Enterasys Networks Security Router X Peditiontm Users Manual UserGuide
X-PeditionTM to the manual b344a643-8e5a-40cd-b181-32d076304bf0
2015-02-04
: Enterasys-Networks Enterasys-Networks-Security-Router-X-Peditiontm-Users-Manual-366769 enterasys-networks-security-router-x-peditiontm-users-manual-366769 enterasys-networks pdf
Open the PDF directly: View PDF .
Page Count: 466
Download | |
Open PDF In Browser | View PDF |
X-Pedition™ Security Router XSR User’s Guide Version 7.6 P/N 9033837-09 Electrical Hazard: Only qualified personnel should perform installation procedures. Riesgo Electrico: Solamente personal calificado debe realizar procedimientos de instalacion. Elektrischer Gefahrenhinweis: Installationen sollten nur durch ausgebildetes und qualifiziertes Personal vorgenommen werden. Notice Enterasys Networks reserves the right to make changes in specifications and other information contained in this document and its web site without prior notice. The reader should in all cases consult Enterasys Networks to determine whether any such changes have been made. The hardware, firmware, or software described in this document is subject to change without notice. IN NO EVENT SHALL ENTERASYS NETWORKS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS DOCUMENT, WEB SITE, OR THE INFORMATION CONTAINED IN THEM, EVEN IF ENTERASYS NETWORKS HAS BEEN ADVISED OF, KNEW OF, OR SHOULD HAVE KNOWN OF, THE POSSIBILITY OF SUCH DAMAGES. Enterasys Networks, Inc. 50 Minuteman Road Andover, MA 01810 © 2005 Enterasys Networks, Inc. All rights reserved. Part Number: 9033837‐09 September 2005 ENTERASYS NETWORKS, ENTERASYS XSR, and any logos associated therewith, are trademarks or registered trademarks of Enterasys Networks, Inc. in the United States and other countries. All other product names mentioned in this manual may be trademarks or registered trademarks of their respective owners. Documentation URL: http://www.enterasys.com/support/manuals Documentacion URL: http://www.enterasys.com/support/manuals Dokumentation URL: http://www.enterasys.com/support/manuals i Regulatory Compliance Information Federal Communications Commission (FCC) Notice The XSR complies with Title 47, Part 15, Class A of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operation. NOTE: The XSR has been tested and found to comply with the limits for a class A digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the XSR is operated in a commercial environment. This XSR uses, generates, and can radiate radio frequency energy and if not installed in accordance with the operator’s manual, may cause harmful interference to radio communications. Operation of the XSR in a residential area is likely to cause interference in which case you will be required to correct the interference at your own expense. WARNING: Modifications or changes made to the XSR, and not approved by Enterasys Networks may void the authority granted by the FCC or other such agency to operate the XSR. The XSR complies with Part 68 of the FCC rules and the requirements adopted by the Administrative Council for Terminal Attachments (ACTA). A label on the circuit board of the Network Interface Module contains, among other information, a product identifier in the format listed in the following table. If requested, this number must be provided to the telephone company. Product Product Identifier NIM-T1/E1-xx, NIM-CT1E1/PRI-xx US: 5N5DENANET1 NIM-BRI-U-xx US: 5N5DENANEBU NIM-ADSL-AC-xx US: 5N5DL02NEAA NIM-DIRELAY-xx US: 5N5DENANEDI NIM-TE1-xx, NIM-CTE1-PRI-xx US: 5N5DENANECT A plug and jack used to connect the XSR to the premises wiring and telephone network must comply with the applicable FCC Part 68 rules and requirements adopted by ACTA. Refer to the following table and installation instructions for details. Product Jack Used NIM-T1/E1-xx, NIM-CT1E1/PRI-xx, RJ48C NIM-DIRELAY-xx, NIM-TE1-xx, NIM-CTE1-PRI-xx NIM-BRI-U-xx RJ49C NIM-ADSL-AC-xx RJ11C Codes applicable to this equipment: Product Facilities Interface Code (FIC) Service Order Code (SOC) NIM-T1/E1-xx, NIM-CT1E1/PRI-xx, 04DU9.BN, 04DU9.DN, 04DU9.1KN, 04DU9.1SN NIM-DIRELAY-xx, NIM-TE1-xx, NIM-CTE1-PRI-xx 6.0N NIM-BRI-U-xx 02IS5 6.0N NIM-ADSL-AC-xx 02LS2 7.0Y If the XSR harms the telephone network, the telephone company will notify you in advance that it may need to temporarily discontinue service. But if advance notice is not practical, the telephone company will notify you as soon as possible. Also, you will be advised of your right to file a complaint with the FCC if you believe it is necessary. The telephone company may make changes in its facilities, equipment, operations, or procedures that could affect the operation of the XSR. If this happens, the telephone company will provide advance notice for you to make necessary modifications and maintain uninterrupted service. If you experience trouble with the XSR, for repair or warranty information, please contact Enterasys Networks, Inc., at 978‐684‐ 1000. If the XSR is causing harm to the telephone network, the telephone company may request that you disconnect the equipment until the problem is solved. The XSR is not intended to be repaired by the customer. ii Industry Canada Notices This digital apparatus does not exceed the class A limits for radio noise emissions from digital apparatus set out in the Radio Interference Regulations of the Canadian Department of Communications. Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de la class A prescrites dans le Règlement sur le brouillage radioélectrique édicté par le ministère des Communications du Canada. Equipment Attachments Limitations “NOTICE: The Industry Canada label identifies certified equipment. This certification means that the equipment meets telecommunications network protective, operational and safety requirements as prescribed in the appropriate Terminal Equipment Technical Requirements document(s). The department does not guarantee the equipment will operate to the userʹs satisfaction. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations. Repairs to certified equipment should be coordinated by a representative designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment. Users should ensure for their own protection that the electrical ground connections of the power utility, telephone lines and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas. Caution: Users should not attempt to make such connections themselves, but should contact the appropriate electric inspection authority, or electrician, as appropriate.” “NOTICE: The Ringer Equivalence Number (REN) assigned to each terminal device provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the ringer equivalence Numbers of all the devices does not exceed 5.ʺ R & TTE Directive Declaration Hereby, Enterasys Networks, Inc. declares that this XSR‐1850 X‐Pedition Security Router is compliant with essential requirements and other relevant provisions of Directive 1999/5/EC. Class A ITE Notice WARNING: This is a Class A product. In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures. Clase A. Aviso de ITE ADVERTENCIA: Este es un producto de Clase A. En un ambiente doméstico este producto puede causar interferencia de radio en cuyo caso puede ser requerido tomar medidas adecuadas. Klasse A ITE Anmerkung WARNHINWEIS: Dieses Produkt zählt zur Klasse A ( Industriebereich ). In Wohnbereichen kann es hierdurch zu Funkstörungen kommen, daher sollten angemessene Vorkehrungen zum Schutz getroffen werden. Product Safety This product complies with the following: UL 60950, CSA C22.2 No. 60950, 73/23/EEC, EN 60950, EN 60825, IEC 60950. Use the XSR with the Advanced Power Solutions (APS61ES‐30) power supply included with the branch router. Enterasys Networks strongly recommends that you use only the proper type of power supply cord set for the XSR. It should be a detachable type, UL listed/CSA certified, type SJ or SJT, rated 250 V minimum, 7 amp with grounding‐type attachment plug. Maximum length is 15 feet (4.5 meters). The cord set should have the appropriate safety approval for the country in which the equipment will be installed. Seguridad del Producto El producto de Enterasys cumple con lo siguiente: UL 60950, CSA C22.2 No. 60950, 73/23/EEC, EN 60950, EN 60825, IEC 60950. Produktsicherheit Dieses Produkt entspricht den folgenden Richtlinien: UL 60950, CSA C22.2 No. 60950, 73/23/EEC, EN 60950, EN 60825, IEC 60950. iii Electromagnetic Compatibility (EMC) This product complies with the following: 47 CFR Parts 2 and 15, CSA C108.8, 89/336/EEC, EN 55022, EN 55024, EN 61000‐3‐2, EN 61000‐3‐3, AS/NZS CISPR 22, and VCCI V‐3. Compatibilidad Electromágnetica (EMC) Este producto de Enterasys cumple con lo siguiente: 47 CFR Partes 2 y 15, CSA C108.8, 89/336/EEC, EN 55022, EN 55024, EN 61000‐3‐2, EN 61000‐3‐3, AS/NZS CISPR 22, VCCI V‐3. Elektro- magnetische Kompatibilität ( EMC ) Dieses Produkt entspricht den folgenden Richtlinien: 47 CFR Parts 2 and 15, CSA C108.8, 89/336/EEC, EN 55022, EN 55024, EN 61000‐3‐2, EN 61000‐3‐3, AS/NZS CISPR 22, VCCI V‐3. European Waste Electrical and Electronic Equipment (WEEE) Notice In accordance with Directive 2002/96/EC of the European Parliament on waste electrical and electronic equipment (WEEE): 1. The symbol above indicates that separate collection of electrical and electronic equipment is required and that this product was placed on the European market after August 13, 2005, the date of enforcement for Directive 2002/96/EC. 2. When this product has reached the end of its serviceable life, it cannot be disposed of as unsorted municipal waste. It must be collected and treated separately. 3. It has been determined by the European Parliament that there are potential negative effects on the environment and human health as a result of the presence of hazardous substances in electrical and electronic equipment. 4. It is the users’ responsibility to utilize the available collection system to ensure WEEE is properly treated. For information about the available collection system, please go to http://www.enterasys.com/support/ or contact Enterasys Customer Support at 353 61 705586 (Ireland). VCCI Notice This is a class A product based on the standard of the Voluntary Control Council for Interference by Information Technology Equipment (VCCI) V‐3. If this equipment is used in a domestic environment, radio disturbance may arise. When such trouble occurs, the user may be required to take corrective actions. BSMI EMC Statement — Taiwan This is a class A product. In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures. iv Declaration of Conformity Application of Council Directive(s): Manufacturer’s Name: Manufacturer’s Address: European Representative Address: 89/336/EEC 73/23/EEC Enterasys Networks, Inc. 50 Minuteman Road Andover, MA 01810 USA Enterasys Networks, Ltd. Nexus House, Newbury Business Park London Road, Newbury Berkshire RG14 2PZ, England Conformance to Directive(s)/Product Standards: EC Directive 89/336/EEC EN 55022 EN 61000‐3‐2 EN 61000‐3‐3 EN 55024 EC Directive 73/23/EEC EN 60950 EN 60825 Equipment Type/Environment: Networking Equipment, for use in a Commercial or Light Industrial Environment. Enterasys Networks, Inc. declares that the equipment packaged with this notice conforms to the above directives. Australian Telecom N826 WARNING: Do not install phone line connections during an electrical storm. WARNING: Do not connect phone line until the interface has been configured through local management. The service provider may shut off service if an un‐configured interface is connected to the phone lines. WARNING: The NIM‐BRI‐ST cannot be connected directly to outside lines. An approved channel service unit (CSU) must be used for connection to the ISDN network. In some areas this CSU is supplied by the network provider and in others it must be supplied by the user. Contact your service provider for details. Federal Information Processing Standard (FIPS) Certification The XSR has been submitted to the National Institute of Standards and Technology (NIST) for FIPS 140‐2 certification and is now officially listed on the NIST pre‐validation list. For more information about the FIPS validation program, go to http:// csrc.nist.gov/cryptval/preval.htm. For the FIPS 140‐1 and 140‐2 Pre‐Validation List, click on the [PDF] link at the top of the page. v Independent Communications Authority of South Africa This product complies with the terms of the provisions of section 54(1) of the Telecommunications Act (Act 103 of 1996) and the Telecommunications Regulation prescribed under the Post Office Act (Act 44 of 1958). TE-2002/195 TE-2002/190 APPROVED APPROVED TE-2003/112 TE-2003/113 APPROVED APPROVED SS/366.01 APPROVED VPN Consortium Interoperability The VPN Consortium’s (VPNC) testing program is an important source for certification of conformance to IPSec standards. With rigorous interoperability testing, the VPNC logo program provides IPSec users even more assurance that the XSR will interoperate in typical business environments. VPNC is the only major IPSec testing organization that shows both proof of interoperability as well as the steps taken so that you can reproduce the tests. vi Enterasys Networks, Inc. Firmware License Agreement BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. This document is an agreement (“Agreement”) between the end user (“You”) and Enterasys Networks, Inc. on behalf of itself and its Affiliates (as hereinafter defined) (“Enterasys”) that sets forth Your rights and obligations with respect to the Enterasys software program/firmware installed on the Enterasys product (including any accompanying documentation, hardware or media) (“Program”) in the package and prevails over any additional, conflicting or inconsistent terms and conditions appearing on any purchase order or other document submitted by You. “Affiliate” means any person, partnership, corporation, limited liability company, or other form of enterprise that directly or indirectly through one or more intermediaries, controls, or is controlled by, or is under common control with the party specified. This Agreement constitutes the entire understanding between the parties, and supersedes all prior discussions, representations, understandings or agreements, whether oral or in writing, between the parties with respect to the subject matter of this Agreement. The Program may be contained in firmware, chips or other media. BY INSTALLING OR OTHERWISE USING THE PROGRAM, YOU REPRESENT THAT YOU ARE AUTHORIZED TO ACCEPT THESE TERMS ON BEHALF OF THE END USER (IF THE END USER IS AN ENTITY ON WHOSE BEHALF YOU ARE AUTHORIZED TO ACT, “YOU” AND “YOUR” SHALL BE DEEMED TO REFER TO SUCH ENTITY) AND THAT YOU AGREE THAT YOU ARE BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES, AMONG OTHER PROVISIONS, THE LICENSE, THE DISCLAIMER OF WARRANTY AND THE LIMITATION OF LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT OR ARE NOT AUTHORIZED TO ENTER INTO THIS AGREEMENT, ENTERASYS IS UNWILLING TO LICENSE THE PROGRAM TO YOU AND YOU AGREE TO RETURN THE UNOPENED PRODUCT TO ENTERASYS OR YOUR DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL REFUND. IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT ENTERASYS NETWORKS, LEGAL DEPARTMENT AT (978) 684‐1000. You and Enterasys agree as follows: 1. LICENSE. You have the non‐exclusive and non‐transferable right to use only the one (1) copy of the Program provided in this package subject to the terms and conditions of this Agreement. 2. RESTRICTIONS. Except as otherwise authorized in writing by Enterasys, You may not, nor may You permit any third party to: (i) Reverse engineer, decompile, disassemble or modify the Program, in whole or in part, including for reasons of error correction or interoperability, except to the extent expressly permitted by applicable law and to the extent the parties shall not be permitted by that applicable law, such rights are expressly excluded. Information necessary to achieve interoperability or correct errors is available from Enterasys upon request and upon payment of Enterasys’ applicable fee. (ii) Incorporate the Program, in whole or in part, in any other product or create derivative works based on the Program, in whole or in part. (iii) Publish, disclose, copy, reproduce or transmit the Program, in whole or in part. (iv) Assign, sell, license, sublicense, rent, lease, encumber by way of security interest, pledge or otherwise transfer the Program, in whole or in part. (v) Remove any copyright, trademark, proprietary rights, disclaimer or warning notice included on or embedded in any part of the Program. 3. APPLICABLE LAW. This Agreement shall be interpreted and governed under the laws and in the state and federal courts of the Commonwealth of Massachusetts without regard to its conflicts of laws provisions. You accept the personal jurisdiction and venue of the Commonwealth of Massachusetts courts. None of the 1980 United Nations Convention on Contracts for the International Sale of Goods, the United Nations Convention on the Limitation Period in the International Sale of Goods, and the Uniform Computer Information Transactions Act shall apply to this Agreement. vii 4. EXPORT RESTRICTIONS. You understand that Enterasys and its Affiliates are subject to regulation by agencies of the U.S. Government, including the U.S. Department of Commerce, which prohibit export or diversion of certain technical products to certain countries, unless a license to export the Program is obtained from the U.S. Government or an exception from obtaining such license may be relied upon by the exporting party. If the Program is exported from the United States pursuant to the License Exception CIV under the U.S. Export Administration Regulations, You agree that You are a civil end user of the Program and agree that You will use the Program for civil end uses only and not for military purposes. If the Program is exported from the United States pursuant to the License Exception TSR under the U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in Sections 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source code for the Program or technology to a national of a country in Country Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Bulgaria, Cambodia, Cuba, Estonia, Georgia, Iraq, Kazakhstan, Kyrgyzstan, Laos, Latvia, Libya, Lithuania, Moldova, North Korea, the People’s Republic of China, Romania, Russia, Rwanda, Tajikistan, Turkmenistan, Ukraine, Uzbekistan, Vietnam, or such other countries as may be designated by the United States Government), (ii) export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the technology, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a complete plant or any major component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S. Munitions List. 5. UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Program (i) was developed solely at private expense; (ii) contains “restricted computer software” submitted with restricted rights in accordance with section 52.227‐19 (a) through (d) of the Commercial Computer Software‐Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data belonging to Enterasys and/or its suppliers. For Department of Defense units, the Program is considered commercial computer software in accordance with DFARS section 227.7202‐3 and its successors, and use, duplication, or disclosure by the Government is subject to restrictions set forth herein. 6. DISCLAIMER OF WARRANTY. EXCEPT FOR THOSE WARRANTIES EXPRESSLY PROVIDED TO YOU IN WRITING BY Enterasys, Enterasys DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON‐ INFRINGEMENT WITH RESPECT TO THE PROGRAM. IF IMPLIED WARRANTIES MAY NOT BE DISCLAIMED BY APPLICABLE LAW, THEN ANY IMPLIED WARRANTIES ARE LIMITED IN DURATION TO THIRTY (30) DAYS AFTER DELIVERY OF THE PROGRAM TO YOU. 7. LIMITATION OF LIABILITY. IN NO EVENT SHALL ENTERASYS OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, EVEN IF ENTERASYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS FOREGOING LIMITATION SHALL APPLY REGARDLESS OF THE CAUSE OF ACTION UNDER WHICH DAMAGES ARE SOUGHT. THE CUMULATIVE LIABILITY OF ENTERASYS TO YOU FOR ALL CLAIMS RELATING TO THE PROGRAM, IN CONTRACT, TORT OR OTHERWISE, SHALL NOT EXCEED THE TOTAL AMOUNT OF FEES PAID TO ENTERASYS BY YOU FOR THE RIGHTS GRANTED HEREIN. 8. AUDIT RIGHTS. You hereby acknowledge that the intellectual property rights associated with the Program are of critical value to Enterasys and, accordingly, You hereby agree to maintain complete books, records and accounts showing (i) license fees due and paid, and (ii) the use, copying and deployment of the Program. You also grant to Enterasys and its authorized representatives, upon reasonable notice, the right to audit and examine during Your normal business hours, Your books, records, accounts and hardware devices upon which the Program may be deployed to verify compliance with this Agreement, including the verification of the license fees due and paid Enterasys and the use, copying and deployment of the Program. Enterasys’ right of examination shall be exercised reasonably, in good faith and in a manner calculated to not unreasonably interfere with Your business. In the event such audit discovers non‐compliance with this Agreement, including copies of the Program made, used or deployed in breach of this Agreement, You shall promptly pay to Enterasys the appropriate license fees. Enterasys reserves the right, to be exercised in its sole discretion and without prior notice, to terminate this license, effective immediately, for failure to comply with this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return to Enterasys the Program and all copies of the Program. 9. OWNERSHIP. This is a license agreement and not an agreement for sale. You acknowledge and agree that the Program constitutes trade secrets and/or copyrighted material of Enterasys and/or its suppliers. You agree to implement reasonable security measures to protect such trade secrets and copyrighted material. All right, title and interest in and to the Program shall remain with Enterasys and/or its suppliers. All rights not specifically granted to You shall be reserved to Enterasys. viii 10. ENFORCEMENT. You acknowledge and agree that any breach of Sections 2, 4, or 9 of this Agreement by You may cause Enterasys irreparable damage for which recovery of money damages would be inadequate, and that Enterasys may be entitled to seek timely injunctive relief to protect Enterasys’ rights under this Agreement in addition to any and all remedies available at law. 11. ASSIGNMENT. You may not assign, transfer or sublicense this Agreement or any of Your rights or obligations under this Agreement, except that You may assign this Agreement to any person or entity which acquires substantially all of Your stock or assets. Enterasys may assign this Agreement in its sole discretion. This Agreement shall be binding upon and inure to the benefit of the parties, their legal representatives, permitted transferees, successors and assigns as permitted by this Agreement. Any attempted assignment, transfer or sublicense in violation of the terms of this Agreement shall be void and a breach of this Agreement. 12. WAIVER. A waiver by Enterasys of a breach of any of the terms and conditions of this Agreement must be in writing and will not be construed as a waiver of any subsequent breach of such term or condition. Enterasys’ failure to enforce a term upon Your breach of such term shall not be construed as a waiver of Your breach or prevent enforcement on any other occasion. 13. SEVERABILITY. In the event any provision of this Agreement is found to be invalid, illegal or unenforceable, the validity, legality and enforceability of any of the remaining provisions shall not in any way be affected or impaired thereby, and that provision shall be reformed, construed and enforced to the maximum extent permissible. Any such invalidity, illegality or unenforceability in any jurisdiction shall not invalidate or render illegal or unenforceable such provision in any other jurisdiction. 14. TERMINATION. Enterasys may terminate this Agreement immediately upon Your breach of any of the terms and conditions of this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return to Enterasys the Program and all copies of the Program. ix x Contents Preface Contents of the Guide ................................................................................................................................... xxvii Conventions Used in This Guide ..................................................................................................................xxviii Getting Help .................................................................................................................................................... xxx Chapter 1: Overview Chapter 2: Managing the XSR Utilizing the Command Line Interface ............................................................................................................. 2-1 Connecting via the Console Port on XSR Series ..................................................................................... 2-1 Using the Console Port for Dial Backup on the XSR 1800 Series...................................................... 2-1 Using the Console Port to Remotely Control the XSR ....................................................................... 2-2 Connecting a Serial Interface to a Modem ......................................................................................... 2-2 Terminal Commands .......................................................................................................................... 2-3 Connecting via Telnet .............................................................................................................................. 2-3 Connecting via SSH ................................................................................................................................. 2-3 Accessing the Initial Prompt ..................................................................................................................... 2-4 Synchronizing the Clock ........................................................................................................................... 2-4 Managing the Session .............................................................................................................................. 2-5 Remote Auto Install .................................................................................................................................. 2-5 RAI Features and Requirements ........................................................................................................ 2-5 RAI Requirements on the XSR........................................................................................................... 2-7 How RAI Components Work............................................................................................................... 2-7 CLI Editing Rules ................................................................................................................................... 2-11 Setting CLI Configuration Modes ........................................................................................................... 2-12 User EXEC Mode ............................................................................................................................. 2-14 Privileged EXEC Mode ..................................................................................................................... 2-14 Global Configuration Mode .................................................................................................................... 2-14 Exiting From the Current Mode .............................................................................................................. 2-14 Mode Examples ..................................................................................................................................... 2-15 Observing Command Syntax and Conventions ..................................................................................... 2-15 CLI Command Limits ........................................................................................................................ 2-16 Describing Ports and Interfaces ............................................................................................................. 2-16 Supported Physical Interfaces .......................................................................................................... 2-16 Supported Virtual Interfaces ............................................................................................................. 2-16 Supported Ports................................................................................................................................ 2-17 Numbering XSR Slots, Cards, and Ports ............................................................................................... 2-17 Setting Port Configuration Mode ...................................................................................................... 2-17 Setting Interface Type and Numbering .................................................................................................. 2-17 Configuration Examples ................................................................................................................... 2-18 Entering Commands that Control Tables ............................................................................................... 2-20 Adding Table Entries ........................................................................................................................ 2-20 Deleting Table Entries ...................................................................................................................... 2-21 Modifying Table Entries .................................................................................................................... 2-21 Displaying Table Entries ................................................................................................................... 2-21 Managing XSR Interfaces ...................................................................................................................... 2-21 Enabling an Interface........................................................................................................................ 2-22 Disabling an Interface ....................................................................................................................... 2-22 xi Configuring an Interface ................................................................................................................... 2-22 Displaying Interface Attributes .......................................................................................................... 2-22 Managing Message Logs ....................................................................................................................... 2-23 Logging Commands ......................................................................................................................... 2-23 Performing Fault Management ............................................................................................................... 2-23 Fault Report Commands .................................................................................................................. 2-24 Capturing Fault Report Data............................................................................................................. 2-24 Using the Real-Time Clock .................................................................................................................... 2-25 RTC/Network Clock Options............................................................................................................. 2-25 RTC Commands............................................................................................................................... 2-25 Managing the System Configuration ...................................................................................................... 2-25 Resetting the Configuration to Factory Default ...................................................................................... 2-26 Using the Default Button (XSR 1800/1200 Series Only) .................................................................. 2-26 Configuration Save Options ................................................................................................................... 2-27 Using File System Commands ......................................................................................................... 2-27 Bulk Configuration Management ............................................................................................................ 2-27 Downloading the Configuration ........................................................................................................ 2-27 Uploading the Configuration/Crash Report....................................................................................... 2-28 Creating Alternate Configuration Files.............................................................................................. 2-28 Managing the Software Image ............................................................................................................... 2-29 Creating Alternate Software Image Files .......................................................................................... 2-29 BootRom Upgrade Choices .............................................................................................................. 2-29 Loading Software Images ................................................................................................................. 2-34 Using EOS Fallback to Upgrade the Image...................................................................................... 2-34 Downloading with FIPS Security ...................................................................................................... 2-36 Software Image Commands ............................................................................................................. 2-36 Configuration Change Hashing ........................................................................................................ 2-36 Displaying System Status and Statistics ................................................................................................ 2-37 Memory Management ................................................................................................................................... 2-37 Creating Resources ............................................................................................................................... 2-37 Network Management through SNMP .......................................................................................................... 2-38 SNMP Informs ........................................................................................................................................ 2-39 Shaping Trap Traffic ............................................................................................................................... 2-39 Statistics ................................................................................................................................................. 2-39 Alarm Management (Traps) ................................................................................................................... 2-40 Network Monitoring via Service Level Agreement Agent ....................................................................... 2-40 Measuring Performance Metrics....................................................................................................... 2-40 Configuration Examples ................................................................................................................... 2-41 Using the SLA Agent in SNMP ......................................................................................................... 2-43 Full Configuration Backup/Restore ........................................................................................................ 2-43 Cabletron CTdownload MIB ............................................................................................................. 2-43 Enterasys Configuration Management MIB ...................................................................................... 2-43 Software Image Download using NetSight ............................................................................................. 2-44 CLI Translator................................................................................................................................... 2-44 Appending CLI Commands to Configuration Files via SNMP ................................................................ 2-44 Accessing the XSR Through the Web .......................................................................................................... 2-45 Network Management Tools ......................................................................................................................... 2-45 NetSight Atlas Router Services Manager v2.0 ....................................................................................... 2-45 Firmware Upgrade Procedures .............................................................................................................. 2-45 Using the CLI for Downloads............................................................................................................ 2-46 Using SNMP for Downloads ............................................................................................................. 2-46 Fault Reporting ....................................................................................................................................... 2-46 Auto-discovery ....................................................................................................................................... 2-46 xii Chapter 3: Managing LAN/WAN Interfaces Overview of LAN Interfaces ............................................................................................................................ 3-1 LAN Features ................................................................................................................................................. 3-1 Configuring the LAN ....................................................................................................................................... 3-2 MIB Statistics .................................................................................................................................................. 3-2 Overview of WAN Interfaces .......................................................................................................................... 3-3 WAN Features ................................................................................................................................................ 3-3 Configuring the WAN ...................................................................................................................................... 3-4 Chapter 4: Configuring T1/E1 & T3/E3 Interfaces Overview ......................................................................................................................................................... 4-1 T1/E1 Functionality .................................................................................................................................. 4-1 T3/E3 Functionality .................................................................................................................................. 4-1 Features ......................................................................................................................................................... 4-1 T1/E1 Mode .............................................................................................................................................. 4-1 T3 Mode ................................................................................................................................................... 4-2 E3 Mode ................................................................................................................................................... 4-2 T1/E1 Subsystem Configuration .............................................................................................................. 4-3 T3/E3 Subsystem Configuration .............................................................................................................. 4-3 T1 Drop & Insert One-to-One DS0 Bypassing ......................................................................................... 4-4 Drop and Insert Features.................................................................................................................... 4-4 Configuring Channelized T1/E1 Interfaces ..................................................................................................... 4-5 Configuring Un-channelized T3/E3 Interfaces ................................................................................................ 4-6 Troubleshooting T1/E1 & T3/E3 Links ............................................................................................................ 4-7 T1/E1 & T3/E3 Physical Layer Troubleshooting ...................................................................................... 4-7 T1/E1 & T3/E3 Alarm Analysis ................................................................................................................. 4-9 Receive Alarm Indication Signal (AIS - Blue Alarm) ........................................................................... 4-9 Receive Remote Alarm Indication (RAI - Yellow Alarm)................................................................... 4-10 Transmit Remote Alarm Indication (RAI - Yellow Alarm).................................................................. 4-10 Transmit Sending Remote Alarm (Red Alarm) ................................................................................. 4-10 Transmit Alarm Indication Signal (AIS - Blue Alarm) ........................................................................ 4-10 T1/E1 & T3/E3 Error Events Analysis .................................................................................................... 4-11 Slip Seconds Counter Increasing ..................................................................................................... 4-12 Framing Loss Seconds Increasing ................................................................................................... 4-13 Line Code Violations Increasing ....................................................................................................... 4-13 Configuring the D&I NIM ........................................................................................................................ 4-13 Chapter 5: Configuring IP Overview ......................................................................................................................................................... 5-1 General IP Features ....................................................................................................................................... 5-1 ARP and Proxy ARP ................................................................................................................................ 5-4 Proxy DNS ............................................................................................................................................... 5-4 BOOTP/DHCP Relay ............................................................................................................................... 5-4 Broadcast ................................................................................................................................................. 5-5 Directed Broadcast ............................................................................................................................. 5-5 Local Broadcast.................................................................................................................................. 5-5 ICMP ........................................................................................................................................................ 5-5 TCP .......................................................................................................................................................... 5-6 UDP .......................................................................................................................................................... 5-6 Telnet ....................................................................................................................................................... 5-6 SSH .......................................................................................................................................................... 5-6 Trivial File Transfer Protocol (TFTP) ........................................................................................................ 5-7 IP Interface ............................................................................................................................................... 5-7 xiii Secondary IP ............................................................................................................................................ 5-7 Interface & Secondary IP.................................................................................................................... 5-7 ARP & Secondary IP .......................................................................................................................... 5-8 ICMP & Secondary IP......................................................................................................................... 5-8 Routing Table Manager & Secondary IP ............................................................................................ 5-9 OSPF & Secondary IP........................................................................................................................ 5-9 RIP & Secondary IP............................................................................................................................ 5-9 Unnumbered Interface & Secondary IP.............................................................................................. 5-9 NAT & Secondary IP .......................................................................................................................... 5-9 DHCP & Secondary IP ....................................................................................................................... 5-9 VPN & Secondary IP .......................................................................................................................... 5-9 VRRP & Secondary IP...................................................................................................................... 5-10 PPPoE & Secondary IP .................................................................................................................... 5-10 Maximum Transmission Unit (MTU) ....................................................................................................... 5-10 Ping ........................................................................................................................................................ 5-10 Traceroute .............................................................................................................................................. 5-10 IP Routing Protocols ..................................................................................................................................... 5-10 RIPv1 and v2 .......................................................................................................................................... 5-11 Triggered-on-Demand RIP ..................................................................................................................... 5-12 How Triggered-on-Demand RIP Works ............................................................................................ 5-12 OSPF ..................................................................................................................................................... 5-14 LSA Type 3 and 5 Summarization .................................................................................................... 5-15 OSPF Database Overflow ................................................................................................................ 5-15 OSPF Passive Interfaces ................................................................................................................. 5-16 OSPF Troubleshooting ........................................................................................................................... 5-17 Null Interface .......................................................................................................................................... 5-17 Route Preference ................................................................................................................................... 5-17 Static Routes .......................................................................................................................................... 5-18 VLAN Routing ........................................................................................................................................ 5-18 Forwarding VLAN, PPPoE over VLAN ............................................................................................. 5-19 VLAN Processing Over the XSR’s Ethernet Interfaces .................................................................... 5-20 VLAN Processing: VLAN-enabled Ethernet to Standard LAN Interfaces ......................................... 5-20 VLAN Processing: VLAN-enabled Ethernet to WAN Interfaces ....................................................... 5-21 VLAN Processing: WAN Interface to a VLAN-enabled Ethernet Interface ....................................... 5-21 QoS with VLAN................................................................................................................................. 5-22 Policy Based Routing ............................................................................................................................. 5-22 Accessing the Global Routing Policy Table ...................................................................................... 5-22 Match Clauses.................................................................................................................................. 5-23 Set Clauses ...................................................................................................................................... 5-23 PBR Cache ....................................................................................................................................... 5-23 Default Network ...................................................................................................................................... 5-24 Classless Inter-Domain Routing (CIDR) ................................................................................................ 5-24 Router ID ................................................................................................................................................ 5-24 Real Time Protocol (RTP) Header Compression ................................................................................... 5-25 Network Address Translation ................................................................................................................. 5-26 Features ........................................................................................................................................... 5-26 Virtual Router Redundancy Protocol ...................................................................................................... 5-27 VRRP Definitions .............................................................................................................................. 5-28 How the VRRP Works ...................................................................................................................... 5-29 Different States of a VRRP Router ................................................................................................... 5-29 VRRP Features ...................................................................................................................................... 5-30 Multiple Virtual IP Addresses per VR ............................................................................................... 5-30 Multiple VRs Per Router ................................................................................................................... 5-30 Authentication................................................................................................................................... 5-30 xiv Load Balancing ................................................................................................................................. 5-31 ARP Process on a VRRP Router ..................................................................................................... 5-31 Host ARP.......................................................................................................................................... 5-31 Proxy ARP ........................................................................................................................................ 5-31 Gratuitous ARP................................................................................................................................. 5-31 Traffic Process on a VRRP Router ................................................................................................... 5-31 ICMP Ping ........................................................................................................................................ 5-32 Interface Monitoring .......................................................................................................................... 5-32 Watch Group Monitoring................................................................................................................... 5-33 Physical Interface and Physical IP Address Change on a VRRP Router ......................................... 5-33 Equal-Cost Multi-Path (ECMP) .............................................................................................................. 5-34 Configuration Considerations ........................................................................................................... 5-34 Configuring RIP Examples ........................................................................................................................... 5-35 Configuring Unnumbered IP Serial Interface Example ................................................................................. 5-37 Configuring OSPF Example ......................................................................................................................... 5-37 Configuring NAT Examples .......................................................................................................................... 5-38 Basic One-to-One Static NAT ................................................................................................................ 5-38 Configuring Static Translation .......................................................................................................... 5-38 Dynamic Pool Configuration ................................................................................................................... 5-39 Configuring Dynamic Pool Translation ............................................................................................. 5-39 Network Address and Port Translation .................................................................................................. 5-40 Configuring NAPT............................................................................................................................. 5-40 Configuring NAPT............................................................................................................................. 5-41 Multiple NAT Pools within an Interface .................................................................................................. 5-41 Static NAT within an Interface ................................................................................................................ 5-42 NAT Port Forwarding ............................................................................................................................. 5-44 Configuring Policy Based Routing Example ................................................................................................. 5-44 Configuring VRRP Example ......................................................................................................................... 5-45 Router XSRa .................................................................................................................................... 5-45 Router XSRb .................................................................................................................................... 5-45 Configuring VLAN Examples ........................................................................................................................ 5-46 Chapter 6: Configuring the Border Gateway Protocol Features ......................................................................................................................................................... 6-1 Overview ......................................................................................................................................................... 6-1 Describing BGP Messages ...................................................................................................................... 6-2 Open................................................................................................................................................... 6-2 Update ................................................................................................................................................ 6-3 Keepalive............................................................................................................................................ 6-3 Notification.......................................................................................................................................... 6-3 Defining BGP Path Attributes ................................................................................................................... 6-3 AS Path .............................................................................................................................................. 6-4 Origin .................................................................................................................................................. 6-4 Next Hop............................................................................................................................................. 6-5 Local Preference ................................................................................................................................ 6-5 Weight ................................................................................................................................................ 6-7 Atomic Aggregate ............................................................................................................................... 6-7 Aggregator.......................................................................................................................................... 6-8 Multi-Exit Discriminator ....................................................................................................................... 6-8 Community ......................................................................................................................................... 6-9 BGP Path Selection Process ................................................................................................................. 6-11 BGP Routing Policy ................................................................................................................................ 6-11 Access Control Lists ......................................................................................................................... 6-12 xv Filter Lists ......................................................................................................................................... 6-12 Community Lists ............................................................................................................................... 6-12 Route Maps ...................................................................................................................................... 6-12 Regular Expressions ........................................................................................................................ 6-13 Regular Expression Characters........................................................................................................ 6-13 Regular Expression Examples ......................................................................................................... 6-13 Peer Groups ..................................................................................................................................... 6-14 Initial BGP Configuration ........................................................................................................................ 6-15 Adding BGP Neighbors .......................................................................................................................... 6-15 Resetting BGP Connections .................................................................................................................. 6-15 Synchronization ...................................................................................................................................... 6-16 Address Aggregation .............................................................................................................................. 6-16 Route Flap Dampening .......................................................................................................................... 6-16 Recommendations for Route Flap Dampening ................................................................................ 6-17 Capability Advertisement ....................................................................................................................... 6-17 Route Refresh ........................................................................................................................................ 6-17 Scaling BGP ........................................................................................................................................... 6-18 Route Reflectors............................................................................................................................... 6-19 Confederations ................................................................................................................................. 6-20 Displaying System and Network Statistics ............................................................................................. 6-21 Configuring BGP Route Maps ...................................................................................................................... 6-22 Configuring BGP Neighbors ................................................................................................................... 6-23 BGP Path Filtering by Neighbor Example .............................................................................................. 6-23 BGP Aggregate Route Examples ........................................................................................................... 6-24 Configuring BGP Confederations ........................................................................................................... 6-24 TCP MD5 Authentication for BGP Example ........................................................................................... 6-25 Configuring BGP Peer Groups ..................................................................................................................... 6-25 IBGP Peer Group Example .................................................................................................................... 6-25 EBGP Peer Group Example ................................................................................................................... 6-26 BGP Community with Route Maps Examples ........................................................................................ 6-26 Chapter 7: Configuring PIM-SM and IGMP Features ......................................................................................................................................................... 7-1 Differences with Industry-Standard Approach .......................................................................................... 7-1 IP Multicast Overview ..................................................................................................................................... 7-2 Defining Multicast Group Addressing ....................................................................................................... 7-2 Outlining IGMP Versions .......................................................................................................................... 7-3 Comparing Multicast Distribution Trees ................................................................................................... 7-3 Forwarding Multicast Traffic ..................................................................................................................... 7-4 Describing the XSR’s IP Multicast Features ................................................................................................... 7-4 Group Membership Actions ...................................................................................................................... 7-5 Sending and Receiving Queries and Reports .......................................................................................... 7-5 Sending a Query................................................................................................................................. 7-5 Receiving a Query .............................................................................................................................. 7-6 Receiving a Report ............................................................................................................................. 7-6 Source-Specific Forwarding Rules ..................................................................................................... 7-6 Interoperating with Older IGMP Versions ................................................................................................. 7-6 Query Version Distinctions ................................................................................................................. 7-6 Behavior of Group Members Among Older Version Queriers ............................................................ 7-6 Behavior of Group Members Among Older Version Group Members ................................................ 7-7 Behavior of Multicast Routers Among Older Version Queriers .......................................................... 7-7 Behavior of Multicast Routers Among Older Version Group Members .............................................. 7-7 xvi Describing the XSR’s PIM-SM v2 Features .................................................................................................... 7-7 Phase 1: Building a Shared Tree ............................................................................................................. 7-8 Phase 2: Building Shortest Path Tree Between Sender & RP ................................................................. 7-8 Phase 3: Building Shortest Path Tree Between Sender & Receiver ........................................................ 7-9 Neighbor Discovery and DR Election ..................................................................................................... 7-10 PIM Register Message ........................................................................................................................... 7-11 PIM Join/Prune Message ....................................................................................................................... 7-11 Bootstrap & Rendezvous Point .............................................................................................................. 7-11 Assert Processing .................................................................................................................................. 7-11 Source-Specific Multicast ....................................................................................................................... 7-12 PIM SM over Frame Relay ..................................................................................................................... 7-12 PIM Configuration Examples ........................................................................................................................ 7-13 Chapter 8: Configuring PPP Overview ......................................................................................................................................................... 8-1 PPP Features ................................................................................................................................................. 8-1 Link Control Protocol (LCP) ..................................................................................................................... 8-2 Network Control Protocol (NCP) .............................................................................................................. 8-2 Authentication .......................................................................................................................................... 8-3 Password Authentication Protocol (PAP) ........................................................................................... 8-3 Challenge Handshake Authentication Protocol (CHAP) ..................................................................... 8-3 Microsoft Challenge Handshake Protocol (MS-CHAP) ...................................................................... 8-3 Link Quality Monitoring (LQM) ................................................................................................................. 8-4 Multilink PPP (MLPPP) ............................................................................................................................ 8-4 Multi-Class MLPPP .................................................................................................................................. 8-5 MLPPP Packet Fragmentation and Serialization Transmission Latency............................................ 8-6 Fragment Interleaving Over the Link .................................................................................................. 8-7 Multilink Head Format Negotiation ..................................................................................................... 8-7 Events and Alarms ............................................................................................................................. 8-8 IP Control Protocol (IPCP) ....................................................................................................................... 8-8 IP Address Assignment ...................................................................................................................... 8-9 PPP Bandwidth Allocation/Control Protocols (BAP/BAPC) ...................................................................... 8-9 Configuring PPP with a Dialed Backup Line ................................................................................................. 8-10 Configuring a Synchronous Serial Interface ................................................................................................. 8-10 Configuring a Dialed Backup Line ................................................................................................................ 8-11 Configuring the Dialer Interface ............................................................................................................. 8-11 Configuring the Physical Interface for the Dialer Interface ..................................................................... 8-11 Configuring the Interface as the Backup Dialer Interface ....................................................................... 8-12 Configuring MLPPP on a Multilink/Dialer interface ....................................................................................... 8-13 Multilink Example ................................................................................................................................... 8-13 Dialer Example ....................................................................................................................................... 8-13 Configuring BAP ........................................................................................................................................... 8-14 Dual XSRs: One Router Using DoD with Call Request .......................................................................... 8-14 XSR1 Configuration .......................................................................................................................... 8-14 XSR2 Configuration .......................................................................................................................... 8-15 Dual XSRs: BAP Using Call/Callback Request ...................................................................................... 8-16 XSR1 Configuration .......................................................................................................................... 8-16 XSR2 Configuration .......................................................................................................................... 8-16 xvii Chapter 9: Configuring Frame Relay Overview ......................................................................................................................................................... 9-1 Virtual Circuits .................................................................................................................................... 9-1 DLCIs.................................................................................................................................................. 9-1 DTEs................................................................................................................................................... 9-2 DCEs .................................................................................................................................................. 9-2 Frame Relay Features .................................................................................................................................... 9-3 Multi-Protocol Encapsulation .................................................................................................................... 9-3 Address Resolution .................................................................................................................................. 9-4 Dynamic Resolution Using Inverse ARP .................................................................................................. 9-4 Controlling Congestion in Frame Relay Networks .......................................................................................... 9-4 Rate Enforcement (CIR) - Generic Traffic Shaping .................................................................................. 9-4 Discard Eligibility (DE) Bit ........................................................................................................................ 9-5 Forward Explicit Congestion Notification (FECN) .................................................................................... 9-5 Backward Explicit Congestion Notification (BECN) .................................................................................. 9-5 Link Management Information (LMI) ............................................................................................................... 9-7 Sub-interfaces ................................................................................................................................................ 9-7 FRF.12 Fragmentation ................................................................................................................................... 9-8 End-to-End Fragmentation ....................................................................................................................... 9-8 User Configuration Commands ................................................................................................................ 9-8 Map-Class Configuration .................................................................................................................... 9-9 Show Running Configuration .............................................................................................................. 9-9 Displaying Statistics............................................................................................................................ 9-9 Reports and Alarms ................................................................................................................................. 9-9 Clear Statistics ......................................................................................................................................... 9-9 Interconnecting via Frame Relay Network .................................................................................................... 9-10 Configuring Frame Relay .............................................................................................................................. 9-11 Multi-point to Point-to-Point Example ..................................................................................................... 9-11 Chapter 10: Configuring Dialer Services Overview of Dial Services ............................................................................................................................. 10-1 Dial Services Features ........................................................................................................................... 10-1 Asynchronous and Synchronous Support .................................................................................................... 10-2 AT Commands on Asynchronous Ports ................................................................................................. 10-2 V.25bis over Synchronous Interfaces .................................................................................................... 10-2 DTR Dialing for Synchronous Interfaces ................................................................................................ 10-3 Time of Day feature ................................................................................................................................ 10-3 Typical Use for Dial Services ................................................................................................................. 10-3 Ethernet Backup ..................................................................................................................................... 10-3 Implementing Dial Services .......................................................................................................................... 10-4 Dialer Profiles ......................................................................................................................................... 10-4 Dialer Interface ....................................................................................................................................... 10-5 Dialer Strings .......................................................................................................................................... 10-5 Dialer Pool .............................................................................................................................................. 10-5 Addressing Dialer Resources ................................................................................................................. 10-5 Configuring Encapsulation ..................................................................................................................... 10-6 ISDN Callback ........................................................................................................................................ 10-6 Configuring the Dialer Interface ........................................................................................................... 10-10 Creating and Configuring the Dialer Interface ................................................................................ 10-10 Configuring the Map Class ............................................................................................................. 10-11 Configuring the Physical Interface for the Dialer Interface ............................................................. 10-11 Sample Dialer Configuration ................................................................................................................ 10-11 xviii Configuring ISDN Callback .................................................................................................................. 10-12 Point-to-Point with Matched Calling/Called Numbers ..................................................................... 10-12 Point-to-Point with Different Calling/Called Numbers ..................................................................... 10-12 Point-to-Multipoint with One Neighbor ............................................................................................ 10-12 Point-to-Multipoint with Multiple Neighbors .................................................................................... 10-12 Overview of Dial Backup ............................................................................................................................ 10-13 Dial Backup Features ........................................................................................................................... 10-13 Sequence of Backup Events ...................................................................................................................... 10-13 Link Failure Backup Example ..................................................................................................................... 10-14 Configuring a Dialed Backup Line .............................................................................................................. 10-14 Configuring the Dialer Interface ........................................................................................................... 10-14 Configuring the Physical Interface for the Dialer Interface ................................................................... 10-15 Configuring Interface as the Backup Dialer Interface ........................................................................... 10-15 Sample Configuration ........................................................................................................................... 10-16 Overview of Dial on Demand/Bandwidth on Demand ................................................................................ 10-17 Dialer Interface Spoofing ............................................................................................................................ 10-18 Dialer Watch ............................................................................................................................................... 10-18 Dialer Watch Behavior ......................................................................................................................... 10-19 Caveat .................................................................................................................................................. 10-20 Answering Incoming ISDN Calls ................................................................................................................. 10-20 Incoming Call Mapping Example .......................................................................................................... 10-21 Node A (Calling Node) Configuration ............................................................................................. 10-21 Node B (Called Node) Configuration .............................................................................................. 10-22 Node D (Calling Node) Configuration ............................................................................................. 10-22 Configuring DoD/BoD ................................................................................................................................. 10-23 PPP Point-to-Multipoint Configuration .................................................................................................. 10-24 Node A (Calling Node) Configuration ............................................................................................. 10-24 Node B (Called Node) Configuration .............................................................................................. 10-25 PPP Multipoint-to-Multipoint Configuration .......................................................................................... 10-25 Node A Configuration ..................................................................................................................... 10-25 Node B Configuration ..................................................................................................................... 10-26 PPP Point-to-Point Configurations ....................................................................................................... 10-26 Dial-in Routing for Dial on Demand Example ................................................................................. 10-27 Dial-out Routing for Dial on Demand Example ............................................................................... 10-27 PPP Point-to-Multipoint Configurations ................................................................................................ 10-28 Dial-out Router Example ................................................................................................................ 10-29 Dial-in Router Example................................................................................................................... 10-29 MLPPP Point-to-Multipoint Configuration ............................................................................................. 10-30 Node A (Calling Node) Configuration ............................................................................................. 10-30 Node B (Called Node) Configuration .............................................................................................. 10-31 MLPPP Point-to-Point Configurations .................................................................................................. 10-31 Dial-in Router Example................................................................................................................... 10-31 Dial-out Router Example ................................................................................................................ 10-32 MLPPP Point-to-Multipoint Configurations ........................................................................................... 10-32 Dial-out Router Example ................................................................................................................ 10-33 Dial-in Router Example................................................................................................................... 10-34 MLPPP Multipoint-to-Multipoint Configuration ..................................................................................... 10-34 Node A Configuration ..................................................................................................................... 10-34 Node B Configuration ..................................................................................................................... 10-35 Switched PPP Multilink Configuration ........................................................................................................ 10-35 Bandwidth-on-Demand ........................................................................................................................ 10-35 Node A (Calling Node) Configuration ............................................................................................. 10-36 Node C (Called Node) Configuration .............................................................................................. 10-36 Backup Configuration ................................................................................................................................. 10-37 xix Backup Using ISDN ............................................................................................................................. 10-37 Node A (Backed-up Node) Configuration ....................................................................................... 10-37 Node C (Called Node) Configuration .............................................................................................. 10-38 Configuration for Backup with MLPPP Bundle ..................................................................................... 10-39 Node A (Backed-up Node) Configuration ....................................................................................... 10-39 Node C (Called Node) Configuration .............................................................................................. 10-40 Configuration for Ethernet Failover ...................................................................................................... 10-40 Configuration for Frame Relay Encapsulation ..................................................................................... 10-41 Chapter 11: Configuring Integrated Services Digital Network ISDN Features .............................................................................................................................................. 11-1 BRI Features .......................................................................................................................................... 11-2 PRI Features .......................................................................................................................................... 11-2 Understanding ISDN ..................................................................................................................................... 11-2 Basic Rate Interface ............................................................................................................................... 11-3 Primary Rate Interface ........................................................................................................................... 11-3 B-Channels ............................................................................................................................................ 11-3 D-Channel .............................................................................................................................................. 11-3 D-Channel Standards ............................................................................................................................. 11-4 D-Channel Signaling and Carrier Networks ........................................................................................... 11-4 ISDN Equipment Configurations ............................................................................................................ 11-4 Bandwidth Optimization ......................................................................................................................... 11-5 Security .................................................................................................................................................. 11-5 Call Monitoring ....................................................................................................................................... 11-6 ISDN Trace ............................................................................................................................................ 11-6 Trace Decoding ................................................................................................................................ 11-6 Q921 Decoding................................................................................................................................. 11-6 Q931 Decoding................................................................................................................................. 11-7 Decoded IEs ..................................................................................................................................... 11-9 BRI NI-1, DMS100 & 5ESS SPID Registration................................................................................. 11-9 Terminal Endpoint Identifier (TEI) Management Procedures ........................................................... 11-9 ISDN Configuration ....................................................................................................................................... 11-9 BRI (Switched) Configuration Model .................................................................................................... 11-10 PRI Configuration Model ...................................................................................................................... 11-12 Leased-Line Configuration Model ........................................................................................................ 11-14 More Configuration Examples .................................................................................................................... 11-15 T1 PRI .................................................................................................................................................. 11-15 E1 PRI .................................................................................................................................................. 11-15 ISDN BRI .............................................................................................................................................. 11-15 BRI Leased Line ................................................................................................................................... 11-16 BRI Leased PPP .................................................................................................................................. 11-16 BRI Leased Frame Relay ..................................................................................................................... 11-16 ISDN (ITU Standard Q.931) Call Status Cause Codes .............................................................................. 11-16 Chapter 12: Configuring Quality of Service Overview ....................................................................................................................................................... 12-1 Mechanisms Providing QoS ......................................................................................................................... 12-2 Traffic Classification ............................................................................................................................... 12-2 Describing the Class Map................................................................................................................. 12-3 Describing the Policy Map ................................................................................................................ 12-3 Queuing and Services ............................................................................................................................ 12-4 Describing Class-Based Weight Fair Queuing ................................................................................. 12-4 Configuring CBWFQ ......................................................................................................................... 12-5 xx Measuring Bandwidth Utilization ...................................................................................................... 12-5 Describing Priority Queues............................................................................................................... 12-5 Configuring Priority Queues ............................................................................................................. 12-5 Describing Traffic Policing ...................................................................................................................... 12-6 Configuring Traffic Policing............................................................................................................... 12-6 Class-based Traffic Shaping .................................................................................................................. 12-7 Traffic Shaping per Policy-Map .............................................................................................................. 12-8 Differences Between Traffic Policing and Traffic Shaping ..................................................................... 12-9 Traffic Shaping and Queue Limit ............................................................................................................ 12-9 Congestion Control & Avoidance ......................................................................................................... 12-10 Describing Queue Size Control (Drop Tail) .................................................................................... 12-10 Describing Random Early Detection............................................................................................... 12-10 Describing Weighted Random Early Detection .............................................................................. 12-11 Configuration per Interface ................................................................................................................... 12-12 Suggestions for Using QoS on the XSR .............................................................................................. 12-13 QoS and Link Fragmentation and Interleaving (LFI) .................................................................................. 12-13 Configuring QoS with MLPPP Multi-Class ........................................................................................... 12-13 Configuring QoS with FRF.12 .............................................................................................................. 12-14 QoS with VLAN ........................................................................................................................................... 12-14 Traffic Classification ............................................................................................................................. 12-14 Describing VLAN QoS Packet Flow ..................................................................................................... 12-15 VLAN Packet with Priority Routed out a Fast/GigabitEthernet Interface ........................................ 12-15 VLAN Packet with Priority Routed out a Serial Interface ................................................................ 12-15 Non-VLAN IP Packet Routed Out a Fast/GigabitEthernet Interface............................................... 12-16 QoS with VLAN Configuration Process ................................................................................................ 12-16 QoS on Input .............................................................................................................................................. 12-17 QoS on VPN ............................................................................................................................................... 12-17 QoS over VPN Features ...................................................................................................................... 12-18 Configuring QoS on a Physical Interface ............................................................................................. 12-18 Configuring QoS on a Virtual Tunnel Interface .................................................................................... 12-18 QoS on a Virtual Interface Example ............................................................................................... 12-19 QoS and VPN Interaction ..................................................................................................................... 12-22 Configuring the Shaper on the VPN Interface ................................................................................ 12-23 QoS Policy Configuration Examples ........................................................................................................... 12-24 Simple QoS on Physical Interface Policy ............................................................................................. 12-24 QoS for Frame Relay Policy ................................................................................................................. 12-25 QoS with MLPPP Multi-Class Policy .................................................................................................... 12-26 QoS with FRF.12 Policy ....................................................................................................................... 12-27 QoS with VLAN Policy .......................................................................................................................... 12-28 Input and Output QoS Policy ................................................................................................................ 12-28 Input QoS on Ingress to the Diffserv Domain Policy ............................................................................ 12-29 Chapter 13: Configuring ADSL Overview ....................................................................................................................................................... 13-1 Features ....................................................................................................................................................... 13-1 PDU Encapsulation Choices .................................................................................................................. 13-2 PPP over ATM.................................................................................................................................. 13-2 PPP over Ethernet over ATM (Routed) ............................................................................................ 13-3 Routed IP over ATM ......................................................................................................................... 13-4 ADSL Limitations .................................................................................................................................... 13-5 xxi ADSL Hardware ..................................................................................................................................... 13-5 NIM Card .......................................................................................................................................... 13-5 ADSL on the Motherboard ................................................................................................................ 13-6 DSP Firmware .................................................................................................................................. 13-6 ADSL Data Framing ............................................................................................................................... 13-6 ATM Support .......................................................................................................................................... 13-6 Virtual Circuits .................................................................................................................................. 13-6 OAM Cells ........................................................................................................................................ 13-7 Performance Monitoring ................................................................................................................... 13-7 Class of Service................................................................................................................................ 13-7 DSLAM Compatibility ............................................................................................................................. 13-7 Access Concentrator Restrictions .......................................................................................................... 13-7 Inverse ARP ........................................................................................................................................... 13-8 QoS ........................................................................................................................................................ 13-8 SNMP ..................................................................................................................................................... 13-8 Configuration Examples ............................................................................................................................... 13-8 PPPoE .............................................................................................................................................. 13-8 PPPoA .............................................................................................................................................. 13-9 IPoA................................................................................................................................................ 13-10 Chapter 14: Configuring the Virtual Private Network VPN Overview .............................................................................................................................................. 14-1 Internet Security Issues .......................................................................................................................... 14-1 How a Virtual Private Network Works .................................................................................................... 14-2 Ensuring VPN Security with IPSec/IKE/GRE ............................................................................................... 14-2 GRE over IPSec ..................................................................................................................................... 14-4 Defining VPN Encryption ........................................................................................................................ 14-5 Describing Public-Key Infrastructure (PKI) ................................................................................................... 14-5 Digital Signatures ................................................................................................................................... 14-5 Certificates ............................................................................................................................................. 14-6 Machine Certificates for the XSR ........................................................................................................... 14-6 CA Hierarchies ....................................................................................................................................... 14-7 Certificate Chains ................................................................................................................................... 14-7 RA Mode ................................................................................................................................................ 14-8 Pending Mode ........................................................................................................................................ 14-9 Enroll Password ..................................................................................................................................... 14-9 CRL Retrieval ......................................................................................................................................... 14-9 Renewing and Revoking Certificates ..................................................................................................... 14-9 DF Bit Functionality ...................................................................................................................................... 14-9 VPN Applications ........................................................................................................................................ 14-10 Site-to-Site Networks ........................................................................................................................... 14-11 Site-to-Central-Site Networks ............................................................................................................... 14-11 NAT Traversal ................................................................................................................................ 14-11 Client Mode .................................................................................................................................... 14-12 Network Extension Mode (NEM) .................................................................................................... 14-13 Remote Access Networks .................................................................................................................... 14-13 Using OSPF Over a VPN Network ....................................................................................................... 14-14 OSPF Commands .......................................................................................................................... 14-14 Configuring OSPF Over Site-to-Central Site in Client Mode .......................................................... 14-14 Configuring OSPF over Site-to-Central Site in Network Extension Mode ...................................... 14-16 Server ............................................................................................................................................. 14-17 Client .............................................................................................................................................. 14-17 Configuring OSPF with Fail Over (Redundancy) ............................................................................ 14-17 xxii Server 1 .......................................................................................................................................... 14-17 Server 2 .......................................................................................................................................... 14-18 Client .............................................................................................................................................. 14-18 Limitations ...................................................................................................................................... 14-18 XSR VPN Features ..................................................................................................................................... 14-18 VPN Configuration Overview ...................................................................................................................... 14-20 Master Encryption Key Generation ...................................................................................................... 14-20 ACL Configuration Rules ...................................................................................................................... 14-21 Configuring ACLs ........................................................................................................................... 14-21 Selecting Policies: IKE/IPSec Transform-Sets ..................................................................................... 14-22 Security Policy Considerations ....................................................................................................... 14-23 Configuring Policy........................................................................................................................... 14-23 Creating Crypto Maps .......................................................................................................................... 14-24 Configuring Crypto Maps................................................................................................................ 14-24 Authentication, Authorization and Accounting Configuration ............................................................... 14-25 AAA Commands ............................................................................................................................. 14-26 Configuring AAA ............................................................................................................................. 14-26 PKI Configuration Options .................................................................................................................... 14-27 Configuring PKI .............................................................................................................................. 14-28 PKI Certificate Enrollment Example ..................................................................................................... 14-28 Interface VPN Options ......................................................................................................................... 14-31 VPN Interface Sub-Commands ...................................................................................................... 14-32 Configuring a Simple VPN Site-to-Site Application .................................................................................... 14-32 Configuring the VPN Using EZ-IPSec ........................................................................................................ 14-34 EZ-IPSec Configuration ....................................................................................................................... 14-35 Configuration Examples ............................................................................................................................. 14-36 XSR with VPN - Central Gateway ........................................................................................................ 14-36 GRE Tunnel for OSPF ......................................................................................................................... 14-40 Tunnel A: XSR-3250 VPN GRE Site-to-Site Tunnel....................................................................... 14-40 Tunnel B: XSR-1805 VPN GRE Site-to-Site Tunnel....................................................................... 14-42 XSR/Cisco Site-to-Site Example .......................................................................................................... 14-44 Cisco Configuration ........................................................................................................................ 14-44 XSR Configuration.......................................................................................................................... 14-45 Interoperability Profile for the XSR ............................................................................................................. 14-46 Scenario 1: Gateway-to-Gateway with Pre-Shared Secrets ................................................................ 14-46 Scenario 2: Gateway-to-Gateway with Certificates .............................................................................. 14-49 Chapter 15: Configuring DHCP Overview of DHCP ....................................................................................................................................... 15-1 Features ....................................................................................................................................................... 15-1 DHCP Server Standards ........................................................................................................................ 15-2 How DHCP Works ........................................................................................................................................ 15-2 DHCP Services ............................................................................................................................................. 15-3 Persistent Storage of Network Parameters for Clients ........................................................................... 15-3 Temporary or Permanent Network Address Allocation .......................................................................... 15-3 Lease................................................................................................................................................ 15-3 Assigned Network Configuration Values to Clients: Options ................................................................. 15-3 Provisioning Differentiated Network Values by Client Class .................................................................. 15-4 BOOTP Legacy Support ........................................................................................................................ 15-4 Nested Scopes: IP Pool Subsets ........................................................................................................... 15-4 Scope Caveat ......................................................................................................................................... 15-5 Manual Bindings ..................................................................................................................................... 15-5 xxiii DHCP Client Services .................................................................................................................................. 15-6 Router Option ......................................................................................................................................... 15-6 Parameter Request List Option .............................................................................................................. 15-6 DHCP Client Interaction ......................................................................................................................... 15-6 Secondary Address Caveats ............................................................................................................ 15-6 Interaction with Remote Auto Install (RAI)........................................................................................ 15-7 DHCP Client Timeouts ........................................................................................................................... 15-7 DHCP CLI Commands ................................................................................................................................. 15-8 DHCP Set Up Overview ............................................................................................................................... 15-9 Configuring DHCP Address Pools ......................................................................................................... 15-9 Configuring DHCP - Network Configuration Parameters ....................................................................... 15-9 Configuration Steps ...................................................................................................................................... 15-9 Create an IP Local Client Pool ............................................................................................................... 15-9 Create a Corresponding DHCP Pool ................................................................................................... 15-10 Configure DHCP Network Parameters ................................................................................................. 15-10 Enable the DHCP Server ..................................................................................................................... 15-10 Optional: Set Up a DHCP Nested Scope ............................................................................................. 15-10 Optional: Configure a DHCP Manual Binding ...................................................................................... 15-10 DHCP Server Configuration Examples ....................................................................................................... 15-11 Pool with Hybrid Servers Example ....................................................................................................... 15-11 Manual Binding Example ..................................................................................................................... 15-11 Manual Binding with Class Example .................................................................................................... 15-11 BOOTP Client Support Example .......................................................................................................... 15-12 DHCP Option Examples ....................................................................................................................... 15-12 Chapter 16: Configuring Security on the XSR Features ....................................................................................................................................................... 16-1 Access Control Lists ............................................................................................................................... 16-1 ACL Violations Alarm Example......................................................................................................... 16-2 Packet Filtering ...................................................................................................................................... 16-2 LANd Attack ........................................................................................................................................... 16-2 Smurf Attack ........................................................................................................................................... 16-3 Fraggle Attack ........................................................................................................................................ 16-3 IP Packet with Multicast/Broadcast Source Address ............................................................................. 16-3 Spoofed Address Check ........................................................................................................................ 16-3 SYN Flood Attack Mitigation .................................................................................................................. 16-3 Fragmented and Large ICMP Packets ................................................................................................... 16-3 Fragmented ICMP Traffic ................................................................................................................. 16-3 Large ICMP Packets......................................................................................................................... 16-4 Ping of Death Attack......................................................................................................................... 16-4 Spurious State Transition ....................................................................................................................... 16-4 General Security Precautions ....................................................................................................................... 16-4 AAA Services ................................................................................................................................................ 16-5 Connecting Remotely via SSH or Telnet with AAA Service ................................................................... 16-6 Firewall Feature Set Overview ..................................................................................................................... 16-9 Reasons for Installing a Firewall ............................................................................................................ 16-9 Types of Firewalls ................................................................................................................................ 16-10 ACL and Packet Filter Firewalls ..................................................................................................... 16-10 ALG and Proxy Firewalls ................................................................................................................ 16-11 Stateful Inspection Firewalls ........................................................................................................... 16-12 XSR Firewall Feature Set Functionality ...................................................................................................... 16-12 Stateful Firewall Inspection (SFI).................................................................................................... 16-12 Filtering non-TCP/UDP Packets ..................................................................................................... 16-12 xxiv Application Level Commands ......................................................................................................... 16-13 Application Level Gateway ............................................................................................................. 16-13 On Board URL Filtering .................................................................................................................. 16-14 Denial of Service (DoS) Attack Protection ...................................................................................... 16-15 Alarm Logging ................................................................................................................................ 16-16 Alarms ............................................................................................................................................ 16-16 Authentication................................................................................................................................. 16-17 Firewall and NAT ............................................................................................................................ 16-18 Firewall and VPN ............................................................................................................................ 16-18 ACLs and Firewall .......................................................................................................................... 16-18 Dynamic Reconfiguration ............................................................................................................... 16-18 Firewall CLI Commands ............................................................................................................................. 16-19 Firewall Limitations ..................................................................................................................................... 16-22 Pre-configuring the Firewall ........................................................................................................................ 16-23 Steps to Configure the Firewall .................................................................................................................. 16-23 Configuration Examples ............................................................................................................................. 16-24 XSR with Firewall ................................................................................................................................. 16-24 XSR with Firewall, PPPoE and DHCP ................................................................................................. 16-26 XSR with Firewall and VPN .................................................................................................................. 16-27 Firewall Configuration for VRRP .......................................................................................................... 16-33 Firewall Configuration for RADIUS Authentication and Accounting ..................................................... 16-33 Configuring Simple Security ................................................................................................................. 16-34 RPC Policy Configuration ..................................................................................................................... 16-35 Appendix A: Alarms/Events, System Limits, and Standard ASCII Table Recommended System Limits ........................................................................................................................A-1 System Alarms and Events ............................................................................................................................A-3 Firewall and NAT Alarms and Reports .........................................................................................................A-14 Standard ASCII Character Table ..................................................................................................................A-19 Appendix B: XSR SNMP Proprietary and Associated Standard MIBs Service Level Reporting MIB Tables ..............................................................................................................B-1 etsysSrvcLvlMetricTable.....................................................................................................................B-1 etsysSrvcLvlOwnerTable ....................................................................................................................B-2 etsysSrvcLvlHistoryTable ...................................................................................................................B-2 etsysSrvcLvlNetMeasureTable ...........................................................................................................B-3 etsysSrvcLvlAggrMeasureTable .........................................................................................................B-4 BGP v4 MIB Tables ........................................................................................................................................B-5 General Variables Table .....................................................................................................................B-5 BGP v4 Peer Table.............................................................................................................................B-5 BGP-4 Received Path Attribute Table ................................................................................................B-7 BGP-4 Traps.......................................................................................................................................B-8 Firewall MIB Tables ........................................................................................................................................B-9 Global Interface Operations .....................................................................................................................B-9 Monitoring Objects .................................................................................................................................B-10 Policy Rule Table Totals Counters ...................................................................................................B-10 Policy Rule True Table .....................................................................................................................B-10 Session Totals Counters ..................................................................................................................B-10 Session Totals Table ........................................................................................................................B-10 IP Session Counters.........................................................................................................................B-11 IP Session Table ..............................................................................................................................B-11 Authenticated Address Counters......................................................................................................B-11 Authenticated Addresses Table........................................................................................................B-11 xxv DOS Attacks Blocked Counters........................................................................................................B-12 DOS Attacks Blocked Table .............................................................................................................B-12 VPN MIB Tables ...........................................................................................................................................B-12 etsysVpnIkePeer Table ....................................................................................................................B-13 etsysVpnIkePeerProposals Table ....................................................................................................B-13 etsysVpnIkeProposal Table ..............................................................................................................B-14 etsysVpnIpsecPolicy Table...............................................................................................................B-14 etsysVpnIntfPolicy Table ..................................................................................................................B-14 etsysVpnIpsecPolicyRule Table .......................................................................................................B-15 etsysVpnIpsecPolProposals Table ...................................................................................................B-15 etsysVpnIpsecProposal Table ..........................................................................................................B-16 etsysVpnIpsecPropTransforms Table ..............................................................................................B-16 etsysVpnAhTransform Table ............................................................................................................B-16 etsysVpnEspTransform Table ..........................................................................................................B-17 etsysVpnIpcompTransform Table.....................................................................................................B-17 ipCidrRouteTable for Static Routes ..............................................................................................................B-18 Host Resources MIB Objects .......................................................................................................................B-18 Enterasys Configuration Management MIB ..................................................................................................B-19 Enterasys Configuration Change MIB ..........................................................................................................B-20 Enterasys SNMP Persistence MIB ...............................................................................................................B-21 Enterasys Syslog Client MIB ........................................................................................................................B-22 xxvi Preface This guide provides a general overview of the XSR hardware and software features. It describes how to configure and maintain the router. Refer to the XSR CLI Reference Guide and the XSR Getting Started Guide for information not contained in this document. This guide is written for administrators who want to configure the XSR or experienced users who are knowledgeable of basic networking principles. Contents of the Guide Information in this guide is arranged as follows: • Chapter 1, Overview, introduces key features of the XSR. • Chapter 2, Managing the XSR, describes the three methods of managing the router along with the control commands and tools available to accomplish that task including Remote Auto Install (RAI) and memory management. • Chapter 3, Managing LAN/WAN Interfaces, describes system FastEthernet/GigabitEthernet and High Speed Serial features, how to configure them, and MIB-II statistics collected for LAN interfaces. • Chapter 4, Configuring T1/E1 & T3/E3 Interfaces, outlines XSR controller features, including the Drop and Insert NIM, and how to configure and troubleshoot them. • Chapter 5, Configuring IP, outlines a host of XSR IP protocol suite features, including Secondary IP, VRRP, Proxy DNS, VLAN and Policy Based routing, Route Preference, multiple static routes, CIDR, and their associated configuration. • Chapter 6, Configuring the Border Gateway Protocol, describes XSR-supported BGP-4 features including MIB tables defined in RFC-1657, BGP SNMP traps, protection of sessions, capabilities advertisement, route reflection, communities, route refresh, route flap dampening, AS confederations, and debug capability. • Chapter 7, Configuring PIM-SM and IGMP, describes Protocol Independent Multicast - Sparse Mode (PIM-SM) and Internet Group Management Protocol (IGMP) configuration with these features and how to configure them: IGMP versions 1, 2 and 3 (on LAN interface only), PIMSM version 2, Static IGMP group membership, Dynamic and Static RP, Register and Assert Mechanism, Rendezvous Point Tree (RPT) Build-up, Shortest Path Tree (SPT) Build-up, RPT to SPT Switch, Join/Prune Mechanism, and Source Specific Multicast (SSM) Support. • Chapter 8, Configuring PPP, details XSR support for the PPP and Multi-link PPP protocols, Multi-Class MLPPP, peer entity authentication, Bandwidth on Command (BAP), and how to configure these features. • Chapter 9, Configuring Frame Relay, details how to set up Frame Relay networks on the XSR, including using rate enforcement (CIR) and congestion control (FECN and BECN), Discard Eligibility, Frame Relay Inverse ARP, LMI support, and FRF.12 fragmentation. • Chapter 10, Configuring Dial Services and Back Up, details background information about Dial Services and Dial Backup across a PSTN, Ethernet failover, Dial on Demand (DoD) and Bandwidth on Demand (BoD), Multi-link PPP, dialer interface spoofing, Dialer Watch, ISDN callback, and the commands to configure these features. XSR User’s Guide xxvii Conventions Used in This Guide • Chapter 11, Configuring ISDN, outlines how to set up the Integrated Services Digital Network protocol on the XSR for BRI, PRI and leased line applications. ISDN protocol tracing and partial decoding of Q921 and Q931 frames is also described. • Chapter 12, Configuring Quality of Service, describes XSR support for QoS, including Random Early Detection (RED), Weighted Random Early Detection (WRED), tail-drop, DSCP, IP precedence, traffic policing and shaping, priority and CBWFQ queuing, and class-based traffic shaping. • Chapter 13, Configuring ADSL, details ADSL line operation over POTS and ISDN circuits, ADSL data framing format ATM Frame UNI, OAM cell behavior, PDU encapsulation choices: PPP over ATM (PPPoA), PPP over Ethernet (PPPoE), and Routed IP over ATM (IPoA). • Chapter 14, Configuring the Virtual Private Network, outlines XSR support for Site-to-Site, Siteto-Central-Site, and Remote Access VPN applications. Other supported functionality includes RADIUS authentication, PKI authentication, NAT traversal, IP address management, dynamic routing over VPN (remote access only), digital signature and certificate support, GRE over IPSec, and AAA. • Chapter 15, Configuring DHCP, details the router’s support for the Dynamic Host Configuration Protocol including dynamic and manual IP address allocation, persistent storage of client values, temporary or permanent network address allocation, and nested scopes. • Chapter 16, Configuring Security on the XSR, describes methods to protect the router against hacker attacks and install strong security including ACLs, AAA service, firewall, and how to configure these features. • Appendix A, Alarms/Events and System Limits, lists the high, medium and low severity alarms and events captured by the XSR as well as system limits for various XSR functions as a function of installed memory. • Appendix B, SNMP Proprietary and Associated Standard MIBs, lists and describes XSR-supported SNMP tables and objects for the following standard (partial listing) and proprietary MIBS. Conventions Used in This Guide The following conventions are used in this guide Note: Calls the reader’s attention to any item of information that may be of special importance. Nota: Llama la atencion del lector a cierta información que puede ser de especial importancia. Caution: Contains information essential to avoid damage to the equipment. Precaución: Contiene información esencial para prevenir dañar el equipo. Achtung: Verweißt auf wichtige Informationen zum Schutz gegen Beschädigungen. Electrical Hazard: Warns against an action that could result in personal injury or death due to an electrical hazard. Riesgo Electrico: Advierte contra una acción que pudiera resultar en lesión corporal o la muerte debido a un riesgo eléctrico. Elektrischer Gefahrenhinweis: Installationen sollten nur durch ausgebildetes und qualifiziertes. Personal vorgenommen werden. xxviii Preface Conventions Used in This Guide Warning: Warns against an action that could result in personal injury or death. Advertencia: Advierte contra una acción que pudiera resultar en lesión corporal o la muerte. Warnhinweis: Warnung vor Handlungen, die zu Verletzung von Personen oder gar Todesfällen führen können! Bold/En negrilla Text in boldface indicates values you type using the keyboard or select using the mouse (for example, a:\setup). Default settings may also appear in bold. El texto en negrilla indica valores que usted introduce con el teclado o que selecciona con el mouse (por ejemplo, a:\setup). Las configuraciones default pueden también aparecer en en negrilla. Italics/It áli ca Text in italics indicates a variable, important new term, or the title of a manual. El texto en itálica indica un valor variable, un importante nuevo término, o el título de un manual. SMALL CAPS/ MAYUSCULAS Small caps specify the keys to press on the keyboard; a plus sign (+) between keys indicates that you must press the keys simultaneously (for example, CTRL+ALT+DEL). Las mayusculas indican las teclas a oprimir en el teclado; un signo de más (+) entre las teclas indica que usted debe presionar las teclas simultáneamente (por ejemplo, CTRL+ALT+DEL). Courier font/ Tipo de letra Courier Text in this font denotes a file name or directory. El texto en este tipo de letra denota un nombre de archivo o de directorio. + Points to text describing CLI command. Apunta al texto que describe un comando de CLI. FastEthernet FastEthernet and GigabitEthernet references are generally interchangeable throughout this guide. Las referencias a los terminos FastEthernet y GigabitEthernet son generalmente intercambiables en el contenido de esta guia. XSR User’s Guide xxix Getting Help Getting Help For additional support related to the XSR, contact Enterasys Networks by one of these methods: World Wide Web http://www.enterasys.com Phone (978) 684-1000 1-800-872-8440 (toll-free in U.S. and Canada) For the Enterasys Networks Support toll-free number in your country: http://www.enterasys.com/support/gtac-all.html Internet mail support@enterasys.com To expedite your message, please type [xsr] in the subject line. FTP Login Password ftp://ftp.enterasys.com anonymous your email address Acquire the latest image and Release Notes http://www.enterasys.com/download Additional documentation http://www.enterasys.com/support/manuals Forward comments or suggestions techpubs@enterasys.com To expedite your message, include the document Part Number in the subject of your email. Before contacting Enterasys Networks for technical support, have the following information ready: xxx Preface • Your Enterasys Networks service contract number • A description of the failure • A description of any action(s) already taken to resolve the problem (e.g., rebooting the unit, reconfiguring modules, etc.) • The serial and revision numbers of all relevant Enterasys Networks products in the network • A description of your network environment (layout, cable type, etc.) • Network load and frame size at the time of the problem • The XSR’s history (i.e., have you returned the device before, is this a recurring problem, etc.) • Any previous Return Material Authorization (RMA) numbers 1 Overview This chapter briefly describes the functionality of the XSR. Refer to the following chapters in this manual for details on how to configure this functionality and the XSR CLI Reference Guide for a description of associated CLI commands and examples. The following functionality is supported on the XSR: • System Management - The XSR’s resources can be managed via four methods: the Command Line Interface (CLI) for full configuration, performance and fault management; the Simple Network Management Protocol including SNMP v1/v2c/v3 agent, for remote monitoring; the NetSight Atlas Router Services Manager application for firewall and ACL configuration; and the Web to gather version information. These tools control the XSR’s many hardware and software facilities. Also supported: memory management, SSH v2 server, full configuration backup and restore, EOS Fallback for reliable image upgrades, Simple Network Time Protocol (SNTP v3) client and server (unicast mode) external source synchronization, login banner, and a host of proprietary and standard MIBs including Download, Syslog, Configuration Management, Configuration Change, Timed Reset, Chassis, Persistence, Host Resource, Enterprise Firewall and VPN, and Protocol MIBs (OSPF, RIP, Frame Relay, and PPP), SNMP Informs and Service Level Agreement (SLA) agents. The XSR’s SNMP MIBs support readable checksums on XSR configurations and the Enterasys Configuration Management MIB will TFTP a file on-the-fly to the XSR Flash, load the file to running config and save it to startup-config. The XSR also supports placing a hostname in the Syslog message header and configuring multiple Syslog servers. • Remote Auto Install (RAI) - automatically retrieves a centrally managed configuration specifically created for a remote XSR by one of three methods: over a Frame Relay network using the lowest numbered serial port, a PPP connection using the lowest numbered serial port, or over an ADSL connection. • Ethernet Interfaces - The XSR 1800 Series’ two 10/100 Base-T FastEthernet interfaces and XSR 3000 Series’ three 10/100/1000 BaseT GigabitEthernet interfaces handle the router’s LAN traffic stream, with support for alarms and events, diagnostics, packet filtering and statistics gathering, and Ethernet backup. • T1/E1 & T3/E3 Interfaces - The XSR’s T1/E1 and T3/E3 subsystem on NIM-based I/O cards handle the router’s WAN traffic with support for alarm detection and signaling, diagnostics, line encoding, the Drop & Insert NIM, and a host of other functionality. • Serial Interface - The XSR’s NIM serial interface typically supports PPP providing both asynchronous and synchronous protocol support. The XSR’s Console port can also be used as a Serial connection to the router for remote or backup dialin. • PPP (WAN) -The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP defines procedures for the assignment and management of network addresses, asynchronous and synchronous encapsulation, link configuration, link quality testing, network protocol multiplexing, error detection, and option negotiation for such capabilities as network-layer address negotiation XSR User’s Guide 1-1 and data-compression negotiation. Also supported: PPPoE client and sub-interface monitoring, and Multilink PPP protocols as well as Dial on Demand (DoD), Bandwidth on Demand (BoD), Multi-Class MLPPP. 1-2 Overview • IP Protocol - IP supports interconnected systems of packet-switched computer communication networks. It uses a 32-bit addressing scheme where an IP address is represented by four fields, each containing 8-bit numbers. Also supported: secondary IP addressing, CIDR, the Virtual Router Redundancy Protocol (VRRP), Proxy DNS, VLAN and Policy Based routing, Route Preference, multiple static routes, and AAA, PPP and OSPF debugging. • DHCP - The XSR supports DHCP Server and Client on the trusted LAN to provide IP addresses to computers on a customer's private LAN segment, temporary or permanent network (IP) address and network configuration parameter assignment to clients, persistent storage/database of network values for network clients - Bindings Database, persistent storage of network client lease states kept after a system reboot, persistent and usercontrollable conflict avoidance to prevent duplicate IP address including configurable ping checking, and visibility of DHCP network activity and leases through operator reports statistics and logs. • Network Address Translation - static NAT, Network Address Port Translation (NAPT) and dynamic NAT by source/destination IP address, dynamic NAT pool mapping with overload, PPTP/GRE ALG and arbitrary IP address for NAPT, on the interface and port-forwarded static NAT, multiple NATs on an interface. • IP Routing - The XSR supports RIP, OSPF and BGP4 dynamic routing, a vital function of the IP protocol. Stored in a routing table, network data is used to determine the route for each packet passing through the XSR. Also supported: route redistribution between OSPF and RIP, static routes, multiple static routes to the same destination with different hops and distances, Virtual Router Redundancy Protocol (VRRP) for default router redundancy and load balancing, DNS proxy, Virtual Area Networks (VLAN 802.1Q), priority VLAN routing 802.1P, policy based routing, route preference, multiple static routes, Protocol Independent Multicast - Sparse Mode (PIM-SM), and configurable RIP and OSPF poll timers. • Equal-Cost Multi-Path (ECMP) - per packet and per flow (round robin) support for OSPF, BGP and static routes (RIP excluded). • Border Gateway Protocol v4 - The XSR supports the following the BGP-4 features: all MIB tables defined in RFC-1657 including BGP SNMP traps, protection of BGP sessions, capabilities advertisement, route reflection, communities, route refresh, route flap dampening, AS confederations, debugging, per neighbor configurable BGP timer and filter tags. • PIM/IGMP - Protocol Independent Multicast - Sparse Mode (PIM-SM) and Internet Group Management Protocol (IGMP) is supported with the following features: IGMP versions 1, 2 and 3 (on LAN interface only), PIM-SM version 2, static IGMP group membership, dynamic RP (BootStrap without Admin Scope Zone support), static RP, register and assert mechanism, Rendezvous Point Tree (RPT) and Shortest Path Tree (SPT) Build-up, RPT to SPT Switch, Join/Prune Mechanism, and Source Specific Multicast (SSM). • Frame Relay - The XSR provides this fast-packet switching method for wide-area networking. Acting as a DTE, the router encapsulates data in a frame and transmits that data while serving as a source device. When it is a destination device, it receives frames and de-encapsulates them. The XSR’s implementation of Frame Relay employs DTE support of the User Network Interface (UNI) for PVC (DLCI) connections with Committed Information Rate (CIR) traffic shaping, BECN/FECN congestion control, standard LMIs ILMI, ANSI Annex D, CCITT Annex A, FRF.12 fragmentation, periodic keep-alives, multi-protocol interconnect over Frame Relay, Frame Relay Inverse ARP, multiple logical interfaces over the same physical port, QoS including standard FIFO queuing or IP QoS on DLCIs, DCE support, and Frame Relay over ISDN. • Quality of Service - The XSR provides traffic classification using IP Precedence and DSCP bits, bandwidth control via metered, policed and prioritized traffic queues, and queue management utilizing Tail Drop, Random and Weighted Early Detection (RED, WRED). Also, QoS on Input including classification based on class maps (similar to QoS on Output), marking per traffic flow (DSCP and IP precedence fields), and policing per traffic class, and QoS over VPN. • ADSL - Three PDU encapsulation types are available for ADSL: PPP over ATM (PPPoA), PPP over Ethernet (PPPoE), and Routed IP over ATM (IPoA). Also supported: POTS and ISDN circuit support, ATM Frame UNI (FUNI) data framing format, OAM cells: AIS, RDI, CC, Loopback over F4 and F5 flows, up to 30 ATM Permanent Virtual Circuits (PVCs), ATM UBR traffic class, ATM Adaption Layers 0, 5, response to inverse ARP requests, and maintenance of SNMP Interface and Interface Stack tables. • Virtual Private Network - The XSR supports VPN tunnels using L2TP, PPP or IPSec protected by DES, 3DES, RC4, MD5, AES or SHA-1 encryption. VPN tunnels are authenticated/ authorized for credentials using pre-shared keys or Public Key Infrastructure (PKI) certificates (Microsoft and Verisign). Also supported: DF Bit override, OSPF over VPN, GRE over IPSec, interaction between firewall/NAT/VPN, ToS bit preservation, IP helper on VPN interfaces, IETF/Microsoft-compatible NAT traversal for L2TP, and QoS over VPN. • Security - In its firewall feature set, the XSR provides stateful firewall protection against a variety of Denial of Service attacks, FTP and H.323 ALG support, application command filtering for FTP, SMTP, NNTP, HTTP, onboard URL filtering, firewall logging and authentication, and supports standard and extended Access Control Lists to manage network access. Also supported: AAA for firewall, Console/Telnet and SSHv2 users, and dynamic reconfiguration of firewall policy without having to restart the code. • Dialer Interface - Dial Services are a cost-saving alternative to the leased line connection between two peers and they can be implemented for different types of media for both inbound and outbound connections. The XSR supports incoming calls on analog modems. • Dial Backup - The dialed backup feature provides a backup link over a dial line. The backup link is brought up when a failure occurs in a primary link, and it is brought down when the primary link is restored. This feature is supported for PPPoE to enable cable backup over FastEthernet/GigabitEthernet sub-interfaces. Also supported: Dialer Watch, ISDN callback, and dialer interface spoofing. • ISDN - The XSR’s BRI and PRI switched and leased lines set up and tear down calls, usually under the control of the Dialer. The XSR’s ISDN services BRI and PRI lines with a 1, 2 or 4 port Channelized NIM card for PRI lines, 1 or 2 port BRI-S/T NIM card, or 1 or 2 port BRI U NIM card. Also supported: Circuit Mode Data (CMD) channel (DS0s) switching by the CO to the destination user for the duration of the call, outgoing calls supported for Backup, DoD/BoD, incoming calls routed to the correct protocol stack based on called number/sub-address and calling number/sub-address, permanent B-channel support, i.e. 64 or 128 kbps lease line (each BRI port can be set for CMD or Leased-Line mode of operation), BRI supported switches: ETSI, TEI auto-negotiated for BRI, automatic configuration of Q.921/Q.931 (Layer 2/Layer 3) by selection of switch type, PRI supported switches: ETSI, NI, DMS100, NTT, automatic configuration of PRI restart and maintenance modes, Fixed TEI of 0 for PRI, ISDN switched and leased line connections, bandwidth optimization through Dial on Demand (DoD), Bandwidth on Demand (BoD) and Bandwidth Allocation Protocol (BAP), security through caller ID, call monitoring, ISDN callback, Multilink PPP (MLPPP), per call activation for NTT switches, and Frame Relay over ISDN. The XSR also provides: asynchronous serial support through an external modem, synchronous serial, Unnumbered Interface Addressing, PPP encapsulation, authentication from XSR’s database for PAP and CHAP, dialer profile support, configurable redialer, ISDN callback, dialer watch, and dialer interface spoofing. XSR User’s Guide 1-3 1-4 Overview 2 Managing the XSR The XSR can be managed via three interfaces with varying levels of control: the Command Line Interface (CLI) for full configuration, performance and fault management; the Simple Network Management Protocol (SNMP) for remote monitoring and firmware upgrades, and the Web for gathering version information. Utilizing the Command Line Interface The Command Line Interface (CLI) is a widely used tool to access and control configurable parameters of the XSR. You can access the CLI three ways: • Directly connect to the Console port via an asynchronous terminal • Over the network using Telnet or SSH via a LAN or WAN interface Connecting via the Console Port on XSR Series For ease of use when first setting up the XSR, you can directly connect the Console port to an asynchronous terminal (via Microsoft’s HyperTerminal or other program) with the following values: 8 data bits, no parity, 9600 bps, 1 stop bit, flow control - none. Because the Console port is wired as a DCE with a DB-9 connector, a DB-9 null modem cable is needed to attach a standard PC COM port to the Console port. Although a login (admin) is required to make this connection, for additional security you can later delete the admin user as well as disable Telnet sessions through the Console. Using the Console Port for Dial Backup on the XSR 1800 Series Optionally, you can set up the Console port as a dial-in WAN interface for dial backup purposes (refer to the following Caution). This option is avaialable only on the XSR 1800 series. For details, see Chapter 3 of the XSR Getting Started Guide. Caution: When you enable the Console port as a WAN port, you can no longer directly connect to it because it is in data communication mode. Your only access to the CLI will be to Telnet/SSH to an IP address of a configured port. Also, if startup-config does not set up any of the ports properly and sets up the console port as a serial port, you will no longer be able to login and will have to press the Default button (1800 Series) to erase your configuration. If you opt to connect a modem to the Console port with the required straight-through cable, configure the sample settings described below. Note: This feature is not supported on the XSR 3000 Series. XSR User’s Guide 2-1 Utilizing the Command Line Interface Using the Console Port to Remotely Control the XSR The XSR’s Console port can also be connected to a modem for the purpose of remote console control. Make the connection with a straight-through cable and enter the following XSR commands: XSR(config)#interface serial 0 XSR(config-if)#physical-layer async XSR(config-if )#clock rate 9600 XSR(config-if )#encapsulation ppp XSR(config-if )#ip address 192.168.10.1 255.255.255.0 XSR(config-if )#ppp timeout retry 20 XSR(config-if )#no shutdown Set the modem switches as follows: • DTR override (DTR is ignored) • No echo offline commands • Auto answer on first ring • Carrier Detect normal • Load factory defaults • Dumb mode (AT command mode disabled Connecting a Serial Interface to a Modem The XSR supports attaching a Serial (RS-232) NIM interface and modem to accept inbound and outbound data calls. Modem switches and the receiving-side XSR are configured exactly as described in “Using the Console Port to Remotely Control the XSR” except that the interface serial 0 command must instead specify interface serial 1 (or higher). Straight-through cabling is required again for the connection. On the calling-side XSR, enter the following commands: XSR(config)#interface serial 1/1 XSR(config-if )#physical-layer async XSR(config-if )#clock rate 38400 XSR(config-if )#encapsulation ppp XSR(config-if )#dialer pool-member 1 XSR(config-if )#no shutdown XSR(config-if )#dialer interface 1 XSR(config-if )#dialer pool 1 XSR(config-if )#dialer string XSR(config-if )#address 192.100.10.2 255.255.255.0 XSR(config-if )#no shutdown And enter the following calling-side modem switch settings: • DTR normal (DTR disconnects) • Echo offline commands • Verbal result codes • Display result codes • Carrier Detect normal • AT command mode enabled 2-2 Managing the XSR Utilizing the Command Line Interface Terminal Commands If you want to display identification information about the current terminal connection, issue the show whoami command. Refer to the XSR Getting Started Guide and XSR CLI Reference Guide for more information on commands. Connecting via Telnet Once the XSR is properly configured with a valid IP address, you can remotely connect to the CLI via Telnet using the default user admin with no password. Later, you can create users with the username command. Although up to five concurrent Telnet/SSH and one Console sessions are supported, if more than one session is running simultaneously (including the Console session), only one session permits configuration changes. Any other session could only view configuration settings. This prohibition applies to all commands that make changes to the configuration and is limited to Global mode. For example, if a user is in Global mode and another user tries to enter Global mode, the second user will get the following error message: XSR#config Configuration is currently locked by user admin. Please try later. Also, in order to ensure that an administrator can always login to the router, one of the five permitted Telnet or SSH sessions is always reserved for the administrator. That is, if the first four sessions are regular users, the fifth session will allow only the administrator to login. But if one of the first four is logged in as administrator, then the fifth session can be any user. You can also Telnet from the XSR to a server by using the telnet ip_address command. It is a useful utility for diagnostics. Be aware that the router will try to make a Telnet connection for 70 seconds. Connecting via SSH Secure Shell (SSH v2) encrypts the link to the XSR so it is a more secure alternative to Telnet for remote connections. To activate SSH, invoke the following commands: • Create a host key pair with crypto key dsa generate • Add an AAA user including a password and privilege level with aaa user, password and privilege 15. You can also create a user in the CLI database with the username command. • Enable SSH access with policy ssh • Enable local authentication with aaa client ssh • Load an SSH client application on your PC to connect with the XSR • Optionally, you can disable Telnet with ip telnet server disable for higher security • Optionally, if you are enabling the firewall feature set you can configure an Access Control List (ACL) to allow a single host SSH access to the XSR by entering these commands: XSR(config)#access-list 100 permit tcp host 192.168.1.10 eq 22 XSR(config)#access-list 100 deny tcp any host 192.168.1.10 eq 22 XSR(config)#access-list 100 permit ip any XSR(config)#interface fastethernet 1 XSR(config-if )#ip access-group 100 in XSR User’s Guide 2-3 Utilizing the Command Line Interface PuTTY and other shareware programs are compatible with the XSR’s SSH server. Refer to the XSR Getting Started and CLI Reference guides for more details. Accessing the Initial Prompt The CLI is protected by security. Before you can access EXEC mode, you must enter a valid password. This mode lets you test basic connectivity of the XSR but does not permit you to change or monitor the router’s configuration. Access to enhanced commands is permitted only if you enter Privileged EXEC mode by entering enable. You can logout at any time by entering exit while in EXEC mode. Refer to Table 2-1 for session limits. Table 2-1 Session Limits Parameter Limit Total number of CLI Telnet/SSH sessions permitted 5 SSH sessions permitted with 32 MBytes of memory 1 Console sessions permitted 1 Number of Telnet sessions reserved for administrators 1 Terminal auto-logout timeout value (configurable) 1800 seconds The show resources command displays all resources created and the memory utilized. Refer to the XSR CLI Reference Guide for more details. Synchronizing the Clock XSR 1800 and 3000 Series routers have an on-board Real Time Clock (RTC) chip with which to keep accurate time across the network. As an alternative to accessing a public time server, you can utilize the RTC as a time reference for isolated networks employing the Simple Network Time Protocol (SNTP). XSR 1200 Series routers do not carry an RTC chip, however, and for these you must synchronize from an external source. The XSR supports both SNTP v3 client and server (unicast mode) to synchronize logs on routers, switches and other network devices. Scenarios include isolated “flat” or hierarchical topologies as well as public time-server schemes. A flat scenario, for instance, might have Router A (XSR 3150) acting as a server to both Router B (XSR-1220) and Router C (XSR-1220) which makes a client request through Router B via an ISDN connection. A hierarchical scenario, on the other hand, might have Router B acting as both SNTP client and server, making a client request of Router A and taking a client request from Router C over ISDN. Note: We recommend using an NTP time server over an SNTP server with an RTC as its primary source for greater accuracy. In this respect, the default stratum is set internally to 10. SNTP client and server are configured with the sntp-client server [primary | A.B.C.D.][alternate | A.B.C.D.] and sntp-server enable commands, respectively. Also, you can also set the interval between client requests with the sntp-client poll-interval command. Refer to the XSR Getting Started Guide for a configuration example and the XSR CLI Reference Guide for command details. 2-4 Managing the XSR Utilizing the Command Line Interface Managing the Session A first-time CLI session is set up with default attributes; e.g., the session is set to time out after 1800 seconds of idle time. You can reconfigure session values such as create users, passwords, and login banners, and set Telnet and Web access. Refer to the XSR CLI Reference Guide for details about these commands. Remote Auto Install The Remote Auto Install (RAI) feature automatically retrieves a centrally managed configuration specifically created for the node’s operation in your network. Basically, RAI sends a configuration file from a TFTP server for configuring the remote XSR. This file is then placed in the Flash: directory as the startup-config and run via the normal startup process. RAI can be performed by one of three methods: over a Frame Relay network using the lowest numbered serial port, a PPP connection using the lowest numbered serial port, a PPPoE connection using the ADSL network, or over an LAN connection using the lowest number Ethernet port. RAI simplifies management and deployment of the XSR. Because device configurations are stored centrally on the TFTP server, re-configuring the XSR requires only a remote reboot. Installing the device at a new location involves deploying a new startup-config file with a corresponding name (based on the serial number or hostname) and rebooting the XSR. Described in further detail, these choices are: • RAI over Frame Relay is performed over a Frame Relay network. The RAI central site includes a Bootp server on a DLCI to deliver the local IP address for the branch (remote) site in order to communicate with the configuration management server. • RAI over PPP can be performed over either leased or dial-up lines. Leased line RAI operates similar to Frame Relay RAI in that it is perfomed over a serial link via a leased Telco line. Dialin RAI occurs where a designated port is configured and waiting for the central site to dial in. Dial in can utilize a modem attached to the XSR’s serial or switched BRI/ PRI interfaces. • RAI over ADSL can be performed over the ADSL network. XSR uses the auto discovery mechanism to identify an existing PVC on the ADSL line and tries to retrieve the startup configuration using PPPoE and TFTP over that PVC. • RAI over Ethernet utilizes a DHCP client/server methodology to quickly retrieve a particular file from a TFTP server that will be used to configure the remote XSR. Refer to the “Software Configuration” chapter of the XSR Getting Started Guide for a RAI configuration examples and phased output from the program. RAI Features and Requirements At the branch site, the XSR supports the following Frame Relay IETF features: • Operates on Serial NIM interfaces only - lowest slot/card/port only. • Standard physical Serial media-types. • DTE LMI type ANSI, ILMI, Q933 supported. • Up to 30 DLCIs supported on Frame Relay (FR) connection. • Bootp client. • Reverse DNS client. • TFTP client. XSR User’s Guide 2-5 Utilizing the Command Line Interface • Backwardly compatible/transparent to those not requiring RAI. • Console display of RAI progress. • Console interrupt of RAI process at any time. • CLI configurable RAI loading. Persistent, 5-minute try, and none (disable). • No rebooting required to activate configuration. • Hostname choices are flexible to include/exclude domain and canned names as well for the configuration file. • The configuration file is examined for the proper target node identification to minimize the chance of being locked out of remote access. At the central site, the XSR supports the following Frame Relay IETF serial interface features: • Operational on all physical interfaces which support Frame Relay - T1, T3, and Serial. • Bootp server configurable on a per DLCI basis. • DLCI limit based on standard LMI limitation. (ILMI, AUTO - 190, ANSI, Q933A - 300) • Bootp server. • IP helper address for forwarding to DNS and TFTP servers. • Configurable to Inverse ARP and No Inverse ARP on a DLCI basis. At the branch site, the RAI ADSL has the following features: • F5 OAM end-to-end or segment cells are used to discover the link VPI and VCI numbers. • PVC connections should be set with the VPI ranging from 0 to 128 and VCI from 32 to 128. • RAI requires the ADSL line to be connected to the first port of the ADSL card. • ADSL RAI works with PPPoE SNAP or MUX. The PPPoE server must be reachable from the DSLAM either by ATM or by bridging. ADSL RAI does not work with IPoA or PPPoA. • The local IP address is obtained using PPPoE IP address negotiation. • The serial number of the XSR is the initial username and password for CHAP/PAP PPPoE. • The file name of the startup-config sought from the TFTP server is the serial number of the branch XSR. At the central site, the RAI ADSL requires the following features: • The device terminating the ADLS connection (mostly likely DSLAM), has configured and enabled PVC with F5 OAM cells. • The PPPoE server provides a pool of IP addresses for IP configuration of the remote XSR. • The PPPoE server authenticates the remote XSR with CHAP or PAP using the XSR’s serial number as the username (hostname) and password. • On the interface where PPPoE is terminated, broadcasting should be allowed by helper address or some other method in order for TFTP discovery packetsto find the TFTP server. • The name of the startup-config files stored on the TFTP server should match the serial number of the branch XSR. 2-6 Managing the XSR Utilizing the Command Line Interface DHCP client over the LAN: • Operational over an Ethernet interface only on the lowest slot/card/port only. • Uses the options field for TFTP server, IP address, host name and config file. • Optionally uses Reverse DNS if options are not populated. At a branch site, the XSR supports the following features over a PPP IETF serial interface: • Operational on Serial NIM interfaces only - Lowest slot/card/port only. • Supports standard physical Serial media-types. • Supports Sync/Async interface type. • Supports the following clock rates (in bps) for the Async interface: – 9600, 14400, 33300, 28800, 57600, and 115200 baud. • Supports PPP and MLPPP negotiation via LCP. • Supports IP address negotiation via IPCP. RAI Requirements on the XSR The branch XSR retrieves the configuration file by means of a TFTP client. The TFTP transfer requires a specific file name and unique local IP address to communicate with a remote server. The branch XSR must get the local IP address from the central site. How it is done differs between RAI methods. FR RAI uses the Bootp server residing on the central site node, RAI DHCP gets the local IP through DHCP negotiation, while PPP-based RAIs facilitate PPP IP address negotiation. At the end of the process, the interface on the branch XSR is configured with an IP address and can communicate with the TFTP server. The file name is the name of the startup file that is transferred from the TFTP server to the branch XSR. It derives from the XSR hostname. As in the case of the local IP address, the branch XSR must get the hostname from the central site. RAI uses the rDNS for this purpose. DNS servers map nodenames/domains and IP addresses - typically, you provide a hostname and the DNS server returns the IP address. But rDNS lookup used by RAI offers an IP address and DNS returns the hostname.domain. RAI ADSL is an exception to this process since is not required to perform rDNS during the RAI process because it uses the serial number of the XSR as the name of the startupconfig file. In the case of RAI over Ethernet, where DHCP is configured to provide the configuration file, no rDNS is required because config-file is the file name. In general, accessing the DNS or TFTP server requires the client (in this case, the branch XSR) to know the IP address of the server. Since the branch router has no configuration and no knowledge of the server address, it must broadcast a request for DNS or TFTP access. For RAI to work correctly, the terminator of the connection (other end of the FR DLCI, PPP or PPPoE point-to-point connection) is required to channel the broadcast to a specific address. This is done by entering the ip helper-address command at the central site. How RAI Components Work Frame Relay (Remote Router) The FR interface keeps the FR link alive via proper protocol handling of LMI. If the connection fails, or new DLCIs are added to the list, the FR interface will notify RAI of the changes. XSR User’s Guide 2-7 Utilizing the Command Line Interface RAI checks each DLCI, up to 30, on a given interface for a Bootp response, an rDNS server and a TFTP server with a configuration file. The first DLCI that accomplishes this will be chosen. If the connection fails, RAI will reset itself and restart at Phase 1, next media-type. If the DLCI does not have all of the correct servers and responses, the next DLCI on that interface is queried. The last DLCI in the list will loop around to the first DLCI to be continued indefinitely in persistent mode and for five minutes in non-persistent mode as set by the netload command. A node with no startup-config will default to persistent (forever) mode. A node with no Serial NIM card installed will abort RAI processing immediately and proceed to the login prompt after executing a local startup-config file if it exists. While in RAI mode, inverse ARP, pings, and other packets entering the port may be optionally responded to depending on the phase of the process. It is not recommended that you rely on the proper response to these packets. Bootp Client The Bootp client sends up to five broadcast bootp requests with the MAC address of the first Ethernet port in the node as the client's unique hardware address. The MAC address is chosen this way for compatibility with bootp servers to be associated based on the hardware address. In newer FR/routers which provide Bootp server functionality inside the FR configuration, this hardware address field is ignored and responded to locally with static mapping. In the Bootp response, the boot file provided is ignored by the client. The IP address assigned by the Bootp server in the bootp reply is used as the client's IP address. Reverse DNS Client The rDNS client sends a broadcast request with the discovered IP address from bootp as the source. This rDNS request occurs five times before quitting. The broadcast relies on the central site router to have a helper IP address configured to forward to the correct server. Use the ip helper-address command to set the DNS server IP address. TFTP Client The TFTP client broadcasts a request for the hostname-config file first. The TFTP server responds with a unicast reply, from then on unicast is used for both the client and server. The TFTP broadcast relies on the central site router to have a helper IP address configured on the corresponding interface to forward to the correct server. If the file is not found or is read-protected, the TFTP client will try the additional file types shown below. Once all the names have been exhausted, the next DLCI from FR will be tried. • Hostname-confg • Hostname.domain-confg • Hostname.cfg • Hostname.domain.cfg • enterasys-confg • enterasys.cfg If the server does not respond, RAI tries the next DLCI, renegotiating bootp and rDNS as before. Frame Relay (Central Site) At the central site, the node is a fully configured router to accept broadcast bootp requests from a remote router. If bootp service is to be provided by an external server then omit this parameter. 2-8 Managing the XSR Utilizing the Command Line Interface With bootp enabled, DHCP relay and server functionality is disabled on this DLCI for broadcast packets entering from this DLCI. Unicast bootp requests are still forwarded to the server. Configuration on a DLCI by DLCI basis is supported for a bootp response, requiring that a statically-mapped DLCI number be configured with a corresponding IP address. This mapping is valid for both point-to-point and multi-point sub-interfaces. Since the XSR does not support an internal rDNS or a TFTP server, you must map the helper address to the appropriate server in sub-interface mode with ip helper-address A.B.C.D. DHCP over LAN (RAI over Ethernet) The DHCP over LAN client/server RAI employs a very fast installation for providing a running configuration to an XSR. RAI over Ethernet retrieves a particular file from a TFTP server that will be used to configure the remote router. This file will then be copied to Flash as the startupconfig and executed via normal startup procedures. DHCP Client must be set on the XSR’s first Ethernet port. It sends a DHCP request several times up to 18 seconds and if no response is received, RAI will proceed to the next RAI connection type. The DHCP Client seeks the following information: • IP Address - This mandatory data is required because the DHCP Server must assign a static MAC address to the IP address • Config file name - This optional data is needed otherwise a reverse DNS server is required. • TFTP server address - This optional data is needed otherwise TFTP will send its initial message. • Hostname - This optional data is not needed if the config file or an rDNS server are available In practice, one of the following scenarios is played out: • If the client receives an IP address only, it will request the hostname.domain via reverse DNS and then a TFTP broadcast will be sent to find the file. • If the client receives the config file name as well as the TFTP server address, then the TFTP request will be initiated as a unicast message containing the DHCP config file name. • If the client receives the hostname, reverse DNS will not be tried. The hostname will be used only if the client config file name is not provided. The DHCP application usually performs dynamic address assignment on a first-come, first-serve basis from an address pool. For RAI to work properly, the DHCP server must statically map the XSR’s MAC address to the IP address that will be used by reverse DNS. Failing to do so will cause the XSR to try retrieving the wrong file from the TFTP server. The DHCP Server seeks the following information: • IP Address - This mandatory data is required because the DHCP Server must assign a static MAC address to the IP address • Config file name - This optional data is supplied by DHCP Option 67. • TFTP server address - This optional data is supplied by DHCP Option 150. • Hostname - This optional data is supplied by DHCP Option 12. The XSR’s DHCP server feature is used by RAI over Ethernet but if a PC/Unix/Linux-based application is available and meets the criteria for static assignment of IP addresses based on MAC addresses, it may be used. XSR User’s Guide 2-9 Utilizing the Command Line Interface PPP RAI over a Leased Line PPP over a leased line performs similarly to Frame Relay RAI over a serial link via a leased Telco line. When PPP negotiation is successful, a point-to-point connection is established from the remote XSR to the central router. Then the remote XSR can obtain its IP address. But, you must assign a default peer IP address in the central router to give the remote XSR a valid IP address. After the remote XSR acquires the address, RAI proceeds by sending DNS and TFTP requests. At the central site, the node will be fully configured with PPP encapsulation. In case multilink is required, the PPP multilink option is enabled and a multilink interface created. The central router is also configured with a default IP address over the serial interface for non-multilink PPP circumstances and over a multilink interface for a multilink PPP scenario. PPP RAI over a Dial-in Line Dial-in PPP RAI is performed as a background task in that the designated port is configured and waiting for the central site to dial in while the other RAI type (Ethernet/Frame Relay/PPP Leased line) is still operating on the other ports. As soon as the dial-in port reaches a PPP up state, the rest of the RAI process is terminated. Dial-in line RAI requires either a modem attached to the serial interface or the switched BRI/PRI interface. Similar to leased line PPP RAI, successful PPP negotiation provides the point-to-point link from the remote XSR to the central router. Authentication may then be required by the central site. After successful authentication, the remote XSR can obtain the IP address through negotiation but a default peer IP address must be assigned in the central router to provide the remote XSR with a valid IP address. Dial-in PPP RAI is directed to a port by the following priority with only one port type defined: • The first BRI port found in the XSR or, • The first PRI port found in the XSR or, • The second serial port found on the XSR (since the first serial is defaulted to be used for FrameRelay/PPP Leased line RAI). The XSR’s Dialer interface (Dx) is configured to handle a dial-in call and set for PPP encapsulation to accept either CHAP or PAP authentication. While being authenticated by the central site, the serial number of the remote XSR will be used as the user name and the password. The central site must decide which PPP authentication type to use or none at all. The Dialer interface’s IP address is negotiated and is assigned via PPP negotiation similar to PPP leased line RAI. Refer to the XSR Getting Started Guide for configuration examples. PPP RAI over ADSL RAI ADSL is performed over the ADSL line using PPPoE. Similar to other RAI methods, RAI tries to configure a point-to-point connection in order to download the startup file from the TFTP server. To reach the TFTP server, RAI ADSL must connect to the DSLAM with a proper PVC and establish the PPPoE session with the PPPoE server. The PPPoE server that terminates the PPPoE connection for the XSR handles the TFTP request and directs it to a proper TFTP server (that may or may not be on the same device as the PPPoE server). When the XSR boots without the startup-config and the ADSL card is installed, the first RAI method tried is RAI over ADSL. If that fails, RAI moves on to other available RAI methods. RAI ADSL passes through four phases to configure the XSR during which it displays console messages about the state of the process. 2-10 Managing the XSR Utilizing the Command Line Interface The first phase establishes a physical connection (training) on the ADLS line. RAI ADSL attempts a physical connection on the first port of the ADSL card, waiting one minute for training to succeed. If it fails, RAI abandons ADSL RAI and moves to the next available RAI method. After training with the DSLAM, RAI must configure a proper PVC channel on the ADSL line. In this discovery hase, PVCs on a particular ADSL line are preconfigured on the DSLAM that terminates the ADSL physical line. In order to discover VPI and VCI numbers for the PVC, RAI ADSL sends F5 OAM cells on the line and collects responses (if any) from the the DSLAM. RAI searches PVCs starting from VPI = 0/VCI = 30 and stops on VPI=128/VCI=128. Because ADSL RAI conducts a linear search of the VPI/VCI space, searching for a PVC with high VPI/VCI values can be lengthy. Currently, RAI does not support preconfigured VPI/VCI numbers. RAI stays in discovery phase until it finds the first PVC that responds on OAM cells or until it exhausts the PVC space in which case it abandons ADSL RAI and moves to the next available RAI method. In the port setting phase, RAI configures sub-interface 1 on the first port of the ADSL card (atm 0.1) with the discovered PVC. If there is more than one discovered PVC, RAI begins with the first one. ADSL RAI tries two PPPoE encapsulations - SNAP and MUX. If authentication is required, RAI ADSL uses CHAP or PAP and takes the serial number of the XSR as its username and password - the PPPoE server must be configured with the XSR serial number to authenticate successfully. If authentication succeeds, the IP address is retrieved from the PPPoE server and the IP layer comes up. RAI ADSL waits one minute for authentication and the IP connection to come up. If it times out, it proceeds to the next encapsulation, or if both encapsulation types fail, for that PVC to try the next discovered PVC. In a case where there are no other PVCs to try, RAI abandons ADSL RAI and moves on to the next RAI method. The final phase involves TFTP, where RAI downloads the startup file. This phase is common to other RAI methods. Because TFTP broadcasts the request for the TFTP server, it is important that the server terminating the PPPoE session direct this request to the TFTP server (using the IP helper address). The startup file name is the serial number of the device. If TFTP fails and PVCs exist that were not previously tried for configuration, RAI returns to PPPoE negotiation and reconfigures the ATM 0.1 interface with a new PVC. Otherwise, it abandons ADSL RAI and moves on to the next RAI method. CLI Editing Rules To use the CLI efficiently, be aware of the following rules: • Case-sensitivity: CLI commands are not case-sensitive. For example, you can enter either SHOW VERSION or show version to display the XSR's software revision. But, some parameters may be case sensitive. For example, entering snmp-server community public is different from snmp-server community PUblic • Command Abbreviation: You can abbreviate commands and keywords to the minimum number of characters that define a unique abbreviation. For example, you can abbreviate the hostname command to hostn (but you cannot abbreviate to hos because other commands also start with the letters hos). • Output Display: By default, output data are displayed one page at a time if the data occupies more than one page. In this case, you can use the spacebar to scroll down to the next page or press ENTER to scroll down one line at a time. The default page size is 132 characters wide, 23 rows high and they are configurable in a range from 0 to 512 characters using the terminal command. Refer to the XSR CLI Reference Guide for more information about the command. XSR User’s Guide 2-11 Utilizing the Command Line Interface • Command Recall: Non-help commands are stored in the command history list buffer up to the last 32 commands. You can recall and edit previous commands using shortcut keys. For example: Ctrl+p/Ctrl+n will list the previous/next command respectively and can be applied repeatedly. The up-arrow or down-arrow keys provide the same feature if your terminal supports these keys. • Tab Completion: Pressing the TAB key or CTRL+I completes a command. In case of an ambiguous match, the word is completed up to the character which leads to ambiguity. For example, hostname and hostDos share the letters host, so tab completion completes the “command” ho to host. • Carriage Return/Enter: Pressing the carriage return/ENTER key signals the end of a CLI command. • Help Symbol: At any point you can enter the? character to prompt for a list of possible commands/parameters at a particular mode. • Error: Proper error messages are displayed if the command could not be issued due to syntax errors or invalid values made by the user. Typing these characters will produce output as follows: XSR#showFIioLLJl XSR#showFIioLLJl ^ % invalid input detected at '^' marker XSR# • Table 2-2 CLI Terminal Editing Command Keys: Refer to the following table for these useful shortcuts. CLI Shortcuts Command Description Command Description Ctrl + a Move cursor to beginning of line Ctrl + p Previous CLI command in history Ctrl + b Move cursor back 1 character Ctrl + r Echo current line Ctrl + c Same as the CLI end command Ctrl + u Delete all characters before cursor Ctrl + d Delete 1 character after cursor Ctrl + w Delete 1 word before cursor Ctrl + e Move cursor to end of line Ctrl + x Delete all characters before cursor Ctrl + f Move cursor forward 1 character Ctrl + y Restores the most recently deleted item Ctrl + h Delete 1 character before cursor Ctrl + z Same as the CLI end command Ctrl + I Tab completion Del Delete a character Ctrl + k Delete all characters after cursor Esc + b Move cursor back 1 word Ctrl + l Echo current line Esc + d Delete to end of word at cursor Ctrl + n Next CLI command in history Esc + f Move cursor forward 1 word Setting CLI Configuration Modes The CLI provides modes of operation permitting a subset of commands to be issued from each mode. Also, you can issue any command and acquire any mode if the command entered or mode acquired subscribes to the same parent. For example, you can issue the interface serial command at Crypto Map mode because both Serial Interface and Crypto Map modes subscribe to Global (config) mode. Table 2-3 describes a few primary modes of operation. 2-12 Managing the XSR Utilizing the Command Line Interface Table 2-3 CLI Configuration Modes Mode Function Access Method Prompt User EXEC Password-protected mode: •Changes terminal settings •Performs basic tests •Displays system information Login process XSR> Privileged EXEC This mode: •Sets system operating values •Shows configuration parameters •Saves/copies configurations Enter enable in User EXEC XSR# Global Sets system-wide values. Save changes Enter configure terminal in after a reboot by copying the runningPrivileged EXEC configuration to the startup-configuration XSR(config)# Interface Modifies/assigns port parameters on a port-by-port basis Enter interface interface-type in Global mode XSR(config-if )# Router Sets RIP, OSPF or BGP parameters Enter router rip/ospf in Global mode XSR(config-router)# Refer to Figure 2-1 for a graphic example of configuration modes. Figure 2-1 Partial Configuration Mode Tree Login EXEC enable Privileged EXEC show commands 5 configure Global Configuration4 show commands 5 Controller cont-parameter Crypto map Interface if-type num1 Router router-parameter 2 Config-if Config-Router 3 Controller T3/E3 T1/E1 The footnotes below refer to command options cited in the illustration. 1. The interface type can be one of the following: Serial, FastEthernet, GigabitEthernet, BRI, loopback, Multilink, VPN, Dialer, or ATM 2. Router parameters can be: RIP, OSPF or BGP 3. Controller can be one of the following: T1, E1, T3 or E3 XSR User’s Guide 2-13 Utilizing the Command Line Interface 4. Some attributes can be set at this level without acquiring other modes. For example: accesslist access-list-num [deny | permit] [parameter [parameter…]] 5. Show commands can all be entered at EXEC, Privileged EXEC or higher modes. User EXEC Mode You enter User EXEC (or simply EXEC) mode after logging in. The following commands can be entered in EXEC mode: disable, enable, exit, help, isdn, ping, show, telnet, terminal and traceroute. Privileged EXEC Mode In order to make configuration changes, you must enter PRIV EXEC mode. Some configuration parameters specified in this mode apply to XSR global settings such as the system clock. Supported privileged EXEC mode commands are: cd, clear, clock, configure, copy, debug, delete, dir, disable, enable, exit, help, isdn, more, no, ping, pwd, reload, rename, show, telnet, terminal, traceroute, verify, and write. Global Configuration Mode In Global configuration mode you can configure many different resources such as ports, interfaces, and routing tables. The following levels are provided at the Global configuration level: • Interface Level: At this level you can modify/assign specific port parameters on a port-by-port basis. You can enter this level by typing interface interface-type at the Global configuration command prompt. For example, you can enter: XSR(config)#interface gigabitethernet 3 The XSR will return the following prompt: XSR(config-if )# • Router level: At this level you can configure parameters associated with the RIP or OSPF protocols. You reach this level by typing router [RIP, OSPF] in Global mode. For example: XSR(config)#router rip The XSR will return the following prompt: XSR(config-router)# • Several other levels are available in Global mode including AAA, Class-Map, Crypto, Dialer, IP, and Map-Class. Many of these modes have additional levels nested within them. Exiting From the Current Mode Each of these commands exits from your mode but with different results: 2-14 • Exit: In each mode exit quits from the current to previous mode • End: end always returns to Privileged EXEC from either Global or sub-configuration mode • Ctrl-Z: Same as the end command • Be aware that you need not always exit from a mode if your current and destination modes subscribe to the same parent in the mode tree. Managing the XSR Utilizing the Command Line Interface Mode Examples Consider the following examples to change configuration mode: XSR>enable + Acquires Privileged EXEC mode XSR#config terminal + Acquires Global configuration mode XSR(config)#interface fastethernet 1 + Acquires Interface mode XSR(config-if )#ip address 192.168.2.2.255.255.255.0 + Sets up the IP address and subnet mask for this FastEthernet port XSR(config-if )#exit + Quits Interface mode XSR(config)#exit + Quits Global mode XSR#disable + Quits Privileged EXEC mode XSR> + Returned to EXEC mode by previous command Note: In many cases, you are not required to exit from a mode to configure a command in another mode. Observing Command Syntax and Conventions The CLI command syntax and conventions on the XSR use the notation described below. Table 2-4 Command Syntax and Conventions Convention Description xyz Key word or mandatory parameters (bold) [x] [ ] Square brackets indicate an optional parameter (italic) [x | y | z] [ | ] Square brackets with vertical bar indicate a choice of values {x | y | z} { | } Braces with vertical bar indicate a choice of a required value [x {y | z} ] [{ | } ] Combination of square brackets with braces and vertical bars indicates a required choice of an optional parameter (config-if ) xx signifies the interface type; e.g., F1, G3, S2/1.0, D1, L0, BRI, PRI (T1/E1, T3/E3, ATM), VPN, etc. In the following example: show interface [dialer | fastEthernet/gigabitethernet | loopback | serial | bri | multilink | vpn {interface-number}] • show and interface are keywords • [dialer, fastEthernet, gigabitethernet, loopback, serial, bri, multilink, vpn and {interface-number}] are optional parameters Syntactically, each line begins with one or more command keywords followed by a list of mandatory values (if any) and, lastly, a list or optional values. For example, the command below: channel-group number timeslots range [speed {56 | 64}] has a mandatory parameter value number, a mandatory parameter keyword and value pair timeslots range, an optional value offered as a keyword speed and value options of 56 or 64. XSR User’s Guide 2-15 Utilizing the Command Line Interface CLI Command Limits CLI commands on the XSR are bounded by the following: • Total number of characters in a command line/help message: 299 • Total number of words in a command line: 127 • Number of command history entries recalled: 31 • Total number of characters in a prompt: 1023 • Total number of characters in system name: 31 Describing Ports and Interfaces Technically, a port is a physical connector with some physical layer values. XSR ports are: FastEthernet (XSR 1800 Series) or GigabitEthernet (XSR 3000 Series), Async/Sync Serial, ATM, BRI, Loopback, T1/E1T3/E3, Console, and Null. An interface is a data and management plane comprising the physical, link and a part of the network layer. The terms are used interchangeably in this manual. The XSR supports multiple access types, including Fast/GigabitEthernet LAN, Frame Relay and Serial WAN access over Asynchronous, Synchronous, T1/E1, and Serial lines with async and sync access over permanent or dial lines. Generally, Frame Relay, PPP and Multilink PPP (Console optional) are for WAN access and PPPoE for WAN access over a LAN. Dial access is provided by ISDN BRI and PRI. Supported Physical Interfaces The XSR supports the following physical interfaces: • FastEthernet/GigabitEthernet for LAN port consisting of Ethernet's physical, Mac (Layer-2), and IP layer functionality. • Serial for Sync or Async port/line consisting of a Sync port/line's physical, Layer-2 (PPP) and IP layer functionality. • Serial for T1/E1 (PRI) channel group consisting of its physical, Layer-2 (PPP or Frame Relay), and IP layer functionality. Supported Virtual Interfaces The XSR supports the following virtual interfaces: 2-16 • Interface dialer includes physical interfaces supporting dial connectivity from the dial port/ line's physical layer functionality including dialing, Layer-2 (PPP), and IP layer functionality. • Sub-Interface for an NBMA network. An NBMA network has multiple access over the same line but no broadcast capability. Examples of such networks are Frame Relay, X.25, and ATM. One physical interface comprises one or more sub-interfaces which in turn consist of one or more circuits on the physical interface. Sub-interface examples and its circuits are: one or more DLCIs forming a sub-interface, one or more X.25 PVC/SVCs forming a sub-interface and one or more VCs of ATM forming a sub-interface. This interface shares its physical layer functionality with other sub-interfaces, but each sub-interface has its own layer-2 (PPP or Frame Relay) and IP layer functionality. Managing the XSR Utilizing the Command Line Interface Supported Ports The XSR supports the following port types: • Single-channel ports: Fast- and GigabitEthernet, Sync/Async serial, ATM • Multiple-channel type ports: BRI, T1/E1 Numbering XSR Slots, Cards, and Ports The syntax for XSR slot, card, and port numbering on the CLI, illustrated in Figure 2-2, is: slot#/card#/port# These parameters indicate: • slot #: (motherboard is zero), (XSR 1800: 1/2, 3020/3150: 1/2, 3250: 0-2) • card #: NIM card number (FastEth: 1/2, GigaEth: 1-6 from left to right) • port #: NIM port numbers begin with zero Figure 2-2 Slots on the XSR-3250 Slot 1 SECURITY ROUTERS XSR-3250 NIM 1 Slot 2 NIM 2 NIM1 NIM2 Link SYS VPN PWR COM COM Slot 0 1000 TX GBIC 10/100/1000 ETH1 10/100/1000 ETH2 ETH3 Motherboard Slot, cards, and ports on the motherboard (Slot 0) are expressed as: • Slot 0, Card 1 or 2, Port 1 or 2: 0/1/1-4 or 1/1-4 and 0/2/1-4 or 2/1-4. The first 0 can be ignored Slot, cards, and ports on the first XSR-3250 upper tray slot are expressed as: • Slot 1, Card 1 or 2, Port 1-4: 1/1/1-4 and 1/2/1-4 Slot, cards, and ports on the second XSR-3250 upper slot are expressed as: • Slot 2, Card 1 or 2, Port 1-4: 2/1/1-4 and 2/2/1-4 Setting Port Configuration Mode The configuration mode setting for ports on the XSR is as follows: • Single-channel ports are configured in Interface configuration mode. • Multi-channel ports are configured in Controller configuration mode. A physical layer data stream is identified by channel using the controller command, and this channel group is then configured using the interface command. Setting Interface Type and Numbering XSR interface types and numbers are set as follows: • Physical-type interface and port numbers are similar. Interface types are Serial BRI, ATM, PRI (T1/E1), or Fast/GigabitEthernet. XSR User’s Guide 2-17 Utilizing the Command Line Interface • Virtual Interfaces: – Loopback - Range 0 to 15. Interface type: Internal Loopback. – Dialer - Range: 0 to 255, Interface type: Dialer. – VPN - Range: 0 to 255, Interface type: VPN tunnel/Dialer. – Multilink - Range: 1 to 32767, Interface type: VPN tunnel. – Frame Relay DLCI - Range: 16 to 1007, Interface type: Serial/FR. – Sub-interface: Each sub-interface correlates with a physical interface, ranging as follows: ATM, BRI, and Serial - 1 to 30, Fast/GigabitEthernet - 1 to 64. The sub-interface number is Port number.sub-interface number for single channel serial, port number.channelgroupnumber.subinterface number for multi-channel. Configuration Examples The following examples display minimal interface configuration: • FastEthernet Example interface fastethernet 1 + Begins configuring interface/port 1 no shutdown + Enables the interface • T1 Example controller t1 1/0 + Begins configuring controller on NIM card 1, port 0 channel-group 3 timeslots 1, 3-6, 12 + Maps timeslots 1, 3, 4, 5, 6, and 12 to channel group 3 no shutdown + Enables the interface ! interface serial 1/0:3 + Configures channel group 3 defined above encapsulation ppp + Sets interface encapsulation type to PPP no shutdown + Enables the interface • T1-PRI (ISDN) Example controller t1 1/0/0 + Begins configuring PRI NIM card 1, port 0 pri-group + Enables ISDN, sets all timeslots to map to channel groups on NIM controller t1 1/0/0:23 + Maps T1 NIM to D-channel sub-interface isdn switch-type primary-ni + Selects switch type isdn pool-member 1 priority 100 + Adds a prioritized pool member to sub-interface • Dialer Example interface dialer 4 + Begins configuring dialer interface 4 ip address 11.1.2.2 255.0.0.0 + Sets IP address/subnet on dialer port dialer pool 5 + Sets dialer 4 to use pool 5. Its members are physical ports interface serial 2/0 + Configures serial interface on NIM card 2, port 0 encapsulation ppp + Sets interface encapsulation type to PPP dialer pool member 5 + Serial 2/0 is now a member of dialer pool 5 and will eventually be used by dialer 4 no shutdown + Enables the interface ! interface serial 2/1 + Configures serial interface on NIM card 2, port 1 encapsulation ppp + Sets interface encapsulation type to PPP dialer pool member 5 + Serial 2/1 is now a member of dialer pool 5 and will eventually be used by dialer 4 no shutdown + Enables the interface 2-18 Managing the XSR Utilizing the Command Line Interface • BRI-Dialer (IDSN) Example interface dialer 0 + Configures dialer interface 0 ip address 2.2.2.2 255.255.255.0 + Sets IP address/subnet on port encapsulation + Interface/Sub-interface Behavior XSR interfaces and sub-interfaces, channels and channel-groups are added and deleted differently depending on the particular interface. Interface characteristics are as follows: • T1/E1 Controller - Creating a channel group adds a serial interface. For example, when you issue the command controller t1 1/0, the XSR automatically creates channel group 0 with all available timeslots assigned to it. You can verify this by checking the running configuration where the following entry is displayed: interface serial 1/0:0 – You can create other serial objects by creating more channel groups. For example, by entering the following commands: channel-group 0 timeslots 1-10 speed 64 channel-group 1 timeslots 11-20 speed 64 – the following interfaces are added: interface serial 1/0:0 interface serial 1/0:1 – You can delete those controller interfaces only by removing the channel groups which automatically created them by entering: no channel-group 0 + This automatically deletes Serial port 1/0:0 no channel-group 1 + This automatically deletes Serial port 1/0:1 – To delete controller ports and all associated interfaces, you must remove the entire controller: no controller t1 1/0 • PRI NIM - When configuring a PRI interface, a pri group is created as follows: controller t1 1/0 pri-group – Creating a PRI group adds a serial interface internally, but it is not visible nor accessible to the user: interface serial 1/0:0 is not displayed anywhere. But, the system resources associated with it remain in use until the pri group is deleted as follows: no pri-group • BRI NIM - When configuring a BRI interface, sub-interface addition/removal differs if you are configuring a leased line or switched connection. – Leased line: When configuring a leased line connection, serial sub-interfaces are created and are visible to the user: interface bri 2/1 leased-line 64 + This adds serial port 2/1:1 leased-line 64 + This adds serial port 2/1:2 – These serial interfaces are removed by deleting the entire controller. For example: interface bri 2/2 no controller t1 2 XSR User’s Guide 2-19 Utilizing the Command Line Interface – Switched: When configuring a switched BRI connection, three serial sub-interfaces are automatically created when you enter: interface bri 2/1 isdn switch-type basic-ni1 – The following sub-interfaces are added: interface serial 2/1:0 interface serial 2/1:1 interface serial 2/1:2 – These serial sub-interfaces are removed with the no isdn switch-type command: interface bri 2/1 no isdn switch-type + This deletes serial ports 2/1:0, 2/1:1 and 2/1:2 Entering Commands that Control Tables A number of CLI commands configure entries in tables such as arp and access-list in the XSR. Two types of tables are configurable: • Single-instance table: The ARP table, for example, in which one table holds many rows and each row is a complete entry. Entries are not displayed in the same order they are entered. • Multiple-instance table: The Access-List table, for example, in which there are multiple tables identified by number with each table containing many rows and each row is a complete entry. Entries are not displayed in the same order they are entered. With few exceptions, you must be in Global mode before issuing table commands. Adding Table Entries Depending on the type of table configured, the parameter list can be optional or required. For example the ARP table has three required parameters and some optional values depending on the context. For example, using the following command: arp ip-address mac-address you may type: XSR(config)#arp 1.1.1.1 e45e.ffe5.ffee + where arp is the command and type of table to be filled or modified, 1.1.1.1 is the IP address corresponding to the MAC address e45e.ffe5.ffee. Note: ARP is a table type, as well as a command, that fills or modifies entries in the ARP table. A second example is entered as follows: XSR(config)#access-list 1 deny any + where access-list is the command and the type of table to be filled or modified, 1 is the ID of the table to be modified, deny is the type of operation authorized and any is the host that should be denied. 2-20 Managing the XSR Utilizing the Command Line Interface Deleting Table Entries There are two ways to delete an entry from a table depending on the table type. Type (e.g.): XSR(config)#no arp 1.1.1.1 e45e.ffe5.ffee + removes the arp entry related to row 1.1.1.1. where no is the command that negates the previous operation and arp is the associated table type. A second example is entered as follows: XSR(config)#no access-list 1 + removes access-list 1 where no is the command that clears the access-list. Modifying Table Entries For some tables, you must first remove the entry then add the same entry with new values. For the ARP table the syntax is similar to the add command where you enter the command and entry ID with a new value which replaces the old value in the ARP table. For example, typing the following: XSR(config)#arp 1.1.1.1 e45e.ffe5.efef XSR(config)#arp 1.1.1.1 e45e.ffe5.3434 + first creates an arp entry of 1.1.1.1 associated with MAC address e45e.ffe5.efef. Then, this entry is modified to be associated with the new MAC address e45e.ffe5.3434. Displaying Table Entries You can display ARP table, access-list table, gateway-type prefix table, IP routing table, and other entries at privileged EXEC mode. For example, enter show ip arp displays the following output: XSR#show ip arp Protocol Internet Internet Internet Internet Internet Internet Internet Address 192.168.12.16 192.168.14.64 192.168.12.40 180.180.180.1 192.168.12.1 192.168.12.81 192.168.12.17 Age(min) 0 12 18 59 8 60 44 Hardware Address 0001.f4fe.2716 0001.f4ee.2764 00b0.d0fe.e292 0030.ee1f.ef61 00e0.631f.a45a 0030.85ff.ef61 0001.f4ef.2717 Type ARPA ARPA ARPA ARPA ARPA ARPA ARPA Interface FastEthernet2 FastEthernet2 FastEthernet2 FastEthernet2 FastEthernet2 FastEthernet2 FastEthernet2 Managing XSR Interfaces You must be in Interface mode before configuring XSR ports. To enter Interface mode, type the following, for example: XSR#configure terminal XSR(config)#interface FastEthernet 1 XSR(config-if )# XSR User’s Guide 2-21 Utilizing the Command Line Interface Ports can be enabled or disabled, configured for default settings, associated tables, clock rate, priority group, and encapsulation, for example. Refer to the XSR CLI Reference Guide for more details on Interface mode commands. Note: All interfaces are disabled by default. Enabling an Interface The following command enables an interface. XSR(config-if )#no shutdown + Enables serial interface 2 Disabling an Interface An interface can be administratively disabled with the shutdown command: XSR(config-if )#shutdown + Disables interface Configuring an Interface You can configure an interface only after invoking Interface configuration mode. Each interface can be configured with a set of interface-specific commands. If you are unsure which commands are available, type ? to list them for the particular port. Consider the following sequence of commands to configure a GigabitEthernet interface: XSR#config terminal XSR(config)#interface gigabitethernet 2 XSR(config-if )#? description + Text describing this interface duplex + Manually set the duplex mode exit + Quit interface configuration mode help + Description of the interactive help system ip + Interface Internet Protocol config commands loopback + Configure interface for internal loopback no + Negate a command or set its defaults shutdown + Shutdown the selected interface speed + Manually set the line speed XSR(config-if )exit + Quit Interface mode Displaying Interface Attributes You can display the current settings of an interface when in Privileged EXEC or Global configuration mode. For example, type: XSR#show interface fastethernet 1 or: XSR(config)#show interface serial 1/0 2-22 Managing the XSR Utilizing the Command Line Interface Managing Message Logs Messages produced by the XSR, whether alarms or events, as well as link state changes for critical ports and a management authentication log, can be routed to various destinations with the logging command. And by issuing the no logging command, you can block messages to a site while permitting transmission to others. For normal operation, you should log only HIGH severity alarms which indicate critical events and those requiring operator intervention. Be aware that the XSR may drop LOW and DEBUG level alarms if the system is too busy to deliver them. The number of dropped messages is displayed by the show logging command. Be aware that the DEBUG alarm level is used by maintenance personnel only. The XSR serves the following logging destinations: • Syslog (to remote Syslog server over the network) • Console terminal • Monitor (up to five CLI sessions via Telnet) • Buffer (in XSR’s memory) • File on CompactFlash card when persistent logging (with respect to power loss) is enabled. This feature is used especially for the firewall (see “Configuring Security on the XSR” on page 16-1 for more information) • SNMP Trap (async notification by XSR to the SNMP Manager) Logging Commands You can log all messages into a particular destination based on the severity level of the message (high, medium, low and debug) with the logging command. Note that entering logging medium sets that level for all destinations. Also, you can log ACL violations in particular on a per-source per-ACL group basis with the access-list log command and view them every five minutes. Alternatively, you can display the log when it reaches a specified packet threshold with accesslist log-update-threshold. Generally, you can display your logging configuration with show logging and show or clear messages in the memory buffer with show logging history and clear logging commands, respectively. Be aware that the entire message history is lost when the XSR is powered down. Refer to Appendix A: “Alarms/Events, System Limits, and Standard ASCII Table” on page A-1 for a thorough listing of XSR alarms/events and the XSR CLI Reference Guide for command details. Performing Fault Management When a software problem causes the XSR’s processor to fail, the system captures pertinent data, produces a Fault Report, and restarts the router automatically. The Fault Report is useful in diagnosing the problem because it contains the following data relevant to the failure: • Cause of processor exception • Time-stamp • Contents of processor registers • Operating system status • Status of tasks, current task (the crashed task) XSR User’s Guide 2-23 Utilizing the Command Line Interface • Contents of stacks (task stacks, interrupt stack) • Status of one special task (packet processor by default) • Code around the crash program counter • Task message queues • Memory management statistics • Task stack traces for all tasks The router can store one Fault Report, retaining the first Fault Report in case of multiple failures. It is stored in a special RAM memory area which is preserved if the XSR is rebooted but lost if the router is powered down. A fault report is also captured in case of a catastrophic watchdog interrupt. Typically, the watchdog timer is reset once per second. If the software fails and 2.6 seconds expire, the watchdog hardware will induce an interrupt which initiates the capture of the fault report. After an additional 2.6 seconds, the CPU is reset and the XSR will warm-boot. Fault reports can be retrieved from the CLI interface and forwarded to Enterasys Support for analysis. When the XSR automatically reboots after a crash, the following sample message is logged: <186>May 29 22:20:59 1.1.1.1 PLATF System warm boot from crash Fault Report Commands The show fault-report command displays the report. Refer to the XSR CLI Reference Guide for more command details. The clear fault-report command can be used to remove old fault reports and reset the XSR to capture a new one. Capturing Fault Report Data Enterasys Networks recommends that you enter the following commands from privileged EXEC mode during capture to assist in analysis and simplify the capture process. The clear faultreport command should only be executed once you are sure that the text has been completely captured since the data is not recoverable afterwards. 2-24 • enable • terminal Length 0 • show fault-report • show version • show logging history • clear fault-report • terminal length 24 • disable Managing the XSR Utilizing the Command Line Interface Using the Real-Time Clock The XSR’s Real-Time Clock (RTC) is employed by other system software modules to time-stamp events, alarms and is useful when no network clock source is accessible. It is normally synchronized with a master clock source over the network using the Simple Network Time Protocol (SNTP) but can also synchronize with the battery-supported RTC chip. For SNTP configuration, see Chapter 3: Software Configuration in the XSR Getting Started Guide. RTC/Network Clock Options SNTP synchronizes the RTC with a network master clock but if there is no network clock source the RTC clock is used on its own. The RTC maintains the correct time with its battery even when the XSR is powered down. RTC Commands The real-time clock can be set with the clock set command. The universal time can be viewed with show clock command. To set the SNTP server, use the sntp-client server command. Refer to the XSR CLI Reference Guide for more command details. Managing the System Configuration The XSR’s system configuration consists of three discrete types which are described below. The configuration can also be reset to the defaults, saved, and uploaded or downloaded in bulk. • Factory Default Configuration: These system parameters are set at the factory. If you make configuration changes and do not save them or the startup configuration file cannot be found, the XSR reverts to factory default parameters. You can manually reset to factory defaults on XSR 1800 Series routers by pressing the reset button at the back of the units. XSR 3000 and 4100 Series routers are not equipped with a reset button but you can restore factory defaults via the CLI as described in the next section. • Startup Configuration: These system settings are used as the current running configuration when you power up or issue the reload command. The startup configuration is stored in nonvolatile (Flash) memory as the startup-config file. The file contains a version number followed by a series of CLI commands. When the XSR restarts, each CLI command in this file is read and executed. • Private Configuration: The private-config file contains SNMP v3 related commands. When the XSR restarts, each CLI command in this file is read and executed. The file is updated or created when the running configuration is saved to the startup configuration. • Running Configuration: These system settings, known as running-config, include a version number followed by accumulated commands from startup-config and user revisions. Changes made to the configuration are lost if you power cycle or reboot unless you save it to startup-config using the copy or write command. The XSR validates commands as they are entered and rejects with an error message those commands which are invalid. XSR User’s Guide 2-25 Utilizing the Command Line Interface Resetting the Configuration to Factory Default In situations where the XSR has invalid software or a problem booting up, you can reset the router and return it to its factory default settings by accessing Bootrom Monitor Mode. Take these steps: 1. Power up with a serial Com connection. 2. During the first five seconds of system initialization, press CTRL-C to enter Bootrom mode. 3. When prompted for a password, enter any characters if you have not previously configured a password. If you have configured a password, enter an incorrect password. In either case, the XSR will produce an error message and prompt you to try again. 4. After trying 5 times to enter the “wrong” password, you are prompted to restore factory defaults. Refer to the XSR CLI Reference Guide and XSR Getting Started Guide for more details about Bootrom Monitoring Mode. Using the Default Button (XSR 1800/1200 Series Only) You can also boot up from the factory default configuration by pressing the default button on the rear panel of the XSR 1800 and 1200 Series routers. Doing so will erase the content in the startup configuration in Flash memory. After pressing the default button, the XSR performs the following operations: • Processor is interrupted • Software enforces default configuration as running configuration • Software restarts the XSR • XSR restarts with default configuration • Original startup configuration in Flash is erased • Bootrom password is set to default • Fault report (if any) is cleared • Security-sensitive files are erased from Flash • Bootrom Monitor mode network parameters are set to defaults • Master encryption key is erased from non-volatile memory • Console connection restarts Caution: Pressing the Default button erases all files in Flash memory. Figure 2-3 ON +1 XSR-1805 (right) and XSR-1220/35 Default Button DEFAULT /O FF CORD 2V DC FA UL T Default button 2-26 Managing the XSR SWITCH POWER DE ELAN 1 ELAN 2 COM Utilizing the Command Line Interface Configuration Save Options There are several options available regarding configuration: • If you want to make your running configuration the new startup configuration, you can save it to Flash memory with the copy running-config startup-config command. • If you want to convert your startup configuration into the running configuration, you can issue the reload command which reboots the XSR and reloads the startup configuration. • If you want to save the startup configuration to a remote site using a TFTP server, issue the copy startup-config tftp: command. See the associated command below. • If you want to load the configuration manually from a remote site using a TFTP server, issue the copy tftp: startup-config command. Refer to “Bulk Configuration Management” on page 2-27 for more information about this and the previous command. • If you want to copy your entire startup configuration including encoded files to a remote site, issue the copy flash: full-config tftp: command when backing up the XSR, and the copy tftp: flash:full-config command when restoring the XSR. Refer to “Full-config Backup” on page 2-28 for more details about the command. To view the running-config, use the show running-config command. To view the startupconfig, issue the more startup-config command. For more command details, refer to the XSR CLI Reference Guide. Using File System Commands A set of MS-DOS compatible commands are available for use in conjunction with configuration files. The XSR has a file system residing in the XSR’s non-volatile memory. You can copy files with the copy command, remove files with the delete command, display files with the more command, verify a packed software image file with the verify command, and change and list directory contents with the cd and dir commands, respectively. For more command details, refer to the XSR CLI Reference Guide. Bulk Configuration Management The XSR can be configured in one action by storing CLI commands as a script in an ASCII file then transferring the file to the router remotely using TFTP or locally from cflash:. There is a limitation in the size of the stored file, though. If the file is larger than the limit, then the download operation will abort producing an error message. Downloading the Configuration Downloading transfers a script file remotely from a server to the XSR’s startup configuration using TFTP or locally from cflash:. The ASCII-format script can include comments delineated by an exclamation mark. To perform the task correctly, the TFTP server must be running on a remote device with the configuration file residing in the TFTP root directory of the server. You can then enter the copy startup-config tftp: command in EXEC mode to copy the configuration file from the server to the XSR. Alternately, the file must first be loaded in cflash: then copied to flash: with the copy cflash:startup-config flash:startup-config command. XSR User’s Guide 2-27 Utilizing the Command Line Interface Note: If you have inadvertently added errors to the CLI script file, the restoration of startupconfig will be stopped at the error line. So, any commands after that line in startup-config are not executed. For more command details, refer to the XSR CLI Reference Guide. Uploading the Configuration/Crash Report An upload copies the XSR startup-configuration file (partial) to a system in a CLI script format using TFTP. You can later retrieve the file with TFTP. To perform the task correctly, the TFTP server must be running on a remote device. You then enter the copy startup-config tftp: /filename command in EXEC mode to copy the file to the server. A successful upload produces the following sample output: XSR#copy startup-config tftp: Address of remote host [0.0.0.0]: 10.10.10.10 Destination file name [startup-config]: Copy 'startup-config' from Flash to server as 'startup-config'(y/n) ? y Upload to server done File size: 976 bytes You can also upload the crash report via TFTP using the same procedure as the one used to upload the configuration file. Refer to the XSR CLI Reference Guide for more command details. Full-config Backup Alternately, you can backup and restore the full configuration file suite including encoded VPN users, usernames, passwords, certificates, and SNMPv3 data files (user.dat, cert.dat, and private-config) to a remote site with a full configuration backup. This method employs a modified backup/restore algorithm to copy the data encoded by the master encryption key to the temporary full-config file then restores the data in startup-config and other data files. Be aware that the same master encryption key is required for both backup (on the source XSR) and restore (on the destination XSR) operations. Information in the full-config file is stored either as ASCII text (startup-config data) or encrypted binary text (data files). The full-config backup/restore option is also available using SNMP. Refer to “Full Configuration Backup/Restore” on page 2-43 for details. Creating Alternate Configuration Files The XSR permits you to create multiple configurations, a useful option if you want to quickly select one of two configuration files stored in flash: or cflash:, for example: startup-config and startup-configB. The file named startup-config is used by the autoboot process. You can use any file name for the alternate configuration. To make an alternate configuration file available, rename startup-config to startup-configA (for example), and startup-configB to startup-config., using the rename command. Then issue the reload command to use the new configuration. 2-28 Managing the XSR Utilizing the Command Line Interface Managing the Software Image The XSR can store more than one software image in Flash. Creating Alternate Software Image Files The XSR can create multiple software images, a useful option if you want to quickly select an alternate image. For example, you can create two software image files: XSR1805_a.fls and xsr1805_b.fls. Begin the process by issuing the boot system command to create a boot-config file containing the name of your software file. Enter: boot system XSR1805_b.fls The boot-config file contains the file name - XSR1805_a.fls - used by the autoboot process. By changing the file name inside boot-config, you will boot from the alternate software file in Flash, XSR1805_b.fls: Note: If the boot from Flash fails for any reason, the XSR will attempt to copy the specified software file from the network based on the setting in Bootrom mode. Refer to the following section for details. BootRom Upgrade Choices Upgrading from Version 2.xx to 3.xx code on the XSR 1800 Series Because the XSR does not recognize the 3.x format, you cannot use the Bootrom Monitor Mode commands bu and bU to upgrade the Bootrom from version 2.x. You must upgrade from the CLI using the following procedure: 1. With Bootrom version 2.x still installed, first upgrade the firmware image to Release 6.0 in the usual manner by copying the xsr1800.fls file to the Flash: directory and rebooting. 2. Copy Bootrom version 3.x to the Flash: directory. 3. Enter the following command from the CLI: bootrom update btXSR1800_3_x.fls where x is the current sub-release number. The XSR will automatically reboot and be operable. Upgrading from Version 1.xx to 2.xx code on the XSR 1800 Series There are two methods available to upgrade your Bootrom. If you use the Bootrom Update Utility, you will need the updateBootrom.fls and bootromX_xx.fls files. For details on using these files to perform a Bootrom upgrade, refer to “Using the Bootrom Update Utility” on page 2-30. If not using the Bootrom Update Utility, you must perform a two-step procedure to upgrade from 1.xx to 2.xx Bootrom versions due to a file format change and will need the bootrom_uncmp.fls and bootromX_xx1.fls files. For details, see “Local Bootrom Upgrade” on page 2-32. Pre-upgrade Procedures XSR firmware upgrades are infrequent but if you do so using Bootrom mode, you must: • Make a DB-9 null modem serial link to a terminal (HyperTerminal, Procomm, et al.) with 9600 bps, 8 bits, 1 stop bit, and no flow control. • Make an Ethernet connection at the first network interface (located next to the power switch). • Connect to the FTP (default) or TFTP server on a host PC running with a known user and password. Be sure you can access the latest Bootrom binary file on the host computer, e.g., bootrom1_21.fls. XSR User’s Guide 2-29 Utilizing the Command Line Interface • Optionally, if you have CompactFlash installed, you can download the firmware file to cflash: then perform Step 1 (see below) followed by the bu (lower-case u) command. • If you use the Cabletron TFTP/BOOTP Services application, which does not recognize long file names, first shorten the Bootrom file name to 8 characters or less with an extension, before beginning the download (i.e.: bootnew.fls). Rename the file after the download. • Be aware that factory default Flash is limited to 8 Mbytes and if congested may not be able to store a downloaded Bootrom. Delete old firmware or other files before downloading. Using the Bootrom Update Utility The Bootrom update utility upgrades the boot flash sectors of the on-board Flash memory. This update tool functions similar to the bU command but also can be executed from a Telnet session, allowing Bootrom updates to be performed remotely. The utility runs as a standalone program and can recognize both old (1.x) and new (2.01) versions of the Bootrom file format. After you complete the Bootrom update, the XSR will reboot. Note that screen-captured XSR text is displayed in Courier font. User-required input appears in larger, bold Courier font. 1. From a remote Telnet session, at a CLI prompt, configure the “boot-config” file to your current software file residing in flash: (the default is xsr1800.fls; if your Bootrom version is earlier than 1.16, the default is xsr1805.fls). Enter: XSR(config)#boot system xsr1800.fls xsr1800.fls saved into flash:boot-config 2. Exit to EXEC mode and verify this setting by entering: more boot-config. Verify at least two MBytes of flash file space is open by entering the dir command. If file space is low, delete unnecessary files. The following files are required (xsr1800.fls may be replaced by the current software file): XSR-1805#dir Listing Directory flash:/ size -------208 3244017 12 date -----OCT-31-2002 OCT-31-2002 OCT-31-2002 time -----09:34:16 09:32:46 09:31:32 name -------startup-config xsr1800.fls boot-config 3,475,456 bytes free 6,727,680 bytes total 3. Using TFTP, transfer the latest Bootrom version from the network. The target name must be bootrom.fls: – XSR-1805#copy tftp://192.168.27.95/C:/tftpDir/ bootrom2_01.fls flash:bootrom.fls 2-30 – Copy 'tftpDir/bootrom2_01.fls' from server as 'bootrom.fls' into Flash(y/n) ? y – !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! – Download from server done – File size: 820136 bytes Managing the XSR Utilizing the Command Line Interface 4. Using TFTP, transfer updateBootrom.fls from the network: XSR-1805#copy tftp://192.168.27.95/C:/tftpDir/ updateBootrom.fls flash:updateBootrom.fls Copy 'tftpDir/updateBootrom.fls' from server as 'updateBootrom.fls' into Flash(y/n) ? y !!!!!!!!!!!!!!!!!!!!!!!!!! Download from server done File size: 667172 bytes 5. Copy boot-config to restore-boot-config: XSR-1805#copy flash:boot-config flash:restore-boot-config Copy 'boot-config' from flash: device as 'restore-boot-config' into flash: device(y/n) ? y copying file flash:boot-config -> flash:restore-boot-config Copy OK: 12 bytes copied 12 bytes copied 6. Reconfigure boot-config to boot updateBootrom.fls: XSR-1805(config)#boot system updateBootrom.fls updateBootrom.fls saved into flash:boot-config 7. Display the current list of files and the contents of boot-config and restore-boot-config to verify the transfers went smoothly: XSR-1805#dir Listing Directory flash:/ size date 208 OCT-31-2002 3244017 OCT-31-2002 820136 OCT-31-2002 667172 OCT-31-2002 18 OCT-31-2002 12 OCT-31-2002 time 09:34:16 09:32:46 09:40:42 09:42:06 09:44:10 09:43:44 name startup-config xsr1800.fls bootrom.fls updateBootrom.fls boot-config restore-boot-config 1,984,512 bytes free 6,727,680 bytes total XSR-1805#more boot-config updateBootrom.fls XSR-1805#more restore-boot-config xsr1800.fls 8. This is a critical step and all previous steps must be completed accurately before proceeding. Reload and wait a couple of minutes. You will lose your Telnet session as the system reboots. The XSR will run updateBootrom.fls and update the Bootrom into the boot flash sectors. Power must not be interrupted since a power failure or interruption may render the XSR unusable. The file, restore-boot-config, will be renamed to boot-config and updateBootrom.fls and bootrom.fls will be removed before the router is rebooted again. XSR-1805#reload Proceed with reload (y/n) ? y 9. Verify that the system is up by remotely logging in via Telnet. Enter show version and check the new Bootrom version. XSR User’s Guide 2-31 Utilizing the Command Line Interface Local Bootrom Upgrade Due to the change in the format of the Bootrom file between version 1.x and version 2.01, a transitional step is required when updating across these versions only. This transitional step can be avoided by using the Bootrom Update utility described above. When you are running a 1.x version of the Bootrom and you try to upgrade to version 2.01 of the Bootrom file, it will be rejected due to the change in format. bootrom_uncmp.fls is a transitional, non-redundant Bootrom file that the existing 1_x version bU command can recognize. By updating and rebooting with this transitional version, you can subsequently use the new bU command (which recognizes the new 2.01 format) to update the Bootrom to version 2.01. Be aware that if you boot with bootrom_uncmp.fls, you will see the following output on the screen: “Danger! Cannot find a good copy of Bootrom” After upgrading to version 2.01 with bootrom2_01.fls, you can reboot and all subsequent Bootrom updates (which do not involve a change in the bootFirst module) are power-safe. In summary, when upgrading 1.x to 2.x Bootrom versions only, you must run the bU command twice - first with the bootrom_uncmp.fls file, then with the upgraded Bootrom. Between upgrades you must reboot using bw. To upgrade your firmware using the Local Bootrom Upgrade, perform the following steps: 1. Power on the XSR by flipping the rear switch and observe the front LEDs. When the system, VPN, console, NIM1 and NIM2 LEDs turn off, immediately enter on the terminal. If you miss this time window, power off and try again. The Bootrom monitor menu should appear as follows: X-Pedition Security Router Bootrom Copyright 2003 Enterasys Networks Inc. HW Version: 9002854-02 REV0A Serial Number: 2854019876543210 CPU: IBM PowerPC 405GP Rev. D VxWorks version: 5.4 Bootrom version: 1.20 Creation date: Aug 26 2002, 11:16:44 Cold Start: SystemReset from powerup Password: Entering ROM monitor Type “h” for help Using default Bootrom password The system is not secure!!! Use “bp” to change password XSR1800: 2-32 2. Type h or ? to display the command groups. 3. Type f to list the file command group. 4. Type n to list the network command group. 5. Using the np command, assign the following: – Local IP address (of the XSR). – Remote (host computer) IP address (The host must be on the same subnet as the XSR). Managing the XSR Utilizing the Command Line Interface – DOS-style full path (without the file name) of the site of the Bootrom file on the host PC. – The username and password to use when connecting to your FTP server on the host PC. 6. Verify the network boot values using the sn command. For example: XSR: sn Local IP address : 192.168.1.1 Remote IP address : 192.168.1.2 Remote file path : c:/XSR Transfer Protocol : FTP Ftp userid : administrator Ftp password : anonymous Local target name : XSR Autoboot : enabled Quick boot : no Current 405 ethernet MAC address is: 00:01:f4:00:01:02 Current PCI ethernet MAC address is: 00:01:f4:01:01:03 7. Type b to list the boot command group. 8. Enter the bU command to transfer the Bootrom image file over FTP and upgrade the Bootrom flash sectors to the latest version. Be sure to enter the command with an uppercase U and follow the prompts. Caution: If the Bootrom file transfer is corrupted due to a network interruption, this step may render the router unusable. If you suspect this has happened, type n at the confirmation prompt to abort erasing and replacing the Bootrom. Then, delete the file (type: rm bootrom1_21.fls, for example) and re-issue the bU command to transfer the image again. Here is a sample session: XSR1800: bU bootrom_uncmp.fls ftp RETR 192.168.1.2:c:/XSR1850/ bootrom_uncmp.fls into flash bootrom_uncmp.fls ........ Saved 818448 bytes to flash: bootrom_uncmp.fls Checking bootrom_uncmp.fls... Updating bootrom with file, “bootrom_uncmp.fls”. Proceed with erasing current Bootrom in flash and replace with bootrom_uncmp.fls? (y/n) y ***************************************************** * Do not interrupt or power down until complete! * ***************************************************** Erasing 3 sectors at address=0xfff20000 Programming 131072(0x20000) bytes at address 0xfff20000 Programming 131072(0x20000) bytes at address 0xfff40000 Programming 48299(0xbcab) bytes at address 0xfff60000 Verifying Bootrom flash sectors Locking 3 Bootrom flash sectors Second copy of Bootrom ... Erasing 3 sectors at address=0xfff80000 Programming 131072(0x20000) bytes at address 0xfff80000 XSR User’s Guide 2-33 Utilizing the Command Line Interface Programming 131072(0x20000) bytes at address 0xfffa0000 Programming 48299(0xbcab) bytes at address 0xfffc0000 Verifying Bootrom flash sectors Locking 3 Bootrom flash sectors Locking 8 Bootrom flash sectors ***** Bootrom update completed. ***** Do you want to remove the bootrom file bootrom_uncmp.fls? (y/n) y Using default Bootrom password. Use “bp” to change password 9. The system is not secure!!! Reboot the XSR by entering bw. 10. Repeat Step 8 with: bU bootrom2_01.fls 11. Reboot the XSR again: bw 12. Your Bootrom in Flash memory is now updated and will be used during the next power up sequence. Note: For more information, consult the SSR boot Release Notes at: http://www.enterasys.com/download/ Loading Software Images If the XSR has a valid Bootrom but no valid firmware, the software can be loaded from Bootrom Monitor mode using FTP. You also have the option of copying the image remotely from a TFTP server, using the copy tftp: flash: command, or locally from cflash:, using the copy cflash: command. Be aware that should the transfer fail, the XSR may temporarily be without valid software in flash: and should not be reloaded or powered down until a new image is downloaded. Also, the CLI session which initiated the copy command is blocked during a TFTP download, with a character repeatedly shown on screen to indicate a file transfer in progress. Using EOS Fallback to Upgrade the Image The easy to use Enterasys Operating System (EOS) fallback feature safely upgrades your image, as configured from either the CLI using the reload command or via SNMP. If the new image does not successfully install, the XSR will automatically fall back to the previous running image. The functionality works as follows: you download a new, primary image which the XSR will reboot from. After this image loads, the EOS fallback test will run for a period you configure. The test checks if the XSR crashes, and optionally checks if the configuration causes a syntax error or whether the XSR receives any SNMP messages with the primary image. If successful, the following syslog message is sent: <186>Jun 8 08:49:39 Toronto PLATF: EOS Fallback Test Completed, file my_new_XSR1800.fls is OK If the test fails, the XSR will send an error message and reboot with the secondary image - the last image loaded before the primary image - and will disregard the primary image. Syslog failure messages can cite no message from SNMP in 30 minutes, startup-config error, crash and watchdog expired. Respond as follows to these failure causes: • 2-34 If XSR reboots with the secondary EOS file, check the fault report generated and retry reload Managing the XSR Utilizing the Command Line Interface • If the power to XSR fails, try another reload • If a syntax error is indicated, examine your configuration for errors • If XSR crashes, do not retry reloading. Contact Technical Support EOS fallback is configurable from the CLI or via SNMP. Refer to the following section to configure the feature on the CLI or “Configuring EOS Fallback via SNMP” on page 2-35 for SNMP configuration instructions. Configuring EOS Fallback on the CLI 1. Upgrade the bootrom. Because EOS fallback is implemented partially in bootrom and partially in the router image, both the bootrom and image must be upgraded. Minimum requirements are as follows on each router type: XSR 1800 Series - bootrom 3.4, XSR 1200 Series - bootrom 1.1, XSR 3000 Series - bootrom 1.7. Refer to “BootRom Upgrade Choices” on page 2‐29 for directions. 2. Copy the new EOS file to the XSR’s Flash or Compact Flash memory as flash:xsr1800.fls or cflash:xsr1800.fls. If you do not stipulate the flash directory, the default chosen is flash:. Note: The XSR Series 1800 Flash directory can contain only one image, so you must load the file to cflash:. Flash RAM in Series 1200 routers has a 16-Mbyte capacity and can hold two image files. 3. Enter the reload fallback primary-file {cflash: | flash:} duration [config | snmp [ip-address]] command. For example, type: reload fallback cflash:xsr3004.fls 6 config snmp 1.1.1.2. Refer to the CLI Reference Guide for more information on the command. Configuring EOS Fallback via SNMP The following procedure configures EOS fallback through the SNMP Enterasys-image-validationmib and Enterasys-configuration-management-mib. Caution: You must enable EOS Fallback on the CLI before specifying the primary image and rebooting the XSR. Refer to “Configuring EOS Fallback on the CLI” in the previous section. 1. 2. Enable EOS fallback by setting the etsysImageValidationEnable OID in the Enterasys-ImageValidation-MIB to enabled. Configure other parameters in this MIB. For example, set etsysImageValidationOperations to 0xa0 to enable the config and snmp tests during EOS fallback verification as follows: • Enable EOS fallback: set 1.1.1.1 .1.3.6.1.4.1.5624.1.2.47.1.1.1.0 • Set test duration to 10 minutes: set 1.1.1.1 .1.3.6.1.4.1.5624.1.2.47.1.1.2.0 10 • Set test config and snmp values: set 1.1.1.1 .1.3.6.1.4.1.5624.1.2.47.1.1.3.0 a0 • 1 Monitor SNMP requests from the PC with IP address 1.1.1.2: set 1.1.1.1 .1.3.6.1.4.1.5624.1.2.47.1.1.7.0 01010102 Note: The etsysImageValidationOperations for ping is not supported. 3. Add a row to the Configuration Management Change Table that specifies the primary image: set 1.1.1.1 .1.3.6.1.4.1.5624.1.2.16.2.7.1.11.1 5 4. Set the primary file name which include the file (x.fls) and device name (flash: or cflash:): set 1.1.1.1 .1.3.6.1.4.1.5624.1.2.16.2.7.1.2.1 file://cflash:/xsr3004.fls XSR User’s Guide 2-35 Utilizing the Command Line Interface 5. Set the operation to imageSetSelected: set 1.1.1.1 .1.3.6.1.4.1.5624.1.2.16.2.7.1.3.1 0100 6. Set the row to active: set 1.1.1.1 .1.3.6.1.4.1.5624.1.2.16.2.7.1.11.1 1 Note: The primary image cflash:xsr3004.fls must already exist in the XSR, otherwise the configuration will fail at this point. 7. Reboot the XSR to load the new image by configuring the following: • Create a row: set 1.1.1.1 .1.3.6.1.4.1.5624.1.2.16.2.7.1.11.2 5 • Set operation to resetSoftwareset: 1.1.1.1 .1.3.6.1.4.1.5624.1.2.16.2.7.1.3.2 8000 • Set the row to active: set 1.1.1.1 .1.3.6.1.4.1.5624.1.2.16.2.7.1.11.2 1 Note: The Configuration Management MIB lets you add a delay (Etsysconfigmgmtchangedelaytime) In Steps 3-6 and Step 7. Be aware that the Step 7 delay cannot be smaller than the delay set in Steps 3-6. Downloading with FIPS Security In compliance with Federal Information Processing Standard (FIPS) security, XSR 1800/3000 Series routers require a different download procedure than usual. You must specify the FIPScompliant HMAC SHA-1 key using either the Bootrom key command or the sw-verification key command on the CLI. Follow the prompts as instructed. When FIPS is enabled, all .FLS files must be signed with the signing utility: signEtsFls.exe -k <20hexdigits> . Only signed incoming FLS files will be accepted from TFTP, SNMP and CompactFlash. After FIPS is enabled, back revisioning is not permitted. To disable FIPS, press the Default button (on the XSR 1800 Series) to clear all configuration settings including the FIPS and master encryption keys. For the XSR 3000 Series only, FIPS can be disabled by entering five invalid Bootrom password entries. You will be prompted before the XSR reverts to the default factory configuration and clears the FIPS key. Software Image Commands You can view the status of the software image including such data as the current firmware image filename, software release version, timestamp, and size by issuing the show version command. Use the boot system command to actively change the default file name of the software image. For more command details, refer to the XSR CLI Reference Guide. Configuration Change Hashing Transparently, the XSR hashes persistent configuration changes and stores them in an SNMP accessible variable to assist you in assessing remote backups or device monitoring. Hashing by the MD5 algorithm is conducted on the following files: 2-36 • startup-config • private-config • user.dat Managing the XSR Memory Management When the XSR boots up, the checksum of these files is calculated and stored in volatile memory. From then on any time the content of those files is changed the hash is recalculated and stored. You can access the hash value in the etsysConfigMgmtPersistentStorageChSum SNMP object and compare it with previous queries to detect configuration changes to the managed entity. Displaying System Status and Statistics The XSR’s numerous show commands, which are available in either privileged EXEC or Global configuration mode, display a broad array of system data such as: • System name, port types and their status, CPU card revision, Flash memory and DRAM size, NIM cards and type, contact and system hardware data, image in Flash, and system location. • XSR statistics: buffer counters, packets and NIM card status. To display available show commands, issue the show ? command. Some system data such as the product type and serial number, hardware revision number of the motherboard, and Ethernet port MAC addresses is stored in IDROM, a discrete area in Flash memory. You can view these parameters by issuing the show version command. Refer to the XSR CLI Reference Guide for details about these commands. Memory Management The XSR provides memory management via its Resource Capacity feature. Resource Capacity marks an advance in flexibility over the hard-coded limits mechanism of earlier releases in that you can now choose which software modules to configure based on available memory per resource. Resource Capacity is designed to control resource creation so that the XSR does not run out of memory and operate improperly. The XSR defines a resource as a software element which can be created or deleted in run time. When it is created it allocates memory by calling the memory management malloc function. When deleted, it returns the memory to common pools by calling free functions. Currently, approximately 45 resources including VPN tunnel, Access List entry, Route, and ARP request are tracked by a memory governor which can be accessed with the show resources command. A resource can exist multiple times - for example, 5000 VPN tunnels - and each occurrence is considered an Instance by Resource Capacity. The maximum number of resource instances which can be created in a situation where practically no other resource is present constitutes that resource’s Extreme Limit although it is highly unlikely you will ever configure that many instances. Extreme limits are hard-coded, they can not be configured, and their size depends on the total amount of installed memory on the XSR. Creating Resources You can create a new instance of a given resource depending on the extreme limit for that resource and the current amount of available memory. Because you can keep creating resources until you run out of memory, you should find the right balance to satisfy your system operational needs the XSR does not arbitrarily limit any particular resource. For example, you may want to create a “VPN-heavy” configuration with many VPN tunnels, but only a few routes. In this case, the number of tunnels is not limited as it was in earlier releases. Alternatively, you can set up a “route-heavy” configuration with many routes but only a few tunnels. In either case, memory usage is balanced. XSR User’s Guide 2-37 Network Management through SNMP When the memory governor is asked to allow or deny a new resource, the decision is based on: • memory low watermark • extreme limit You can push the extreme limit of individual resources as long as the memory low watermark is not met. Once the low watermark is met and you wish to create more resources, you must then free up earlier configured resources. The memory low watermark can constrain resource creation as follows: • Un-carved (un-allocated) memory remains in the memory “pie”. If un-carved memory is lesser than a given number (e.g., 1 Mbyte) creation is denied but if it is larger, it is permitted. • All memory has been carved. Each free pool (64-byte, 128-byte, and others) must have at least the defined number of blocks to permit resource creation. The XSR manages memory more efficiently by means of different-sized memory blocks. Memory is carved during run time based on malloc requests received. Depending on your startup configuration, memory will be carved in different ways. There are more than 10 fixed-size pools, with the amount of carved buffers in each pool depending on your startup configuration. You can examine memory buffering with the show buffers, show buffers malloc, and show buffers i/o commands. If you intend to configure and un-configure a large number of resources, be advised to reboot the XSR when necessary to optimize memory carving. Also remember that resource creation will be denied in the highly unlikely event of an extreme limit being reached. Caution: Do not enroll more certificates nor add more AAA users than permitted by the 1.5 MByte system limit imposed on both Flash cert.dat and user.dat files, respectively. Doing so may disable the XSR and require you to delete the files. Network Management through SNMP XSR system monitoring provides for the SNMP v1 agent (READ-ONLY) including gets and limited sets and SNMP v3 gets and sets. Standard MIB II modules are supported as well as Enterasys MIBs, as listed in the following table. Proprietary MIBs are available via download at: http://www.enterasys.com/support/mibs For a list of supported proprietary and standard MIB objects, refer to the table in “Chapter 1: Network Management “of the XSR User Guide. In order to use SNMP to gather statistics or configure the device, first configure the XSR’s SNMP agent with the snmp-server commands. Variables you can set are: community name, traps, informs and host. SNMP v3 support includes options to specify an engineID, security values for users and groups, and associated show commands. The snmp-server view command is an especially powerful tool to display SNMP objects either via their SNMP term or numerical ID. SNMP v3 data is stored in the privateconfig file in Flash. Although SNMP is disabled by default, entering any SNMP configuration command except snmp-server disable will enable the server. Refer to “XSR SNMP Proprietary and Associated Standard MIBs” on page B-1 for more information about supported tables and table objects. 2-38 Managing the XSR Network Management through SNMP SNMP Informs SNMP Informs were first introduced in SNMPv2. An Inform is essentially nothing more than an acknowledged trap. That is, when a remote application receives an Inform it sends back an “I got it” message. When you send an Inform you use the remote engineID with the message and the securityName and engineID exist as a pair in the Remote User table. The SNMP trap program discovers the remote engineID as other applications would and creates the SNMPv3 message with the proper user that the remote side is expecting to receive. SNMP v3 on the XSR is supported by several CLI and SNMP agent enhancements. SNMP v1/v2c traps can be configured with remote IP addresses to send traps with the snmp-server host command. For SNMP v3, each agent has a unique identifier - the engine ID - which is used to configure users in the User Security Model (USM). With the SNMP v3 USM, the XSR requires configuration of remote engine IDs and remote users. To set up an inform recipient, first set the engine ID of the remote SNMP entity with snmp-server engineID. USM users may then be added with snmp-server user. Complete the configuration using snmp-server host to specify remote SNMP entities that will receive informs. The snmpserver informs command can be used to change the global retry, timeout and queue default settings. The snmp-server enable traps command remains the same in all SNMP versions. This command enables both traps and informs. For a full description of SNMP commands, refer to the XSR CLI Reference Guide. Also refer to NetSight Atlas Router Services Manager v2.0 documentation to query and change SNMP values. Because the SNMP manager is disabled at boot-up, you must either manually enable the SNMP manager using the CLI, or enable it in startup-config. Shaping Trap Traffic Two controls are available to manage network traffic caused by SNMP traps. The first, set by the snmp-server min-trap-spacing command, configures minimum spacing between successive traps to ensure that they are spaced without causing delay and cap the number of packets generated by traps. The second control defines the maximum number of traps that can be sent in a given time window. The time window is a moving sum of the number of traps sent to the network. If the number of traps sent in the previous window-time is less than the value set by the snmp-server max-traps-per-window command, then more traps can be sent. Both methods work simultaneously and independently and only when both are satisfied will a trap be sent. Otherwise, traps will be queued and sent as soon as conditions satisfy both traffic shaping methods. Statistics The XSR supports SNMP gets for MIBs listed in “Chapter 1: Network Management “of the XSR CLI Reference Guide. Also, refer to NetSight Atlas Router Services Manager v2.0 to query and change SNMP values. XSR User’s Guide 2-39 Network Management through SNMP Alarm Management (Traps) The following events are supported by SNMP traps: snmpTrapColdStart, snmpTrapWarmStart, snmpTrapLinkDown, snmpTrapLinkUp, snmpTrapAuthFailure, entityTrapConfigChange, frameRelayTrapfrDLCIStatusChange, ospfTrapIfStateChange, ospfTrapVirtIfStateChange, ospfTrapNbrStateChange, ospfTrapVirtNbrStateChange, ospfTrapIfConfigError, ospfTrapVirtIfConfigError, ospfTrapIfAuthFailure, ospfTrapVirtIfAuthFailure, ospfTrapIfRxBadPacket, ospfTrapVirtIfRxBadPacket, ospfTrapTxRetransmit, ospfTrapVirtIfTxRetransmit, ospfTrapOriginateLsa, ospfTrapMaxAgeLsa, ospfTrapLsdbOverflow, ospfTrapLsdbApproachingOverflow, bgpTrapEstablished, and bgpTrapBackwardTransition. SNMP alarms are listed in Appendix A: “Alarms/Events, System Limits, and Standard ASCII Table” on page A-1. Network Monitoring via Service Level Agreement Agent The XSR supports a Service Level Agreement (SLA) agent to monitor network performance based on configurable latency, jitter, and packet loss metrics as well as to query the results. You can schedule measurements between the XSR and any remote host which supports the type of operation - ICMP echo - used to perform the measurement. There are two management interfaces which operators can choose from to perform monitoring: CLI or SNMP. The SLA agent supported via the CLI is based on the de facto industry standard whereas the supported MIB provided by the SNMP interface is based on the Enterasys-ServiceLevel-Reporting-MIB (SLR). This MIB in turn is based on the IP Performance Monitoring Reporting MIB, now in RFC draft form. The SLR MIB classifies network performance by network and aggregate measurements as follows: • Network measure - Performs several metric measurements per packet exchange: each measurement step produces a single result per metric. • Aggregate measure - Summarizes the results of previous network or aggregated measurements. For example, metrics such as packet loss and round-trip delay are classified as network measurements while round-trip delay average and jitter metrics, which are calculated based on previous results, are classified as aggregate measurements. This is described further in the following sections. Note: The SLA agent provides statistics based on round-trip measurements only and includes XSR processing time. For more information on SLA-related CLI commands, refer to the XSR CLI Reference Guide. Refer to Appendix: B “Service Level Reporting MIB Tables” on page B-1 for a list of XSR-supported fields and tables from the Enterasys Service Level Reporting MIB. Measuring Performance Metrics XSR performance metrics are measured as follows: 2-40 • D(i) - the value for the ith measurement • Ri - receive time for the ith measurement • Si - sending time for the ith measurement Managing the XSR Network Management through SNMP Latency (network delay) is measured with the formula: D(i)=(Ri-Si), which is the round-trip interval between sending and receiving the ICMP packet triggered by the initiator and echoed back by the target. Jitter (network delay variation) is the value between packets i and j as figured by the formula: D(i,j)=(Rj-Ri)-(Sj-Si). Since the XSR measures the round trip, Ri indicates the receive interval at the source instead of the target. Packet loss - If an ICMP echo reply packet is not received within a specified time, it is considered lost. This does not allow the operator to identify whether the packet is lost on the way to the target or when the response is traveled from the target back to the sender. Configuration Examples The following CLI and SNMP examples illustrate how to create: an owner, a measurement to ping, schedule a measurement, and query a measurement. Create an Owner The XSR provides a default owner monitor residing in the first row of the owner table. If you want to create another RTR owner, follow the instructions below. Via CLI The following example creates the user Clem: XSR(config)#rtr owner Clem Via SNMP The example below creates a user in row 2 of the table (the instance is 2 as indicated in bold): 1. Create a row (etsysSrvcLvlOwnersStatus): 1.3.6.1.4.1.5624.1.2.39.1.2.1.1.9.2 = 5 (createAndWait) 2. Configure user (etsysSrvcLvlOwnersOwner): 1.3.6.1.4.1.5624.1.2.39.1.2.1.1.2.2 = userA 3. Change the row status to active (etsysSrvcLvlOwnersStatus): 1.3.6.1.4.1.5624.1.2.39.1.2.1.1.9.2 = 1 (active) Note: The string userA is equivalent to the ASCII value 117:115:101:114:65, which will be used to index into the aggregate measure table. If you want to use the default owner, the ASCII value of the default owner (monitor) is 109:111:110:105:116:111:114. Refer to “Standard ASCII Character Table” on page A-19 for more information. With NetSight Atlas MIB Tools, retrieve the ASCII value from the Raw Value column, as shown in Figure 2-4. Figure 2-4 NetSight Atlas MIB Tools Screen Create a Measurement to Ping Via CLI The following example adds a ping measurement to IP address 1.1.1.1: XSR(config)#rtr 1 XSR(config-rtr-echo-1)#type echo protocol ipIcmpEcho 1.1.1.1 XSR User’s Guide 2-41 Network Management through SNMP Via SNMP The following example creates a row in the aggregate measure table with owner userA. If the entry is created with owner monitor, replace 5.117.115.101.114.65 with 7.109.111.110.105.116.111.114. 1. Create a row (etsysSrvcLvlAggrMeasureStatus): 1.3.6.1.4.1.5624.1.2.39.1.4.2.1.18.5.117.115.101.114.65.1 = 5 (createAndWait) 2. Configure the destination address (etsysSrvcLvlNetMeasureDst) in the network measure table: 1.3.6.1.4.1.5624.1.2.39.1.4.1.1.14.5.117.115.101.114.65.1 = 1.1.1.1 Schedule a measurement Via CLI The following command schedules a measurement immediately: XSR(config)#rtr schedule 1 start-time now Via SNMP 1. The following example obtains the current time by querying the etsysSrvcLvlSystemTime schedule a measure (1.3.6.1.4.1.5624.1.2.39.1.1.1.0). 2. Configure the measurement begin time (etsysSrvcLvlAggrMeasureBeginTime) to now which is the result of the above query: 1.3.6.1.4.1.5624.1.2.39.1.4.2.1.5.5.117.115.101.114.65.1 = 3. 0796BD1048F5C28F Change the row status (etsysSrvcLvlAggrMeasureStatus) to active and activate the measure: 1.3.6.1.4.1.5624.1.2.39.1.4.2.1.18.5.117.115.101.114.65.1 = 1 2-42 Managing the XSR Network Management through SNMP Query a Measurement Now that you have performed the previous actions, you can query the measurement result. Via CLI The following command displays rtr output: XSR#show rtr history Via SNMP 1. Query the etsysSrvcLvlHistoryTable (1.3.6.1.4.1.5624.1.2.39.1.3.1). Using the SLA Agent in SNMP The XSR’s SLA agent implements the Enterasys Service Level Reporting MIB and supported metrics as detailed in the following tables, which may cross-reference each other. For example, etsysSrvcLvlNetMeasureIndex is used to index etsysSrvcLvlHistoryTable as well. Note: All configurable values are limited by ranges specified in the CLI. Refer to Appendix B: “Service Level Reporting MIB Tables” on page B-1 for supported OIDs. Full Configuration Backup/Restore The XSR supports a full configuration backup and restore via SNMP using the Enterasys Configuration Management and Cabletron CTdownload MIBs. Follow the steps below. Cabletron CTdownload MIB 1. Select the downLoadConfiguration(4) and upLoadConfiguration(5) operations in the ctDLOnLineDownload field. 2. Specify the address of the TFTP server in ctDLNetaddress. Start the transfer with the appropriate value in ctDLOnLineDownload. Monitor the transfer’s progress by polling the ctDLOperStatus field. Note that by definition, the XSR will be reset after a full-config is downloaded, unbundled, verified and committed to RAM. 3. During an upload of full-config, the user.dat, cert.dat, and private-config files will be bundled and stored in a temporary file (full-config), then uploaded to the TFTP server. Enterasys Configuration Management MIB 1. Select the configurationUpload(5) and configurationDownload(6) operations in the etsysConfigMgmtChangeOperation field. Specify the file name as full-config. 2. In order to activate the configuration, the configurationActivate(9) command is issued causing a bundled full-config to be unbundled and become the active (startup) configuration. The file name in etsysConfigMgmtChangeURL must indicate full-config. This action initiates a system reset. 3. The upload and download of the startup-config file follows the same steps as in the Cabletron MIB but does not bundle or unbundle other configuration components. XSR User’s Guide 2-43 Network Management through SNMP Software Image Download using NetSight The NetSight Remote Administrator application can download an image to the XSR using TFTP. The software image download is initiated through NetSight using an SNMP set command, which triggers a TFTP download session initiated from the XSR. Note: The XSR does not support an off-line download triggered by SNMP. That is, when you use NetSight to download an image, a dialog box will pop up with a check box titled Online download. If the box is unchecked, the SNMP request will fail. See NetSight documentation for more information. SNMP Download with Auto-Reboot Option To use this option, you must first enter the following command in Global mode to allow a user to reboot the XSR using SNMP: XSR(config)#snmp-server system-shutdown When you employ NetSight to download an image, a dialog box will pop up with a check box titled Auto reboot. If the box is checked, the XSR will be rebooted remotely after the download ends. If the snmp-server system-shutdown command were not entered and the remote user chose the auto reboot option, the request would fail. CLI Translator The XSR provides a CLI Translator as a stand-alone CLI configuration application or a NetSight plug-in application to translate a CLI script configuration file, which can be downloaded to the XSR through TFTP. Appending CLI Commands to Configuration Files via SNMP The XSR permits appending a file containing CLI commands to your configuration by using SNMP. This is done by the ConfigurationAppend command in the Configuration Management MIB executing CLI commands. In detail, it is performed as follows: • Using TFTP, the file is copied to the XSR’s Flash: directory using a temporary file name. If an error occurs while transferring the file, an error message will be sent to the SNMP agent and displayed in the etsConfigMgmtChangeErrorDescription field. • Once the file has successfully transferred, the ConfigurationAppend command acquires Global mode and begins reading the CLI commands from the file. If Global mode is locked by another user then an error will be displayed in the etsConfigMgmtChangeErrorDescription field and the temporary file deleted. • When all command lines have been executed the SNMP agent is informed that the command was successful. If an error occured in the file, you are informed through the SNMP agent. • The running configuration is saved to the startup configuration on the CLI. • The SNMP user is informed that the command was successful and the temporary file name is then deleted. Follow the steps below to perform the append: Note: Before starting this procedure, make sure that a TFTP server program is running on your PC. 2-44 Managing the XSR Accessing the XSR Through the Web 1. Write a plain ASCII file containing the CLI commands you want entered. For example: interface FastEthernet2 ip address 192.168.19.1 255.255.255.0 no shutdown 2. Save and move the file to the root directory of the TFTP server on your PC. 3. Use SNMPv3 to create a row in the Configuration Management MIB. For example, CreateAndWait: 1.3.6.1.4.1.5624.1.2.16.2.7.1.11.1 = 5 If you read the table, one row should be added. 4. Set the file name to point to the file on your PC: 1.3.6.1.4.1.5624.1.2.16.2.7.1.2.1 = tftp://1.1.1.1/newCmd 5. Set the operation to configAppend: 1.3.6.1.4.1.5624.1.2.16.2.7.1.3.1 = 0x0020 6. Set the row to active state: 1.3.6.1.4.1.5624.1.2.16.2.7.1.11.1 - 1 The configuration in the newCmd file is now part of the running-config. That is, you will see the configuration for fastethernet2 when you enter the show running-config command. Note: Be aware that the ConfigurationAppend command does not check for syntax errors in the file being downloaded from the server. For more information, refer to the Enterasys Configuration Management MIB. Accessing the XSR Through the Web The XSR via a browser but provide a cursory display of hardware configuration data to diagnose the router over the Web. Because the Web server is disabled at boot-up, you must either manually enable the Web server using the CLI, or enable it in startup-config. The default Web server port is 80. Access to the XSR through the Web is not password protected. Network Management Tools The following tools are useful to manage the XSR over the network. NetSight Atlas Router Services Manager v2.0 XSR firewall and Access Control List (ACL) configuration can performed on the NetSight Atlas Router Services Manager v2.0 application. For more information, refer to the following URL: http://www.enterasys.com/products/management/NSA-RSM-CD/ For NetSight Atlas documentation, refer to the following URL: http://www.enterasys.com/support/manuals/netsight.html Firmware Upgrade Procedures A variety of tools provided by the XSR and Enterasys’ NetSight application support: XSR User’s Guide 2-45 Network Management Tools Using the CLI for Downloads TFTP can be used to transfer system firmware to the XSR remotely. A TFTP server must be running on the remote machine and the firmware image file must reside in the TFTP root directory of the server when using the copy tftp filename command. Using SNMP for Downloads You can use an SNMP manager to download or upload firmware from a remote server, and copy a configuration image file to the XSR. Only run-time/online mode downloads are supported. This requires setting the ctDLNetAddress and ctDLFileName objects and issuing a ctDLOnLineDownLoad defined in the CTRON-DOWNLOAD-MIB. For more details click on the following URL: http://www.enterasys.com/support/mibs Fault Reporting A fault report can be uploaded through TFTP. The mechanism to upload the crash report is the same as the one used to upload configuration file. Refer to “Performing Fault Management” on page 2-23 for more information. Auto-discovery The NetSight Gateway Management Tool can auto-discover an XSR on the network using SNMP with the following MIB variables: • SysDesr • SysObjID • Sysuptime NetSight also performs auto-discovery via ping using ICMP ping. 2-46 Managing the XSR 3 Managing LAN/WAN Interfaces Overview of LAN Interfaces The XSR supports two 10/100 Base-T FastEthernet ports on the XSR 1800 Series branch routers and three 10/100/1000 Base-T GigabitEthernet ports on the XSR 3000 Series regional routers. All ports are capable of running in half- and full-duplex modes, and are ANSI/IEEE 802.3 and ANSI/ IEEE 802.3u compliant. These ports connect to an Ethernet network for LAN connectivity. The Fast/GigabitEthernet interfaces perform the following functions: • Allow the XSR to connect to networks of speeds of 10 Mbps, 100 Mbps, or 1000 Mbps (using manual settings or auto-negotiation) • Monitor the status of the link: up or down • Allow you to issue interface/device configuration commands through the Command Line Interface (CLI) • Accumulate MIB-II (RFC-1213) interface statistics regarding the transmission and reception of bytes and packets LAN Features The XSR supports the following LAN interface features: • Alarms/events - For a complete list, refer to “Alarms/Events, System Limits, and Standard ASCII Table” on page A-1 in this manual. • Duplex mode is set using the duplex command with the following options: • – Half - half-duplex – Full - full-duplex – Auto - auto-negotiation (default) Packet filtering - the interface will receive: – All broadcast packets – All multicast packets – Unicast packets which have the MAC addresses of the device • Maximum Receive Unit (MRU) - all frames less than or equal to 1518 bytes are accepted including the 4-byte FCS. • Oversized packets greater than 1518 bytes are not accepted. • Runt packets of 64 bytes or less are not accepted. XSR User’s Guide 3-1 Configuring the LAN • Maximum Transmission Unit (MTU) - all frames less than or equal to 1518 bytes are accepted. MTU size is set using the ip mtu command. • Speed is enabled using the speed command with the following options: – 10 - 10 Mbps – 100 - 100 Mbps – 1000 - 1000 Mbps – Auto - Auto-negotiate (default) • Statistics - all MIB-II interface statistics are supported • Clear commands such as clear counters FastEthernet and clear counters gigabitethernet, which reset the MIB-II counters, and clear interface FastEthernet and clear interface GigabitEthernet, which reset the interface counters and facilitate interface troubleshooting. Configuring the LAN Enter the following commands to configure FastEthernet interface 1 on network 192.57.99.32: XSR(config)#interface fastethernet 1 XSR(config-if )#ip address 192.57.99.32 255.255.255.0 XSR(config-if )#no shutdown Enter the following commands to configure GigabitEthernet interface 2 on network 192.168.57.12: XSR(config)#interface gigabitethernet 2 XSR(config-if )#ip address 192.168.57.12 255.255.255.0 XSR(config-if )#no shutdown MIB Statistics The following table reflects MIB-II (RFC-1213) port statistics collected by a LAN interface. 3-2 Table 3-1 MIB-II Interface Statistics Variable Description IfDescr Description of the interface. IfType Type of the interface (set once, and never changed). IfMtu Size of the largest packet that can be sent/received on the interface, specified in bytes. IfSpeed Estimate of the interface's current bandwidth in kilobits per second (10000 or 100000) IfPhysAddress Interface's address at its protocol sub-layer (the MAC address). ifAdminStatus Desired state for the interface. ifOperStatus Current operational status of the interface. ifLastChange Value of sysUpTime when the interface entered its current operational state. IfInOctets Sum of octets received on the interface. ifInUcastPkts Sum of subnetwork-unicast packets delivered to a higher layer protocol. Managing LAN/WAN Interfaces Overview of WAN Interfaces Table 3-1 MIB-II Interface Statistics (continued) Variable Description ifInNUcastPkts Sum of non-unicast packets delivered to a higher layer protocol. IfInDiscards Sum of inbound packets discarded. IfInErrors Sum of inbound packets that contained errors. IfOutOctets Sum of octets transmitted on the interface ifOutUcastPkts Sum of subnetwork-unicast packets sent to the network. ifOutNUcastPkts Sum of non-unicast packets transmitted to the network. IfOutErrors Sum of outbound packets that could not be sent due to errors. IfOutDiscards Sum of outbound packets discarded. Overview of WAN Interfaces The XSR supports as many as six serial cards (in an XSR-3250), each of which can support four ports for a maximum of 24 serial ports. Each port is individually configurable regarding speed, media-type, and protocol. The Serial WAN interface performs the following functions: • Transmit packets given by the protocol layer onto a serial link. • Receive packets from a serial link and pass up to the protocol layer. • Allow CLI configuration commands to be issued. • Accumulate all MIB-II (RFC-1213) interface statistics regarding the transmission and reception of bytes and packets. WAN Features The XSR supports the following WAN interface features: • Alarms/events - For a complete list, refer to “Alarms/Events, System Limits, and Standard ASCII Table” on page A-1 in this manual. • Interfaces - The following interface types can be configured using the media-type command: – RS232 (also known as V.28) (default) – RS422 (also known as RS-530) – RS449 (also known as V.36) – RS530A – V.35 – X.21 • Either Sync or Async mode is set by using physical-layer. • Encoding - On Sync interfaces, nrzi-encoding sets NRZI encoding (NRZ encoding is the default). XSR User’s Guide 3-3 Configuring the WAN • Clocking speed - For Sync interfaces, an external clock must be provided. Acceptable clock values range from 2400 Hz to 10 MHz. For Async interfaces, the clock is internally generated and can be set to the following values using clock rate: – 2400 Kbps – 4800 Kbps – 7200 Kbps – 9600 Kbps (default) – 14400 Kbps – 19200 Kbps – 28800 Kbps – 38400 Kbps – 57600 Kbps – 115200 Kbps • Statistics - all MIB-II interface statistics are supported. • Clear commands such as clear counters serial and clear interface serial facilitate interface troubleshooting. • Async mode commands such as databits, stopbits, and parity provide configuration of the serial line. • Maximum Receive Unit (MRU) is 1518 bytes (including CRC). Configuring the WAN Enter the following commands to configure either a synchronous T1 or asynchronous Serial interface. For more detailed information on the commands used here, refer to the XSR CLI Reference Guide and other chapters in this manual. The following example configures the synchronous T1 controller on NIM 1, port 0 named Acme T1 with the default values of ESF framing and B8ZS line encoding. It also specifies channel group 1 with mapped timeslots 1-5, 8 and 9, assigns the local IP address 192.168.1.1 to the channel group and sets PPP encapsulation. XSR(config)#controller t1 1/0 XSR(config-controller )#description T1 “Acme T1” XSR(config-controller )#framing esf XSR(config-controller )#linecode b8zs XSR(config-controller )#channel-group 1 timeslots 1-5,8,9 XSR(config-controller )#no shutdown XSR(config)#interface serial 1/0:1 XSR(config-if )#ip address 192.168.1.1 255.255.255.0 XSR(config-if )#encapsulation ppp XSR(config-if )#no shutdown 3-4 Managing LAN/WAN Interfaces Configuring the WAN The following example configures the asynchronous serial interface on NIM 2, port 0 with the following non-default values: PPP encapsulation, RS422 cabling, 57600 bps clock rate, MTU size of 1200 bytes, no parity, 7 databits and 2 stopbits. It also assigns the local IP address 192.168.1.1 to the interface. Although the XSR is not designed to be an access server, you can attach an external modem to the serial port and accept async calls as long as the modem is configured in “dumb mode” (AT commands are disabled). XSR(config)#interface serial 2/0 XSR(config-if )#ip address 192.168.1.1 255.255.255.0 XSR(config-if )#encapsulation ppp XSR(config-if )#physical-layer async XSR(config-if )#media-type rs422 XSR(config-if )#clock rate 57600 XSR(config-if )#ip mtu 1200 XSR(config-if )#parity none XSR(config-if )#databits 7 XSR(config-if )#stopbits 2 XSR(config-if )#no shutdown The following example configures the XSR to dial-out (async): XSR(config)#interface serial 1/0 XSR(config-if )#encapsulation ppp XSR(config-if )#physical-layer async XSR(config-if )#dialer pool-member 1 XSR(config-if )#clock rate 57600 XSR(config-if )#no shutdown XSR(config-if )#interface dialer1 XSR(config-if )#dialer pool 1 XSR(config-if )#dialer string 015081234567 XSR(config-if )#encapsulation ppp XSR(config-if )#ip address 192.168.1.2 255.255.255.0 XSR(config-if )#no shutdown XSR User’s Guide 3-5 Configuring the WAN 3-6 Managing LAN/WAN Interfaces 4 Configuring T1/E1 & T3/E3 Interfaces Overview The XSR provides Frame Relay and PPP service via T1/E1 and T3/E3 functionality as well as Drop and Insert features. T1/E1 Functionality The XSR provides a T1/E1 subsystem on a single NIM-based I/O card with a maximum of two installed NIMs. Depending on the card type and series, each card can support 1, 2 or 4 T1 or E1 physical ports. You can select either T1, at 1.544 Mbps interface rate per port, or E1, at 2.048 Mbps interface rate per port. In both operational modes, the interface can work either in full rate T1/E1 mode (the complete available line interface rate is assigned to one user), fractional T1/E1 mode (only one channel group is assigned, with less than the total available number of timeslots on a T1/E1 line configured per physical port) or in channelized mode (more than one channel group is configured per physical port). In fractional/channelized mode, up to 31 DS0 channels can be assigned on E1 interfaces and up to 24 DS0 channels can be assigned on T1 interfaces. The rate (line speed) of basic channel (DS0) can be configured at 56 or 64 Kbps. T3/E3 Functionality The XSR T3/E3 subsystem offers a NIM-based I/O card with a single port, full rate unchannelized T3/E3 mode and sub-rate support for proprietary T3 and E3 DSU vendors. “Sub-rate T3/E3” and “fractional T3” are interchangeable terms describing un-channelized T3/E3 service that delivers less than full line bandwidth. T3 or E3 mode is software selectable - one hardware NIM supports both modes. Features T1/E1 Mode The following features are offered on the T1/E1 interfaces: • Integrated CSU/DSU • Full-rate, channelized and fractional • Short and long haul symmetrical line interfaces with 100/120 ohm impedance using RJ-45/ 48C or 49C connectors XSR User’s Guide 4-1 Features • Support for local and remote loopback • Support for an IP interface as a loopback (refer to the CLI Reference Guide for an example) • Timing - line and internal • Framing - T1: SF, ESF; E1: CRC4, NO-CRC4 • Line encoding - T1: AMI, B8ZS; E1: AMI, HDB3 • Data inversion • Loopback Tests - local, network line, network payload, inband FDL • Alarm detection - all levels of alarm/event detection and signaling • T1 Drop and Insert (D&I NIM) with One to One voice DS0 bypassing The following features are offered on the T3/E3 interfaces: T3 Mode The following features are offered on T3 interfaces: • Framing - M13 and C-bit parity • Line build out - short (0 to 250 feet) and long (250 to 450 feet) • Line interface - 75-ohm BNC coax female connectors • Clock - line (slaved to network receive clock) and internal (private clock source) • Line rate - 44.736 Mbps (gross rate including overhead and payload) • Full Rate - 44.2 Mbps (payload rate only) • Sub-rate - approximately 3 Mbps increments up to 44.2 Mbps • Sub-rate compatible DSUs supported: – Quick Eagle (formerly Digital Link) DL3100 T3 or Cisco-300-44210 Kbps – Larscom Access T45-3100-44210 Kbps – ADC Kentrox T3/E3 IDSU-1500-35000, 44210 Kbps – Adtran T3SU 300-75-44210Kbps – Verilink HDM 2182-1500-44210 Kbps • Scrambling - same as for sub-rates, DSU vendor dependant • Diagnostics - ANSI T1.107 compatible loop backs (initialized from the network) • Performance monitoring local network port statistics - Current 15 -minute, 24-hour (96 *15minute intervals) and total for 24 hours E3 Mode The following features are offered on E3 interfaces: 4-2 • Framing - G751 or bypass • Line interface - 75-ohm BNC coax female connectors • Clock - line (slaved to network receive clock) and internal (private clock source) Configuring T1/E1 & T3/E3 Interfaces Features • Line rate - 34.368 Mbps • Full rate - 34.0995 Mbps (G751) • Sub-rate - approximately 3 Mbps increments up to 33 Mbps • Compatible DSUs supported – Cisco or Quick Eagle (formerly Digital Link) DL3100 E3 -300-33.920 Kbps – ADC Kentrox T3/E3 IDSU • Scrambling - Cisco mode only • Performance Monitoring Local Network Port Statistics - Per RFC-2496- Current 15-minute, 24hour (96 *15-minute intervals) and total for 24 hours T1/E1 Subsystem Configuration Each T1/E1 physical port is represented as a T1 or E1 controller. This is valid for both full rate T1/ E1 mode and fractional/channelized modes. Each T1/E1 physical port (line) can be configured to run in one of the following modes: • Full rate T1/E1 mode - full T1/E1 line bandwidth is used by one user • Fractional T1/E1 mode - only one Channel Group is assigned to one T1/E1 physical line • Channelized T1/E1 mode - more than one Channel Group is assigned to one T1/E1 physical line For both fractional and channelized configurations, each configured Channel Group, which might contain individual timeslots or ranges of timeslots, uses only one of the available logical channels. All configured T1/E1 lines are recognized by the system software as serial interfaces. That implies that all of the available configuration procedures for interfaces are applicable. Each of the serial interfaces can be configured to carry data traffic with PPP encoding. T3/E3 Subsystem Configuration Each T3/E3 physical port is represented as a T3 or E3 controller. This is valid for both full and subrate T3/E3 modes. Un-channelized or “unformatted” service creates a point-to-point connection between your network equipment and that of the service provider. The T3/E3 WAN transmission line can be provisioned as follows: • Full rate service is covered by national and international standards. Only one data stream at full data rate is sent over the T3/E3 line. – T3 - 44.2Mbps payload, Framing DS3 ANSI T1.107 – E3 - 33.920 Mbps payload, Framing G.751. The entire bandwidth of the line is used to pass Frame Relay or PPP data. Frame Relay service can be provisioned in a number of ways, e.g., measured T3 service provides an unlimited (burstable) T3 with charges based on bandwidth used. • Sub-rate service includes no standards. It is provisioned by T3 or E3 DSUs which transmit only one data stream at a reduced rate. Supported rates are DSU-specific. Data rates are: – T3 - 1 to 35 MHz in 0.5MHz steps – E3 - 1 to 24.5 MHz in 0.5MHz steps Sub‐rate T3/E3 DSUs include: Digital Link, Kentrox, Adtran, Verilink and Larscom. XSR User’s Guide 4-3 Features • Clear Channel service is similar to the full rate service except that the data stream rate is slightly higher because the framing overhead bits are also used to deliver data. – T3 - Not Available – E3 - 34.368Mbps payload T1 Drop & Insert One-to-One DS0 Bypassing The XSR’s 2-port D&I NIM is designed to cross-connect unused timeslots between the two ports and provide one T1/E1 line for both data and voice traffic, as shown in Figure 4-1. The timeslots carrying data are terminated in the on-board HDLC controller, while voice timeslots bypass the D&I NIM and are terminated in the downstream PBX. This NIM is configured with drop-andinsert-group and runs identically to the XSR’s 2-port fractional T1/E1 NIM. Show controller t1 s/c/x is useful for debugging the line. Refer to the XSR CLI Reference Guide for associated commands. Figure 4-1 Drop and Insert NIM Topology Voice timeslots bypass the XSR T1-PBX PSTN T1-CO Clock PBX Clock Frame Relay Data timeslots terminate in the XSR The D&I NIM does not support channelized mode nor PRI. Note: If the XSR loses power, the two T1 lines will be cross-connected by the relays. Consequently, the Central Office will not report the lines down. Drop and Insert Features The following features are supported by the D&I NIM: 4-4 • The D&I feature allows Channel Associated Signaling (CAS) voice DS0 timeslots to be taken off the Central Office (CO) T1 or E1 interface and inserted into timeslots of the PBX T1 or E1 interface, as long as both interfaces are on the same NIM card. • You must configure the timeslots belonging to the data channel group. All timeslots not within the data channel group are considered idle and bypassed between the T1 or E1 ports. • D&I timeslots need not be contiguous - all idle timeslots on both the T1 or E1 interface will be automatically connected and transparently pass voice channels. Idle timeslots are not configured to take part in channel groups. • The CO T1/E1 and PBX T1/E1 ports are bypassed by relays to maintain a CO-PBX link in case of a power outage or watchdog timeout. So, when the XSR with the D&I NIM is inserted between the PBX and the T1 line of the CO, there is no need to reconfigure the PBX. Configuring T1/E1 & T3/E3 Interfaces Configuring Channelized T1/E1 Interfaces • The D&I NIM supports different framing and line coding on the CO T1 and PBX T1 ports (ESF versus D4, B8ZS versus AMI), but if the ports are not identically configured, the bypass relays will not restore the voice link in the case of an XSR failure or power outage. • The CO T1/E1 port supports one PPP or Frame Relay channel. • The T1E1 Drop & Insert NIM includes the same data functionality as the standard two-port Fractional T1E1 NIM. • The PBX T1 port need not support a data channel. Note: All of the above features are supported for the E1 interface, as well. The E1’s timeslot 16 is reserved for CAS signaling and can not be configured for data. Refer to “Configuring the D&I NIM” on page 4-13 for a configuration example. Configuring Channelized T1/E1 Interfaces Perform the following steps to set up a channelized T1/E1 port. This T1 example is similar to that for an E1 controller and associated port. 1. Specify the slot/card/port address of the controller to be configured: XSR(config)#controller t1 0/1/0 This command automatically adds a full-rate channel group on port 0 and acquires Controller mode. Alternatively, you can add a different port and manually add a channel group using any of 24 timeslots. 2. Specify the clock source for the controller. XSR(config-controller )#clock source line The clock source command determines which one of the circuits provides the clocking signal. 3. Specify the controller's framing type: XSR(config-controller )#framing esf 4. Specify the controller's line encoding type: XSR(config-controller )#linecode b8zs 5. Specify a channel group and map timeslots to the group. Enter the channel-group command. XSR(config-controller )#channel-group 0 timeslots 1,3-5,8 The example specifies channel group 0 and maps timeslots 1, 3 through 5, and 8 to channel group 0. Note: Each channel group is represented as a serial interface and is set individually. Channel groups are created as shown above but to configure them you must acquire Interface Serial mode as shown below. 6. Enter the no shutdown command to enable the line. XSR(config-controller )#no shutdown 7. If IP routing is enabled, assign an IP address and subnet mask to the channel group with the interface and ip address commands: XSR(config)#interface serial 1/0:0 That is, NIM 1, port 0, and Channel group 0. XSR(config-if )#ip address 10.1.16.2 255.255.255.0 8. Specify the encapsulation protocol to be used over this interface. XSR(config-if )#encapsulation ppp In this example PPP is used. XSR User’s Guide 4-5 Configuring Un-channelized T3/E3 Interfaces 9. Add any additional configuration commands required to enable IP- or PPP-related protocols. 10. Use the no shutdown and exit commands to enable the interface and return to configuration mode. Repeat the previous steps to configure more channel groups. XSR(config-if )#no shutdown Configuring Un-channelized T3/E3 Interfaces Perform the following steps to set up an un-channelized T3 or E3 port. If you wish to use defaults, enter only the first two commands. The remaining commands set up IP routing, WAN/LAN ports and optional T3 values. 1. Specify the slot/card/port address of the controller to be configured. XSR(config)#controller t3 0/1/0 This command adds the serial pipe, a single channel, and acquires Controller mode. 2. Enable the Controller line. XSR(config-controller )#no shutdown 3. Optionally, if you prefer to configure internal clocking. XSR(config-controller )#clock source internal 4. Optionally, if you wish to configure sub-rate mode, enter the following commands to set the proprietary DSU mode and bandwidth. For example: XSR(config-controller )#dsu mode adtran XSR(config-controller )#dsu bandwidth 30074 5. If IP routing is enabled, assign an IP address and subnet mask to the channel group. XSR(config)#interface serial 1/0:0 That is, NIM 1, port 0, and Channel group 0. XSR(config-if )#ip address 10.1.16.2 255.255.255.0 6. Specify the encapsulation protocol to be used over this interface. XSR(config-if )#encapsulation ppp In this example PPP is used. 7. Enable the Serial line. XSR(config-if )#no shutdown 8. Optionally, enter a static route to connect to a remote site. XSR(config-if )#ip route 5.5.5.0 255.255.255.0 10.1.16.3 9. Set LAN interfaces. GigabitEthernet interface 2 is configured with speed and duplex values. XSR(config)#interface GigabitEthernet 1 XSR(config- )#ip address 192.168.72.135 255.255.255.0 XSR(config- )#no shutdown XSR(config)#interface GigabitEthernet 2 XSR(config- )#speed 100 XSR(config- )#duplex full XSR(config- )#ip address 6.6.6.1 255.255.255.0 XSR(config- )#no shutdown 4-6 Configuring T1/E1 & T3/E3 Interfaces Troubleshooting T1/E1 & T3/E3 Links Troubleshooting T1/E1 & T3/E3 Links This section describes general procedures for troubleshooting T1/E1 lines on the XSR. The following flow diagram shows basic steps to perform. Figure 4-2 General T1/E1 & T3/E3 Troubleshooting Flowchart Execute the show controller t1 x command Is the line administratively down? Yes Use the following commands to bring up the controller: controller t1 x no shutdown No Is the line up? No Loss of Signal/Loss of Frame - refer to Figure 5 Yes Is the line in loopback mode? Yes Use the following commands to turn loopback off: controller t1 x no loopback (T1/E1) No Are there any alarms? Yes Alarm analysis - refer to Figures 6 and 7 No Are there any error events? Yes Error Events analysis - refer to Figure 8 If your T1/E1 or T3/E3 controller still does not function as desired, contact your service/network provider As shown in Figure 4-2, three troubleshooting actions are defined: • T1/E1 & T3/E3 Physical Layer (Layer 1) troubleshooting (loss of signal/frame) • T1/E1 & T3/E3 Alarm Analysis • T1/E1 & T3/E3 Error Events Analysis T1/E1 & T3/E3 Physical Layer Troubleshooting This section describes the techniques and procedures to troubleshoot T1/E1 or T3/E3 physical layer problems. The troubleshooting flowchart below displays the procedures described in the following section. XSR User’s Guide 4-7 Troubleshooting T1/E1 & T3/E3 Links Figure 4-3 T1/E1 & T3/E3 Physical Layer (Layer 1) Troubleshooting Flowchart Loss of Signal Loss of Signal/Loss of Frame Use the following commands to bring up the controller: controller t1 x framing Loss of Frame No Is the framing format correct? Yes Are the cables and connectors ok? No Connect or replace the cable Yes Use the following commands to change the LBO: cablelength long/short (T1) cablelength (T3) If your T1/E1 or T3/E3 controller still does not function as desired, contact your service/network provider The show controller command displays current controller parameters, status and statistics data. Most controller errors are caused by incorrectly configured lines including line coding, framing, and clock source parameters. When a T1/E1 or T3/E3 controller (port) is created with an associated channel or channel group, it can exist in three states: • Administratively down: If you do not enter the no shutdown command when you create the controller (port) or enter the shutdown command for an already created controller (port), you create all associated channel-groups on that controller (port) but they are disabled. • Down: If you enter the no shutdown command for the controller in Controller mode, all associated channel groups are enabled on the physical level but the controller senses an alarm on the line and will not pass user data. • Up: Only when the associated interface is enabled using the no shutdown command in Interface mode does the channel-group become operational. This is because there is one-to-one mapping between channel groups and interfaces; if an interface is administratively down so is its channel group - even if the controller port is up! Follow these steps to restart the controller to correct this type of error: 1. Enter Controller mode. For example: XSR(config)#controller t1 1/0 XSR(config-controller )# 4-8 Configuring T1/E1 & T3/E3 Interfaces Troubleshooting T1/E1 & T3/E3 Links 2. Restart the controller: XSR(config-controller )#no shutdown If the T1/E1or T3/E3 controller and line are not up, check that either the T3/E3 NIM LOS or LOF LEDs are shining or one of the following messages displays in the show controller output: • Receiver has loss of frame (LOF), or • Receiver has loss of signal (LOS) Complete the following steps if the receiver has loss of frame: 1. Ensure the framing format set on the port matches the framing format of the line. If needed, change the framing format configuration. 2. Change the Line Build-Out (LBO) using cablelength long/short (T1) or cablelength (T3) commands. If needed, contact your service provider for more details on LBO configuration. Complete the following steps if the receiver has a loss of signal: 1. Ensure the cable between the interface port and the T1/E1 or T3/E3 service provider equipment is connected correctly. 2. Check the cable integrity by looking for breaks or other physical abnormalities in the cable. 3. Check the cable connectors. T1/E1 & T3/E3 Alarm Analysis Perform the following steps to troubleshoot for various alarms that can occur within the T1/E1 or T3/E3 subsystem. The following troubleshooting flowchart displays the procedures. Figure 4-4 T1/E1 & T3/E3 Alarm Analysis Troubleshooting Flowchart (Part 1) Alarm Analysis Receive Remote Alarm Indication (Yellow alarm) - refer to Figure 1-4 If a Receive Alarm Indication Signal (Blue alarm) is reported, contact your service/network provider What kind of alarm is reported? If a Transmit Sending Remote Alarm (Red alarm) is reported, check your settings at the remote end Transmit Alarm Signal (Blue alarm) - refer to Figure 1-4 If a Transmit Remote Alarm Indication (Yellow alarm) is reported, check your settings at the remote site If your T1/E1 or T3/E3 controller still does not function as desired, contact your service/network provider Receive Alarm Indication Signal (AIS - Blue Alarm) 1. Check that the framing format of the controller port matches the framing format of the line provided by your service provider. XSR User’s Guide 4-9 Troubleshooting T1/E1 & T3/E3 Links Receive Remote Alarm Indication (RAI - Yellow Alarm) 1. Insert an external loopback cable into the T1/E1 or T3/E3 port. 2. Use the show controller command to check for alarms. To identify the type of the alarm, analyze the log report of the XSR. If alarms are reported, contact your service provider. 3. Remove the external loopback cable and the reconnect line. 4. Check the cabling. 5. Power cycle the XSR. 6. Connect the T1/E1 or T3/E3 line to a different port and configure the port with the same settings as the line. If the problem does not persist, then the fault lies with the port. In this case, contact Technical Support for assistance. Transmit Remote Alarm Indication (RAI - Yellow Alarm) 1. Check the settings at the remote end to ensure that they match your port settings. 2. Contact your service provider if the problem persists. Transmit Sending Remote Alarm (Red Alarm) 1. Ensure the framing format configured on the port matches the framing format of the line. If not, change the framing format on the controller to match the format of the line. 2. Check the settings at the remote end and ensure that they match your port settings. 3. Contact your service/network provider if the problem persists. Transmit Alarm Indication Signal (AIS - Blue Alarm) 4-10 1. Ensure that the framing format configured on the port matches the framing format of the line. If not, change the framing format on the controller to match the format of the line. 2. Power cycle the XSR. 3. Connect the T1/E1or T3/E3 line to a different port. Configure the port with the same settings as the line. If the problem persists, perform an external loopback test on that port. If the problem persists, contact Technical Support for assistance. Configuring T1/E1 & T3/E3 Interfaces Troubleshooting T1/E1 & T3/E3 Links Figure 4-5 T1/E1 & T3/E3 Alarm Analysis Troubleshooting Actions Flow (Part 2) Receive Remote Alarm Indication (Yellow alarm) - see Figure 1-2 Transmit Alarm Indication Signal (Blue alarm) - see Figure 1-2 Insert external loopback cable in the port No Does framing on the port match the line setting? No Are there any alarms? Yes Check the cabling Power cycle the XSR Check the cabling Yes Check the settings on the remote end Contact your service/ network provider Connect the line to a different port No Does the problem persist? Use the following commands to set framing: controller t1 x framing Power cycle the XSR Does the problem persist? No This problem is fixed Yes Connect the line to a different port Reconnect the line to the original port Yes Does the problem persist? No The port may be defective Yes Perform loopback test Perform loopback test Error Events Analysis - refer to Figure 1-5 Error Events Analysis - refer to Figure 1-5 T1/E1 & T3/E3 Error Events Analysis This section describes various error events that can occur on controller lines and provides troubleshooting information to fix some of these errors. The show controller command displays the status and statistics specific to the hardware. This information is useful for diagnostic tasks. All problems that can occur are captured by the underlying hardware and reported by the show controller output. Here are some troubleshooting steps you can perform with a flowchart displaying troubleshooting actions. XSR User’s Guide 4-11 Troubleshooting T1/E1 & T3/E3 Links Figure 4-6 T1/E1 & T3/E3 Error Events Analysis Troubleshooting Flowchart Error Events Analysis Is the slip seconds counter increasing? Yes Is the clock source derived from the network/line? No No Is the framing loss seconds counter increasing? Yes Is the framing type correct? No Use the following commands to set source clocking: controller t1 x clock source line Use the command below to verify the error counter is still: increasing: controller x Use these commands to set framing: controller t1 x framing If T1, then change LBO: cablelength {long | short} If T3, then change LBO: cablelength Use the command below to verify the error counter is still: increasing: controller x Use the following T1/E1 commands to set line coding: controller t1 x linecode {ami | b8zs} If T1, then change LBO: cablelength {long | short} Use the command below to verify the error counter is still: increasing: controller x No Yes Is the line code violations counter increasing? Is theT1/E1 line coding correct? No No If your controller still does not function as desired, contact your service/network provider Note: Statistics displayed with the show controllers command are reset every 24 hours. That is, once the port or line is created with the controller command, the 24-hour timer starts. Slip Seconds Counter Increasing If slip seconds are present on the T1/E1 or T3/E3 line, usually there is a clocking problem. Complete the following steps to correct this problem: 4-12 1. Ensure the clock source is derived from the network (source clocking extracted from the line). 2. Set the T1/E1 or T3/E3 clock source from Controller mode if needed. Configuring T1/E1 & T3/E3 Interfaces Troubleshooting T1/E1 & T3/E3 Links Framing Loss Seconds Increasing If framing loss seconds are present on the T1/E1 line, usually there is a framing problem. Perform the following steps to correct this problem: 1. Ensure the framing format configured on the controller port matches the framing format of the line. 2. Set the T1/E1 framing mode from Controller mode if needed. 3. (T1 Only) Change the line build out (LBO) using the cablelength long or cablelength short command if needed. Line Code Violations Increasing If line code violations are present on the T1/E1 line, usually there is a line encoding problem. Perform the following steps to correct this problem: 1. Ensure the line coding format configured on the controller port matches the framing format of the line. 2. Set the T1/E1 linecode mode from Controller mode if needed. 3. (T1 Only) Change the line build out (LBO) using the cablelength long and cablelength short command if needed. Configuring the D&I NIM The following D&I configuration instructs the XSR to terminate timeslots 1 through 7 of controller T1-0/1/0 into a PPP channel and bypass the rest of the timeslots from T1 controller 0/1/0 to controller T1 0/1/1. Controller port T0/1/0 is connected to the Central Office and controller port T0/1/1 is connected to the PBX down stream. Serial 0/1/0:0 is the data channel on the Telco side of the NIM. Note that the clock source is set to line at the CO and internal locally. Alternately, if you require a line speed of 64 Kbps, you can use the default line coding B8ZS. XSR(config)#controller t1 0/1/0 XSR(config-controller )#drop-and-insert-group XSR(config-controller )#channel 0 timeslots 1-7 speed 56 XSR(config-controller )#clock source line XSR(config-controller )#line ami XSR(config-controller )#no shutdown XSR(config-controller )#exit XSR(config)#interface s1/0:0 XSR(config-if )#encapsulation ppp XSR(config-if )#no shutdown XSR(config-if )#exit XSR(config)#controller t1 0/1/1 XSR(config-controller )#drop-and-insert-group XSR(config-controller )#no channel 0 XSR(config-controller )#line ami XSR(config-controller )#clock source internal XSR(config-controller )#no shutdown XSR User’s Guide 4-13 Troubleshooting T1/E1 & T3/E3 Links 4-14 Configuring T1/E1 & T3/E3 Interfaces 5 Configuring IP Overview This document describes the XSR’s IP protocol suite functionality including: • General IP features (ARP, ICMP, TCP, UDP, TFTP, Telnet, SSH, NAT, VRRP, Proxy DNS, et al.) • IP routing (RIP, OSPF, static routing, triggered-on-demand RIP updates) • VLAN routing • Applicable MIBs • Configuration examples IP protocol, the main protocol of the TCP/IP suite, interconnects systems of packet-switched computer communication networks. It transmits TCP, UDP, and ICMP information as IP datagrams in a 32-bit addressing scheme where an IP address is represented by four fields, each containing 8-bit numbers. IP uses three types and five classes of addresses: • Unicast - destined for a single host • Broadcast - destined for all hosts on a given network • Multicast - destined for a set of hosts belonging to a multicast group • Class A, B, and C - used as a pool for unicast addresses • Class D - used for multicast addresses • Class E - reserved for future use General IP Features The following features are supported on the XSR: • Meets requirements for IPv4 routers - RFC-1812 • Ethernet 802.3 support of SNAP and DIX frame format • Internet Standard Subnetting Procedure (ISSP) - RFC-950 • ARP - dynamic, static, and proxy ARP • Proxy DNS • IP subnet zero (always enabled) XSR User’s Guide 5-1 General IP Features • The Router ID can be configured with the ip router-id command or, if not configured, automatically generated from the existing configuration. Alternately, the Router ID is automatically generated as the highest non-zero IP address among all loopback interfaces or, if no loopback interface is configured, the highest non-zero IP address among standard configured interfaces. A loopback interface can be configured with the interface loopback command. • BOOTP/DHCP relay • Broadcasting: Directed and UDP broadcast forwarding • ICMP • – ICMP Router Discovery Protocol – Destination unreachable message – Time exceeded message – Parameter problem message – Redirect message – Echo or echo reply message TCP – Window and acknowledgement – TCP maximum segment size – Congestion control in TCP/IP – TCP extensions for high performance – TCP selective acknowledgement option • UDP • Telnet • SSH • TFTP • MTU • – Path MTU discovery protocol: Support for external MTU discovery (data passing through the XSR). An ICMP MTU size exceeded message is issued if large packets transit the XSR with the “don't fragment” bit set. These packets are dropped per RFC-1191. Also, the XSR does not originate MTU discovery, that is, application data originating in the XSR. – Set MTU size per interface IP Interface – Numbered interfaces – Un-numbered interfaces on point to point links – NBMA support – 5-2 Configuring IP ‐ Point to multipoint networks ‐ Fully meshed networks Secondary IP General IP Features • • • Troubleshooting Tools – Ping – Traceroute IP Routing – RIP – Triggered-on-Demand RIP updates – OSPF including Database Overflow (RFC-1765) and Passive Interfaces – OSPF debugging – Static routes – Default network – CIDR (IP classless) – Router ID configuration RFC-1850 – Configurable RIP and OSPF timers – Per interface OSPF poll timer VLAN Routing – Layer 3 (IPv4) forwarding of Ethernet frames with 802.1Q VLAN over FastEthernet/ GigabitEthernet interfaces – VLAN IDs - up to 64 unique VLAN IDs per physical interface in a range from 0 to 4094 – User priority (priority bits) in a VLAN- tagged frame: – - XSR does not prioritize traffic when forwarded – - But priority preserved when forwarded to another VLAN port – - Locally sourced VLAN frames and frames not accessing a VLAN interface will have their priority bits set to 0 – Encapsulation supported over VLAN for PPPoE – VLAN Routing supported for: OSPF, RIP, Static routes – IP support over VLAN includes: Secondary IP addresses, NAT, Policy Based Routing (PBR), ACLs, standard IP applications including Ping, Traceroute, Telnet, Helper Addresses, Directed Broadcast, VPN, Firewall, DHCP Server, et al. – VRRP and QoS supported over VLAN physical interfaces only – QoS with VLAN supporting up to four priority queues per interface, input traffic classification based on user priority bits in the VLAN header, and output traffic marking by priority – One global ARP table maintained and is shared across VLANs – Duplicate MAC addresses not allowed across VLANs • Policy Based Routing (PBR) • Real Time Protocol (RTP) Header Compression • Network Address Translation - static (NAT), Network Address Port Translation (NAPT), dynamic NAT pool mapping with overload, PPTP/GRE ALG and arbitrary IP address for NAPT, on the interface and port-forwarded static NAT, multiple NATs on an interface. XSR User’s Guide 5-3 General IP Features • Virtual Router Redundancy Protocol (VRRP): RFC-2338 and Definitions of Managed Objects for the Virtual Router Redundancy Protocol: RFC-2787 • Equal-Cost Multi-Path (ECMP) per packet and per flow (round robin) for OSPF, BGP and static routes (RIP excluded) – Unequal cost multi-path, redistribution of equal-cost paths, and multiple default routes based on default networks with multiple equal-cost next hops are not supported ARP and Proxy ARP ARP (Address Resolution Protocol) is a link-level protocol which provides a mapping between the two different forms of addresses: 32-bit IP addresses and hardware addresses used by the data link. The protocol dynamically keeps entries in the ARP Table and can accept statically configured entries according to RFC-826. The arp command adds or deletes permanent entries to the ARP Table while the arp-timeout command sets the duration for an ARP entry to stay in the ARP table before expiring. The show ip arp command displays real-time entries in the ARP table. Proxy ARP lets the XSR answer ARP requests on one network for a host on another network. The router acts as a proxy agent for the destination host, relaying packets to it from other hosts, as defined by RFC-1027. It is configured with the ip proxy-arp command. Proxy DNS Proxy servers act as intermediaries between DNS clients and servers. They handle outgoing queries and answer them from data obtained by sending one or more queries to other DNS servers. Typically, they cache data received, reducing traffic and latency if the data are frequently requested. XSR’s forwarding proxy server talks to other proxy or DNS servers without performing DNS resolution. They simply forward request and replies, relying on real DNS servers for name resolution, and cache the replies to avoid having to request resolution again with these benefits:: • A proxy DNS server releases the function of the resolver on the client side, and by doing so simplifies client implementation. • Since the proxy acts as an intermediary between DNS clients and servers, no direct connection between clients and servers is needed. • Instead of caching the DNS database in each client, proxy DNS maintains a centralized cache for DNS resolution. You can enable DNS proxy with ip proxy-dns enable, specify a proxy server with ip proxydns name-server, clear the DNS cache table with clear ip proxy-dns cache, verify DNS settings with show running-config, and display DNS cache settings with show ip proxy-dns cache. BOOTP/DHCP Relay The Bootstrap Protocol (BOOTP) is used by systems with no capability of learning their IP addresses. BOOTP requests can be forwarded by routers, not necessitating one server on each physical network. Normally, BOOTP/DHCP requests are not forwarded, since they are local broadcasts which are not designed to be forwarded, and they have an invalid nonroutable IP source address, such as 0.0.0.x. But the agent replaces the destination address with a helper address, and the source address with its own address, then forwards it. You can set the helper address with the ip helper-address command. 5-4 Configuring IP General IP Features When a BOOTP/DHCP response is received, the packet is sent to the requester as a unicast IP packet, according to RFC-951, with clarifications in RFC-1532. The source addresses of the relayed BOOTP/DHCP packets can be selected using ip dhcp relaysource gateway command. By default, IP stack selects the outgoing interface address as the source address. Broadcast A broadcast is a packet destined for all hosts on a given network as defined by RFC-919 and RFC-922. Directed Broadcast An IP directed broadcast is a datagram sent to the broadcast address of a subnet to which the sending device is not directly attached. The directed broadcast is routed through the network as a unicast packet until it arrives at the target subnet, where it is converted into a link-layer broadcast. The XSR supports directed broadcast using the ip directed-broadcast command. For security purposes, restrictions can be set by defining and applying an ACL and by restricting the protocols. There are two types of directed broadcasts, described as follows: • A net-directed broadcast specifies a destination address with a host ID of all 1s. For example, a Class A net-directed broadcast destination address is netid.255.255.255 where the netid is the Class A network ID. The XSR forwards it by default. • A subnet-directed broadcast also specifies a destination address with a host ID of all 1s, but with a specific subnet ID. For example, a Class A subnet-directed broadcast destination address is netid.subnetid.255.255 where netid is the Class A network ID and subnetid is the subnet. The XSR forwards it by default. Local Broadcast A local broadcast is a broadcast to a destination address of all ones -255.255.255.255. This broadcast should not be forwarded. It may be: • Consumed by the router, or, • Forwarded using UDP broadcast forwarding, a feature which allows XSR to forward a UDP local broadcast to one or more new destinations if the UDP port of the datagram matches the configured one. The destination address is replaced by a configured unicast address with no change in the source address (except BOOTP/DHCP relay). ICMP The Internet Control Message Protocol (ICMP) communicates error messages and other conditions that require attention as defined by RFC-792. ICMP messages are transmitted in IP datagrams and are usually acted on by the IP layer or higher layer protocols (TCP/UDP). The XSR supports these message types: ICMP router discovery, destination unreachable, time exceeded, parameter problem, redirect, echo or echo reply. The XSR also supports the ICMP Router Discovery Protocol (IRDP) which dynamically discovers routes to other networks, as defined by RFC-1256. IRDP allows hosts to locate routers and can also infer router locations by checking RIP updates. When the XSR operates as a client, router discovery packets are generated. When the device operates as a host, router discovery packets are received. The IRDP client/server implementation XSR User’s Guide 5-5 General IP Features does not actually examine or store full routing tables sent by routing devices, it merely keeps track of which systems are sending such data. Using IRDP, the XSR can specify both a priority and the time after which a device should be assumed down if no further packets are received. The XSR enables router discovery and associated values with the ip irdp command. The router also supports the redirection of packets routed through the same port they were received on with the ip redirect command. TCP The Transmission Control Protocol (TCP) is a transport layer language providing a connectionoriented, reliable, byte-stream service described by RFC-793. UDP The User Datagram Protocol (UDP) is a simple, datagram-oriented, transport layer protocol where each operation by a process produces exactly one UDP datagram, which causes one IP datagram to be sent. RFC-768 describes UDP. Telnet Telnet provides a general, bi-directional, 8-bit byte-oriented communications facility that is always enabled on the XSR. It is a standard method by which terminal devices and terminaloriented processes interface, as described by RFC-854. A Telnet connection is a TCP connection used to transmit data with interspersed Telnet control data. Two entities compose a Telnet link: • A Telnet server is the host which provides some service • A Telnet user is the host which initiates communications Telnet port (23) and server settings can be configured on the XSR with the ip telnet port and ip telnet server commands. You can also configure Telnet client service to other servers with the telnet ip_address command. Refer to the XSR CLI Reference Guide for more information. SSH The Secure Shell (SSH) protocol provides for safe remote login and other network services on the XSR. Along with a user-supplied client, the SSHv2 server allows you to establish a secure connection, similar to that provided by an inbound Telnet connection with an important exception. Unlike Telnet, SSH encrypts the entire connection with the XSR to hide your identity, provides data confidentiality via the negotiated choice of encryption types such as 3DES, and offers message integrity through hashing using SHA-1 or other algorithms such as MD5 or crypto library support for third-party encryption ciphers such as Blowfish, Twofish, AES, CAST and ARCfour. Enabled (by default) on the CLI with the ip ssh server command, SSH is further configured by specifying users, passwords, privilege level and policy with the aaa user, password, privilege 15 and policy commands, the idle timeout interval for your SSH session with the session-timeout ssh command, and user authentication with the aaa SSH command. Upon configuring the XSR for the first time, you should generate a host key pair with the crypto key dsa command, otherwise, if no key is generated, the default key is used for any connection request. Generated host keys are encrypted and stored in the hostkey.dat file within Flash where the file cannot be read or copied. All SSH connection requests use the host keys stored in the 5-6 Configuring IP General IP Features hostkey.dat file unless none have been generated or the content of the file is corrupted in which case default keys are used to secure the connection. Note: SSH is enabled by default on port 22. Be aware that with SSH enabled, traditional facilities such as FTP, TFTP, and Telnet are not disabled so to ensure system security, you must disable other communication services. A number of SSH clients are commercially available. Enterasys recommends the PuTTY client freeware as compatible and easy to configure. For step-by-step instructions on installing PuTTY and configuring SSH, refer to “Configuring Security” in the XSR User’s Guide. Trivial File Transfer Protocol (TFTP) TFTP is a bare bones file transfer protocol, as defined by RFC-1350, using UDP to simplify transport with less overhead. The XSR provides TFTP client functionality using the snmp-server tftp-server-list and copy commands. Always enabled on the router, it is useful to save and restore configuration files and images. Refer to the XSR CLI Reference Guide and “Managing the XSR” on page 2-1 for more information. IP Interface IP interfaces are virtual circuits used to pass traffic between a physical port and the XSR forwarder. IP interfaces have the following characteristics: • Numbered interfaces have IP addresses assigned to them. • The port can be pinged to monitor its status with the ping command. • Some routing protocols require the interface to have an IP address. • The command interface sets all XSR interfaces. • Un-numbered interfaces are not assigned IP addresses – Un-numbered interfaces may be used on point-to-point networks. By default, the address used by the unnumbered interface when it generates a packet is the router ID, which is the address of the highest, non-zero configured loopback interface. An unnumbered interface address can be configured to be the address of a specified numbered interface. The ip unnumbered command sets interface parameters on the XSR. – An un-numbered interface cannot be pinged to monitor its status. Secondary IP Enabling secondary IP allows multiple IP addresses to be configured on the same physical network interface and multiple subnets to share one MAC address. Secondary addresses are treated largely like primary addresses, but not exactly the same, as explained below. Secondary IP is useful when there are insufficient host addresses on a network segment. Configuring several subnets on the router interface which connects the network segment combines these logical subnets into one physical segment making more host addresses available. Interface & Secondary IP The XSR supports secondary IP on Ethernet networks only. All other ports, including loopback interfaces, support one IP address per interface only. XSR User’s Guide 5-7 General IP Features An XSR interface can support one primary IP address and multiple secondary IP addresses. Including all XSR interfaces, the total of supported secondary IP addresses allowed depends on the amount of the installed memory, although at present ten secondary IP addresses are supported despite the memory size. All system interfaces share the pool of secondary addresses. For example, if FastEthernet 1 uses eight secondary addresses, FastEthernet 2 is allowed no more than two secondary addresses. Secondary IP is subject to the following rules: • Primary and secondary IP addresses on the same interface are not allowed to exist in the same subnet, nor allowed to exist in the same subnets already occupied by other interfaces. • Packets generated by the XSR, except the route update packet, are always sourced by the IP address of the outgoing interface which is in the same subnet as the IP address of the next-hop the packet should be forwarded to. • All routers on the same segment should share the primary network number or some protocols, such as OSPF, may not work properly. • If any router on a network segment uses a secondary address, all other devices on the same segment must also use a secondary address from the same network or subnet. Inconsistent use of secondary addresses on a network segment can quickly cause routing loops. • Specify the primary IP address before any secondary IP addresses on the same interface. Conversely, before deleting a primary address, all secondary IP addresses should be removed. • You can configure OSPF, RIP or static routes on each primary and secondary IP address. • A secondary IP address is configured using the ip address secondary command. ARP & Secondary IP For each IP address configured on the interface, including primary and secondary IP addresses, the corresponding static ARP entry should be maintained in the static ARP table. Primary and secondary IP addresses on the same interface share the same MAC address of the interface. When an ARP request is received, the destination IP address in the ARP packet will be checked against the primary IP and all secondary IP addresses. If found, an ARP reply will be sent back with the MAC address of the interface. When sending an ARP request, the source IP address used in the ARP packet should be on the same subnet as the destination IP. ICMP & Secondary IP When ICMP Echo packets are received by the XSR, the destination IP address is checked against all configured IP addresses including primary and secondary addresses. Any ICMP Echo packet addressed to the subnet broadcast addresses will be dropped without returning a response. ICMP Echo Replies are generated by swapping the destination and source IP addresses in the received ICMP Echo packets. By default, ICMP Echo packets generated by the XSR’s ping command will be sourced by the IP address of the outgoing interface which is in the same subnet as the IP address of the next-hop the ICMP packet should be forwarded to. When ICMP Mask request packets are received, the destination IP address will be matched against the entire subnet network associated with the primary and secondary IP addresses. The matched IP address will then be used as the source IP address of the reply packet. 5-8 Configuring IP General IP Features Routing Table Manager & Secondary IP If the interface is up, each primary and secondary IP address will have an entry in the routing table as a directly connected route. If the interface is rejected or the IP addresses configured on it are removed, the Routing Table Manager (RTM) will delete corresponding table route entries. If any IP address - primary and secondaries - is deleted or changed, any static route based on the next hop reachable through that IP address will be removed from the active routing table. And if the IP address is restored, any static route removed earlier will be restored in the active table. OSPF & Secondary IP In OSPF, HELLO messages use the primary IP address as the source address. Adjacencies are set up based on the primary IP address only. Designated routers (DR) and back-up DRs use the primary IP as their IP addresses. The virtual link uses the primary IP only, as well. OSPF can be enabled on primary and secondary IP addresses but should be enabled on the primary first. Also, if OSPF is used for routing, all OSPF-enabled secondary addresses of an interface should be configured in the same OSPF area as the primary address to function properly. OSPF can be selectively enabled on a secondary IP address as long as it is already enabled on the primary IP address. RIP & Secondary IP If RIP is used for routing, route updates should be multicast or broadcast to each subnet represented by both the primary and secondary IP addresses. If an interface is configured with a secondary IP address and split horizon is enabled, route updates learned from one specific network cannot be sent back to the same physical network. Only one routing update is sourced per network number if split horizon is disabled. RIP can be selectively enabled on primary and secondary IP addresses. Unnumbered Interface & Secondary IP If an unnumbered interface attempts to borrow an IP address from an Ethernet interface upon which a secondary IP address is configured, only the primary IP address can be borrowed. Also, secondary IP cannot be configured on an unnumbered interface. NAT & Secondary IP Only the primary IP address on the specified interface is used for NAT. DHCP & Secondary IP DHCP operates in the same manner regardless if secondary IP addresses are configured or not. Only one IP pool is employed even if multiple IP addresses are configured on a single interface. VPN & Secondary IP Secondary IP addresses are not supported on VPN virtual interfaces. Concerning secondary IP addresses assigned to physical interfaces, if an interface constitutes the endpoint of a VPN tunnel, the primary IP address is always used as that tunnel endpoint. For the trusted interface upon which EZ-IPSec Network Extension Mode is running, only the SPD for the primary IP address assigned to the internal interface will be created. XSR User’s Guide 5-9 IP Routing Protocols VRRP & Secondary IP Multiple virtual IP addresses per Virtual Router (VR) are available to support multiple logical IP subnets on a single LAN segment. Secondary IP interacts with the XSR’s implementation of the Virtual Router Redundancy Protocol (VRRP) as follows: • The primary physical IP address on an interface will be selected as a VRRP primary IP address, which is used for VRRP advertisement. • If one of the virtual IP addresses of a VR is the real physical address of the interface, all other virtual IP addresses of that VR must also be the real physical addresses of that interface. • Conversely, if any virtual IP address is not the real physical address of that interface, all virtual IP address of that VR cannot be the real physical address of that interface. • The XSR supports 11 IP addresses per VR (1 primary + 10 secondary) • With four VR's allowed per XSR, you can configure up to 44 virtual IP addresses per XSR. PPPoE & Secondary IP Secondary IP is not supported on PPPoE interfaces. Maximum Transmission Unit (MTU) MTU is the largest frame size allowed on an interface. It is dictated by the link level limit on a particular port. Examples of link layer types are Ethernet and 802.3 encapsulation. MTU limits the bytes of data that can be sent in an IP packet using the ip mtu command. Datagrams exceeding the link layer's MTU must be fragmented. The default MTU size is 1500 bytes. Refer to the XSR CLI Reference Guide for more information. Ping Ping is an important debugging tool for testing network layer connectivity between a source and destination address. The source represents an IP address on the XSR where the command is executed from. The destination can be any IP address on the network, including an address on the same device where a ping occurs. Ping also allows the packet size to be set. Refer to the XSR CLI Reference Guide for more information. Traceroute Traceroute is a vital debugging tool which reports the route IP datagrams follow to a certain destination. Its output is a complete list of routers that a specific datagram crosses to reach its destination, as well as the round time trip between the XSR where the Traceroute program runs and each of these routers. The traceroute command can be issued by the XSR. Refer to the XSR CLI Reference Guide for more information. IP Routing Protocols Routing is one of the most important functions of IP. Routing information, which is stored in a routing table, is used by the XSR to determine the route for each of the packets that pass through it. The following routing features are supported on the XSR: • 5-10 Configuring IP RIP, OSPF, and BGP IP Routing Protocols • Static routes • Route redistribution • Default network • CIDR (classless IP) • Configurable Router ID • Route Preference When you run multiple routing protocols, the XSR assigns a weight to each of them. For more information, refer to “Route Preference” on page 5-17. RIPv1 and v2 The Routing Information Protocol (RIP) is a distance-vector protocol based on the Bellman-Ford algorithm to learn the shortest path between two points in a network. RIP is used only on networks whose longest path is 15 hops or less and is marked by the following limits on the XSR: • MD5 authentication is not supported • Distribution lists require an ACL to be configured RIP uses request and response messages. Requests ask for all or part of routing table entries and responses can be sent for one of these reasons: • Response to a specific query • Regular updates (unsolicited response) • Triggered updates caused by a route change RIP specifications are RFC-1058 for RIPv1 and RFC-2453 for RIPv2. It is supported on the XSR with the following features: • Set globally with the router rip and per interface with the network commands: they support RIP on both LAN and WAN interfaces with these default values: Receive RIPv1 and v2, Transmit RIPv1, no redistribution, no filtering and Split Horizon with no poison. • Redistribute static routes into RIP with the redistribute command • Redistribute RIP into OSPF and vice versa with the redistribute rip and redistribute ospf commands • Split horizon with poisoned reverse enabled with ip split-horizon • Triggered updates delivered by default or disabled by ip rip disable-triggered-updates • Clear text authentication enabled by ip rip authentication mode Note: RIP commands configured under Interface mode are independent of enabling/disabling the RIP protocol. • RIP is configurable for: – Send only mode set by issuing no received interface to prevent RIP from receiving update packets on a specified port – Receive only mode set by issuing passive interface to prevent RIP from sending update packets on a specified port XSR User’s Guide 5-11 IP Routing Protocols • Offset metric parameters - route metrics via RIP. Adding an offset to an interface might force a route through that interface to become a backup route • Route filtering, in association with access lists, is enabled by the distribute-list command • RIP timers can be set for update, invalid and flush intervals with the timers basic command • Statistical display commands revealing RIP counters including show ip traffic, show ip route, show ip protocols Triggered-on-Demand RIP Triggered-on-demand RIP (defined in RFC-2091) is available for sending routing updates on a PPP serial (WAN) port only. This feature updates the XSR’s RIP routing table only when the topology changes or when a next hop’s reachability is detected on the WAN side of the link. This functionality reduces the on-demand WAN circuit’s routing traffic letting the link be brought down when application traffic ceases. Regular RIP updates would prevent the connection from being torn down when application use ends. The following conditions govern the feature’s use: • RIP must be enabled • IP split horizon must be enabled (default). Whether poison is enabled or not, triggered on demand will still send its updates with poison Triggered-on-demand RIP on the XSR is implemented by this command: • ip rip triggered-on-demand enables the functionality on a per interface basis. Be aware that this command runs on point-to-point Serial interfaces only. Note: The ip rip disable-triggered-updates command, with the default enforced (triggered updates enabled), invokes triggered updates in a timely fashion. Related commands include: • ip rip max-retransmissions sets the number of retransmissions to be sent. • ip rip polling-interval sets the polling period for triggered RIP requests. Refer to the XSR CLI Reference Guide for more information on commands. How Triggered-on-Demand RIP Works To better understand when to configure triggered-on-demand RIP, consider how it works. Routing updates are sent on the WAN in the following manner: • • 5-12 Configuring IP The full content of the routing database is sent when: – An update request is received. An update is sent only to the neighbor requesting it. – The XSR is first powered up. An update is sent through all interfaces running triggeredon-demand RIP. – An interface is brought up. An update is sent only out the interface which was brought up. A partial update of the database is sent when: – An interface is brought up. The new local route is advertised to all other interfaces running triggered-on-demand RIP. – An interface is brought down. All routes reachable through the interface that went down are advertised as unreachable to the other interfaces running triggered-on-demand RIP. IP Routing Protocols • The latest changes are sent when: – The routing database is modified by new data. The latest changes are sent through all interfaces running triggered-on-demand RIP. RFC-2091 also specifies how packet types are handled in the following manner: • • An update request is defined as a request to a peer to send its entire routing database. It is sent: – When the XSR is powered up; – When an interface is brought up. An update response is defined as a message containing zero or more routes; it is retransmitted at periodic intervals until an update acknowledge is received. It is sent: – In response to an update request. The first response contains no routes. Other update responses will not be sent until an update acknowledge is received. Then the routing database is sent. – At power up. The first update response will contain no routes. – When a port comes up. The first response contains no routes. – When a port is brought down. – When there is fresh routing information to be propagated. • Each update response packet sent to a peer is given a sequence number, a 16-bit unsigned integer. • Responses must be received in order. Updates received with a sequence number out of order is dropped. Packets are accepted if: – A sequence number is one more than the previous; – A sequence number is the same as the previous (occurs when the ack for the previous was sent, but not received on the other side); – The sequence number is 0 (could occur at startup or when it wraps around). – The response sequence number received will be saved and used as a starting point. • Resynchronization occurs with every update response. • Update acknowledgments answer every update response. The RFC delineates route persistency in the routing database as follows. Entries learned from a triggered response on participating WAN interfaces are permanent, unless certain events occur, in which case entries are marked as unreachable and the hold-down timer started. These events are: • A circuit-down event has been received; all routes learned from that next hop router are marked unreachable. • An update packet with the flush flag set is received; all routes learned from that next hop router are marked unreachable. • Too many retransmissions of an update go unacknowledged. All routes learned from that next hop router are marked unreachable. • An update response for an expired route comes in. That route is marked unreachable. The XSR does not retain alternative routes as they are not needed for the following scenarios: • Dialer and dialer backup connections, which are not both up at the same time. Dialer backup occurs only when the dialer interface goes down (the best route is lost; the back up interface is brought up, then an update request and reply are issued and the new route installed). XSR User’s Guide 5-13 IP Routing Protocols • Dial-on-demand connections. Retransmissions are governed by the following conditions, among others: • The retransmission timer is a periodic timer set to 5 seconds. • A limit in the number of retransmissions will be set, after which the routes learned through the specified circuit are marked as unreachable. The maximum number of retransmissions is configurable. The default value is 36. • After the maximum number of retransmissions has been reached, requests will continue to be sent out with a polling interval whose default value is 30 seconds. This value is also configurable. Polling will continue until a response is received. OSPF The Open Shortest Path First (OSPF) routing protocol is a link-state protocol as defined by RFC2328. It supports a replicated database approach to routing where each router has a copy of the database and contributes information to the database describing the local environment of linked routers. All routers piece together the data to obtain a current map of the network. The shortest path is calculated using an algorithm based on entries in the database. OSPF outperforms RIP as a link-state protocol: it converges faster than RIP, a distance-vector protocol; its longest path is not limited as is RIP’s (to 15); and it supports subnets - a mask is linked with each advertised route. The XSR’s implementation of OSPF permits route redistribution to RIP and vice versa. Note: OSPF does not learn neighbors over unnumbered WAN interfaces with Firewall functionality enabled. OSPF commands are provided on the XSR with the following features: • Set globally with the router ospf and per port with the network area: they support OSPF on LAN and WAN interfaces with these defaults: no authentication, cost 10 (LAN) or Serial (64), dead interval of 40 seconds, hello interval of 10 seconds, priority 1, and 5second retransmit interval. • Intra- and inter-areas, and Type 1 and 2 external routing • Broadcast, point-to-point and point to multi-point models • Protocol enabled/disabled with router ospf • Area IDs identified and defined with network • Address ranges used by ABRs defined by area range • OSPF priority with ip ospf priority • Cost to send a packet over interface with ip ospf cost • Cost for default route sent into a stub area with area default cost • Stub and NSSA set with area stub and area nssa • Opaque Link-state Advertisement (LSA) option • Redistribute RIP into OSPF and vice versa with redistribute rip and redistribute ospf • Manual and automatic virtual links enabled with area virtual link • MD5 authentication enabled per interface with area authentication and ip ospf message-digest-key 5-14 Configuring IP IP Routing Protocols • Incremental SPF is always enabled. SPF calculation can be changed with timers spf • Hello wait intervals with ip ospf dead-interval and ip ospf hello-interval as well as the poll timer to set up adjacencies as quickly as possible with ip ospf poll-timer • Retransmission and link-state update intervals with ip ospf retransmit-interval and ip ospf transmit-delay • A host of statistical display commands including: show ip ospf border routers, show ip ospf database, show ip ospf interface, show ip ospf neighbor, show ip ospf virtual links, show ip protocols, and show ip route LSA Type 3 and 5 Summarization The XSR supports LSA Type 3 and 5 summarization using the area range advertise and summary-address commands, respectively. Type 3 LSAs (intra routes) are summarized by an Area Border Router then injected into other areas and furnished a unique Link-State ID (Appendix E Processing) as well as the highest metric of the included intra-area routes. Further, the XSR installs a discard route for any active summary range of routes, defined as including at least one intra route being leaked into the area. Conversely, specifying the not-advertise value causes undesired aggregated Type 3 LSAs to be discarded, and when a summary range becomes inactive, the discard route is dropped. Note: Summary ranges may overlap. The most specific range activates for a locally sourced route, Type 5 LSA summarization groups locally sourced routes which have been redistributed from other protocols. The XSR’s Type 5 summarization is similar to Type 3 aggregation in terms of discard routes, Appendix E processing, overlapping, and not-advertise behavior. Additionally: • The XSR will not summarize Type 7 to Type 5 translations. • The XSR produce a Type 5 LSA for active summary ranges. If a NSSA area exists, a Type 7 LSA will be produced for each NSSA area. • The XSR should not be subjected to needless re-origination of Type 5 LSAs. For example, importing locally sourced routes which do not alter a summary’s type/cost will not reoriginate the summary LSA. • Type 5 LSAs generated by translation may supplant a Type 5 LSA originating from a local source. This will not affect what is being generated into a NSSA because translations are not advertised there. • If for a given prefix, both a summary and a locally sourced route exist, the summary will be considered the better route even if the summary includes only that locally sourced route. OSPF Database Overflow A router sometimes cannot maintain the Link-State database in its entirety, typically, because the database has overflowed due to importing many external Type 5 LSA routes into OSPF. You can avert this issue by properly configuring OSPF routers into stub areas or NSSAs since AS-external LSAs are omitted from this type of Link-State database. But, with an unexpected database overflow, there is not enough time to perform this type of isolation. The XSR’s database-overflow command controls this problem by limiting the number of Type 5 LSAs it imports and others as well: Types 1 through 4, 7, and 10. The command also can set a warning of a pending overflow and set an interval in which to exit overflow. XSR User’s Guide 5-15 IP Routing Protocols Each LSA type configurable for database overflow can generate a log to reflect pending overflow, overflow entered and exited logs in this format: – Date and time stamp – Router ID (IP address) – Module (OSPF) – Log Description – LSA Type – Current LSA count The following is a high priority Pending Overflow log report: May 2 12:11:32 42.42.42.2 OSPF: Database Pending Overflow, Lsa Type: router, Count: 2 The following is a high priority Overflow Entered log report: May 2 12:13:41 42.42.42.2 OSPF: Database Entered Overflow, Lsa Type: router, Count: 2 The following is a high priority Overflow Exited log report: May 2 12:14:24 42.42.42.2 OSPF: Database Exited Overflow, Lsa Type: router, Count: 2 OSPF Passive Interfaces In some situations it is desirable to include a subnet in the OSPF routing process (and Link-State Database), without actually running OSPF on the interface of the XSR connected to that subnet. This is particularly useful for interfaces that are used as BGP peering links or for customer connectivity. You have two choices to incorporate this subnet into OSPF: • Redistribute it as an external route into OSPF. • Include the interface in OSPF. Typically, the later approach is preferred because it injects the route as a native OSPF route, subject to address summarization at an Area Border Router, while the first approach injects it as a nonsummarizable external. But the first approach creates a security hole as it opens the possibility of establishing an unintended OSPF adjacency. Passive interfaces, entered with the ip ospf passive command, suppress OSPF packet transmissions through the specified interface so there is no chance of establishing an OSPF adjacency. Also, loopback interfaces enabled in OSPF could be considered passive interfaces and treated the same way. The XSR’s passive interface functionality performs as follows: • Hellos are not sent out or received on passive OSPF interfaces. • OSPF adjacencies are not established on passive OSPF interfaces. • OSPF passive interfaces are advertised as stub networks in the self- originated router LSA. • When the passive parameter is changed on an operational OSPF interface, it will be administratively disabled and re-enabled. Refer to the XSR CLI Reference Guide for more information and this chapter for a sample OSPF configuration. 5-16 Configuring IP IP Routing Protocols OSPF Troubleshooting XSR commands provide debugging of OSPF Version 2 control information including: • Monitoring specific OSPF events from the CLI with show ip ospf (with debugging enabled) • Control Packets with debug ip ospf packet • LSA transmissions/receptions with debug ip ospf lsas • Neighbor Events with debug ip ospf nbr • Designated Router Events with debug ip ospf dr Be aware that only one CLI debug session is permitted at a time. Null Interface The XSR provides a non-configurable null interface (null 0) so that discard routes can be installed for OSPF LSA Type 3 and 5 route summarization. The null interface acts as a “bit bucket” to dispose of unwanted packets while avoiding the problem of looping. The null interface is unlike any other XSR port in that it does not need an IP interface to be enabled - it is always up, it cannot be deleted, and it appears only when specifically referenced by the show ip interface null0 or show interface null0 commands. Other show commands do not display the port. Additionally, the null interface is characterized by the following: • It can be specified in the ip route command as the next hop: ip route 7.0.0.0 255.0.0.0 null0 • Routes which are unreachable through null0 cannot be redistributed • It responds to the interfaces.ifTable.ifEntry SNMP query with the value 0 or as follows: interfaces.ifTable.ifEntry.ifDescr.7 = Null0 Refer to the XSR CLI Reference Guide for more information on commands. Route Preference Route preference or administrative distance is a tool to decide which route to install in the global routing table. Each routing protocol presents the global Routing Table Manager (RTM) with its best selection of a route. If several routes to the same destination are offered (derived from different protocols), installation occurs based on the protocol’s administrative distance. The route for the protocol with the lowest distance is chosen from the table. The feature functions as follows: • Administrative distance is configurable per protocol using the distance command. Static routes remain configurable per route. • OSPF distance can be set for different values on intra-area, inter-area, and external routes. • OSPF distance must follow this rule: Intra-area distance is less than inter-area distance which is less than external distance. • Static route distance can be set using the ip route command. If distance is not specified, the default distance is applied. • Aggregation is not accepted in order to set the distance for several static routes at one time. • Configuring the same distance across different protocols is permitted except for multiple static routes. Tie breaks are resolved by the following default administrative distances: – Connected routes: 0 XSR User’s Guide 5-17 IP Routing Protocols • – Static routes: 1 – BGP external routes: 20 – OSPF intra-area routes: 108 – OSPF inter-area routes: 110 – OSPF external routes: 112 – RIP routes: 120 – BGP internal routes: 200 – Values between 241 and 255 are reserved for internal use The show ip route command displays distances and metrics. Refer to the XSR CLI Reference Guide for more information on commands. Static Routes Static routes are used when a dynamic route to a destination cannot be set up or to specify what the XSR will route to. The XSR creates static routes with the ip route command. Refer to the XSR CLI Reference Guide for more information and sample static route configurations. The XSR’s Static Route Manager (SRM) allows configuration of multiple static routes to the same destination but with different hop and distance values. You can cap the number of these routes with ip route maximum_multiple. The SRM validates and forwards all reachable static routes to the Routing Table Manager (RTM) which saves them but implements only the best (lowest distance) route. Unreachable static routes are saved in the SRM for later use should they become reachable. When an interface is enabled, all static routes accessible through that interface are stored in the RTM. Also, for multi-point interfaces, when a neighbor becomes accessible, all the best static routes accessible through that neighbor are saved in the RTM. Conversely, when an interface is disabled, all static routes accessible through that interface are deleted from the RTM. The same holds true on multi-point interfaces. VLAN Routing Virtual Local Area Networks (VLANs) allow groups of end systems, possibly on multiple physical LAN segments, to communicate as if they were a common LAN unconstrained by the network's physical layout. VLAN switches can be used to establish different broadcast domains within networks but different VLANs cannot communicate with one another through VLAN switches because routing is still required for inter-VLAN traffic. The XSR’s VLAN route traffic among IEEE 802.1Q VLANs. The IEEE 802.1Q standard documents the insertion of a VLAN tag, shown in Figure 5-1, between the Source MAC address and the Length/Type of an Ethernet frame to identify the VLAN to which the frame belongs. 5-18 Configuring IP IP Routing Protocols Figure 5-1 802.1Q Tag Type 802.1Q VLAN Tag Priority CFI VLAN Identifier The reserved Tag Type denotes the associated Ethernet frame type of the VLAN Tag while the remaining 16 tag bits comprise this control data: • a 3-bit value indicating the user priority of the Ethernet frame for QoS purposes • a 1-bit Canonical Format Indicator (CFI) denoting the presence of a Routing Information Field • a 12-bit VLAN Identifier (VLAN ID) used for network assignment The XSR lets you configure up to 4094 VLANs using the vlan command, with IDs 0 and 4095 reserved. VLAN ID 0 is used to represent the default VLAN. VLANs provide for eight priority levels but the XSR does not act on priority bits. Any VLAN packets originating from the XSR are assigned a priority of 0. Figure 5-2 depicts a typical VLAN routing setup. The LAN that a device belongs to depends on the settings of the interfaces on the VLAN switch rather than the actual systems layout. Figure 5-2 Typical Configuration of VLAN Routing Physical layout WAN XSR VLAN Switches Logical layout VLAN 100 VLAN 200 VLAN 300 Forwarding VLAN, PPPoE over VLAN It is possible for a single physical Ethernet interface to support a mixture of Ethernet, PPPoE, Ethernet VLAN, and PPPoE over VLAN traffic, as illustrated in Figure 5-3. Note that GigabitEthernet sub-interfaces 3.1 - 3.4 are all sub-interfaces associated with different VLAN IDs. XSR User’s Guide 5-19 IP Routing Protocols Figure 5-3 Topology of Ethernet/PPPoE/VLAN/PPPoE over VLAN G3.1 G3.2 G3.3 IP IP IP IP PPPoE PPPoE VLAN 200 VLAN 300 PPPoE VLAN 100 G3.4 Ethernet VLAN Processing Over the XSR’s Ethernet Interfaces The VLAN routing process, shown in Figure 5-4, works as follows on the XSR. The following steps are reflected in the graphic below. Figure 5-4 2 VLAN 1200 IP 1.2.3.4/24 XSR’s VLAN Processing IP Routing Table 1.2.3.0/24 F1.1 2.2.3.0/24 F2.1 3.3.2.0/24 F2.2 9.9.9.0/24 F2.1 (Static) VLAN 1300 IP 2.2.3.4/24 F2.1 Ethernet VLAN Tag IP: 9.9.9.1 Ethernet VLAN Tag IP: 9.9.9.1 F1.1 1 Priority CFI VLAN: 1300 3 F2.2 VLAN 1400 IP 3.3.2.4/24 Priority CFI VLAN: 1300 Outgoing VLAN tagged frame Incoming VLAN tagged frame 1. When a VLAN-tagged Ethernet frame is received, it is stripped and the tag’s VLAN ID used to map the frame to a sub-interface of the Ethernet port. Priority bits are kept internally with the frame. If a PPPoE session header exists behind the tag, the frame is further de-muxed. The matched sub-interface is marked as the incoming port. If no match is found for the VLAN ID, the frame is dropped. 2. The Ethernet frame’s IP packet is routed based on the XSR’s forwarding table which chooses the next hop and outgoing interface. 3. If the outgoing interface is associated with a VLAN by a VLAN ID, a VLAN tag including the VLAN ID is created and inserted into the outgoing Ethernet frame. If priority bits are stored with the frame, they are marked in the VLAN tag. VLAN Processing: VLAN-enabled Ethernet to Standard LAN Interfaces In this scenario, illustrated in Figure 5-5, the XSR does not insert a VLAN tag since there is no VLAN associated with the outgoing interface. 5-20 Configuring IP IP Routing Protocols Figure 5-5 VLAN Ethernet to Fast/GigabitEthernet Topology 2 VLAN 1200 IP 1.2.3.4/24 IP Routing Table 1.2.3.0/24 F1.1 3.3.2.0/24 F2 9.9.9.0/24 F2 (Static) IP 3.2.3.4/24 F2 Ethernet IP: 9.9.9.1 Ethernet VLAN Tag IP: 9.9.9.1 Outgoing Ethernet frame F1.1 1 Priority CFI 3 VLAN: 1300 Incoming VLAN tagged frame VLAN Processing: VLAN-enabled Ethernet to WAN Interfaces In this scenario, shown in Figure 5-6, the XSR does not insert a VLAN tag in Ethernet frames because no VLAN is linked with the outgoing port (Serial 1). Note: VLAN tags cannot be assigned to a WAN interface - they are relevant only for XSR FastEthernet and GigabitEthernet interfaces. Figure 5-6 VLAN Ethernet to WAN Interfaces Topology 2 VLAN 1200 IP 1.2.3.4/24 IP Routing Table 1.2.3.0/24 F1.1 3.3.2.0/24 Serial 1 9.9.9.0/24 Serial 1 (Static) Serial 1 PPP Ethernet VLAN Tag IP: 9.9.9.1 Priority CFI 3 Outgoing Serial frame F1.1 1 IP: 9.9.9.1 IP 3.2.3.4/24 PPP encapsulation VLAN: 1200 Incoming VLAN tagged frame VLAN Processing: WAN Interface to a VLAN-enabled Ethernet Interface In this scenario, as shown in Figure 5-7, a VLAN tag is inserted since a VLAN ID (1200) is associated with the outgoing VLAN sub-interface (FastEthernet 1.1). The packet will be forwarded to IP address 9.9.9.1 of the next-hop router. For traffic which did not enter the XSR from a VLAN sub-interface, the priority bits are set to 0 (lowest level). XSR User’s Guide 5-21 IP Routing Protocols Figure 5-7 2 IP 3.2.3.4/24 PPP encapsulation WAN Interface to VLAN Ethernet Topology IP Routing Table 1.2.3.0/24 F1.1 3.3.2.0/24 Serial 1 9.9.9.0/24 Serial 1 (Static) VLAN 1200 IP 1.2.3.4/24 F1.1 Ethernet VLAN Tag IP: 9.9.9.1 PPP IP: 9.9.9.1 Incoming Serial frame 3 Serial 1 1 Priority CFI VLAN: 1200 Outgoing VLAN tagged frame For sample configurations, refer to “Configuring VLAN Examples” on page 5-46. QoS with VLAN The XSR’s support for Quality of Service (QoS) with VLAN is described in the chapter “Configuring Quality of Service” on page 12-1. Policy Based Routing IP packets typically are forwarded according to the route chosen by traditional routing protocols RIP, OSPF, BGP or static routes. Selection is based only on the destination of the packet. Policy Based Routing (PBR) allows you to selectively forward some patterned packets through alternative paths. It is not meant to replace routing protocols but is complementary while adding flexibility. If any packets do not meet policy criteria, the destination-based routing table will be searched. PBR is beneficial for the following reasons: • Flexible Transit Provider Selection - Internet service providers and others can set priorities for their customers and use PBR to route traffic according to their users' priorities through different Internet connections across policy routers. • Cost Savings - PBR can cut networking costs by distributing traffic among low-cost and highcost paths. • Load Sharing - You can implement policies to distribute traffic among multiple paths based on traffic characteristics as opposed to traditional load sharing. With PBR, the same traffic flow will go through the same path but different traffic flow will be directed over a different path according to the policy. Note: Policy-based routing takes precedence over destination-based routing. Accessing the Global Routing Policy Table Policy-based routing can be applied to incoming packets only and can be enabled on any interface with the ip policy command. It works as follows: 1. 5-22 Configuring IP If a packet is a candidate for PBR, the XSR consults a global routing policy table in the form of a route-map table having multiple entries. Each entry is assigned a sequence number and are sequentially ordered from low to high. The route-map pbr command specifies the sequence number and acquires PBR configuration mode. You can display this information with the show route-map pbr command. IP Routing Protocols 2. When a policy entry is found for a packet, the table search ends and the packet is processed according to that entry. 3. Each entry has a group of match and set clauses. All match clauses must match in order to process the packet according to the entry. When a match is found, one of the set clauses is used to process the packet. Set clauses are listed according to the order you configure them but when one clause specifies an invalid next hop or interface, the next clause is searched. Match Clauses Packet flows are identified by use of Access Control Lists (ACL). ACLs specify traffic to be routed according to a particular end system, higher protocol layer (UDP or TCP), or a port number within the specified protocol. The XSR associates ACLs with PBR by the match ip-address command. Multiple clauses can be configured for each policy entry. Set Clauses The XSR provides two ways for the policy to specify the forwarding path in the set statement: • through the next-hop router with the set ip next-hop command • through the outgoing interface with the set interface command Forwarding behavior is governed by the following considerations: • The next-hop router can be configured only if it belongs to an XSR-connected network. • Traffic over Serial sub-interfaces can be forwarded only to the next-hop router. • The outgoing interface need not be enabled when the entry is configured but will be disregarded when a packet is processed if still in down state. • If a match is found but no set clause is available to forward the packet, the packet is discarded. PBR Cache Since ACL matching is too resource-intensive to perform for all packets, the short-cut cache is created based on a packet’s contents. Each entry in the PBR cache contains a packet’s source and destination IP address, and IP protocol number. Also a port number is kept if the IP protocol is TCP/UDP, and an ICMP code number kept for ICMP. Data on how to forward the packet is also saved in the cache. When a packet enters the XSR, the router first searches the cache for any match on the packet. If a match is made, the packet is forwarded according to the forwarding data. If no match is found, the policy table is searched and a cache built up when forwarding information becomes available. You can view real-time PBR cache data with the show ip pbr-cache command. When a newly created cache entry is not accessed within two to four minutes, that cache is deleted and if the next packet arrives with no cache entry matched, a new cache will be created. For more information, refer to “Configuring Policy Based Routing Example” on page 5-44. XSR User’s Guide 5-23 IP Routing Protocols Default Network The default network is used to specify candidates for the default route when a default route is not specified or learned. If the network specified by the ip default-network command appears in the routing table from any source (dynamic or static), it is flagged as a candidate default route and is subject to being chosen as the default route for the XSR. Note: Use this command only when the default network is more than one hop away and the XSR has either a static or dynamic route to it. Do not confuse creating a valid static route of all zeroes (ip route 0.0.0.0 0.0.0.0 ) with an invalid all-zero default network. You may enter ip default-network multiple times. All candidate default routes appear in the routing table preceded by an asterisk. If the network specified is a subnet, default routing applies only to the classful network. If a directly connected interface is specified, RIP will generate a default route. If the XSR has no interface on the default network but has a route to it, it will consider this network a candidate default route for itself. The best route candidate is chosen based on administrative distance and metric. The gateway to the best default path will be named the gateway of last resort for the router. The gateway of last resort is the gateway for the route used by packets as the last possible alternative, when there is no route to the destination, including a default route. Refer to the XSR CLI Reference Guide for more information and a sample default route configuration. Classless Inter-Domain Routing (CIDR) CIDR is an advanced address scheme for the Internet allowing more efficient allocation of IP addresses than the earlier A, B, and C address scheme. CIDR currently uses prefixes anywhere from 13 to 27 bits. This allows for address assignments that much more closely fit an organization's specific needs. CIDR addressing also enables route aggregation in which a single high level route entry can represent many lower-level routes in the global routing table, thus reducing the table size. The XSR supports CIDR in all IP address/subnet mask CLI commands and the feature is always enabled. The ip address {address mask | address&mask | negotiated} command is just one CIDR-applicable command you can enter. Note: CIDR is not supported where a reverse mask is used. Router ID A router identifier is used by routing protocols such as OSPF to uniquely identify a routing instance. When the Router ID is not assigned, it is selected in the following manner by the XSR: 5-24 • If loopback interfaces are configured, the Router ID is selected based on the highest IP address among active loopback interfaces. • If no loopback are interfaces configured, the Router ID is selected based on the highest IP address among active physical interfaces. Configuring IP IP Routing Protocols Leaving the Router ID unconfigured or allowing it to be assigned by default to a physical IP interface can be risky because physical interfaces are impermanent and their IP addresses can be re-configured. A change in an IP address or the state of a physical interface that has been selected as the Router ID will cause the XSR to drop and recreate its neighbor adjacencies, leading to unnecessary instability. The XSR permits you to configure the Router ID, using the ip router-id command, with the following conditions: • The configured Router ID IP address need not correspond to a valid interface (loopback or physical). • When the Router ID is changed, dependant protocols (i.e., OSPF) are informed and the protocol restarted with the new Router ID. • Precedence for Router ID selection is: user-configured Router ID, then highest IP address loopback port, and highest IP address physical port. Real Time Protocol (RTP) Header Compression RTP header compression is useful for VoIP traffic over low speed PPP wan links . For VoIP packets, the 40 bytes of header (IP header + UDP + RTP header) is almost as large as the VoIP payload itself. The ability to reduce the header size enables more voice traffic to be passed over the PPP wan link. RFC 2508 describes a scheme where the 40 byte combined header of RTP (VoIP) traffic can be reduced to 2 to 4 bytes under most circumstances. With release 7.6.0.0, the XSR now supports both the VJ Header Compression (for TCP and UDP header) and the new IP Header Compression (for TCP, UDP and RTP header compression). XSR cannot be configured to initiate VJ header compression, but it does response to VJ Header compression configuration option from the remote peer with a NAK or REJ. In release 7.6.0.0, the behavior is changed slightly. If RTP is not enabled, then upon receiving a VJ header compression negotiation option, the XSR sends back a NAK or REJ, same as in current release. XSR uses the following criteria to select packets for RTP compression: Must be UDP packet, UDP payload must be less than 500 bytes, Packet must not be fragmented, and The destination port of the packet must be within user configurable port range (there is no restriction on the source port). The XSR does not impose any restriction on RTP de-compression. The following new alarms are added for RTP header compression: High Severity alarm: Out of memory, RTP compression disabled Low Severity alarms: RTP_compression RX failed allocate memory XSR User’s Guide 5-25 IP Routing Protocols RTP_compression TX reached maximum allowed connections, RTP compression received un-expected 8 bit CID RTP compression received un-expected 16 bit CID Received CID (mmm) exceeds the negotiated max CID nnn. Network Address Translation Network Address Translation (NAT) maps IP address from one address realm to another, providing transparent routing to end hosts. Using NAT and Network Address Port Translation (NAPT), the protocol provides a way for many users to share one global IP address. NAT also enhances access security by only allowing certain global addresses to access the private network. NAT is limited in some respects: it requires more processing in the fast path which can impact packet delivery speed. Also, applications which bundle the host IP address inside the payload do not interoperate with NAT because the address does not match the address on the IP header. A special translation agent known as an Application Level Gateway (ALG) is used to allow such programs on a host in one address realm to transparently connect to its counterpart running on a host in a different realm. The XSR implements traditional NAT (RFC-3022). It has two forms: • • Static NAT - Hosts on the private network are mapped statically to global addresses. There are two kinds of basic NAT: – One-to-one mapping - Each host is supplied a one-to-one mapping, on the private network, to a global address. Hosts without mappings are not NATted. – Pool mapping - A pool of global addresses is defined. Hosts on the private network are mapped to global addresses on a first-come, first-serve basis. Once a global address is selected, static mapping is performed. This NAT type is not supported at this time. NAPT - Both the source address and source port of hosts on the private network are translated. The global address is that of the egress interface. Hosts on the private network all share the same global address (based on the egress interface). – Pool NAT - – Pool NAT with Overload Note: Prioritization of packets passing from trusted to external interfaces for the XSR’s four basic types of NAT are, in descending order: • Interface Static NAT • Global Static NAT • Pool NAT • NAPT Features The following NAT features are supported on the XSR: 5-26 • Static NAT - One-to-one mapping based on global (independent of interface) static mapping table. Mapping is permanent and is deleted only if the configuration is removed. • Network Address Port Translation (NAPT). • Standard and Extended Access Control Lists supported. Configuring IP IP Routing Protocols • Application Level Gateway (ALG) for FTP, ICMP, Netbios over TCP and UDP – PPTP/GRE ALG for NAPT - allows PPTP traffic to be NATted • Multiple ISP - NAPT based on the egress interface. • With NAPT, routing is not automatically filtered out. Use distribution lists to ensure global networks are advertised out of external ports. • NAT configuration for VPN interfaces. • Pool NAT (without NAPT). • Pool NAT with overload - Each address allocated from the pool is used to perform NAPT. When all ports are exhausted, the next address is allocated. • NAPT with an arbitrary IP address - Any arbitrary IP address can be utilized for NAPT in addition to the interface IP address. • Interface-specific static NAT - Static NAT is employed on an interface so that only packets that leave/enter that external interface are NATted. • Port Forwarding - Interface-static NAT is used for port forwarding. When NAPT is configured and an incoming packet does not have a translation entry, interface static NAT will select the private IP address and port based on the packet’s destination port. • Multiple NATs on an interface - Multiple pool NATs with ACLs, static NAT and NAPT are supported on an interface simultaneously with the NAT type used in the order it is specified. • IPSec support – Out-bound packets are processed first by NAT, then forwarded to IPSec for encryption. – In-bound packets are processed by NAT after IPSec decryption. Fore more information, refer to “Configuring NAT Examples” on page 5-38. Virtual Router Redundancy Protocol The Virtual Router Redundancy Protocol (VRRP) provides redundancy and load sharing of multiple IP default gateways on a single LAN without requiring that LAN's hosts to run a routing protocol. VRRP configures multiple IP routers on one broadcast LAN to form a single Virtual Router (VR), which has both a unique virtual IP and virtual MAC address. The advantage of this protocol is that hosts on a LAN can switch from one IP router to another (in case of failure) without changing their routing configuration or running additional protocols. Load balancing can also be implemented by configuring multiple VRRP routers across multiple IP routers, with each IP router being the master of a different virtual router. VRRP is an alternative to dynamic types of router discovery such as proxy ARP, RIP and IRDP in that it specifies a group of statically configured default gateways on the client. For example, Figure 5-8 below shows a LAN topology where XSRs 1 and 2 are VRRP routers (running VRRP) comprising one virtual router (VRRP group). The IP address of the VR matches that of the Ethernet interface of XSR1 (10.10.10.1). XSR User’s Guide 5-27 IP Routing Protocols Figure 5-8 Simple VRRP Topology VR IP address: 10.10.10.1 XSR1 XSR2 VR Master VR Backup 10.10.10.2 10.10.10.1 ClientA ClientB ClientC Because the VR uses the IP address of the physical Ethernet interface of XSR1, XSR1 becomes the master VR, also known as the IP address owner. XSR1, as the master VR, assumes the IP address of the VR and is responsible for forwarding packets sent to this IP address. Clients A, B, and C are configured with the default gateway IP address of 10.10.10.1. XSR2 is a backup VR. If the master VR fails, XSR2 will take over as the master VR and support the connected LAN hosts. When XSR1 comes back on line, it assumes the role of master VR again. Figure 5-9 illustrates a topology where VRs XSR1 and XSR2 split outgoing traffic between them and provide full system redundancy. ClientA and ClientB install a default route to XSR1’s VR IP address and ClientC and ClientD install a default route to XSR2’s VR IP address. Both XSRs serve dual master/backup roles. Figure 5-9 Load Balanced, Redundant VRRP Topology VR (Group 2) VR (Group 1) IP address: 10.10.10.1 IP address: 10.10.10.2 XSR2 XSR1 VR Master1/Backup2 VR Master2/Backup1 10.10.10.1 ClientA 10.10.10.2 ClientB ClientC ClientD VRRP Definitions The XSR defines VRRP terms as follows: • 5-28 Configuring IP VRRP Router - A router running the Virtual Router Redundancy Protocol. It may participate in one or more VRs. IP Routing Protocols • Virtual Router - An abstract object managed by VRRP that acts as a default router for hosts on a shared LAN. It consists of a VR Identifier and a set of associated IP address(es) across a common LAN. A VRRP router may back up one or more VRs. • IP Address Owner - The VRRP router that has the VR's IP address(es) as real interface address(es). This is the router that, when up, will respond to packets addressed to one of these IP addresses for ICMP pings, TCP connections, etc. • VRRP Primary IP Address - An IP address selected from the set of real interface addresses. One possible selection algorithm is to always select the first address. VRRP advertisements are always sent using the primary IP address as the source of the IP packet. • Virtual Router Master - The VRRP router that assumes the responsibility of forwarding packets sent to the IP address(es) associated with the VR, and answers ARP requests for these IP address. Note that if the IP address owner is available, then it will always become the master. How the VRRP Works Multiple IP routers on a single broadcast LAN comprise a single virtual router, which has a unique virtual IP address and virtual MAC address. Hosts on the LAN configure the VR as their default router (default gateway). Devices that provide support for a VR form a VRRP group. The device acting as the VR is designated the master of the group. At any one time, only one of the routers acts as the VR, forwarding packets from hosts on the LAN. If that router goes down, the VRRP provides a method by which one of the other routers in the group can take over the virtual IP address and MAC address in a timely manner. When the VRRP is started, the IP router sends and receives VRRP advertisements until a master is chosen. If the IP router does not become the master, it continues to listen to advertisements from the master of the group. If the IP router becomes the master of the group, it begins sending VRRP advertisements and adds VRRP group information to the interface set. Once added, any Ethernet frame for the virtual MAC address is received by the IP router. Any ARP requests for the virtual IP address are responded to using the virtual MAC address. If the IP router ceases to be the group master, it removes the VRRP group information from the system and continues to listen for VRRP advertisements from the new master. Different States of a VRRP Router Underlying how VRRP operates are three states the VRRP router experiences: initialize, backup, and master. Initialize, the first state, involves these steps: • A VRRP router checks the virtual IP address to learn if it is the master. • If it owns that address, it realizes it is the master and its priority is 255. • If the priority equals 255, the VRRP router advertises itself as the master, broadcasts an ARP message to all IP addresses associated with the VR’s IP address, starts the advertisement timer and transitions to the master state. • If priority is less than 255, the VRRP router transitions to backup state. In the backup state, a VRRP router monitors the VR master to confirm it is alive, does not respond to ARP requests or accept packets for the IP address(es) associated with the VR, and discards packets destined for the VR’s MAC address. If an advertisement is received that the priority equals 0, then the VRRP router performs the following: • Advertises that it is the master VR, XSR User’s Guide 5-29 IP Routing Protocols • Broadcasts an ARP message with the VR’s MAC address to all the IP addresses associated with the VR’s IP address, • Starts the advertisement timer, • And transitions to the master state. • If an advertisement is received that has a higher priority, or a higher IP address (if the priority is the same), then the VRRP router discards the advertisement and remains as the master VR. In the master state, a VRRP router performs as follows: • Responds to ARP requests or accepts packets for the IP address(es) associated with the VR, • Does not accept packets address to the IP address associated with the VR if it is not the owner of the IP address, • Forwards packets destined for the VR’s MAC address. If a shutdown event is received, the VRRP router advertises a 0 priority. If an advertisement with a greater priority or higher IP address (if the priority is the same) is received by the virtual master, it experiences the following: • Transitions to a backup state • Cancels the advertisement timer If an advertisement is received with the priority lower than local priority, or with a lower IP address if the priority is the same, then the VRRP router discards the advertisement. VRRP Features Multiple Virtual IP Addresses per VR The XSR permits specifying multiple virtual IP addresses on the VR (up to 11) to support multiple logical IP subnets on a LAN segment. Functionality is set by the vrrp ip command. The primary physical IP address in that interface will be selected as a VRRP primary IP address, which is used for the VRRP advertisement. The advertisement timer is set using the vrrp adver-int command. If one of the virtual IP addresses of a VR is the real physical address of the interface, then all other virtual IP addresses of that VR must also be the real physical addresses of that interface. Obversely, if any of the virtual IP addresses is not the real physical address of that interface, then all of the virtual IP address of that VR cannot be the real physical address of that interface. Multiple VRs Per Router The XSR supports multiples VRs per router as follows: • A maximum of four VRs are supported per router. • The scope of a VR is limited to a single LAN segment. • The VR ID can be reused in a different scope. Authentication The XSR supports one type of authentication - simple password authentication - which is meant to avoid careless misconfiguration, not provide security. It is invoked with the vrrp authentication command. Authentication is set per VR. 5-30 Configuring IP IP Routing Protocols Load Balancing The XSR provides load balancing according to the following rules: • Load balancing depends on how your network is designed. • Load balancing is supported by separate physical VRRP routers and not supported on the same physical router which has two LAN ports on the same LAN segment with the same subnet. ARP Process on a VRRP Router Three types of ARP requests can be employed on a VRRP router: Host, Proxy and Gratuitous ARP. Host ARP Host ARP performs according to the following rules: • When a host sends an ARP request for one of the VR IP addresses, the master VR returns the virtual MAC address (00-00-5e-00-01-VRID). • The backup VR must not respond to the ARP request for one of the VR IP addresses. • If the master VR is the IP address owner, when a host sends an ARP request for this address, the master VR must respond with the virtual MAC address, not the real physical MAC address. • For other IP addresses, the VRRP router must respond with the real physical MAC address, regardless of master or backup. Proxy ARP • If Proxy ARP is used on a VRRP router, then the master VRRP router must advertise the VR MAC address for the VR IP address in the proxy ARP message. Gratuitous ARP Gratuitous ARP behaves in the following manner on a VRRP router: • Each VR sends gratuitous ARP when it becomes the master with virtual IP and MAC addresses. One gratuitous ARP is issued per VR IP address. • To make the bridge learn the correct VR MAC address, the VR masters send gratuitous ARP for every virtual IP address in the corresponding VR every 10 seconds. Traffic Process on a VRRP Router Incoming traffic on a VRRP router is governed by the following rules: • Whether a VRRP router is in a master or backup state, it must receive packets with a real physical MAC address as the destination MAC address. • The master VR must receive packets with a virtual MAC address as the destination MAC address. • The backup VR must not receive any packets with the virtual MAC address as the destination MAC address. Outgoing traffic on a VRRP router is governed by the following rules: XSR User’s Guide 5-31 IP Routing Protocols • Master VR - all traffic, including locally generated or forwarding traffic, uses one of the virtual MAC addresses as the source MAC address except VRRP protocol packets, which use the corresponding virtual MAC address as the source MAC address. For example, if four VRs occupy one interface, two are in a master and the others a backup state. The VRRP router uses one of the virtual MAC addresses of the master VRs as the source MAC address for all traffic transferring over this interface, except VRRP protocol packets, which use the corresponding virtual MAC address as the source MAC address. • Backup VR - all traffic will use a real physical MAC address as the source MAC address. For example, If there are two VRs on one interface and both are in the backup state. The VRRP router will use the real physical MAC address of this interface as the source MAC address for all traffic transferred over this interface. ICMP Ping RFC-2338 specifies that a VR master that is not the actual address owner should not respond to an ICMP ping associated with the virtual IP address. The vrrp master-respond-ping command allows the VR master to respond to a ping regardless of actual IP address ownership. Interface Monitoring This feature, invoked by vrrp track, allows a different router to act as the default gateway when a route through the local router is unavailable. An interface of a VR (usually the intended master of the VR) is set to monitor another interface on the same router, and will refrain from acting as the master of the VR if the monitored interface is down. It lowers its VR priority to 0 when the XSR meets one of the following conditions: • The monitor interface does not exist. This occurs when you configure one monitor interface on a certain VR but do not create that interface. • The monitor interface is removed. This occurs you remove one port which has been configured as the monitor port on a certain VR. • The monitor interface fails. This occurs in the following cases: – You change the administrate state of the interface to down. – You remove the IP address of that interface. – The physical layer of the interface fails due to a disconnected cable, for example. – The link layer of the interface fails, such as a PPP or FR link. The VR will increase its priority back to the original value, and may become the Master VR again if preemption is enabled, when the router meets all of the following conditions: • The physical layer of the monitor interface comes up. • The link layer of the monitor interface comes up. • You configure a valid IP address for the monitor interface. • You change the administrate state of the monitor interface to up. When the monitored interface comes up again, the interface of the VR will increase its priority back to the original value, and may become the master VR again if preemption is enabled with vrrp preempt. You can manually set the VR priority level with vrrp priority. 5-32 Configuring IP IP Routing Protocols When the actual IP address owner of the Virtual IP address releases the master state of the VR, it will no longer be able to receive any IP packet destined for that address even though the actual interface is still up. This may cause routing packets to not reach this interface and cause this interface to be considered down by other routers. To avoid this situation when using Interface Monitoring, be sure that you configure Virtual IP addresses different than the actual IP addresses of the interfaces. Watch Group Monitoring This feature, entered by the vrrp track command, permits tracking of Dialer, Fast/GigabitEthernet, Multilink or Serial interfaces or sub-interfaces. It also allows the tracking of one or more routes as configured by the dialer watch-list command. Watch lists are particularly useful for monitoring Dialer backup lines. Watch group monitoring is very similar to interface monitoring. The VR configured with the dialer watch-group command will monitor the routes configured under the corresponding dialer watch-list instead of the interface. If all routes are not available, the VR will lower its priority to 0 and let the other router to take over as master for that VR. Usually, dialer watchgroup monitoring should be configured on the XSR which has a very high likelihood of being the master for that VR. The VR will lower its priority to 0 when the XSR meets all of the following conditions: • All active routes configured under the corresponding dialer watch-list went down. • The connect or route check timer has expired. Those timers can be configured under that dialer watch list. The default value for the connect timer is 5 seconds, and 30 seconds for the route check. For more timer details, refer to the XSR CLI Reference Guide. The VR will increase its priority back to the original value, and may become the master VR again if preemption is enabled, when the XSR meets one of the following conditions: • At least one of the routes configured under monitoring watch-group came up and the disconnect timer has expired. The disconnect timer can be configured under that dialer watch list with a default value of five seconds. • You have removed the watch-list. The watch-list behaves differently on an interface: removing an interface indicates the interface is down and cannot pass traffic, but removing the watch-list indicates you do not want to monitor those routes; it does not indicate the routes configured under that watch-list are down. When the actual IP address owner of the Virtual IP address releases mastery of the VR, it can no longer receive any IP packet destined for that address even though the actual interface is still up. This may cause routing packets to not reach this interface and cause it to be considered down by other routers. To avoid this situation, when dialer watch-group Monitoring is enabled, the Virtual IP address configured should be different from the actual IP addresses of the interfaces. Physical Interface and Physical IP Address Change on a VRRP Router The VR will change to the initialize state regardless of the interface state, if you configure a VR before configuring the physical IP address, and there will be a conflict between the physical IP and VR IP address. XSR User’s Guide 5-33 IP Routing Protocols Equal-Cost Multi-Path (ECMP) Equal-Cost Multi-Path (ECMP) is a technique to forward packets along multiple paths of equal cost, aggregating multiple physical links into one virtual link to effectively increase the total bandwidth of a connection. Internally, the XSR decides which next hop to use in the event that more than one choice is available in the forwarding table and by searching this table, the forwarding engine identifies paths by the next hop. The XSR offers two methods to calculate the next hop, described as round robin (per packet) and per-flow options in the ip equal-cost multi-path {round-robin | per-flow} command. They are characterized as follows: • Per packet round robin - This selection method has the advantage of bearing very little impact on performance and not requiring much time for computation as well as offering perfect load balancing. Disadvantages include disruptions caused by flow-based traffic; a variable path MTU where the overall path MTU might change on a packet-by-packet basis, thus negating the usefulness of path MTU discovery; variable latencies with negative implications on TCP traffic, where packets might be received out of order; and less reliable debugging utilities (ping, traceroute) which may produce wrong results. • Per flow round robin - this selection method is nondisruptive and lends itself to session-based traffic. It configures all packets belonging to a certain flow (as determined by source/ destination IP address and protocol number) to take the same path and directs each new flow toward the next available next hop. Disadvantages include a possible detrimental impact on performance depending on the algorithm selected and unbalanced traffic flows owing to the nature of the method. ECMP is enabled globally so it applies to static, BGP and OSPF routes as well as all interfaces. If enabled, a maximum of three paths is allowed to a particular destination. If ECMP is disabled, one path to a particular destination is permitted. You can display configured equal cost routes by using the show ip route command which describes routing descriptor blocks, with one for each route. An asterisk placed (*) next to a block entry corresponds to the active route used for new traffic. Configuration Considerations When configuring ECMP on the XSR, keep in mind the following considerations: 5-34 • We highly recommend you employ ECMP over similar physical interfaces. If you enable round-robin ECMP over dissimilar physical links and those link speeds differ, results might be unpredictable because the order of incoming packets may be reversed. If you enable per-flow ECMP in this instance, packet order will not be a problem but balancing will be inefficient. • The XSR supports ECMP over VPN but without tunnel balancing in circumstances where two or more tunnels share the same peer at equal cost. For example, ECMP is not supported if two tunnels are created from a remote XSR to a central XSR, each through different ISPs, with both tunnels sharing the same peer. • The XSR does support load balancing in a VPN topology where an ECMP route is configured on an XSR to different peers, as shown in Figure 5-10. On the Central XSR, next hops 1.1.1.2 and 1.1.1.3 are selected as the ECMP route through the VPN1 interface and static routes are configured over FastEthernet interfaces to Peer1 and Peer2. In this scenario, dual levels of routing are performed: one at the virtual interface level where ECMP applies and two, at the physical interface level where static routes are used. Configuring IP Configuring RIP Examples Figure 5-10 ECMP VPN Load Balancing Topology Remote XSR1 N1 VPN1: 1.1.1.2 Central XSR VPN1: 1.1.1.1 Routes O N2 next hop 1.1.1.2 O N2 next hop 1.1.1.3 S Peer1 next hop nh1 S peer2 next hop nh2 N2 VPN link nh1 nh2 Peer1 Internet Physical link Peer2 VPN1:1.1.1.3 Remote XSR2 Configuring RIP Examples The following example enables RIP on both FastEthernet interfaces and a serial link of the XSR. The FastEthernet 2 interface is configured to be totally passive (updates not sent or received). The serial interface uses split horizon with poison reverse while the others use split horizon (the default). Authentication mode text is used on Serial 1/0, and the key string is Mexico: XSR(config)#interface fastethernet 1 XSR(config-if )#ip address 192.168.1.1 255.255.255.0 XSR(config-if )#no shutdown XSR(config)#interface fastethernet 2 XSR(config-if )#no shutdown XSR(config-if )#ip address 192.169.1.1 255.255.255.0 XSR(config)#interface serial 1/0 XSR(config-if )#ip address 192.5.10.2 255.255.255.0 XSR(config-if )#ip split-horizon poison XSR(config-if )#ip rip authentication key-string Mexico XSR(config-if )#ip rip authentication mode text XSR(config-if )#encapsulation ppp XSR(config-if )#no shutdown XSR(config)#router rip XSR(config-router)#network 192.168.1.0 XSR(config-router)#network 192.169.1.0 XSR(config-router)#network 192.5.10.0 XSR(config-router)#passive-interface fastethernet 2 XSR(config-router)#no receive-interface fastethernet 2 The following RIP example sets an Access Control List (ACL) to allow packets from the address of 192.168.1.xxx and 154.68.1.xxx (where xxx are any valid numbers) only through the XSR's F1 port. XSR(config)#interface FastEthernet 1 XSR(config-if #no shutdown XSR User’s Guide 5-35 Configuring RIP Examples XSR(config-if )#ip address 192.168.1.100 255.255.255.0 XSR(config-if )#ip access-group 1 in XSR(config-if )#ip access-group 1 out XSR(config)#interface serial 1/0 XSR(config-if )#no shutdown XSR(config-if )#media-type V35 XSR(config-if )#encapsulate ppp XSR(config-if )#ip address 154.68.1.47 255.255.255.0 XSR(config)#router rip XSR(config-router)#network 154.68.1.0 XSR(config-router)#network 192.168.1.100 XSR(config)#access-list 1 permit 192.168.1.0 0.0.0.255 XSR(config)#access-list 1 permit 154.68.1.0 0.0.0.255 XSR#copy running-config startup-config The following configuration sets up RIPv1 with Dynamic Host Configuration Protocol (DHCP) Relay enabled. DHCP relay is used when no DHCP server exists on the immediate network. When a local client sends a DHCP request, the XSR relays this request to the appropriate DHCP server specified by the helper-address. After the server responds, the XSR relays this response back to the local client. As described below, the XSR connects to the PSTN via a T1 connection with 12 associated channels comprising channel-group 0. This T1 channel group is presented to the XSR as a serial port and is configured similarly. The T1 (serial port) connection is unnumbered, indicating packets from the T1 interface will use the IP address of the Ethernet interface instead of its own. XSR(config)#controller t1 0/2/0 XSR(config-controller )#channel-group 0 timeslots 1-12 XSR(config-controller )#no shutdown XSR(config)#interface XSR(config-if )#no XSR(config-if )#ip XSR(config-if )#ip fastethernet 1 shutdown address 192.168.1.100 255.255.255.0 helper-address 154.68.1.1 XSR(config-if )#interface serial 2/0:0 XSR(config-if )#no shutdown XSR(config-if )#encapsulate ppp XSR(config-if )#ip unnumbered fastethernet 1 XSR(config)#router rip XSR(config-router)#network 192.168.1.100 XSR#copy running-config startup-config 5-36 Configuring IP Configuring Unnumbered IP Serial Interface Example Configuring Unnumbered IP Serial Interface Example The following example configures an X.21-type, serial interface 1/0 as an unnumbered serial interface. Serial 1/0 is directed to use the IP address of FastEthernet port 1. XSR(config)#interface fastethernet 1 XSR(config-if )#ip address 192.168.1.1 255.255.255.0 XSR(config-if )#no shutdown XSR(config)#interface serial 1/0 XSR(config-if )#media-type x21 XSR(config-if )#encapsulation ppp XSR(config-if )#ip unnumbered fastethernet 1 XSR(config-if )#no shutdown XSR#copy running-config startup-config Configuring OSPF Example The following is a sample configuration of OSPF which adds three networks to OSPF areas including stub and NSSA areas, sets the retransmit interval on interface FastEthernet 1 to 9 seconds, specifies the cost of sending traffic on interface Serial 1/0 to 64, and redistributes static routes into OSPF: XSR(config)#interface FastEthernet 1 XSR(config-if )#no shutdown XSR(config-if )#ip address 192.168.1.100 255.255.255.0 XSR(config-if )#ip ospf retransmit-interval 9 XSR(config-if )#interface FastEthernet 2 XSR(config-if )#no shutdown XSR(config-if )#ip address 156.57.99.3 255.255.255.0 XSR(config)#interface serial 1/0 XSR(config-if )#no shutdown XSR(config-if )#media-type V35 XSR(config-if )#encapsulation ppp XSR(config-if )#ip address 154.68.1.47 255.255.255.0 XSR(config-if )#ip ospf cost 64 XSR(config)#router ospf 1 XSR(config-router)#network 192.168.1.0 0.0.0.255 area 0.0.0.10 XSR(config-router)#network 154.68.1.0 0.0.0.255 area 0 XSR(config-router)#area 10 nssa default-information-originate XSR(config-router)#network 156.57.99.3 255.255.255.0 area 1 XSR(config-router)#area 1 stub XSR(config-router)#redistribute static XSR#copy running-config startup-config XSR User’s Guide 5-37 Configuring NAT Examples Configuring NAT Examples Basic One-to-One Static NAT The following example illustrates inside source address translation on the XSR, as shown in Figure 5-11 below. Figure 5-11 NAT Inside Source Translation Inside Outside Request SA: 10.1.1.1 DA: 172.20.1 After Translation SA: 200.2.2.1 DA: 172.20.2.1 10.1.1.1 External interface Inside interface Reply after reverse lookup SA: 172.20.2.1 DA: 10.1.1.1 XSR NAT Table Private: 10.1.1.1 Global: 200.2.2.1 Internet Reply SA: 172.20.2.1 172.20.2.1 DA: 200.2.2.1 1. The user at 10.1.1.1 opens a connection to host 172.20.2.1. 2. The first packet the XSR receives from host 10.1.1.1 causes the router to check its NAT table. – If a static entry was configured, the XSR proceeds to Step 3. – If no translation entry exists, the router decides that 10.1.1.1 must be translated dynamically, selects a global address from the dynamic address pool, and creates a translation entry. 3. The XSR replaces the inside local source address of 10.1.1.1 with the global IP address 200.20.2.1 and forwards the packet. 4. Host 172.20.2.1 receives the packet and responds to IP address 200.20.2.1. 5. The XSR receives the packet with the inside global destination IP address 200.20.2.1, it looks in the table, and translates the destination address to the inside local destination address 10.1.1.1. Then it forwards the packet to 10.1.1.1. Configuring Static Translation Only one command is required to configure NAT because static NAT is interface independent. Optionally, you can configure multiple entries in the static translation table with the ip nat source static command. • 5-38 Configuring IP XSR(config)#ip nat source static local-ip global-ip + Sets the static translation Configuring NAT Examples Dynamic Pool Configuration The following example illustrates dynamic pool translation on the XSR, as shown in Figure 5-12. Figure 5-12 Dynamic Pool Translation Inside 10.1.1.1 Reply after reverse lookup SA: 172.21.2.1 DA: 10.1.1.1 Outside Request SA: 10.1.1.1 DA: 172.21.2.1 NAT Table 10.1.1.1 200.2.2.1 After packet 1 Internal interface XSR Request packet 2 SA: 10.1.1.2 DA: 172.21.2.2 10.1.1.2 After Translation DA: 172.20.2.1 SA: 200.2.2.1 172.21.2.1 Reply packet 1 DA: 200.2.2.1 SA: 172.21.2.1 Internet External interface 172.21.2.2 NAT Table Reply after reverse lookup SA: 172.21.2.1 DA: 10.1.1.1 10.1.1.1 10.1.1.2 200.2.2.1 After Translation 200.2.2.2 DA: 172.21.2.2 SA: 200.2.2.2 After packet 2 Reply packet 2 DA: 200.2.2.2 SA: 172.21.2.2 Configuring Dynamic Pool Translation Dynamic pool translation, as shown in Figure 5-12, is performed through the following process: 1. The user at address 10.1.1.1 opens a connection to address 172.21.2.1 2. The first packet that the XSR receives from address 10.1.1.1 forces a NAT Pool table check. If no dynamic pool entry exists, and address 10.1.1.1 must be translated, then the XSR adds a pool entry. The router replaces the inside local address 10.1.1.1 with the inside global address 200.2.2.1, and forwards the packet. Any other connections originating from address 10.1.1.1 will use address 200.2.2.1 as the global address. 3. Host address 172.21.2.1 receives the packet, and responds to address 10.1.1.1 by using the inside global address 200.2.2.1. 4. When the XSR receives the packet, it searches its NAT Pool table, using address 200.2.2.1, translates the address to inside local address 10.1.1.1, and forwards it to address 10.1.1.1. 5. The same process applies to the connection originating from address 10.1.1.2, but a different global IP address is used. Now enter the commands below to set dynamic pool translation. Note some steps are optional. 1. Create local IP pool NATpool with excluded IP addresses (optional) and quit Local Pool mode: XSR(config)#ip local pool NATpool 200.2.2.0 255.255.255.0 XSR(ip-local-pool)#exclude 200.2.2.1 8 XSR(ip-local-pool)#exclude 200.2.2.21 233 XSR(ip-local-pool)#exit 2. Register the global NAT pool: XSR(config)#ip nat pool NATpool XSR User’s Guide 5-39 Configuring NAT Examples 3. Optional. Add an ACL to permit NAT traffic from the 10.1.1.0 network. All other traffic is implicitly denied. XSR(config)#access-list 57 permit 10.1.1.0 0.0.0.255 4. Optional. Reset the default NAT timeout interval to 5 minutes: XSR(config)#ip nat translation timeout timeout 300 5. Enable an interface; F1, for example: XSR(config)#interface fastethernet 1 6. Bind the interface and optional ACL to the NAT pool: XSR(config-if )#ip nat source list 57 pool NATpool 7. Optional. Enable a second interface, F2, to use the same NAT pool: XSR(config)#interface fastethernet 2 8. Optional. Bind the second interface to NATpool: XSR(config-if )#ip nat source pool NATpool Note that no ACL is associated with NATpool. Alternatively, you can create a second NAT pool which will share addresses with the first configured NAT pool. Network Address and Port Translation This example sets inside source address translation with overload (NAPT) XSR (Figure 5-13). Figure 5-13 NAT Inside Source Translation with Overload (NAPT). Inside 10.1.1.1 Request SA: 10.1.1.1 DA: 172.20.2.1 Outside NAT applied to this interface After Translation DA: 172.20.2.1 SA: 200.2.2.1 172.20.2.2 Internal Reply after interface reverse lookup SA: 172.20.2.1 DA: 10.1.1.1 Internet XSR NAPT Table Protocol Inside local IP addr:port TCP 10.1.1.1:1729 TCP 10.1.1.1:1780 External interface 200.20.2.1 Inside global IP addr:port 200.2.2.1:40450 200.2.2.1:40460 Outside global IP addr:port 172.2.20.2:23 172.2.21.2:23 Reply SA: 172.20.2.1 172.20.2.1 DA: 200.2.2.1 Configuring NAPT Inside source address translation with overload, as shown in Figure 5-13, is configured as follows: 5-40 1. The user at address 10.1.1.1 opens a connection to host address 172.20.2.1. 2. The first packet that the XSR receives from 10.1.1.1 prompts a check of the NAPT table. If no translation entry exists and the address 10.1.1.1 must be translated, the XSR sets up a translation entry. So the router replaces the inside local address 10.1.1.1 with the external address 200.20.2.1, replaces the source port with 40450, and forwards the packet. Configuring IP Configuring NAT Examples 3. Host 172.20.2.1 receives the packet and responds to address 200.2.2.1. 4. When the XSR receives the packet, it searches the NAPT table, using the protocol, global address and port, and translates the address to the inside local address 10.1.1.1 and destination port 1789, then forwards it to address 10.1.1.1. Configuring NAPT Enter the following commands to configure overloading of inside global addresses. This example configures an optional access list to permit specified traffic. All other traffic is implicitly denied. XSR(config)#interface serial 1/0 + Configures serial port and acquires Interface mode XSR(config-if )#ip nat source list 99 assigned overload + Specifies NAT translation rules on the interface XSR(config)#access-list 99 permit ip 10.1.1.0 0.0.0.255 + Adds ACL to permit IP traffic from the specified source Multiple NAT Pools within an Interface This scenario describes two NAT pools within interface F2. As shown in Figure 5-14, the pools are assigned to external port F2. One is used for packets sent to the 172.20.2.0 network and the other for the 164.17.2.0 network. Based n the ACL, outbound packets would use one of the two pools. Note that the same internal host can have mappings in both pools since it could send packets to both destinations. Packets that do not match either ACL will be sent un-NATted. Optionally, NAPT permits packets not matching either of the pool ACLs to pass through NAPT. Figure 5-14 Multiple NAT Pools within Interface Inside 10.1.1.1 Outside Request SA: 10.1.1.1 DA: 172.20.2.1 Internal interface After Translation DA: 164.17.2.1 SA: 200.2.2.1 External interface XSR 10.1.1.2 NAT Table Request SA: 10.1.1.2 DA: 164.17.2.1 164.17.2.2 Internet F2 After Translation DA: 172.20.2.1 SA: 200.2.2.1 Reply DA: 200.2.2.1 SA: 172.20.2.1 172.20.2.1 Inside local Inside global IP Address IP Address 200.2.2.1 10.1.1.1 201.2.2.1 10.1.1.2 Multiple NAT pooling procedes as follows: 1. The user at 10.1.1.1 opens a connection to host 172.20.2.1. XSR User’s Guide 5-41 Configuring NAT Examples 2. The first packet the XSR receives from 10.1.1.1 is checked against its ACLs. ACL 101 matches and pool NatPool is used. A check is made for existing mapping and if found is used otherwise a new one is created. The global address is 200.2.2.1. 3. Packet are marked as originating from 200.2.2.1 to 172.20.2.1. 4. Reply packets arrive at the XSR with the pool mapping on NatPool used to obtain private IP address 10.1.1.1. Packets are then translated and passed on to the host. Enter the following commands to configure multiple NAT pools: XSR(config)#access-list 101 permit ip any 172.20.2.0 255.255.0.0 + Configures the ACL for the destination on the 172.20.2.0 network XSR(config)#access-list 102 permit ip any 164.17.2.0 255.255.0.0 + Configures the ACL for the destination on the 164.17.2.0 network XSR(config)#ip local pool NatPool 200.2.2.0/24 XSR(ip-local-pool)#ip local pool NatPool1 201.2.2.0/24 XSR(ip-local-pool)#exit + Create two IP local pools at the specified inside global IP addresses XSR(config)#ip nat pool NatPool XSR(config)#ip nat pool NatPool1 + Assigns the above pools to NAT XSR(config)#interface F2 XSR(config-if )#ip nat source list 101 pool NatPool XSR(config-if )#ip nat source list 102 pool NatPool1 + The above optional NAPT commands use ACL 101 for the 200.2.2.0 network and ACL 102 for the 201.2.2.0 network Static NAT within an Interface This scenario extends the example for multiple NAT instances per interface illustrating the interaction between different NAT forms under the interface. 5-42 Configuring IP Configuring NAT Examples Figure 5-15 Static NAT within Interface Inside Outside Request SA: 10.1.1.1 DA: 172.20.2.1 After Translation DA: 164.17.2.1 SA: 201.2.2.1 10.1.1.1 164.17.2.2 Internal interface External interface XSR Internet F2 After Translation DA: 172.20.2.1 SA: 201.2.2.1 10.1.1.2 NAT Table Request SA: 10.1.1.2 DA: 164.17.2.1 Reply DA: 203.2.2.1 SA: 172.20.2.1 172.20.2.1 Inside local Inside global IP Address IP Address 203.2.2.1 10.1.1.1 201.2.2.1 10.1.1.2 As shown in Figure 5-15, packets from the PC at 10.1.1.1 are statically NATted to the PC at 203.2.2.1 but through neither of the pools. This occurs because static NAT takes precedence over other NAT forms. Also, this static NAT would be used only when packets from PC 10.1.1.1 exit the F2 interface. On any other interface the translation would not occur, unless the same mapping is configured. Static NAT within an interface procedes as follows: 1. The user at 10.1.1.1 opens a connection to host 172.20.2.1. 2. When the XSR receives the first packet from 10.1.1.1, the static NAT table for the interface is checked and a mapping found. That mapping is used to translate the source IP address to 203.2.2.1. 3. The packet goes out as being transmitted from 203.2.2.1 to destination 172.20.2.1. 4. When a reply packet is received by the XSR, static mappings are again checked resulting in the translation of the destination IP address from 203.2.2.1 to 10.1.1.1. Enter the following commands to configure static NAT at interface F2: XSR(config)#access-list 101 permit ip any 172.20.0.0 0.0.255.255 + Configures the ACL for the destination on the 172.20.0.0 network XSR(config)#access-list 102 permit ip any 164.17.0.0 0.0.255.255 + Configures the ACL for the destination on the 164.17.0.0 network XSR(config)#ip local pool NatPool 200.2.2.0/24 XSR(ip-local-pool)#exit XSR(config)#ip local pool NatPool1 201.2.2.0/24 XSR(ip-local-pool)#exit + Create two IP local pools with the specified inside global IP addresses XSR(config)#ip nat pool NatPool XSR(config)#ip nat pool NatPool1 + Assigns the above pools to NAT XSR(config)#interface F2 XSR(config-if )#ip nat source list 101 pool NatPool XSR(config-if )#ip nat source list 102 pool NatPool1 XSR User’s Guide 5-43 Configuring Policy Based Routing Example + The above optional NAPT commands use ACL 101 for the 200.2.2.0 network and ACL 102 for the 201.2.2.0 network XSR(config-if )#ip nat source intf-static 10.1.1.1 203.2.2.1 + The above optional command statically NATs packets from 10.1.1.1 to 203.2.2.1 NAT Port Forwarding This scenario, as shown in Figure 5-16, illustrates NAT port forwarding. The connection is initiated by the PC at 172.20.2.1 to port 4003 on 200.2.2.1. The XSR’s static NAT table is first checked for mappings. An entry is found for 200.2.2.1 (which happens to be the interface IP address, but is not required) with port 4003 mapping it to the PC at 10.1.1.1:23. The packet is then translated and forwarded to 10.1.1.1 destined for port 23. The reply packet from the Telnet server once again passes to the static NAT at interface F2 and is forwarded to 172.20.2.1 as being from 200.2.2.1:4003. Figure 5-16 NAT Port Forwarding Inside Outside Runs Telnet Server at Port 23 Reply DA: 172.20.2.1 SA: 200.2.2.1 Telnet SYN Pkt DA: 10.1.1.1 SA: 172.20.2.1 172.21.2.2 10.1.1.1 Internal interface External interface XSR F2 10.1.1.2 NAT Table Protocol TCP Internet Request DA: 200.2.2.1:4003 SA: 172.20.2.1 172.20.2.1 Inside local Inside global IP Address IP Address 10.1.1.1:23 200.2.2.1:4003 Enter the following commands to enable NAT Port Forwarding: XSR(config)#interface XSR(config-if )#ip XSR(config-if )#ip XSR(config-if )#ip fastethernet2 address 200.2.2.1/24 nat source intf-static tcp 10.1.1.1 23 200.2.2.1 4003 nat source assigned overload Configuring Policy Based Routing Example The following example configures PBR to forward to a next-hop router: XSR(config)#access-list 101 permit ip 10.10.10.0 0.0.0.255 192.168.5.0 0.0.0.255 The commands below configure GigabitEthernet interface 1 with an IP address, and enable PBR with the ip policy command: XSR(config)#interface GigabitEthernet 1 XSR(config-if )#ip address 192.168.5.1 255.255.255.0 5-44 Configuring IP Configuring VRRP Example XSR(config-if )#ip policy These commands create the PBR, map it to ACL 101, and set the forwarding router as 192.168.5.2: XSR(config)#route-map pbr 101 XSR(config-pbr-map)#match ip address 101 XSR(config-pbr-map)#set ip next-hop 192.168.5.2 Configuring VRRP Example The following example configures three VRRP groups to provide forwarding redundancy and load balancing on VRRP routers XSRa and XSRb as follows: • Group 1: the virtual IP address is 10.10.10.10, XSRa is the group master with priority 120, the advertising interval is 3 seconds, preemption is enabled with a 2-second delay, and authentication is set with the text robo. • Group 5: XSRb is the group master with priority 200, the virtual IP address is 10.10.10.50, the advertising interval is 30 seconds, and preemption is enabled with a 2-second delay. • Group 100: XSRa is the group master with priority 85, the advertising interval is 1 second (default), and preemption is off. • The WAN Serial interface 2/0 is tracked by FastEthernet interface 1 on each likely master VR. Router XSRa XSRa(config)#interface fastethernet 1/0 XSRa(config-if )#ip address 10.10.10.2 255.255.255.0 XSRa(config-if )#vrrp 1 priority 150 XSRa(config-if )#vrrp 1 preempt delay 2 XSRa(config-if )#vrrp 1 track serial 2/0 XSRa(config-if )#vrrp 1 authentication robo XSRa(config-if )#vrrp 1 adver-int 3 XSRa(config-if )#vrrp 1 ip 10.10.10.10 XSRa(config-if )#vrrp 5 priority 100 XSRa(config-if )#vrrp 5 adver-int 30 XSRa(config-if )#vrrp 5 ip 10.10.10.50 XSRa(config-if )#vrrp 5 preempt delay 2 XSRa(config-if )#vrrp 100 ip 10.10.10.100 XSRa(config-if )#vrrp 100 priority 85 XSRa(config-if )#no vrrp 100 preempt XSRa(config-if )#vrrp 100 track serial 2/0 XSRa(config-if )#no shutdown Router XSRb XSRb(config)#interface fastethernet 1/0 XSRb(config-if )#ip address 10.10.10.1 255.255.255.0 XSRb(config-if )#vrrp 1 priority 100 XSRb(config-if )#vrrp 1 preempt delay 2 XSRb(config-if )#vrrp 1 authentication robo XSRb(config-if )#vrrp 1 adver-int 3 XSRb(config-if )#vrrp 1 ip 10.10.10.10 XSR User’s Guide 5-45 Configuring VLAN Examples XSRb(config-if )#vrrp 5 priority 200 XSRb(config-if )#vrrp 5 adver-int 30 XSRb(config-if )#vrrp 5 ip 10.10.10.50 XSRb(config-if )#vrrp 5 preempt delay 2 XSRb(config-if )#vrrp 5 track serial 2/0 XSRb(config-if )#vrrp 100 ip 10.10.10.100 XSRb(config-if )#vrrp 100 priority 65 XSRb(config-if )#no vrrp 100 preempt XSRb(config-if )#no shutdown Configuring VLAN Examples The following example configures a VLAN interface on FastEthernet sub-interfaces 2.1 and 2.2: XSR(config)#interface FastEthernet 2.1 XSR(config-if )#vlan 1200 XSR(config-if )#ip address 1.2.3.4 255.255.255.0 XSR(config-if )#no shutdown XSR(config-if )#exit XSR(config)#interface FastEthernet 2.2 XSR(config-if )#vlan 1300 XSR(config-if )#ip address 2.2.3.4 255.255.255.0 XSR(config-if )#no shutdown The following example configures a VLAN interface for PPPoE: XSR(config)#interface FastEthernet 2.4 XSR(config-if )#encapsulate ppp XSR(config-if )#vlan 1400 XSR(config-if )#ip address negotiated XSR(config-if )#ip mtu 1492 XSR(config-if )#no shutdown For a QoS with VLAN example, refer to “QoS with VLAN” on page 14. 5-46 Configuring IP 6 Configuring the Border Gateway Protocol Features The XSR supports the following the Border Gateway Protocol (BGP-4) features: • Full mandatory BGP v4 protocol support (RFC-1771) • Support for all BGP v4 MIB tables defined in RFC-1657 including BGP SNMP traps • Protection of BGP Sessions: TCP MD5 Signature Option (RFC-2385) • BGP Capabilities advertisement (RFC-2842) • BGP Route reflection (RFC-2796) • BGP Communities (RFC-1997) • Route Refresh (RFC-2918) • BGP Route Flap dampening (RFC-2439) • AS Confederations for BGP (RFC-3065) • BGP debug capability Overview BGP-4 is an Exterior Gateway Protocol (EGP) typically used to swap routing data among different Autonomous Systems (AS). An AS is defined as a network or group of networks that run under a common administration and with a common set of routing policies. BGP supports two types of exchanges of routing information: exchanges between different ASs (inter-AS) and exchanges within a single AS (intra-AS). When BGP is used between different ASs, the protocol is referred to as External BGP (EBGP). If BGP is used to exchange routes within an AS, then the protocol is referred to as Interior BGP (IBGP), as shown in Figure 6-1. XSR User’s Guide 6-1 Overview Figure 6-1 Differentiating EBGP from IBGP BGP can be categorized as a path vector routing protocol which defines a route as a pairing between a destination and the qualities of the path to that destination. The main role of a BGPspeaking node is to trade network reachability data with adjacent BGP nodes known as neighbors or peers. This reachability data includes a list of AS’s that have been traversed along the way. By using this list, an AS connectivity grid can be built from which routing loops may be pruned and some policy decisions at the AS level may be enforced. Like other protocols, BGP uses the Transmission Control Protocol (TCP) as its transport protocol. Running over a reliable transport protocol eliminates the need for BGP to use fragmentation, retransmission, acknowledgment, and sequencing BGP uses TCP port 179 to build its links. BGP neighbors exchange full routing data when the TCP link between neighbors is first established. When routing table changes are detected, BGP routers send only changed routes to their neighbors. BGP routers do not transmit periodic routing updates, and BGP routing updates advertise only the best path to a destination network. BGP permits policy-based routing which choose among multiple paths to a destination and control the redistribution of routing data. BGP-4 supports Classless Inter-Domain Routing (CIDR), which dispenses with network classes, as wells as route aggregation, including the aggregation of AS paths and supernetting. Describing BGP Messages BGP nodes exchange four types of messages, including Open, Update, Keepalive, and Notification. They are described as follows. Open After two BGP nodes are connected via TCP, they exchange BGP open messages to build a BGP link between them. Once the connection is set up, the nodes trade BGP messages and data traffic. Open messages consist of the BGP header as well as the following fields: 6-2 • Version: The current protocol version number of the message. The current BGP version number is 4. • Local AS number: Autonomous System number of the sender. Configuring the Border Gateway Protocol Overview • Hold time: Number of seconds that the sender proposes for the value of the Hold Timer. The hold time defines the interval that can elapse without the receipt of an Update or KeepAlive message before the peer is assumed to be disabled. • BGP identifier: IP address of the BGP node (Router ID). • Parameter field length and the parameter itself: Optional fields. Update BGP nodes send update messages to swap network reachability data between BGP peers. The nodes use this information to build a graph describing the relationships among all known ASs. Update messages comprise the BGP header plus the following optional fields: • Unfeasible routes length: Length of the field that lists the routes being withdrawn from service because they are judged no longer reachable. • Withdrawn routes: IP address prefixes for the routes being withdrawn from service. • Total path attribute length: Length of the field that lists the path attributes for a feasible route to a destination. • Path attributes: Properties of the routes, including the path origin, the multiple exit discriminator (MED), the originating node’s preference for the route, and data about aggregation, communities, confederations, and route reflection. • Network layer reachability information (NLRI): IP address prefixes of feasible routes being advertised in the update message. Keepalive BGP nodes exchange keepalive messages to learn whether a link or host is down or unavailable. Keepalive messages are exchanged often enough so that the hold timer does not expire. They consist only of the BGP header. When a link is initiated, BGP negotiates the hold time with the neighbor and selects the lesser interval. The keepalive timer is then set based on the negotiated hold and configured keepalive intervals with the XSR maintaining a hold interval that is three times the keepalive. You can reset the default keepalive interval with the timers bgp keep-alive command. If you set the variable to 0, keepalives will not be sent. Hold intervals cannot be configured. Notification BGP nodes send notification messages when an error condition is learned. After the message is sent, the BGP session and TCP connection between the BGP nodes are closed. Notification messages consist of the BGP header, the error code and subcode, and data that describes the error. Defining BGP Path Attributes BGP path attributes are defined as a set of parameters describing the traits of a path to a destination IP prefix. They are used extensively in the route selection process to select the best of multiple routes, and to build routing policies by matching and setting attributes. XSR User’s Guide 6-3 Overview AS Path The AS_PATH attribute, as shown in Figure 6-2, is the sequence of AS numbers a route has traversed to reach a destination. The AS that originates the route adds its own AS number when sending the route to its EBGP peers. Subsequently, each AS that receives the route and passes it on to other BGP peers will prepend its own AS number to the list. When the route is passed to a BGP speaker within the same AS (IBGP peer), the AS_PATH data remains intact. The final list represents all the AS numbers that a route has traversed with the AS number of the AS that originated the route all the way at the end of the list. BGP uses the AS_PATH attribute in its routing updates to ensure a loop-free topology on the Internet. If the route is advertised to the AS that originated it, that AS will see itself as part of the AS_PATH attribute list and will not accept the route. The attribute can be manipulated with the ip as-path access-list command. The match as-path command associates a route map’s aspath with a particular ACL. The set as-path command increases the length of the AS-path attribute for updates that meet the match conditions specified within a route map. Figure 6-2 AS Path List AS_PATH data is one of the attributes BGP considers to determine the best route to a destination. When comparing two or more different routes, if all other attributes are identical, a shorter path is always preferred. In case of a tie in AS_PATH length, other attributes are used in the decision. Origin The ORIGIN attribute indicates the origin of the routing update as follows: 6-4 • IGP: The prefix is internal to the originating AS. • EGP: The prefix was learned via some EGP. • INCOMPLETE: The prefix was learned by some other means, usually via redistribution or aggregation. Configuring the Border Gateway Protocol Overview BGP considers the ORIGIN attribute in its decision-making process to set a preference ranking among multiple routes. Namely, BGP prefers the path with the lowest origin type, where IGP is lower than EGP, and EGP is lower than INCOMPLETE. The attribute is configured with the set origin command. Next Hop The NEXT_HOP attribute is the next IP address used to reach a destination. Usually, BGP chooses the next hop automatically but in networks where BGP neighbors may not have direct access to all other neighbors on the same subnet, BGP's automatic next hop selection can result in broken routing. Use the neighbor next-hop-self command to disable automatic next-hop selection. It forces the BGP speaker to report itself as the next hop for an advertised route it advertised to a neighbor. Typically, this command prevents third-party next hops from being used on NBMA media such as Frame Relay. Next-hop is set on an outbound route map using the set ip next-hop command or the neighbor next-hop-self command depending on the granularity required. Local Preference The LOCAL_PREF attribute informs other peers within an AS of the originator's degree of preference for a particular route out of an AS (it influences egress traffic). The degree of preference given to a route is compared with that of other routes for the same destination with higher LOCAL_PREF values preferred, as shown in Figure 6-3. LOCAL_PREF is local to the AS, is traded between IBGP peers only; it is not advertised to EBGP peers. Refer to “BGP Community with Route Maps Examples” on page 6-26 for a configuration example. XSR User’s Guide 6-5 Overview Figure 6-3 6-6 Configuring the Border Gateway Protocol Local Preference Applied to Direct Egress Traffic from AS. Overview Weight Weight, as shown in Figure 6-4, and LOCAL_PREF attributes are similar except that weight is not exchanged between routers. It is significant only locally. Higher preference is accorded the route with a higher weight. Weight can be used to influence routes coming from different providers to the same router (one router with multiple connections to two or more providers). The attribute is configured with the set weight command. Figure 6-4 Weight Applied to Differentiate Between Routes from Multiple Sources Atomic Aggregate The XSR automatically sets the ATOMIC_AGGREGATE attribute if the aggregate that a BGP speaker distributes is selected as less specific than a route included with it. A route with this attribute cannot be de-aggregated (made more specific). Forwarding along such a route does not ensure that IP packets will actually cross only AS's listed in the route’s AS_PATH attribute. XSR User’s Guide 6-7 Overview Aggregator The AGGREGATOR attribute, as shown in Figure 6-5, is added by the BGP speaker that formed the aggregate route. It includes the AS and router ID of the BGP speaker that originated the aggregate prefix. It is commonly used for debugging purposes. Figure 6-5 Aggregate and Aggregator Attribute Multi-Exit Discriminator The MULTI_EXIT_DISC (MED) attribute, as shown in Figure 6-6, is applied to external (inter-AS) links to discriminate among multiple exit or entry points into the same neighboring AS (influencing ingress traffic). The MED informs external neighbors about the preferred path into an AS that has multiple entry points with the rule that a lower MED is the preferred path over a higher MED. Comparing MEDs is performed only among paths from the same AS by default but you can compare MEDs from different AS’s with the bgp always-compare-med command. Unlike the local preference attribute, the MED is exchanged between AS’s, but a MED that enters an AS does not leave the AS. When an update enters the AS with a certain MED, that value is used for decision-making within the AS. When BGP relays the routing update to another AS, the MED is reset to zero (unless the outgoing MED is set to a specific value). Unless otherwise specified, the XSR compares MEDs for paths from external neighbors occupying the same AS. MEDs from different AS’s typically are not comparable because the MED associated with a route usually indicates the AS internal topology. The set metric command specifies the MED of redistributed routes that match a specified route map; be aware that routes even lacking a MED value are set as well. You can penalize a path without a MED as the least desirable path available using the bgp bestpath missing-as-worst command. This path is assigned a value of infinity. 6-8 Configuring the Border Gateway Protocol Overview Figure 6-6 MED Applied to Direct Ingress Traffic Flow to an AS Community A BGP community, as shown in Figure 6-7, is defined as a group of destinations that share some common property and is not limited to one network or AS. Communities simplify routing policies by identifying routes based on a logical property rather than an IP prefix or AS number. A BGP speaker can then use this attribute along with others to control which routes to accept, prefer, and relay to other BGP neighbors. The XSR supports the following predefined communities based on the BGP COMMUNITIES attribute: • aa:nn - Advertise a particular AS and community number. • internet - Specifies the entire Internet community. • no-export - Do not advertise this route to an EBGP peer. • no-advertise - Do not advertise this route to any peer (internal or external). Based on one of the following values, the XSR supports BGP routing policies: • IP address • AS_PATH • COMMUNITIES Based on a shared common attribute, a community comprises multiple destinations. But, each destination can also belong to multiple communities. While you can specify which communities comprise a destination, all destinations belong to the default Internet community. By creating a community list, you control which routing data to accept, prefer, or distribute to other neighbors. A BGP speaker can set, append, or modify the community of a route when you XSR User’s Guide 6-9 Overview learn, advertise, or redistribute routes. When routes are aggregated, the resulting aggregate has a COMMUNITIES attribute that contains all communities from all the initial routes. Community lists form groups of communities for use in a route map’s match clause. Similar to ACLs, you can create a series of community lists where statements are checked until a match is found and when one statement is satisfied, the test is finished with the ip community-list community-list-number {permit | deny} community-number command. To configure the COMMUNITIES attribute and match clauses based on communities, refer to the match community-list and set community command descriptions in “BGP Community with Route Maps Examples” on page 6-26 and the XSR CLI Reference Guide. Although a COMMUNITIES attribute is not sent to a neighbor by default, you can specify the attribute be sent to the neighbor at an IP address with the neighbor {ip-address | peergroup-name} send-community command. Figure 6-7 6-10 Configuring the Border Gateway Protocol Application of Community Attribute Overview BGP Path Selection Process BGP routers usually consider multiple paths to a destination. The BGP best path selection process decides the optimal path to install in the IP routing table and use for forwarding traffic. Only routes that are synchronized, are free of AS loops and have a valid next-hop are considered in the selection process, as illustrated in Figure 6-8. Figure 6-8 BGP Path Selection Algorithm BGP Routing Policy The XSR employs Access Control Lists (ACLs), filter lists, community lists, route maps, regular expressions, and peer groups to implement BGP routing policy, (refer to Figure 6-9. These features are described in the following pages. Figure 6-9 BGP Routing Policy Process XSR User’s Guide 6-11 Overview Access Control Lists Access Control Lists (ACLs) are filters which permit or deny access to one or more IP addresses. ACLs generally apply to both route updates and packet filtering but with BGP, route update filtering is emphasized. Prefix-based ACLs control access by specifying which IP addresses are permitted or denied via the network prefix number. The XSR filters BGP advertisements as follows: • with AS-path filters using the ip as-path access-list and neighbor filter-list commands. • with ACLs using the neighbor distribute-list {access-list} {in | out} command. Routing data the XSR learns or advertises can be filtered by controlling BGP routing updates through ACLs applied to the updates. Note: Distribute-list filters are applied to network numbers, not AS paths. Filter Lists As-path filter lists control access by specifying which AS paths to permit or deny. They are configured with the ip as-path access-list {permit | deny} as-regularexpression command. To further filter BGP paths by neighbor, use the neighbor filter-list access-list-number {in | out} command. Community Lists Community lists control access by specifying which communities are permitted or denied. Community-based ACLs are configured with the ip community-list command. Route Maps Route maps act with BGP to control and modify routing data and define the conditions by which routes are redistributed between routing domains. Route maps are similar to ACLs in that they both have rules for matching packets and when matches are found, act to permit or deny the packet. Route maps are flexible and powerful in that they not only match, permit and deny, they also change route attributes. The XSR performs a match on AS-path, community, and network numbers for both incoming and outgoing updates with the match as-path, match community-list, and match ip address commands, respectively. You add a route map to in/outbound routes with the neighbor {ipaddress | peer-group-name} route-map {in | out} command. Refer to “BGP Community with Route Maps Examples” on page 6-26 for route-map examples. Each route map includes sets of instructions that include: • A permit or deny statement • A sequence number • An optional match clause • An optional set clause Route maps used with BGP can perform the following: • 6-12 Apply a weight to a specific route with set weight Configuring the Border Gateway Protocol Overview • Set community attributes for a specific route with set community • Set the origin for a specific route with set origin • Set the MED of a specific route with set metric • Set the local preference for a specific route with set local-preference • Set the AS-Path list for a specific route with set as-path • Set the dampening parameters for a specific route with set dampening • Set the next hop IP address for a specific route with set ip next-hop Regular Expressions Regular expressions commonly notate text string patterns. They specify rules for a set of strings you may want to match in a search. With BGP, regular expressions search AS paths to match a particular pattern and are especially useful in building complex policies. Regular expressions are evaluated from left to right in sequence with binary logic. A number denotes a literal numeral and AS number. Special characters denote position or operation within a string. Regular Expression Characters • 0 through 9 numerals are literals, used in any combination to represent an AS number • '^' marks the beginning of a path • '$' marks the end of a path • '{' marks the beginning of an AS_SET • '}' marks the end of an AS_SET • '(' marks the start of an AS_CONFED_SET or AS_CONFED_SEQ • ')' marks the end of an AS_CONFED_SET or AS_CONFED_SEQ To match AS numbers in an AS path, use any of the following expressions: – '.' Matches any valid AS number – '.*' matches 0 or more sequence or AS numbers – '.+' matches 1 or more of the sequence of AS numbers – '_' (underscore) matches 0 or 1 instance of any punctuation character – [ ] specifies a set of AS numbers or punctuation, for example, “[1234 45 6789]” or “[ {( ]”, all members of a set must be the same type, i.e. either AS numbers or punctuation – '-' is used within brackets to specify a range of AS numbers, for example “[23 - 45]” – '^' when used as the first item within brackets specifies any AS number except the set specified; for example, to specify any AS number other than 11 or 13 use “[^11 13]” Regular Expression Examples The following displays some common examples for matching AS paths using regular expressions with the show ip bgp regexp command. • Display all routes with a single AS number in the AS path: – show ip bgp “.” XSR User’s Guide 6-13 Overview • Display all routes with any AS path: – • Display all routes having at least two AS numbers in the AS path: – • show ip bgp “. .+“ Display all routes that traversed AS number 600: – • show ip bgp “.*” show ip bgp “.* 600 .*” Display all routes with beginning with AS number 300 and ending with AS number 800 in the AS path: – show ip bgp “^300 .* 800$” Peer Groups A BGP peer group is a set of BGP neighbors sharing update policies. Rather than define similar policies for each individual neighbor, you can define a peer group and assign policies to the peer group itself. If you modify options for the peer group, all members of the peer group inherit the changes. You can also configure individual members to override those options that do not effect outbound updates. Peer-groups are comprised of either IBGP or EBGP members. IBGP group members must be in the same AS as the peer-group, which itself must be in the same AS as the router. On the other hand, when you create an EBGP peer-group, an AS number is not associated with the peer-group and all peer-group members must belong to an AS other than the AS set for the router. Do not mix IBGP and EBGP members in the same peer-group. Members of an EBGP group can be from different ASs. A peer can belong to a single peer-group only. A BGP peer group is configured by: • Creating the peer group • Assigning Options • Adding neighbors A BGP peer or peer group can be disabled without deleting all settings with the neighbor shutdown command. Creating a Peer Group Create a BGP peer group and add a neighbor to it with the neighbor peer-group command. Assigning Peer Group Options A peer group is set with neighbor commands. Peer group members inherit all group options as well as subsequent changes by default. They can also be configured to override those options not pertinent to outbound updates. Members of a peer group always inherit these attributes: remote-as (if configured), updatesource, neighbor filter-list, advertisement-interval, and next-hop-self. You can set options for an particular neighbor by using any of the following commands with an IP address. If you want to configure options for a peer group, configure any of the commands employing the peer group name. • 6-14 Configure a BGP neighbor: neighbor remote-as number Configuring the Border Gateway Protocol Overview • Permit a local BGP speaker to send the default route 0.0.0.0 to a neighbor as the default route: neighbor default-originate • Configure the COMMUNITIES attribute to be sent to the neighbor at this IP address: neighbor send-community • Permit interior BGP sessions to use any working interface for TCP links: neighbor updatesource interface • Permit BGP sessions, even when the neighbor is not on a directly connected segment: neighbor ebgp multihop • Specify the minimum interval between BGP routing update transmissions: neighbor advertisement-interval seconds • Configure MD5 authentication on a TCP link to a BGP peer: neighbor password . For an example, refer to “TCP MD5 Authentication for BGP Example” on page 6-25. • Specify BGP routing updates to/from neighbors, as detailed in an ACL: neighbor distribute-list {ACL#}{in | out} • Set up a BGP filter: neighbor filter-list ACL# {in | out} • Disable next-hop processing on BGP updates to a neighbor: neighbor next-hop-self • Assign a route map to in or outbound routes: neighbor route-map map-# {in | out} • Set the XSR to begin storing received updates: neighbor soft-reconfiguration inbound • Disable a BGP neighbor or peer group: neighbor shutdown. Conversely, you can enable a previously existing neighbor or neighbor peer group that was disabled with no neighbor shutdown For configuration examples, refer to “Configuring BGP Peer Groups” on page 6-25. Initial BGP Configuration Begin BGP configuration by enabling BGP routing: • Enable a BGP Routing process and acquire Router Configuration mode: router bgp • Mark a “local” network in this AS, adding it as an entry in the BGP Routing table: network mask Adding BGP Neighbors Adding neighbors to a BGP network is fundamental to building a BGP environment. You can add internal neighbors (those inside an AS) or external neighbors (those in other AS’s). Usually, external neighbors are next to each other and share a subnet while internal neighbors may be situated anywhere in the same AS. The process on the XSR is as follows: • Add a BGP network: network mask • Add a BGP neighbor: neighbor remote-as For an example, refer to “Configuring BGP Neighbors” on page 6-23. Resetting BGP Connections If you alter any BGP configuration values that you have defined for BGP neighbors, you must reset that BGP connections for the configuration change to take effect. • Reset one or more BGP connections: clear ip bgp address XSR User’s Guide 6-15 Overview Synchronization When an AS provides transit service to other ASs and if there are non-BGP routers in the AS, transit traffic might be dropped if the intermediate non-BGP routers have not learned routes for that traffic via an IGP. BGP synchronization, which is enabled on the XSR by default, stipulates that a BGP router should not advertise to external neighbors destinations learned from IBGP neighbors unless those destinations are also known via an IGP. If a router is so informed, it assumes that the route has already been propagated inside the AS, and internal reachability is guaranteed. Synchronization can be disabled with the no synchronization command if either of the following conditions pertain: • Your AS does not pass traffic from one AS to another AS. • All the transit routers in your AS run BGP. Address Aggregation BGP routing tables are likely to include thousands of entries so maintaining and updating a large table can prove processor intensive. BGP counters this problem by enabling specific networks to be consolidated into aggregate routes, thus reducing the size of the BGP routing table. They can be configured either by redistributing an aggregate route into BGP or by using the conditional aggregation options described below. The XSR adds an aggregate address to the BGP table if there is at least one more specific entry there. The aggregate-address command adds an aggregate address to the routing table with the following options: • Adds an aggregate entry to the BGP routing table: • Generates AS set path data: [as-set] • Advertises summary addresses only: [summary-only] • Creates an aggregate reflecting values configured in the route map: [advertise-map] • Creates an aggregate with route map parameters: [attribute-map] Route Flap Dampening Routes flap or oscillate when a route is advertised and then withdrawn, or a route is withdrawn and re-advertised in rapid succession. EBGP flapping causes global churn in the routing table, because as the flap ripples across the Internet each router must process the routing data change. IBGP flapping engenders irregular traffic flow and reachability problems within the local AS, and can affect EBGP stability if IBGP routes are advertised to EBGP peers. On the XSR, rapid flapping can cost significant CPU cycles spent on processing the routing updates. From the network perspective, route flapping usually indicates a problem, such as a circuit going up and down, or fatal recurring errors between BGP peers. Route flap dampening is a reactive measure available to prevent route flaps from propagating across an internetwork by selectively suppressing route advertisement. Based on the premise that past can suggest future behavior, dampening penalizes malfunctioning routes and advertises stable routes with minimal delay. This does not preclude the likelihood of some route flapping though, since updates reflect normally occurring changes on the Internet. So, reasonable routing changes should not be penalized; that is, one flap within a few minutes does not necessarily indicate a problem, but five flaps within a few minutes probably does. When you enable this functionality with the bgp dampening command, the XSR collects statistics about the prefix announcements and withdrawals. If a threshold of the number of pairs of withdrawals/announcements (flaps) is exceeded in a given period (the cutoff threshold), the 6-16 Configuring the Border Gateway Protocol Overview prefix is suppressed for a calculated period (a penalty) which is further incremented with every subsequent flap. The penalty is then decremented by a half-life value until the penalty is below a reuse threshold. So, if stable for a certain period, the hold-down is released from the prefix and the route is reused and re-advertised. You can reset dampening defaults with the bgp dampening [half-life | reuse | suppress | suppress-max][route-map route-map-#] command. Dampening should only be used for EBGP peering at network boundaries, so that flapping can be suppressed as close to the unstable source as possible. Recommendations for Route Flap Dampening We recommend you configure the following dampening values with harsher treatment for /24 and longer prefixes: • Do not start dampening before the fourth straight flap: set the suppress value to 3000 • Figure prefixes of /24 and longer as follows: maximum = minimum outage of 60 minutes • Calculate prefixes /22 and /23 as follows: maximum outage of 45 minutes but potential for less because of half-life value - minimum of 30 minutes outage • Set all other prefixes as follows: maximum outage - 30 minutes, minimum outage - 10 minutes If a specific dampening implementation does not allow configuration of prefix-dependent values, use the softest set as follows: • Do not start dampening before the fourth flap in a row with a maximum outage of 30 minutes, and minimum outage of 10 minutes After dampening a route, you can display related data, including the interval before it will be unsuppressed with the show ip bgp dampened-paths command. Capability Advertisement BGP4 requires that when an OPEN message is received with one or more unrecognized optional parameters, BGP peering terminate. To address this issue, capability advertisement allows the graceful introduction of new capabilities without requiring that peering be terminated. This is achieved through a new optional parameter in the OPEN message - capabilities - which lists the capabilities supported by the speaker. Route Refresh When an inbound routing policy for a peer changes, all prefixes from that peer must be made available and then re-examined against that new policy. This can be performed by: • Resetting the BGP session with the neighbor. This invalidates the cache, adversely affecting network operation. • Performing soft reconfiguration which stores an unmodified copy of all routes from a particular peer at all times by using the neighbor soft-reconfiguration inbound command. This reconfiguration activates policies without actually clearing the BGP policy but imposes a higher memory cost. The XSR’s route refresh capability offers an alternative by introducing the dynamic exchange of a route refresh request message between BGP peers. Receiving this request from a peer causes the subsequent re-advertisement of all outbound prefixes that satisfy outbound policy constraints to that peer. XSR User’s Guide 6-17 Overview Scaling BGP BGP requires that all BGP speakers with a single AS (IBGP) be fully meshed, as shown in Figure 610. The result is that for any BGP speakers within an AS, the number of unique BGP sessions required is determined by the following formula: n x (n-1)/2. Be aware that this fully meshed requirement does not scale when a large number of IBGP speakers occupy the AS. Figure 6-10 Fully Meshed BGP As an example, when an AS contains five routers as shown above, the number of BGP sessions needed is 10, as set by the equation: 5 x (5-1)/2 = 10. 6-18 Configuring the Border Gateway Protocol Overview Route Reflectors Route reflectors are an alternative to the requirement of a fully meshed network within an AS, as illustrated in Figure 6-11. This approach allows a BGP speaker (known as a route reflector) to advertise IBGP learned routes to certain IBGP peers. This is a variation from the standard IBGP behavior of not re-advertising IBGP-learned routes to other IBGP speakers. But, if this rule is relaxed, the number of IBGP sessions can be greatly reduced. This functionality is configured with the neighbor route-reflector-client command. Figure 6-11 Route Reflector Applied to Minimize IBGP Mesh As there are route reflector- compliant BGP speakers, some BGP speakers may not comply with route reflector behavior. They can be either client or non-client group members. This situation does not prohibit configuring reflectors, though. At first, you can configure one cluster with a route reflector and some clients. You can consider all other IBGP speakers non-client peers to the route reflector and add more clusters. More than one route reflector can be associated with an AS. As such, a route reflector treats other reflectors similar to other IBGP speakers and it can be configured to include other reflectors in a client or non-client group. A rudimentary scenario would divide the backbone into multiple clusters and each route reflector configured with other route reflectors as non-client peers (fully meshing all reflectors). Clustered clients would be set up to keep IBGP sessions going with only the reflector within. XSR User’s Guide 6-19 Overview It is typical for a client cluster to have one route reflector and be identified by the reflector’s router ID. If you want greater redundancy and wish to avoid a single point of failure, you can add more than one reflector to a cluster. This is accomplished by configuring all cluster route reflectors with the 4-byte cluster ID so that a reflector can recognize updates from other reflectors within that cluster. All reflectors serving a cluster should be fully meshed and share identical client and nonclient peer groups. For clusters with multiple route reflectors, specify the cluster ID with the bgp cluster-id command A route reflector’s clients, by default, need not be fully meshed so a client’s routes are reflected to others. But if clients are fully meshed, the route reflector need not reflect routes to clients and you can disable client-to-client route reflection with the no bgp client-to-client reflection command. To avoid routing data loops, which may arise from reflected IBGP learned routes, the XSR supports the following options: • Originator-ID, a 4-byte attribute created by a route reflector. This automatically generated attribute holds the router ID of the route’s originator in the local AS. If a misconfiguration causes routing data to bounce back to the originator, the data is dropped. • Cluster-list is an optional BGP attribute configured with the bgp cluster-id command. It is a series of cluster IDs the route has passed. When a route reflector reflects a route from its clients to non-client peers, it appends the local cluster ID to the cluster-list, and if empty, it creates a new ID. With this attribute, a reflector can determine if routing data is mistakenly looped back to the same cluster. If the local cluster ID is found in the cluster-list, the advertisement is dropped. • Set clauses employed in outbound route maps change attributes and risk routing loops. The XSR avoids this by ignoring these set clauses for routes reflected to IBGP peers. Confederations Confederations are another alternative to the fully meshed requirement within an AS, as shown in Figure 6-12. This is accomplished by dividing an AS with a host of BGP speakers into smaller domains or confederations and the peers in different AS’s swapping routing data as if they were EBGP peers. By subdividing a larger AS, the number of intra-domain BGP connections are greatly reduced but the network still appears as a single AS to its external EBGP peers. Confederations require a confederation identifier (an AS number) for what will appear as a single AS to exterior networks; it is set with the bgp confederation identifier command. Neighbors from other AS’s within the confederation are marked as special EBGP peers with the bgp confederation peers command. For an example, refer to “Configuring BGP Confederations” on page 6-24. Alternatively, you can also downsize the IBGP mesh with route reflectors, described on page 6-19. 6-20 Configuring the Border Gateway Protocol Overview Figure 6-12 Figure 12 Use of Confederations to Reduce IBGP Mesh Confederation AS-3 Sub AS-302 IBGP XSR A EBGP XSR B Peer using Sub-AS numbers XSR C IBGP IBGP IBGP XSR E XSR D Sub AS-301 EBGP Peer using real AS numbers AS-4 XSR F Displaying System and Network Statistics The XSR supports BGP statistical displays such as routing table entries, caches, and databases. The XSR can also show data about node accessibility and the path packets take through the network. The XSR offers the following BGP show commands: • Show BGP routing table entries: show ip bgp • Show routes within communities: show ip bgp community • Show routes sanctioned by a community list: show ip bgp community-list • Show paths suppressed due to dampening: show ip bgp dampened-list • Show routes matched by the AS path ACL: show ip bgp filter-list • Show routes with conflicting originating ASs: show ip bgp inconsistent-as • Show data on a neighbor’s TCP and BGP links: show ip bgp neighbors XSR User’s Guide 6-21 Configuring BGP Route Maps • Show BGP peer group data: show ip bgp peer-group • Show routes matching regular AS path expressions: show ip bgp regexp • Show summary BGP neighbor status: show ip bgp summary Configuring BGP Route Maps The following example illustrates the use of a route map to modify inbound data from a neighbor. Any route received from 192.168.10.1 matching the filter values set in AS ACL 110 will be permitted with its weight set to 55 and its local preference set to 60. Note the use of regular expressions. XSR(config)#router bgp 1 XSR(config-router)#neighbor 192.168.10.1 route-map 55 in XSR(config-router)#neighbor 192.168.10.1 remote-as 1 XSR(config-router)#route-map 55 permit 5 XSR(config-route-map)#match as-path 110 XSR(config-route-map)#set local-preference 60 XSR(config-route-map)#set weight 55 XSR(config-route-map)#ip as-path access-list 110 permit ^650$ XSR(config-route-map)#ip as-path access-list 110 permit ^700 In the following example, route map 99 marks all paths originating from AS 57 with a MED metric attribute of 99. The second permit clause is needed so that routes not matching AS path list 1 will all be relayed to neighbor 192.168.10.1. XSR(config)#router bgp 1 XSR(config-router)#neighbor 192.168.10.1 route-map 99 out XSR(config)#exit XSR(config)#ip as-path access-list 1 permit ^57_ XSR(config)#ip as-path access-list 2 permit .* XSR(config)#router bgp 1 XSR(config-router)#route-map 99 permit 5 XSR(config-route-map)#match as-path 1 XSR(config-route-map)#set metric 99 XSR(config-route-map)#route-map 99 permit 10 XSR(config-route-map)#match as-path 2 BGP correctly does not accept any AS path not matching the match clause of the route map. This means that you will not set the metric and the XSR will not accept the route. But, you can configure the router to accept AS paths not matched in the match clause of the route map command by using multiple maps of the same name, some without accompanying set commands. XSR(config-router)#route-map 44 permit 8 XSR(config-route-map)#match as-path 1 XSR(config-route-map)#set local-preference 3 XSR(config-route-map)#route-map 44 permit 12 XSR(config-route-map)#match as-path 2 In the following example, route map 77 is assigned to outgoing updates for neighbor 192.168.57.4. Route map 77 will prepend AS path 100 to routes that pass ACL 12. The remaining route map configuration allows other routes to be advertised. XSR(config)#router bgp 33 XSR(config-router)#network 230.57.10.0 XSR(config-router)#network 231.57.10.0 6-22 Configuring the Border Gateway Protocol Configuring BGP Route Maps XSR(config-router)#neighbor 192.168.57.4 remote-as 200 XSR(config-router)#neighbor 192.168.57.4 route-map 77 out XSR(config-router)#route-map 77 5 permit XSR(config-route-map)#set as-path prepend 100 XSR(config-route-map)#match ip address 12 XSR(config-route-map)#route-map 77 15 permit XSR(config-route-map)#match ip address 2 XSR(config-route-map)#access-list 2 permit any XSR(config-route-map)#access-list 12 permit 230.57.10.0 0.255.255.255 XSR(config-route-map)#access-list 12 permit 231.57.10.0 0.255.255.255 XSR(config-route-map)#access-list 12 permit 0.0.0.0 255.255.255.255 Incoming route-maps can perform prefix-based matching and set various update values. Inbound prefix matching is provided in addition to as-path and community-list matching. In the following example, the set local preference command sets the local preference of the inbound prefix 230.57.5.0/16 to 95. XSR(config)#router bgp 13 XSR(config-router)#network 192.168.0.0 XSR(config-router)#neighbor 192.168.1.1 remote-as 47 XSR(config-router)#neighbor 192.168.1.1 route-map 33 in ! XSR(config-router)#route-map 33 permit 5 XSR(config-route-map)#match ip address 2 XSR(config-route-map)#set local preference 95 XSR(config-route-map)#route-map 33 permit 9 XSR(config-route-map)#access-list 2 permit 230.57.5.0 XSR(config-route-map)#access-list 20.255.255.255 access-list 2 deny any Configuring BGP Neighbors This example configures a BGP router for AS 33 including two originating networks and three remote XSR’s. The XSR at AS 33 will share data about networks 125.99.0.0 and 192.168.57.0 with its neighbors. The first router listed exists in a different AS; the second is an internal neighbor (AS 33) at address 125.99.28.2; and the third neighbor also exists on a different AS. Note that the inside BGP neighbor is not directly linked to XSR A. External neighbors (in AS 22 and AS 44) must be linked directly to Router A. XSR(config)#router bgp 33 XSR(router-config)#network 125.99.0.0 XSR(router-config)#network 192.168.57.0 XSR(router-config)#neighbor 125.99.27.1 remote-as 22 XSR(router-config)#neighbor 125.99.28.2 remote-as 33 XSR(router-config)#neighbor 212.106.53.9 remote-as 44 BGP Path Filtering by Neighbor Example This example configures BGP path filtering by neighbor where only routes permitted by as-path ACL 2 will be sent to 192.168.57.69. In the same fashion, only routes passing ACL 3 will be permitted from 192.168.57.69. XSR(config)#router bgp 7 XSR(config-router)#neighbor 192.168.57.69 remote-as 100 XSR User’s Guide 6-23 Configuring BGP Route Maps XSR(config-router)#neighbor 192.168.57.69 filter-list 3 out XSR(config-router)#neighbor 192.168.57.69 filter-list 2 in XSR(config-router)#exit XSR(config)#ip as-path access-list 1 permit _102_ XSR(config)#ip as-path access-list 2 permit _200$ XSR(config)#ip as-path access-list 2 permit ^100$ XSR(config)#ip as-path access-list 3 deny _440$ XSR(config)#ip as-path access-list 3 permit .* BGP Aggregate Route Examples The following examples describe how to use aggregate routes in BGP either by redistributing an aggregate route into BGP or by using the conditional aggregate routing feature. In the next example, redistribute aggregate route 192.*.*.*: XSR(config)#ip route 192.0.0.0 255.0.0.0 null 0 XSR(config)#router bgp 57 XSR(config-router)#redistribute static In the following example, add an aggregate entry in the BGP routing table when at least one route falls into the specified range. The XSR will advertise this route as originating from your AS and has the atomic aggregate attribute set to indicate data may be lost. (By default, atomic aggregate is set unless you use the as-set keyword in the aggregate-address command.) XSR(config)#router bgp 57 XSR(config-router)#aggregate-address 192.0.0.0 255.0.0.0 Next, you add an aggregate entry using similar rules as in the previous example, but the path advertised for this route will be an AS_SET consisting of all elements within all paths being summarized: XSR(config)#router bgp 57 XSR(config-router)#aggregate-address 192.0.0.0 255.0.0.0 as-set The last example adds an aggregate route for 192.*.*.* and suppresses advertisements of more specific routes to all neighbors: XSR(config)#router bgp 23 XSR(config-router)#aggregate-address 192.0.0.0 255.0.0.0 summary-only Configuring BGP Confederations The following example configures a confederation comprised of three internal AS’s with AS numbers 1, 2, and 3. To BGP speakers outside the confederation, the confederation appears to be a standard AS with AS number 20 (set with the bgp confederation identifier command). In a BGP speaker in AS 1, mark the peers from AS’s 2 and 3 as special EBGP peers with the bgp confederation peers command. Peers 192.168.57.5 and 192.168.57.6 then will get the localpreference, next-hop and MED unchanged in updates. The router at 130.32.32.1 is a standard EBGP speaker and the updates it gets from this peer will be similar to a standard EBGP update from a peer in AS 20. XSR(config)#router bgp 1 XSR(config-router)#bgp confederation identifier 20 XSR(config-router)#bgp confederation peers 2 3 XSR(config-router)#neighbor 192.168.57.5 remote-as 2 XSR(config-router)#neighbor 192.168.57.6 remote-as 3 6-24 Configuring the Border Gateway Protocol Configuring BGP Peer Groups XSR(config-router)#neighbor 130.32.32.1 remote-as 37 In a BGP speaker in AS 2, configure the peers from AS’s 1 and 3 as special EBGP peers. Node 191.169.57.1 is a standard IBGP peer and 131.21.12.2 is a standard EBGP peer from AS 30. XSR(config)#router bgp 2 XSR(config-router)#bgp confederation identifier 20 XSR(config-router)#bgp confederation peers 1 3 XSR(config-router)#neighbor 191.169.57.1 remote-as 2 XSR(config-router)#neighbor 192.168.57.7 remote-as 1 XSR(config-router)#neighbor 192.168.57.6 remote-as 3 XSR(config-router)#neighbor 132.21.12.2 remote-as 30 In a BGP speaker in AS 3, specify the peers from AS’s 1 and 2 as special EBGP peers. Node 132.123.31.20 is a standard EBGP peer from AS 53. XSR(config)#router bgp 3 XSR(config-router)#bgp confederation identifier 20 XSR(config-router)#bgp confederation peers 1 2 XSR(config-router)#neighbor 192.168.57.7 remote-as 1 XSR(config-router)#neighbor 192.168.57.5 remote-as 2 XSR(config-router)#neighbor 132.123.31.20 remote-as 53 The following example is a partial configuration from BGP speaker 132.123.31.23 from AS 53. Neighbor 192.168.57.5 is set up as a normal EBGP speaker from AS 45. Interior division of the AS into multiple AS’s is unknown to peers outside the confederation. XSR(config)#router bgp 53 XSR(config)#neighbor 192.168.57.5 remote-as 45 XSR(config-router)# 132.123.31.23 remote-as 53 TCP MD5 Authentication for BGP Example The following example configures the XSR and its BGP peer at 192.168.57.5 perform MD5 authentication on their TCP link: XSR(config)#router bgp 99 XSR(config-router)#neighbor 192.168.57.5 password 7&%kdeuj Configuring BGP Peer Groups This section details IBGP and an EBGP peer group examples. IBGP Peer Group Example Peer group IBGP comprises IBGP neighbors in this example. An IBGP peer group is stipulated by definition because the same AS is set by the router bgp and neighbor remote-as commands, AS 15). All peer group members share loopback 0 as the update source and route-map 3 as the outbound route-map. Also, except for the neighbor at address 192.168.57.5, all the neighbors have filter-list 2 as the inbound filter list. XSR(config)#router bgp 15 XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor IBGP IBGP IBGP IBGP peer-group remote-as 15 update-source loopback 0 route-map 3 out XSR User’s Guide 6-25 Configuring BGP Peer Groups XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor IBGP filter-list 1 out IBGP filter-list 2 in 192.168.57.3 peer-group IBGP 192.168.57.4 peer-group IBGP 192.168.57.5 peer-group IBGP 192.168.57.5 filter-list 3 in EBGP Peer Group Example Peer group EBGP in this example is defined not using the neighbor remote-as command, rendering it an EBGP peer group by definition. Each peer group member is supplied with its respective AS number separately so the peer group is composed of members from AS’s 25, 35, and 45. All peer group members have route map 5 as an outbound route map and filter-list 4 as an outbound filter list and all share incoming filter list 57 except neighbor 192.168.57.10. XSR(config)#router bgp 13 XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor XSR(config-router)#neighbor external-peers peer-group external-peers route-map 5 out external-peers filter-list 4 out external-peers filter-list 57 in 192.168.57.2 remote-as 25 192.168.57.2 peer-group external-peers 192.168.57.9 remote-as 35 192.168.57.9 peer-group external-peers 192.168.57.10 remote-as 45 192.168.57.10 peer-group external-peers 192.168.57.10 filter-list 45 in BGP Community with Route Maps Examples This section illustrates three examples of BGP communities with route maps. First, route map 111 is applied to outgoing updates for neighbor 192.168.57.50. The routes that pass ACL 1 share the no-export community attribute while other routes are advertised as usual. This community value automatically bars BGP speakers in AS 20 from advertising those routes. XSR(config)#router bgp 10 XSR(config-router)#neighbor 192.168.57.50 remote-as 20 XSR(config-router)#neighbor 192.168.57.50 send-community XSR(config-router)#neighbor 192.168.57.50 route-map 111 out XSR(config-router)#route-map 111 10 permit XSR(config-route-map)#match ip address 1 XSR(config-route-map)#set community no-export XSR(config-route-map)#route-map 111 20 permit XSR(config-route-map)#match ip address 2 Secondly, route map 111 is matched with outgoing updates for neighbor 192.168.57.90. All routes originating from AS 7 have the community values 50 50 added to their existing values with other routes advertised as usual. XSR(config)#router bgp 20 XSR(config-router)#neighbor 192.168.57.90 remote-as 10 6-26 Configuring the Border Gateway Protocol Configuring BGP Peer Groups XSR(config-router)#neighbor 192.168.57.90 send-community XSR(config-router)#neighbor 192.168.57.90 route-map 111 out XSR(config-router)#neighbor route-map 111 10 permit XSR(config-route-map)#match as-path 1 XSR(config-route-map)#set community 50 50 additive XSR(config-route-map)#route-map 111 20 permit XSR(config-route-map)#match as-path 2 XSR(config-route-map)#ip as-path access-list 1 permit 7$ XSR(config-route-map)#ip as-path access-list 2 permit .* Thirdly, community-based matching selectively sets MED and local-preference values for neighbor 192.168.57.55’s routes. All the routes that match community list 1 get a MED of 60 including any with communities 10 20 30 or 90 91. These routes may have other community parameters too. A local preference of 30 is set for all routes that pass community list 2 including those with community values 8 or 9. If the routes belong to any other community, no matching by community list 2 is done. A local preference of 40 is set for all routes matching community list 3 which matches all the routes because they are members of the Internet community. So, the remainder of neighbor 192.168.57.55’s routes get local preference 40. XSR(config)#router bgp 20 XSR(config-router)#neighbor 192.168.57.55 remote-as 10 XSR(config-router)#neighbor 192.168.57.55 route-map 101 in XSR(config-router)#route-map 101 10 permit XSR(config-route-map)#match community-list 1 XSR(config-route-map)#set metric 60 XSR(config-route-map)#route-map 101 20 permit XSR(config-route-map)#match community-list 2 XSR(config-route-map)#set local-preference 30 XSR(config-route-map)#route-map 101 30 permit XSR(config-route-map)#match community-list 3 XSR(config-route-map)#set local-preference 40 XSR(config-route-map)#exit XSR(config)#ip community-list 1 permit 10 20 30 XSR(config)#ip community-list 1 permit 90 91 XSR(config)#ip community-list 2 permit 8 XSR(config)#ip community-list 2 permit 9 XSR(config)#ip community-list 3 permit internet Route map 55 is applied to the outgoing updates for neighbor 192.168.57.50 in this example. Routes that pass ACL 1 have the special community attribute value local-as, with other routes advertised as usual. Local-as automatically prevents BGP speakers outside AS 20 from advertising those routes. XSR(config)#router bgp 23 XSR(config-router)#network 1.0.0.0 mask 255.0.0.0 XSR User’s Guide 6-27 Configuring BGP Peer Groups XSR(config-router)#bgp confederation identifier 100 XSR(config-router)#bgp confederation peer 10 20 30 XSR(config-router)#neighbor 192.168.57.50 remote-as 15 XSR(config-router)#neighbor 192.168.57.50 route-map 55 out XSR(config-router)#neighbor 192.168.58.2 remote-as 10 XSR(config-router)#route-map 55 permit 10 XSR(config-route-map)#match ip address 1 XSR(config-route-map)#set community local-as In the final example, confederation 100 holds three AS’s: 10, 20, and 30. For network 2.0.0.0, the command route map set-no-export specifies that the routes advertised have the community attribute “no-export.” XSR(config)#router bgp 20 XSR(config-router)#bgp confederation identifier 100 XSR(config-router)#bgp confederation peer 10 20 30 XSR(config-router)#network 2.0.0.0 mask 255.0.0.0 XSR(config-router)#neighbor 192.168.57.1 remote-as 10 XSR(config-router)#neighbor 192.168.57.1 route-map 29 out XSR(config-router)#set community no-export 6-28 Configuring the Border Gateway Protocol 7 Configuring PIM-SM and IGMP This chapter describes Protocol Independent Multicast - Sparse Mode (PIM-SM) and Internet Group Management Protocol (IGMP) configuration. Features The XSR supports the following IGMP/PIM features: • IGMP versions 1, 2 and 3 (on LAN interface only) • PIM-SM version 2 • Static IGMP group membership • Dynamic RP (BootStrap without Admin Scope Zone support) • Static RP • Register Mechanism • Rendezvous Point Tree (RPT) Build-up • Shortest Path Tree (SPT) Build-up • RPT to SPT Switch • Assert Mechanism • Join/Prune Mechanism • Source Specific Multicast (SSM) Support • Multicast over GRE tunnel Differences with Industry-Standard Approach The XSR’s implementation of IGMP differs from the industry-standard approach as follows: • The XSR stipulates the RFC-3376 default Query interval of 125; the industry-standard value is 60. • The XSR supports dynamic learning of the robust value and query interval from the received query message, as stipulated by RFC-3376, while the industry-standard router does not. The XSR also supports static configuration and the latest value, either learned dynamically or statically configured, will overwrite the previous value. The XSR’s implementation of PIM-SM differs from the industry-standard approach as follows: • When sending a Register packet, the XSR calculates the checksum of the Register packet header only, in keeping with the RFC-2236 requirement. The industry-standard router XSR User’s Guide 7-1 IP Multicast Overview calculates the checksum based on the whole Register packet including the data portion. When the XSR receives a Register packet, it accepts both partial and whole checksum methods. • The XSR permits configuration of the CRP value and sets the default priority value to 192, as required by the RFC. The industry-standard router uses a CRP of 0 - the highest priority - as the default value, and offers no command to change the priority value. IP Multicast Overview IP Multicast reduces traffic by simultaneously delivering a single stream of data to thousands of recipients. It is especially useful for video conferencing and corporate communications where traffic is significantly reduced. IP Multicast traffic begins at its source with a single copy. Packets then flow down a Multicast Distribution Tree (MDT) and are replicated by routers in the network where branches split. The alternative approach requires a source to send multiple copies of the same data but traffic consumption can become unwieldy when the number of receivers grows. Since many duplicates share the same common path, it is sensible to send a single copy over this path and duplicate packets only when necessary. The IP multicast architecture is distinguished by these components: multicast group management, multicast routing, and multicast traffic forwarding. • Multicast group management records current users desirous of getting traffic addressed to a particular multicast group. PIM users or hosts have the flexibility to join or quit a multicast group at any time. IGMP operates within IPv4 networks for this purpose and IGMP version 3 users or hosts can specify the multicast group as well as the sources from which they want to receive particular multicast traffic. • Multicast routing (MR) generates and maintains a loop-free multicast distribution tree for each multicast group over which multicast traffic flows. Further, the multicast routing module interacts with multicast group management such that when users or hosts want to join a group, the MR module will build a new or update an existing distribution tree to include them. DVMRP, PIM-DM and PIM-SM function for this purpose. • Multicast traffic forwarding duplicates and forwards traffic according to the MDT for a particular multicast group. Defining Multicast Group Addressing IP multicast traffic is recognized by destination IP addresses within the Class D address range. Each IP multicast address represents a multicast group. IPv4 multicast addresses are assigned directly by the Internet Assigned Numbers Authority (IANA). The current assignment of the IPv4 multicast addresses is located in RFC-3171. Some address ranges within Class D are reserved for special multicast services, such as the following. 7-2 • IP addresses ranging from 224.0.0.0 to 239.255.255.255 (Class D addresses) are designated multicast addresses. • A multicast IP packet reaches a subset of all hosts on the network which have expressed an interest in the multicast group address. • Addresses between 224.0.0.0 and 224.0.0.255 are reserved as link local addresses for use by network protocols on a local network segment and are never forwarded by any router. • Addresses between 224.0.1.0 and 238.255.255.255 can be delivered throughout the Internet. Configuring PIM-SM and IGMP IP Multicast Overview • Addresses between 239.0.0.0 and 239.255.255.255 should not be forwarded beyond an organization's intranet. • Addresses between 232.0.0.0 and 232.255.255.255 are set aside especially for a Source-Specific Multicast service (SSM). IP multicast enables multiple hosts to receive packets wrapped with the same MAC address: the IP multicast addresses are mapped directly into MAC addresses. In turn, network interface cards can receive packets destined to different MAC addresses. The MAC address range from 0100.5e00.0000 through 0100.5e7f.ffff is the available range of Ethernet MAC addresses for IP multicast. The mapping rule for Ethernet is to place the lower 23 bits of the IP multicast group address into these available 23 bits in the Ethernet address. For example, the MAC address on Ethernet for IP multicast group 226.129.1.1 is 0100.5e01.0101, as illustrated in Figure 7-1. Figure 7-1 Sample IP Multicast Address Mapped to MAC Address 226. 10000001 00000001 00000001 23 bits 0100.5e 00000001 00000001 00000001 Outlining IGMP Versions IGMP allows hosts and routers to report their IP multicast group memberships to neighboring multicast routers. In some circumstances, an IP multicast router may itself be a member of one or more multicast groups, in which case it performs both the multicast router role (to collect membership data) and the group member role (to inform itself and other neighboring multicast routers of its memberships). Presently, three versions of IGMP exist: • IGMPv1(RFC-1112) was the first widely-deployed version and the first to become an Internet standard. It is supported on Windows 95. • IGMPv2 (RFC-2236) added support for low leave latency, that is, a reduction in the period between the moment the last host leaves a group and when the routing protocol is notified that there are no more members). It also allows tuning the burstiness of IGMP traffic on a subnet. This version is supported on the latest service pack for Windows, newer Windows releases, and most UNIX systems. • IGMPv3 (DRAFT-IETF-IDMR-IGMP-V3-07) added support for source filtering, permitting a system to report interest in receiving packets only from a specific source addressed, or from all but specific source addresses, sent to a particular multicast address. It is supported on FreeBSD patch, Linux patch, and Windows XP. Comparing Multicast Distribution Trees To reach packet receivers, multicast packets flow through Multicast Distribution Trees (MDTs) which are created by multicast-capable routers residing between the source and its receivers. Multicast group members can join or leave at any time, so distribution trees are dynamically updated. When all active receivers on a particular branch stop requesting traffic for a particular multicast group, the routers prune that branch from the distribution tree and stop forwarding it traffic. If one receiver on that branch later becomes active requesting multicast traffic, the router will modify the distribution tree on the fly and start re-forwarding traffic. Distribution trees are maintained by multicast routing protocols such as PIM. XSR User’s Guide 7-3 Describing the XSR’s IP Multicast Features Two basic types of MDTs are source and shared trees, described as follows: • A source tree is a distribution network with its root at the source and branches forming a spanning tree through the network to its receivers. Because this tree uses the shortest path through the network, it is also referred to as a Shortest Path Tree (SPT). Different sources usually employ different distribution trees. • A shared tree has a common root at a chosen site in the network called Rendezvous Point (RP). Different sources belonging to the same multicast group share the same distribution tree rooted at the RP. Source trees consume more memory to store its states than shared trees but can often supply a better path from source to receivers with less delay. The XSR generates and maintains MDTs with PIM, a set of popularly used multicast routing protocols. PIM derives its name from the fact that it is IP routing protocol independent. Although termed a multicast routing protocol, PIM uses the existing unicast routing table to perform multicast forwarding via the Reverse Path Forwarding (RPF) check function instead of building an independent multicast routing table. In this regard PIM can operate in two modes: PIM Dense Mode (PIM-DM) and PIM Sparse Mode (PIM-SM). • PIM-DM uses a fairly simple approach to handle IP multicast routing. Assuming there are receivers at most locations for the multicast packet stream, PIM-DM starts by flooding multicast traffic, then stops at each link when an explicit stop request is received. • By contrast, PIM-SM assumes relatively fewer receivers, sending multicasts only when requested to do so. PIM-SM is characterized by a combination of shared and shortest-path distribution trees. All group participants can use a shared distribution tree. Or the last hop routers can initiate a switch to shortest-path trees for certain sources when needed (for example, as data rates or delay requirements warrant, and scale permits). Since PIM is unicast routing protocol-independent, PIM-SM uses explicit joins to build the multicast distribution tree that limits multicast traffic to only flow through the joined branches. And PIM-SM is flexible enough to change from a shared to source-based tree. These advantages make PIM-SM a better choice for intra-domain multicast service. Forwarding Multicast Traffic The XSR forwards multicast traffic as follows: • When a multicast packet with source address S is received by a router, the packet will be forwarded only if it arrived on the interface to which the router would forward a unicast packet with destination address S. Otherwise, the packet is dropped. This is known as the Reverse Path Forwarding (RPF) test which is designed to prevent a forwarding loop since unicast routes are loop-free. • Then the router will check the local distribution tree to get a list of outgoing interfaces, duplicate the packets, and send them to all outgoing interfaces. Describing the XSR’s IP Multicast Features IGMPv3 is designed to enable each multicast router to learn, for each of its directly attached networks, which multicast addresses are of interest to the systems attached to those networks. IGMP version 3 adds the capability for a multicast router to also learn which sources are of interest to neighboring systems, for packets sent to any particular multicast address. The data gathered by IGMP is provided to whichever multicast routing protocol (e.g, PIM) is being used by the router, to ensure multicast packet delivery to all networks with interested receivers. 7-4 Configuring PIM-SM and IGMP Describing the XSR’s IP Multicast Features IGMP is an asymmetric protocol, so there are separate behaviors for group members (hosts or routers that wish to receive multicast packets) and multicast routers (routers that can forward multicast packets). Group Membership Actions Group members transmit Report messages to inform neighboring multicast routers of their multicast group states. Two types of events can trigger IGMPv3 protocol actions on an interface, a change in the interface reception state, and a query reception. • A port reception state change is usually triggered by a higher-layer multicast program for video conferencing or network meetings. When you reconfigure these applications, that may change the multicast state triggering the system to send a state-change report from the associated interface. The type and contents of the group records in that report are determined by comparing the filter mode and source list for the affected multicast address before and after the change. The ip igmp join-group command simulates a host to join a specific multicast group. • When the XSR receives a Query, it delays its response by a random interval - the max resp time value - derived from the max resp code in the received Query message. You can set this value in the sending router with the ip igmp query-max-response-time command. An XSR may receive a variety of Queries on different interfaces including General Queries, Group-Specific Queries, and Group-and-Source-Specific Queries, each of which may require its own delayed response. Before scheduling a response to a Query, the XSR must first consider previously scheduled pending responses and in many cases schedule a combined response. Sending and Receiving Queries and Reports Multicast routers send Query messages to and receive Report messages from group members. Multicast routers need know only that at least one system on an attached network is interested in packets to a particular multicast address from a source. The multicast router is not required to keep track of the interests of each individual neighboring system. Sending a Query Multicast routers periodically send General Queries to request group membership data from an attached network, a value which you can set with the ip igmp query-interval command. These queries help build and refresh the group membership state of attached systems which respond by reporting that state in IGMPv3 Membership Reports. Multicast routers also transmit specific queries enabling all network systems to respond to group membership changes. Group-Specific Queries are sent to verify no systems want to receive the specified group or rebuild the desired reception state for a particular group. They are sent when a router gets a State-Change record indicating a system withdrawal from the group. A Group-and-Source Specific Query verifies no network systems want traffic from a set of sources. It lists sources for a particular group which have been requested to no longer be forwarded. This query is sent by a multicast router to learn if any systems want to receive packets to the specified group address from the specified source addresses. These queries are sent only in response to State-Change Records, never in response to Current-State Records. XSR User’s Guide 7-5 Describing the XSR’s IP Multicast Features Receiving a Query When a LAN contains multiple multicast routers, IGMPv3 chooses a single querier per subnet using the same querier election mechanism as IGMPv2, namely by IP address. When a router receives a query with a lower IP address, it sets the Other-Querier-Present timer to Other Querier Present Interval and stops sending queries on the network if it was the previously elected querier. After its Other-Querier Present timer expires, it will begin sending General Queries. If the previous querier stops sending queries, other multicast routers will wait a certain period, which can be configured by the ip igmp querier-timeout command, then take over as the querier. Receiving a Report Three types of group records comprise a Report message: Filter-Mode-Change, Source-List-Change, and Current-State. When multicast routers receive the Report message, they update the IGMP state table. Source-Specific Forwarding Rules When a multicast router receives a datagram from a source destined to a particular group, a decision must be made whether to forward the datagram onto an attached network or not. The multicast routing protocol makes this decision using IGMPv3 information to ensure that all sources/groups desired on a sub-network are forwarded to that sub-network. IGMPv3 data does not override multicast routing data; for example, if the IGMPv3 filter-mode group for G is EXCLUDE, a router may still forward packets for excluded sources to a transit subnet. Interoperating with Older IGMP Versions IGMPv3 hosts and routers can interoperate with hosts and routers that have not yet been upgraded to IGMPv3. This compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of IGMP operating on hosts and routers within a network. Query Version Distinctions The IGMP version of a Membership Query message is determined as follows: • IGMPv1 Query: length = 8 octets and Max Resp Code field is zero • IGMPv2 Query: length = 8 octets and Max Resp Code field is non-zero • IGMPv3 Query: length >= 12 octets Query messages that do not match any of the above conditions (e.g., a Query of length 10 octets) will be silently ignored. Behavior of Group Members Among Older Version Queriers To be compatible with older version routers, IGMPv3 hosts operate in version 1 and version 2 compatibility modes. IGMPv3 hosts will keep state per local interface regarding the compatibility mode of each attached network. A host's compatibility mode is determined by the Host Compatibility Mode variable which can be in one of three states: IGMPv1, IGMPv2 or IGMPv3. This variable is stored per interface and is dependent on the version of General Queries received on that interface as well as the Older Version Querier Present timers set for the interface. 7-6 Configuring PIM-SM and IGMP Describing the XSR’s PIM-SM v2 Features Behavior of Group Members Among Older Version Group Members An IGMPv3 host may be situated in a network where hosts have not yet been upgraded to IGMPv3. A host may allow its IGMPv3 Membership Record to be suppressed by either a Version 1 or Version 2 Membership Report Behavior of Multicast Routers Among Older Version Queriers IGMPv3 routers may be sited on a network where at least one router on the network has not yet been upgraded to IGMPv3 with these requirements: • If older versions of IGMP exist on routers, the querier must use the lowest IGMP version present on the network. This must be assured administratively; routers that desire to be compatible with IGMPv1 and IGMPv2 must have a configuration option to act in IGMPv1 or IGMPv2 compatibility modes which can be set with the ip igmp version command. When in IGMPv1 mode, routers must send Periodic Queries with a Max Resp Code of 0 and truncated at the Group Address field (i.e., 8-bytes long), and must ignore Leave Group messages. They should also log receipt of IGMPv2 or IGMPv3 queries. When in IGMPv2 mode, routers must send Periodic Queries truncated at the Group Address field (i.e., 8-bytes long), and should also log receipt of IGMPv3 queries. They also must fill in the Max Resp Time in the Max Resp Code field; that is, the exponential algorithm described is not used. • If you do not explicitly configure a router to use IGMPv1 or IGMPv2 and it receives an IGMPv1 Query or IGMPv2 General Query, it should log a warning. Behavior of Multicast Routers Among Older Version Group Members IGMPv3 routers may be placed on a network where there are hosts that have not yet been upgraded to IGMPv3 but for compatibility with older version hosts, IGMPv3 routers must operate in version 1 and version 2 compatibility modes. IGMPv3 routers keep a record of compatibility mode by group, which is determined by the Group Compatibility Mode variable from one of three states: IGMPv1, IGMPv2 or IGMPv3. This variable is kept per group record and is dependent on the version of Membership Reports heard for that group as well as the Older Version Host Present timer for the group. Describing the XSR’s PIM-SM v2 Features PIM-SM is a sparse-mode multicast routing protocol that uses a receiver-initiated process to build and maintain the MDT, as specified in draft-ietf-pim-sm-v2-new-05. A router running PIM-SM joins the construction of a MDT only when at least one of the hosts on its subnet requests membership in the specific multicast group. PIM-SM supports both shared and shortest-path trees (SPT) and can convert from shared to shortest-path tree based on network status to optimize multicast performance. PIM-SM relies on another protocol to discover and collect network topology data and fill the Multicast Routing Information Base (MRIB). The MRIB is used by PIM-SM to learn how to reach other PIM-SM enabled routers. MRIB can derive from the unicast routing table filled by unicast routing protocols, such as RIP and OSPF, or it can be filled by another routing protocol tailored for multicast, such as MBGP. MRIB is also used to check against incoming multicast packets to ensure loop-free forwarding. PIM-SM behavior can be described in three phases. Since senders and receivers can join or leave at any time, all phases may occur in parallel. XSR User’s Guide 7-7 Describing the XSR’s PIM-SM v2 Features Phase 1: Building a Shared Tree During phase one, PIM-SM builds a shared tree rooted at a special router called Rendezvous Point (RP), as shown in Figure 7-2. Each multicast group is mapped to a specific RP to which all Designed Routers (DR) of the receivers of the group send their join requests. All PIM-SM enabled routers within the PIM domain share uniform mapping between the multicast group and RP. When a host wants to join a multicast group by using a group management protocol such as IGMP, the elected DR on its subnet will send a PIM Join message towards the RP of that multicast group by consulting the MRIB. The Join message will be processed hop by hop, and the path state will be pinned in the intermediate routers. The Join message will end on RP or a router already within the group. The paths the Join messages passed converge on RP forming a loop-free multicast distribution tree, which is shared by all multicast group receivers. Periodically, the Join message is re-sent to upstream routers for RP to keep the router on the multicast tree. If a timeout occurs and there is still no Join message received by the upstream router, the Join state for that multicast group will be removed from the upstream router. If all receivers on the subnet leave the multicast group, the DR on that subnet will send a Prune message towards RP to remove itself from the multicast tree for that multicast group. Senders are not required to be on the shared multicast tree. The DR on the subnet of the senders will encapsulate packets sent by the sender to the multicast group into a Register packet. Then the Register packet will be sent by the DR to RP for that multicast group as a unicast packet. When RP receives the Register packet, RP will decapsulate and send it down the shared multicast distribution tree. At the end of phase one, packets sent from senders will be unicasted to RP in encapsulated Register packets and the native packets multicast over the shared distribution tree down to the receivers. Figure 7-2 PIM-SM Phase 1 Topology: Shared Tree RP PIM-SM Join RP Register Packet Register Packet Native Packet Sender IGMP Join Receiver Sender Native Packet PIM-SM Join PIM-SM Join Native Packet IGMP Join Receiver Receiver Receiver Phase 2: Building Shortest Path Tree Between Sender & RP Unicasting Register packets from multicast senders to RP is not efficient because: • Encapsulating/decapsulating packets eats up router processing power • Unicast routes may take a longer path from the sender to the multicast tree Usually, RP will initiate the process to build the shortest path tree between a sender and RP. When RP gets a Register packet from the DR of sender S, RP will send a Join message towards the S for that specific multicast group. The path passed by the Join message is pinned. If the path 7-8 Configuring PIM-SM and IGMP Describing the XSR’s PIM-SM v2 Features interconnects with a router which is already on the shortest path tree from S to the same multicast group, the Join message can end on that router to get a short-cut path. After the path is established, both the native packet along the SPT tree and Register encapsulated packet will be received by RP. When RP gets two copies of the same packet - one native and one encapsulated packet - it drops the encapsulated packet and sends a RegisterStop message back to the DR of S to let it know that it can now stop encapsulating packets in Register packets. After the DR of S receives the RegisterStop message, it starts a RegisterStop timer and stops encapsulating the packets until the RegisterStop timer expires. At the end of phase two, packets flows natively from the sender to RP along the SPT tree, and then are passed by RP to all the receivers along the shared distribution tree., as illustrated in Figure 7-3. Figure 7-3 Phase 2 Topology: Shortest Path Tree Between Sender and RP RP Native Packet Register Stop Native Packet Native Packet RP Register Packet Native Packet Sender Sender Native Packet Native Packet Native Packet Receiver Native Packet Receiver Receiver Receiver Phase 3: Building Shortest Path Tree Between Sender & Receiver At the start of phase 3, the path from the sender to RP and on to the receiver is still not optimal for sender or receiver since some receivers may want to optimize the path between themselves and specific senders. In PIM-SM, the DR for the receiver has the flexibility to initiate a process to join the shortest path tree from the sender to the multicast group. To do so, the DR for the receiver desirous of optimizing the multicast path from sender S will send a source-specific Join message towards S. The path passed by the Join message will be pinned especially for traffic from S to the specific multicast group. After the SPT tree is set up between S and the DR of the receiver, traffic from S to that multicast group will flow both on the SPT tree and the shared RP tree. When the receiver can receive the same packet from both trees, the DR or upstream router for the receiver begins to drop the packet from the shared RP tree and sends a Prune message to tell the RP tree not to forward the traffic from the sender S for the specific multicast group. After phase three, traffic from the sender will flow natively along the shortest path tree to the receiver, as shown in Figure 7-4. XSR User’s Guide 7-9 Describing the XSR’s PIM-SM v2 Features Figure 7-4 Phase 3 Topology: Shortest Path Tree Between Sender and Receiver RP (S,G) Join Native Packet Receiver (S,G,RPT) Prune Native Packet Native Packet Native Packet RP Sender (S,G,RPT) Prune (S,G) Join Native Packets (S,G) Prune Sender (S,G,RPT) Prune Native Packets Receiver Receiver Receiver RP Native Packet Sender Native Packet Receiver Receiver Neighbor Discovery and DR Election PIM-SM neighbor discovery and DR election are performed via Hello messages which are sent periodically through each PIM-enabled interface. A Hello Timer is kept for each interface whose timeout event will trigger sending a Hello message. You can set the interval between Hello messages with the ip pim query-interval command. Hello messages use the multicast address 224.0.0.13 (ALL-PIM-ROUTERS) as its destination address. Hello message must be sent out all PIM-active interfaces, including physical point-to-point ports. The Time-To-Live value of the Hello should be set to 1 with the ip multicast ttl-threshold command. For each PIM interface, a PIM-enabled router keeps a list of active neighbors from which Hello messages are received. When the router receives Join/Prune or Assert messages from an interface, the sources of the messages are checked against the neighbor list for this interface. If the message does not come from one of its neighbors, it is dropped. So if a router needs to send a Join/Prune or Assert message to an interface on which it has not sent a Hello message, it should send a Hello message first without waiting for the Hello timer to expire. Before an interface goes down or changes its IP address, a Hello message with zero HoldTime should be sent immediately to let its neighbors immediately remove itself from their neighbor lists. On each LAN, whether it is a shared media or point-to-point link, a Designated Router (DR) is elected to act on behalf of the hosts in the same LAN for PIM-SM. A DR is chosen from all active neighbors on the interface; if all have their DR priority (a 32-bit unsigned number within the Hello message) present, the one with the largest value is preferred. If there is more than one neighbor share the largest DR priority, the one with the largest IP address is selected as the DR. You can set DR priority with the ip pim dr-priority command. 7-10 Configuring PIM-SM and IGMP Describing the XSR’s PIM-SM v2 Features PIM Register Message By the end of PIM-SM phase one, the DR for the sender will encapsulate packets from the sender in a Register message and send it to RP for the multicast group. When the DR receives a RegisterStop message from RP, the RegisterStop timer will begin to maintain the state. Before the RegisterStop timer expires, the DR should send a empty Register message to RP so that RP will respond with another RegisterStop message. When the DR receives the RegisterStop message while the RegisterStop timer is still running, it restarts the RegisterStop timer so that no unnecessary Register messages are sent to RP. The IP ECN bits and DSCP bits of the original packet should be copied into the encapsulated Register packet. PIM Join/Prune Message To build and maintain the MDT, PIM-SM uses Join/Prune messages which contain a list of multicast groups and a list of Joined and Pruned sources for each multicast group. A PIM Join can be triggered by a new receiver joining the multicast group and is sent periodically from the downstream to upstream router to maintain the multicast tree. A timer controls the periodic sending of PIM Join messages which can be set with the ip pim message-interval command. A PIM Prune can be triggered by the last receiver on a subnet exiting the multicast group. A source-specific Prune can be used to bar the shared RP Tree from forwarding traffic from the specific source. This type of Prune used for the RP tree should also be sent from the downstream to upstream router periodically to maintain state. When a router receives a PIM Prune message from its downstream router, it should start a PrunePending timer to wait for a period so that other downstream routers that are still interested in the traffic to override the Prune message with a Join message. It is performed to avoid unnecessary interruption of multicast traffic. Bootstrap & Rendezvous Point The bootstrap router is designed primarily to provide all routers in a domain with a common group for RP mappings. It is important for both sender and receiver to have a common tree for data distribution. The mechanism to distribute RP information is carried out using periodic RP-Set messages and RP-Adv messages. One Bootstrap Router (BSR) is elected within one domain among all routers that have been configured as Candidate BSRs. A router configured as the Candidate RP sends out periodic RP-Adv messages periodically to the elected BSR. This message contains the address of the other advertising Candidate RPs. When the elected BSR receives RP-Adv messages from different Candidate RPs, it hashes a list of RP to Class-D group mappings in a RP-Set message which is periodically sent hop by hop throughout the domain. In this way, all routers in the domain learn the same RP to group mappings, giving them a consistent view of which RP to send join/prunes and registered packets. The bootstrap domain in which a uniform set of RP-to-group mapping is maintained can be defined by specifying the border interfaces of the bootstrap routers using the ip pim bsr-border command. Bootstrap router candidates can be configured with ip pim bsr-candidate and RP candidates can be defined with ip pim rp-candidate. Assert Processing On a shared LAN, it is possible for more than one upstream router in the MDT to forward the same multicast packet into the same LAN. Assert processing avoids duplicating multicast packets. Assert is triggered when a multicast data packet is received on an outgoing interface according to the constructed multicast tree. This occurs if there are two parallel routers sharing forwarding entries from the same group with outgoing packets directed toward the same LAN. XSR User’s Guide 7-11 Describing the XSR’s PIM-SM v2 Features Assert messages are used to negotiate which router will forward the multicast packets. The rule for the assert winner is the router with the lower preference (usually a unicast routing protocol preference) and a metric learned from that protocol. If the preference is the same between the two parallel routers, then whichever router has the lower metric toward the source of the data packet will win out. If the metric is the same, the interface with the highest IP address wins the assert. The XSR conducts assert processing automatically at the lowest topological level to service the end system network. Source-Specific Multicast Source-specific Multicast (SSM) was designed specifically for one-to-many multicast traffic. It collects subscriber data in a manner that it is much simpler than PIM-SM and can be implemented as a subset of the protocol. Both the regular IP multicast service and SSM service can coexist on the same router implemented by the protocol. In SSM, delivery of datagrams is based on source specific (S, G) channels. Traffic for one (S, G) channel consists of datagrams with an IP unicast source address S and the multicast group address G as the IP destination address. Systems will receive this traffic by becoming members of the (S, G) channel. No signaling is required to become a source. But, in SSM, receivers must subscribe or unsubscribe to (S, G) channels to receive or not receive traffic from specific sources. In other words, receivers can receive traffic only from (S, G) channels that they are subscribed to. The proposed standard approach for channel subscription signaling utilizes IGMP INCLUDE mode membership reports, which are only supported in Version 3 of IGMP. The IP address range from 232.0.0.0 to 232.255.255.255 is reserved especially for SSM service. A receiver is also allowed to issue an (S,G) join request in the non-SSM address range; but, in that case there is no guarantee that it will receive service according to the SSM model. PIM SM over Frame Relay Frame Relay networks are not normally fully meshed but they appear to the IP layer as a logical LAN network. This is a challenge to the XSR’s implementation of multicast functionality because when a prune message is sent from one remote node to a central node, other remote nodes will not receive multicast prune packets and, therefore, none of the remote nodes will override the prune message. The central site will remove the Frame Relay interface from the outgoing list for the specified group when its timer expires. Also, when a multicast data packet is sent from a remote node, other nodes will not receive the packet either. The XSR addresses this problem with a Pointto-Point solution. For each remote node, the central site router configures a point-to-point sub-interface with its own IP address, thus mirrorings the behavior of multiple point to point interfaces. From the PIM perspective, no special processing is needed. 7-12 Configuring PIM-SM and IGMP PIM Configuration Examples PIM Configuration Examples The following is a simple PIM configuration using the virtual Loopback interface 0 and physical interface FastEthernet 1. Configuring a Loopback interface is a safer way to ensure PIM routers discover each other since specifying a physical IP address could result in a router being ignored if the network connection through that interface is down. On the other hand, configuring a physical interface is beneficial if you want a particular network path verified as connected. Only the following commands are required if you do not wish to change PIM default values. XSR(config)#interface XSR(config-if )#ip XSR(config-if )#ip XSR(config-if )#no FastEthernet1 address 192.168.49.2 255.255.255.0 pim sparse-mode shutdown XSR(config)#interface XSR(config-if )#ip XSR(config-if )#ip XSR(config-if )#no Loopback0 address 1.1.1.57 255.255.255.255 pim sparse-mode shutdown XSR(config)#ip multicast-routing XSR(config)#ip pim bsr-candidate Loopback0 30 57 XSR(config)#ip pim rp-candidate Loopback0 priority 57 XSR User’s Guide 7-13 PIM Configuration Examples 7-14 Configuring PIM-SM and IGMP 8 Configuring PPP Overview The Point-to-Point Protocol (PPP), referenced in RFC-1616, is a standard method for transporting multi-protocol datagrams over point-to-point links. PPP defines procedures to assign and manage network addresses, asynchronous and synchronous encapsulation, link configuration, link quality testing, network protocol multiplexing, error detection, and option negotiation for network-layer address and data-compression negotiation. PPP provides all these functions through its three main components: • An extensible Link Control Protocol (LCP) for establishing, configuring, and testing the datalink connection. • A method for encapsulating multi-protocol datagrams. • A family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols. When negotiation is complete, PPP becomes the pipe that carries the network layer protocol data units (PDUs) in the information field of the PPP packet. PPP offers high performance and errorfree transmission of user traffic from sender to receiver over a link. PPP Features The XSR PPP software module offers the following features: • IP datagram encapsulation over a data link connection • Synchronous and asynchronous communication modes • Multilink Protocol (MLPPP) as defined by RFC-1990 • Multi-Class MLPPP, as defined by RFC-2686. This option is present in the PPP LCP negotiation when enabled providing: – Multilink Maximum Received Reconstructed Unit (MRRU) – Multilink Short Sequence Number Header Format – Endpoint Discriminator – Maximum fragment delay – Fragment interleaving, reassembly, and transmission sequencing – Multi-Class option negotiation • IPCP Network Control Protocol (NCP) • Authentication of peer entities through: – Password Authentication Protocol (PAP) XSR User’s Guide 8-1 PPP Features – Challenge Handshake Authentication Protocol (CHAP) – Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) • Link Quality Monitoring (LQM) procedures as defined by RFC-1989 • VJ/IP header compression • No restriction on frame size; default is 1500 octets for the information field - as defined by RFC-1661 • Self-Describing Padding and FCS (16-bytes) as defined by RFC-1570 • Outbound Dialing • 16-bit Fast Check Sequence • The following parameters are negotiated during link level configuration (as defined by RFC1471): – Maximum size of the packet that can be received on a link (MRU) – Protocol to be used for authentication – Asynchronous Character Control Map (ACCM) – The protocol to be used for Link Quality Monitoring – FCS – Magic number – Padding • Bandwidth Allocation Protocol (BAP/BACP) as defined by RFC-2125 • PPP/MLPPP control packet debugging including protocol fields Link Control Protocol (LCP) The Link Control Protocol (LCP) handles the functions of establishing, configuring and terminating the PPP link. These functions are as follows: • Establish, configure and terminate the PPP link. • Initiate authentication and link quality monitoring procedures, if set. • Initiate network layer configuration option negotiation procedures. Link-level configuration options to be negotiated with the peer are set on per-link basis. After the lower layer is operationally up, link establishment and configuration negotiation is performed. If a configuration option is not included in the LCP packet, the default value for that option is assumed. LCP starts authentication and LQM procedures after the link is built. After the link is authenticated successfully, configured NCP protocols are initiated. Network Control Protocol (NCP) The Network Control Protocol (NCP) handles transmission and reception of various network layer control packets and datagrams. NCP provides: • Sets up network layer control protocols over the established PPP link. • Sends/receives network layer datagrams if the corresponding NCP is successfully negotiated. The configuration negotiation procedures are performed once the LCP reaches the OPENED state. 8-2 Configuring PPP PPP Features Authentication Authentication protocols, as referenced in RFC-1334, are used primarily by hosts and routers to connect to a PPP network server via switched circuits or dialup lines, but might be applied to dedicated links as well. The server can use identification of the connecting host or router to select options for network layer negotiations. The authentication protocol used is negotiated with the peer entity via LCP configuration options. If the authentication option is successfully negotiated, the LCP module initiates authentication after link establishment. This module performs authentication and the result is communicated to the LCP module. If authentication succeeds, LCP informs NCP that the PPP link is operational. If authentication fails, it closes the PPP link and generates an error message. Password Authentication Protocol (PAP) The Password Authentication Protocol (PAP) is a simple method for the peer to establish its identity using a two-way handshake. PAP authentication occurs only upon initial link establishment. After this phase is complete, the peer repeatedly sends an ID/Password pair to the authenticator until authentication is acknowledged or the connection closed. PAP is not a strong authentication method because passwords are sent over a circuit in the clear with no protection from playback or repeated trial and error attacks. The peer controls the frequency and timing of authentication tries. PAP is most appropriate where a plaintext password must be available to simulate a login at a remote host. In such a use, PAP provides a similar level of security to the usual user login at the remote host. Challenge Handshake Authentication Protocol (CHAP) The Challenge Handshake Authentication Protocol (CHAP), as referenced in RFC-1994, periodically verifies the identity of the peer using a 3-way handshake. This occurs upon initial link establishment, and may be repeated anytime after the link has been established. After the link establishment phase is complete, the authenticator sends a “challenge” message to the peer. The peer responds with a value calculated using a “one-way hash” function. The authenticator checks the response against its own calculation of the expected hash value. If the values match the connection is accepted, otherwise the connection is ended. CHAP uses MD5 as its hashing algorithm. CHAP protects against playback attack with an incrementally changing identifier and a variable challenge value. The use of repeated challenges is intended to limit the time of exposure to any single attack. The authenticator controls the frequency and timing of the challenges. CHAP depends upon a secret known only to the authenticator and that peer. The secret is not sent over the link. CHAP is most likely used where the same secret is easily accessed from both ends of the link. Microsoft Challenge Handshake Protocol (MS-CHAP) MS-CHAP, referenced in RFC-2433, authenticates remote Windows workstations, providing the functionality to which LAN-based users are accustomed while integrating the encryption and hashing algorithms used on Windows networks. MS-CHAP is closely derived from the PPP CHAP with the exception that it uses MD4 as its hashing algorithm. XSR User’s Guide 8-3 PPP Features The MS-CHAP challenge, response and success packet formats are identical in format to the standard CHAP challenge, response and success packets, respectively. MS-CHAP defines a set of reason for failure codes returned in the Failure packet Message Field. It also defines a new packet called Change Password Packet, which enables a client to send a response packet based on a new password. An 8-octet challenge string is generated using a random number generator. A change password packet is sent in response to a failure packet from the peer that contains the failure code for change password. Currently, MS-CHAP authenticators do not send the name value field in the challenge packet but construct the response packet with the first MS-CHAP name/secret pair retrieved from the secret list. When MS-CHAP secrets are not configured, a configure NAK will be sent with either CHAP (MD5) or PAP protocol in response to a MS-CHAP Authentication protocol option in the LCP request from the Windows system. Link Quality Monitoring (LQM) As referenced in RFC-1989, LQM defines a protocol for generating Link-Quality-Reports. These Report packets provide a mechanism to determine link quality, but it is up to each implementation to decide when the link is usable. LQM carefully defines the Link-Quality-Report packet format and specifies reference points to measure all data transmission and reception. LQM’s functionality includes: • Maintaining LQM statistics and sending them to the peer periodically • Determining link quality based on statistics received from the peer • Suspending traffic over the link, if that link quality is bad • Monitoring suspended link quality by swapping LQM packets with peer • Restoring the link after quality reaches a desired level (configurable) Multilink PPP (MLPPP) Multilink PPP (MLPPP), as defined in RFC-1990, aggregates multiple point-to-point links to form a group with higher bandwidth. Multilink is based on an LCP option negotiation that permits the XSR to indicate to its peer that it is capable of combining multiple physical links into a bundle. LCP negotiation indicates the following: • The XSR can combine multiple physical links into one logical link • The XSR can receive upper layer protocol data units (PDU) fragmented using the multilink header and reassemble the fragments into the original PDU for processing • The XSR can receive PDUs of size N octets where N is specified as part of the option even if N is larger than the maximum receive unit (MRU) for a single physical link Note: The XSR does not support Multilink PPP bundles between unchannelized T3/E3 ports. Multilink PPP bundles are supported on T1/E1 ports of channelized T3/E3 ports, but are limited to a single T3/E3 port; that is, a Multilink PPP bundle between T1/E1s of different channelized T3/E3 ports is not supported. When a packet is transmitted over a multilink bundle it is encapsulated by a multilink header, which includes information to allow the packets sent over the links in the bundle to be sequenced. Functionality provided by MLPPP on the XSR includes: • 8-4 Configuring PPP Learned number of fragments to be sent on each link and the bundle PPP Features • Fragmentation/reassembly • Detection of fragment loss • Optimal buffer usage • MTU size determination • Management of MLPPP bundles • MIB support for network management • Up to four T1/E1 lines can be aggregated running MLPPP • Multi-class MLPPP for up to five multiple sequence number streams over one MLPPP bundle Multi-Class MLPPP The Multi-Class extension to Multi-link PPP, as defined by RFC-2686, provides a means of transmitting multiple sequence traffic streams over one Multi-link PPP bundle on a Multilink or Dialer interface. Multi-Class offers best-effort Quality of Service (QoS) to minimize delay and fully utilize bandwidth over each member link ensuring that high priority traffic such as real-time voice and video packets is transmitted with minimum delay. The XSR’s implementation of Multi-Class MLPPP supports the following features: • Multilink Maximum Received Reconstructed Unit (MRRU). This non-configurable feature is set to 1500 bytes by default. • Multilink Short Sequence Number Header Format is non-configurable but allows lower priority traffic classes to be suspended in favor of higher priority classes when necessary. The XSR defaults to the long sequence number header format but is passive - if a peer requests the short format the router provides a short sequence number. The Suspendable (class) level for negotiation is defaulted to 5. The XSR will accept any lower Suspendable (class) level negotiation and reject any larger levels. • Endpoint Discriminator is configurable to specify a class with the ppp multipoint endpoint command. • Multilink Header Format is enabled with the ppp multilink multi-class command. The benefits of operating Multi-Class MLPPP are as follows: • Fragment interleaving with different classes (priorities). • Multiple suspension (class) layers to accommodate multiple priority classifications and packet interleaving. • Full bandwidth utilization across the bundle since all fragments with different priorities can be sent over any member link without violating the order of packets sharing the same classification. Multi-Class is limited in that it does not provide a method for packet classification, relying on an external method - QoS - to prioritize the output packet stream with certain criteria. QoS currently supports up to four types of classification via ACLs. While MLPPP supports sending packets outside MLPPP with no fragmentation and no MLPPP header by default, the total level of prioritization supported is five for QoS, the same as that (four suspendable levels) available in Multi-Class MLPPP. If the negotiated Multi-Class level is less than the number of classes set by QoS, MLPPP will fit the QoS class type into the MLPPP Multi-Class number according to the principle that the higher priority QoS class type will fit into a higher Multi-Class class until the Multi-Class number 0, which will contain any remaining QoS low priority classes. XSR User’s Guide 8-5 PPP Features MLPPP Packet Fragmentation and Serialization Transmission Latency MLPPP’s packet transport method over multiple member links is made possible by fragmenting the packet after balancing the load bandwidth to fully utilize the member links’ bandwidth. When sent over a MLPPP link, each fragment carries a sequence number within the Multilink header, as shown in Figure 8-5, to ensure that fragment is reassembled and forwarded to higher layer applications in the same order. Figure 8-5 Multilink Header Option Format Code (Long/Short Sequence #) Length Type # of Suspendable Classes Additionally, each fragment of a sequence stream is assigned a class number in the MLPPP header, permitting at most four classes for the short and 16 for the long sequence number fragment. The higher the class number, the higher the priority it is granted over the line. For example, voice, video and data packets can be assigned high, medium and low priority sequence numbers to ensure proper QoS. Refer to “Configuring Quality of Service” on page 12-1 for more information. Since standard MLPPP allows only a single stream sequence number, the result is that only two priority level layers can be utilized without breaking the packet order as follows: • Higher priority layer packets are sent without fragmentation and multilink headers. • Lower priority layer packets are fragmented and interleaved with the higher priority packet. MLPPP is marked by the following limitations: • A higher priority packet can be sent through only one member link since it is not fragmented and does not contain a sequence number, otherwise the higher priority packet order can not be guaranteed. • The bandwidth of the higher priority packet should not exceed the speed of the designated link used. The result is MLPPP bundle bandwidth is not fully utilized. Each MLPPP packet holding a fragment is transmitted through the member link with packet transmission latency occurring as the result of packet size operating against link speed. With a Multi-link PPP connection, most packets are fragmented into equal size fragments and transmitted over all member links to balance bandwidth loading over each link with the same or different speeds. To sum up, fragment size must be controlled in order to minimize transmission latency. Serialization transmission latency, measured in milliseconds, equals fragment size (in bits) multiplied by link speed (in Kbps) as shown in Table 8-1. Table 8-1 Serialization Latency for Different Fragment Size/Link Speed Fragment Size 8-6 Link Speed 1 byte 64 bytes 128 bytes 256 bytes 512 bytes 1024 bytes 1500 bytes 56 kbps 143 us 9 ms 18 ms 36 ms 72 ms 144 ms 214 ms 64 kbps 125 us 8 ms 16 ms 32 ms 64 ms 126 ms 187 ms 128 kbps 62.5 us 4 ms 16 ms 32 ms 32 ms 64 ms 93 ms 256 kbps 31 us 2 ms 4 ms 8 ms 16 ms 32 ms 46 ms 512 kbps 15.6 us 1 ms 2 ms 4 ms 8 ms 16 ms 32 ms 768 kbps 10 us 640 us 1.28 ms 2.56 ms 5.12 ms 10.24 ms 15 ms Configuring PPP PPP Features Table 8-1 Serialization Latency for Different Fragment Size/Link Speed (continued) Fragment Size 1536 kbps 5 us 320 us 640 us 1.28 ms 2.56 ms 5.12 ms 10.24 ms 2024 kbps 4 us 256 us 512 us 1 ms 2 ms 4 ms 6 ms The overall serialization latency for a fragment over a synchronous/ asynchronous Serial or T1 link should be multiplied by the size of the transmission queue. To control latency, both the transmission queue size and fragment size must be controlled. Fragment Interleaving Over the Link Transmitting a higher priority packet, either voice or video, with minimum and controlled latency, especially when lower priority packets such as data packets are present, is performed by the XSR automatically interleaving the fragment of the higher priority packet into the stream of the fragment of the lower priority packet. Fragment interleaving ensures that the transmission latency of a higher priority packet will not exceed the maximum value as determined by the sum of the fragment and transmission queue sizes. To sum up, Multi-Class MLPPP performs as follows: • Each packet is designated with a class number based on the classification result of the packet type. Packet classification is performed by the external method like QoS, which classifies the packet according to the ACL and assigns a class number according to priority as follows: the smaller the class number, the lower the priority. The current class number ranges from 1 to 4, with 1 for lower priority packets and 4 for the highest. Class 0 is reserved for a packet in the fair-queue class. • Each packet is split into the small size. The maximum fragment size is defined as the maximum delay allowed over the slowest speed link in the bundle. • Each fragment is appended with the MLPPP header, which includes the class information and sequence number dedicated to this class and transmitted over the member links. Fragments of different classes are interleaved. • Fragments with a higher class number suspend the transmission of fragments with a lower class number that is pending for transmission, which is the interleaving of the fragments with different class numbers. • When fragments are received, they are re-assembled based on class and sequence number with the order of the packet within the same class preserved. Multilink Head Format Negotiation The Multilink Head Format is negotiated between peers based on whether an MRRU, short sequence number, and code are present, as listed in Table 8-2 on page 8-7: Table 8-2 Multi-Class MLPPP Negotiation Option Type MRRU Short Sequence # Multilink Head Format Negotiation Result present nil nil present present present nil MLPPP with Long Sequence # & No Multi-Class MLPPP with Short Sequence # & No Multi-Class present/Code = 2 MLPPP with Long Sequence # & Multi-Class XSR User’s Guide 8-7 PPP Features Table 8-2 Multi-Class MLPPP Negotiation (continued) Option Type present nil present/Code = 6 MLPPP with Short Sequence # & Multi-Class present present present Not valid The class number is defaulted to five for both short and the long sequence numbers. That includes four suspendable levels from 0 to 4 with the highest level at 5. The current limits on memory and throughput set the optimized number of class to 4 for the XSR. The result of the number of suspendable classes after negotiation will set MLPPP to support up to that level of classes both for transmission and receipt. The suspendable level could differ between transmission and receipt depending on negotiation with the peer. For example, if the local peer is defaulted at a level of five classes and the remote peer has a level of two classes, following negotiation, the local peer could have two transmitting classes acknowledged by the remote peer and five receiving classes acknowledged by the remote peer. Events and Alarms Multi-Class Option Negotiation When Multi-Class is enabled on MLPPP, every member under the bundle uses the same value to perform negotiation, and the member link under the bundle sets the negotiated value for MultiClass, such as header format and suspendable level. The remainder of the member link must have same negotiated values, otherwise it will be rejected from joining the same bundle. Multi-Class Receiving Packet When a MLPPP packet is received with the class number outside the negotiated suspendable levels, as: • A class number larger than the negotiated suspendable level, • A non-zero class number is present when the non Multi-Class option is negotiated, The packet is silently discarded and the discard count for the bundle statistics increased. Also, the following PPP debug message is generated: MLPPP: Invalid Class Num IP Control Protocol (IPCP) IPCP negotiates the following options, as referenced in RFC-1332: • The IP address of the system • The compression protocol to be applied on IP datagrams (Van Jacobson Compressed TCP/IP) Along with the above support, the following IPCP extension is also offered: • Primary and Secondary DNS and NBNS address Once negotiation is successful, IPCP allows IP traffic over the established PPP link. The negotiated IP addresses and MTU of the interface are passed on to the higher layer (IP) to update its tables. 8-8 Configuring PPP PPP Features IP Address Assignment In PPP, IPCP configuration option type 3 corresponds to IP address negotiation. This configuration option provides a way to negotiate the IP address to be used on the local end of the link. It allows the sender of the Configure-Request to state which IP address is desired, or to request that the peer provide the information. The peer can do this by NAKing the option, and returning a valid IP address. If the host wants the peer to provide the IP address, it will mark the IP address field as configuration option 0. Upon receiving an IP-address Configure-Request with IP address field 0, IPCP may allocate a valid IP address to the peer by sending a Configure-Nak to the received Configure-Request or it may reject the Configure-Request. PPP Bandwidth Allocation/Control Protocols (BAP/BAPC) The XSR supports the PPP Bandwidth Allocation/Control protocols (BAP/BACP) as a means of managing individual links of a multilink bundle as well as specifying which peer is responsible for managing bandwidth during a multilink connection. This ability to dynamically change bandwidth during a multilink connection is referred to as Bandwidth-on-Demand (BoD). For more information on BoD, refer to “Configuring Integrated Services Digital Network” on page 11-1 and “Configuring Dialer Services” on page 10-1. BAP/BACP, as defined by RFC-2125, is a flexible, robust method of managing bandwidth between two peers. BAP does this by defining Call-Control packets and a protocol that allows peers to co-ordinate actual bandwidth allocation and de-allocation. Phone number values may be passed in the Call-Control packets to minimize user configuration. BAP/BACP provides the following benefits: • Allows multilink implementations to interoperate by providing call control through the use of link types, speeds, and telephone numbers. • Controls thrashing caused by frequent raising/tearing down links. • Ensures that both ends of a link are told when links are added/dropped from a multilink bundle. The BACP protocol must reach the Opened state using the standard PPP mechanism as defined in RFC-1661. Once BACP reaches the Opened state on a bundle, BAP may transmit packets through this PPP/MLPPP pipeline. BAP datagrams are encapsulated by the PPP/MLPPP module and transmitted across the link. Transmission and reception of BAP and BACP packets is through the same interface procedures used by any other NCP protocol pair. Functionality provided by BAP/BACP is summarized as follows: • • To add links: – Negotiate phone numbers over the bundles through BAP. – Agree with peer before trying to set up a call. – Check for available lines before agreeing to add a link. – Manage race conditions when both peers wish to add a link. To delete links: – Agree with peer to tear down a link before disconnecting the call. XSR User’s Guide 8-9 Configuring PPP with a Dialed Backup Line Configuring PPP with a Dialed Backup Line You can configure PPP on the following types of physical interfaces: • Asynchronous serial • Synchronous serial • T1/E1 By enabling PPP encapsulation on physical interfaces, PPP can also be used on calls placed by the dialer interfaces that use the physical interfaces. Refer to Figure 8-6 for an example of an XSR configured with one backup dial line to two different sites. Figure 8-6 XSR Configuration with One Backup Dial Line to Different Sites XSR Primary link Serial interface 1/1 Primary link Serial interface 1/0 Backup link PSTN Site B Central Site Configuring a Synchronous Serial Interface Perform the following steps to configure a synchronous V.35 serial interface to communicate with PPP: 1. Enter interface serial to specify the interface. XSR(config)#interface serial 1/0 2. Enter the media-type for the interface (default: RS232). XSR(config-if )#media-type v35 3. Enter encapsulation ppp to enable PPP encapsulation. XSR(config-if )#encapsulation ppp 4. Set the local IP address of this interface. XSR(config-if )#ip address 192.168.1.1 255.255.255.0 8-10 Configuring PPP Configuring a Dialed Backup Line 5. Enter no shutdown to enable this interface. XSR(config-if )#no shutdown Configuring a Dialed Backup Line The following tasks must be performed to configure a Dialed Backup line: • Configure the dialer interface • Configure a physical interface to function as backup • Configure primary interfaces to use a backup interface Configuring the Dialer Interface For more details on configuring Dialer Services, refer to Chapter 7. 1. Enter interface dialer number to create the dialer interface. The number range is 0 to 25. 2. Enter encapsulation ppp to enable PPP encapsulation. 3. Enter ppp auth to set the type of authentication. The authentication options are chap, pap, or ms-chap. 4. Enter ppp keepalive seconds to set the keepalive interval. 5. Enter ppp quality percentage to set the minimum LQM value on the interface before it will go down. 6. Enter dialer pool number to specify the dialer pool. The number range is 0 to 255. 7. Enable the interface by entering the no shutdown command. Configuring the Physical Interface for the Dialer Interface 1. Enter interface serial card / port to specify the interface. 2. Enter encapsulation ppp to set PPP encapsulation. 3. Enter media-type {RS232 | RS422 | RS449 | RS530A | V35 | X21} for the cable your interface connects to. The default media-type is RS232. 4. Enter no shutdown to enable the interface. 5. Enter ppp max-bad auth number to set the number of retries after which the interface resets itself. 6. Enter dialer pool-member pool-number priority priority to assign the interface as a member of the pool that the dialer interface will use. Pool-number is a value ranging from 0 to 255 specifying the pool. Priority is an optional value ranging from 0 to 255 that you can configure to prioritize this pool-member within the pool. 7. Enable the interface by entering the no shutdown command. XSR User’s Guide 8-11 Configuring a Dialed Backup Line Configuring the Interface as the Backup Dialer Interface 1. Enter interface serial card/port to specify the interface to back up. 2. Enter ip address ip-address mask to specify the IP address and subnet mask of the interface. 3. Enter backup interface dialer number as the backup interface. 4. Enter backup delay enable-delay disable-delay to set the interval between the physical interface going down and the backup being enabled, and between the physical interface coming back up and the backup being disabled. 5. Enter backup time-range start-time end-time to set the time of day the backup interface should be enabled and disabled. 6. Enable the interface by entering the no shutdown command. The CLI commands shown below configure the example shown in Figure 8-6 on page 8-10. Configure interface dialer 0 to use dial pool 5: XSR(config)#interface dialer 0 XSR(config-if )#encapsulation ppp XSR(config-if )#dialer pool 5 XSR(config-if )#no shutdown Configure interface dialer 1 to use dial pool 5: XSR(config)#interface dialer 1 XSR(config-if )#encapsulation ppp XSR(config-if )#ppp authentication chap pap XSR(config-if )#dialer pool 5 XSR(config-if