - ipCidrRouteTable for Static Routes
 - Host Resources MIB Objects
 - Enterasys Configuration Management MIB
 - Enterasys Configuration Change MIB
 - Enterasys SNMP Persistence MIB
 - Enterasys Syslog Client MIB