Patton Electronic Ip Phone Smartnode 4110 Series Users Manual SmartWare Release 3.20 Software Configuration Guide
SmartNode 4110 Series to the manual b9d2034a-e0e3-4ae7-b3dd-146346f0d58e
2015-02-06
: Patton-Electronic Patton-Electronic-Ip-Phone-Smartnode-4110-Series-Users-Manual-517022 patton-electronic-ip-phone-smartnode-4110-series-users-manual-517022 patton-electronic pdf
Open the PDF directly: View PDF
.
Page Count: 664
SmartNode Series
SmartWare Release 5.2
Software Configuration Guide
Sales Office: +1 (301) 975-1000
Technical Support: +1 (301) 975-1007
E-mail: support@patton.com
URL: www.patton.com
Part Number: 07MSWR52_SCG, Rev. A
Revised: August 7, 2008
Patton Electronics Company, Inc.
7622 Rickenbacker Drive, Gaithersburg, MD 20879 USA
Tel: +1 (301) 975-1000 • Fax: +1 (301) 869-9293 • Support: +1 (301) 975-1007
Web: www.patton.com • E-mail: support@patton.com
Copyright Statement
Copyright © 2008, Patton Electronics Company. All rights reserved.
Trademark Statement
The terms SmartWare, SmartView, SmartLink, and SmartNode are trademarks of Patton Electronics Company. All other trademarks presented in this document are the property of their respective owners.
Notices
The information contained in this document is not designed or intended for use as critical components in
human life-support systems, equipment used in hazardous environments, or nuclear control systems. Patton
Electronics Company disclaims any express or implied warranty of fitness for such uses.
The information in this document is subject to change without notice. Patton Electronics assumes no liability for errors that may appear in this document.
Any software described in this document is furnished under license and may be used or copied only in accordance with the terms of such license.
Supported Platforms
SmartNode 4110 Series
SmartNode 4830 Series
SmartNode 4552, 4562
SmartNode 4520 Series
SmartNode 4900 Series
SmartNode 4554, 4564
SmartNode 4600 Series
SmartNode 4960
Smart-DTA
Summary Table of Contents
1 System overview ............................................................................................................................................ 38
2 Configuration concepts ................................................................................................................................. 44
3 Command line interface (CLI) ...................................................................................................................... 49
4 Accessing the CLI .......................................................................................................................................... 53
5 System image handling.................................................................................................................................. 65
6 Configuration file handling........................................................................................................................... 76
7 Basic system management ............................................................................................................................. 90
8 RADIUS Client Configuration.................................................................................................................... 102
9 IP context overview ..................................................................................................................................... 114
10 IP interface configuration ........................................................................................................................... 120
11 NAT/NAPT configuration........................................................................................................................... 132
12 Ethernet port configuration ........................................................................................................................ 141
13 Link scheduler configuration ...................................................................................................................... 151
14 Serial port configuration ............................................................................................................................. 170
15 Frame Relay configuration .......................................................................................................................... 177
16 PRI port configuration................................................................................................................................ 191
17 BRI port configuration................................................................................................................................ 205
18 ISDN Overview ........................................................................................................................................... 212
19 ISDN configuration .................................................................................................................................... 217
20 RBS configuration....................................................................................................................................... 225
21 DSL Port Configuration.............................................................................................................................. 230
22 Basic IP routing configuration .................................................................................................................... 235
23 RIP configuration........................................................................................................................................ 242
24 Access control list configuration.................................................................................................................. 253
25 SNMP configuration ................................................................................................................................... 267
26 SNTP client configuration .......................................................................................................................... 282
27 DHCP configuration................................................................................................................................... 292
28 DNS configuration ...................................................................................................................................... 304
29 DynDNS configuration ............................................................................................................................... 308
30 PPP configuration....................................................................................................................................... 313
31 CS context overview .................................................................................................................................... 339
3
SmartWare Software Configuration Guide
32 VPN configuration ...................................................................................................................................... 362
33 CS interface configuration........................................................................................................................... 381
34 ISDN interface configuration...................................................................................................................... 390
35 FXS interface configuration......................................................................................................................... 404
36 FXO interface configuration ....................................................................................................................... 414
37 RBS interface configuration ........................................................................................................................ 426
38 H.323 interface configuration ..................................................................................................................... 431
39 SIP interface configuration ......................................................................................................................... 441
40 Call router configuration............................................................................................................................. 456
41 SIP call-router services ................................................................................................................................ 524
42 Tone configuration...................................................................................................................................... 529
43 FXS port configuration ............................................................................................................................... 537
44 FXO port configuration .............................................................................................................................. 542
45 H.323 gateway configuration ...................................................................................................................... 546
46 Context SIP gateway overview..................................................................................................................... 559
47 VoIP profile configuration .......................................................................................................................... 573
48 PSTN profile configuration......................................................................................................................... 597
49 SIP profile configuration............................................................................................................................. 601
50 Authentication Service................................................................................................................................. 604
51 Location Service .......................................................................................................................................... 607
52 VoIP debugging........................................................................................................................................... 624
A Terms and definitions ................................................................................................................................ 644
B Mode summary ........................................................................................................................................... 650
C Command summary ................................................................................................................................... 654
D Internetworking terms & acronyms ........................................................................................................... 657
E Used IP ports & available voice codecs ...................................................................................................... 662
4
Table of Contents
Summary Table of Contents ........................................................................................................................... 3
Table of Contents ........................................................................................................................................... 5
List of Figures ............................................................................................................................................... 27
List of Tables ................................................................................................................................................ 29
About this guide ........................................................................................................................................... 30
Audience............................................................................................................................................................... 30
How to read this guide ......................................................................................................................................... 30
Structure............................................................................................................................................................... 31
Precautions ........................................................................................................................................................... 34
Typographical conventions used in this document................................................................................................ 34
General conventions .......................................................................................................................................34
Mouse conventions .........................................................................................................................................36
Service and support ...............................................................................................................................................36
Patton support headquarters in the USA .........................................................................................................36
Alternate Patton support for Europe, Middle East, and Africa (EMEA) ..........................................................36
Warranty Service and Returned Merchandise Authorizations (RMAs)...................................................................37
Warranty coverage ..........................................................................................................................................37
Returns for credit ......................................................................................................................................37
Return for credit policy .............................................................................................................................37
RMA numbers ................................................................................................................................................37
Shipping instructions ................................................................................................................................37
1 System overview ............................................................................................................................................ 38
Introduction ..........................................................................................................................................................39
SmartWare embedded software .............................................................................................................................40
Applications...........................................................................................................................................................41
Carrier networks .............................................................................................................................................41
Enterprise networks ........................................................................................................................................42
LAN telephony ...............................................................................................................................................43
2 Configuration concepts ................................................................................................................................. 44
Introduction ..........................................................................................................................................................45
Contexts and Gateways..........................................................................................................................................46
Context ...........................................................................................................................................................46
Gateway ..........................................................................................................................................................46
Interfaces, Ports, and Bindings...............................................................................................................................47
Interfaces ........................................................................................................................................................47
Ports and circuits ............................................................................................................................................47
Bindings ..........................................................................................................................................................47
Profiles and Use commands...................................................................................................................................48
Profiles ............................................................................................................................................................48
Use Commands ..............................................................................................................................................48
5
SmartWare Software Configuration Guide
Table of Contents
3 Command line interface (CLI) ...................................................................................................................... 49
Introduction ..........................................................................................................................................................50
Command modes ..................................................................................................................................................50
CLI prompt ....................................................................................................................................................50
Navigating the CLI .........................................................................................................................................51
Initial mode ..............................................................................................................................................51
System changes ..........................................................................................................................................51
Configuration ...........................................................................................................................................51
Changing Modes .......................................................................................................................................51
Command editing .................................................................................................................................................51
Command help ...............................................................................................................................................51
The No form ..................................................................................................................................................51
Command completion ....................................................................................................................................51
Command history ...........................................................................................................................................52
Command Editing Shortcuts ..........................................................................................................................52
4 Accessing the CLI .......................................................................................................................................... 53
Introduction ..........................................................................................................................................................54
Accessing the SmartWare CLI task list...................................................................................................................54
Accessing via the console port .........................................................................................................................55
Console port procedure .............................................................................................................................55
Telnet Procedure .......................................................................................................................................56
Using an alternate TCP listening port for the Telnet server .............................................................................56
Disabling the Telnet server ..............................................................................................................................56
Logging on ......................................................................................................................................................56
Selecting a secure password .............................................................................................................................57
Password encryption .......................................................................................................................................58
Factory preset administrator account .........................................................................................................58
Creating an operator account ....................................................................................................................58
Creating an administrator account ............................................................................................................59
Opening a secure configuration session over SSH ...........................................................................................59
Displaying the CLI version .............................................................................................................................60
Displaying account information ......................................................................................................................60
Switching to another account ..........................................................................................................................61
Checking identity and connected users ...........................................................................................................61
Command index numbers ...............................................................................................................................62
Ending a Telnet or console port session ..........................................................................................................64
Showing command default values ...................................................................................................................64
5 System image handling.................................................................................................................................. 65
Introduction ..........................................................................................................................................................66
Memory regions in SmartWare..............................................................................................................................67
System image handling task list .............................................................................................................................68
Displaying system image information ..............................................................................................................69
Copying system images from a network server to Flash memory .....................................................................69
6
SmartWare Software Configuration Guide
Table of Contents
Upgrading the software directly ......................................................................................................................71
Auto provisioning of firmware and configuration ..................................................................................................72
Boot procedure......................................................................................................................................................74
Factory configuration ............................................................................................................................................75
Default Startup Configuration ........................................................................................................................75
IP Addresses in the Factory Configuration ......................................................................................................75
6 Configuration file handling........................................................................................................................... 76
Introduction ..........................................................................................................................................................77
Understanding configuration files ...................................................................................................................77
Factory configuration ............................................................................................................................................79
Configuration file handling task list.......................................................................................................................79
Copying configurations within the local memory ............................................................................................80
Replacing the startup configuration with a configuration from Flash memory ................................................81
Copying configurations to and from a remote storage location ........................................................................82
Replacing the startup configuration with a configuration downloaded from TFTP server ...............................83
Displaying configuration file information .......................................................................................................83
Modifying the running configuration at the CLI .............................................................................................84
Modifying the running configuration offline ...................................................................................................85
Deleting a specified configuration ...................................................................................................................86
Encrypted file download .................................................................................................................................87
Encrypted Configuration Download .........................................................................................................87
Use Cases ..................................................................................................................................................88
7 Basic system management ............................................................................................................................. 90
Introduction ..........................................................................................................................................................91
Basic system management configuration task list ...................................................................................................91
Managing feature license keys .........................................................................................................................92
Setting system information .............................................................................................................................93
Setting the system banner ................................................................................................................................94
Setting time and date ......................................................................................................................................95
Display clock information ...............................................................................................................................95
Display time since last restart ..........................................................................................................................96
Configuring the Web server ............................................................................................................................96
Determining and defining the active CLI version ............................................................................................96
Restarting the system ......................................................................................................................................97
Displaying the system logs ..............................................................................................................................97
Displaying reports ...........................................................................................................................................98
Controlling command execution .....................................................................................................................98
Timed execution of CLI command ...............................................................................................................100
Displaying the checksum of a configuration ..................................................................................................100
Configuration of terminal sessions ................................................................................................................100
8 RADIUS Client Configuration.................................................................................................................... 102
Introduction ........................................................................................................................................................103
The AAA component ..........................................................................................................................................103
7
SmartWare Software Configuration Guide
Table of Contents
General AAA Configuration ..........................................................................................................................104
RADIUS configuration........................................................................................................................................106
Configuring RADIUS clients ........................................................................................................................107
Configuring RADIUS accounting .................................................................................................................108
Configuring the RADIUS server ...................................................................................................................110
Attributes in the RADIUS request message .............................................................................................110
Attributes in the RADIUS accept message ...............................................................................................111
Configuring the local database accounts ..............................................................................................................111
Storing call logs with quality information ............................................................................................................113
9 IP context overview ..................................................................................................................................... 114
Introduction ........................................................................................................................................................115
IP context overview configuration task list...........................................................................................................116
Planning your IP configuration ...........................................................................................................................117
IP interface related information .....................................................................................................................117
QoS related information ...............................................................................................................................117
Configuring physical ports...................................................................................................................................117
Creating and configuring IP interfaces.................................................................................................................117
Configuring NAPT .............................................................................................................................................118
Configuring static IP routing...............................................................................................................................118
Configuring RIP..................................................................................................................................................118
Configuring access control lists............................................................................................................................119
Configuring quality of service (QoS) ...................................................................................................................119
10 IP interface configuration ........................................................................................................................... 120
Introduction ........................................................................................................................................................121
IP interface configuration task list........................................................................................................................121
Creating an IP interface ................................................................................................................................121
Deleting an IP interface ................................................................................................................................122
Setting the IP address and netmask ...............................................................................................................123
Configuring a NAPT DMZ interface ............................................................................................................123
ICMP message processing .............................................................................................................................124
ICMP redirect messages ................................................................................................................................124
Router advertisement broadcast message .......................................................................................................124
Defining the MTU and MSS of the interface ................................................................................................125
Configuring an interface as a point-to-point link ..........................................................................................126
Displaying IP interface information ..............................................................................................................126
Displaying dynamic ARP entries ...................................................................................................................127
Flushing dynamic ARP entries ......................................................................................................................127
Processing gratuitous ARP requests ...............................................................................................................127
Testing connections with the ping command ................................................................................................127
IP link supervision ........................................................................................................................................128
Check connectivity of an IP link .............................................................................................................129
Show IP link status ..................................................................................................................................129
Debug connectivity .................................................................................................................................129
8
SmartWare Software Configuration Guide
Table of Contents
Debug ARP ...................................................................................................................................................129
Traceroute ....................................................................................................................................................130
Configuring the IGMP Proxy..............................................................................................................................131
11 NAT/NAPT configuration........................................................................................................................... 132
Introduction ........................................................................................................................................................133
Dynamic NAPT ...........................................................................................................................................133
Static NAPT .................................................................................................................................................134
Dynamic NAT ..............................................................................................................................................134
Static NAT ...................................................................................................................................................135
NAPT traversal .............................................................................................................................................135
NAT/NAPT configuration task list .....................................................................................................................136
Creating a NAPT profile ...............................................................................................................................136
Configuring a NAPT DMZ host .............................................................................................................137
Defining NAPT port ranges ....................................................................................................................137
Preserving TCP/UDP port numbers in NAPT ........................................................................................138
Defining the UDP NAPT type ...............................................................................................................138
Activate NAT/NAPT ....................................................................................................................................139
Displaying NAT/NAPT configuration information ......................................................................................139
Configuring NAT static protocol entries .......................................................................................................140
12 Ethernet port configuration ........................................................................................................................ 141
Introduction ........................................................................................................................................................142
Ethernet port configuration task list ....................................................................................................................142
Entering the Ethernet port configuration mode ............................................................................................142
Configuring medium for an Ethernet port ....................................................................................................142
Configuring Ethernet encapsulation type for an Ethernet port ......................................................................143
Binding an Ethernet port to an IP interface ..................................................................................................143
Multiple IP addresses on Ethernet ports ........................................................................................................144
Configuring a VLAN ....................................................................................................................................145
Configuring layer 2 CoS to service-class mapping for an Ethernet port .........................................................146
Adding a receive mapping table entry ......................................................................................................147
Adding a transmit mapping table entry ...................................................................................................148
Closing an Ethernet port ...............................................................................................................................148
Using the built-in Ethernet sniffer .......................................................................................................................149
13 Link scheduler configuration ...................................................................................................................... 151
Introduction ........................................................................................................................................................152
Applying scheduling at the bottleneck ...........................................................................................................152
Using traffic classes .......................................................................................................................................152
Introduction to Scheduling ...........................................................................................................................153
Priority ....................................................................................................................................................153
Weighted fair queuing (WFQ) ................................................................................................................153
Shaping ...................................................................................................................................................153
Burst tolerant shaping or wfq ..................................................................................................................154
Hierarchy ................................................................................................................................................154
9
SmartWare Software Configuration Guide
Table of Contents
Quick references ..................................................................................................................................................155
Setting the modem rate .................................................................................................................................155
Command cross reference .............................................................................................................................156
Link scheduler configuration task list...................................................................................................................156
Defining the access control list profile ...........................................................................................................157
Packet classification .................................................................................................................................157
Creating an access control list ..................................................................................................................158
Creating a service policy profile .....................................................................................................................159
Specifying the handling of traffic-classes ........................................................................................................161
Defining fair queuing weight ...................................................................................................................161
Defining the bit-rate ...............................................................................................................................162
Defining absolute priority .......................................................................................................................162
Defining the maximum queue length ......................................................................................................162
Specifying the type-of-service (TOS) field ...............................................................................................162
Specifying the precedence field ................................................................................................................163
Specifying differentiated services codepoint (DSCP) marking .................................................................163
Specifying layer 2 marking ......................................................................................................................164
Defining random early detection .............................................................................................................165
Discarding Excess Load ...........................................................................................................................165
Quality of Service for routed RTP streams ....................................................................................................165
Devoting the service policy profile to an interface .........................................................................................167
Displaying link arbitration status ..................................................................................................................168
Displaying link scheduling profile information .............................................................................................168
Enable statistics gathering .............................................................................................................................168
14 Serial port configuration ............................................................................................................................. 170
Introduction ........................................................................................................................................................171
Serial port configuration task list .........................................................................................................................171
Disabling an interface ...................................................................................................................................171
Enabling an interface ....................................................................................................................................172
Configuring the serial encapsulation type ......................................................................................................173
Configuring the hardware port protocol ........................................................................................................173
Configuring the active clock edge ..................................................................................................................174
Configuring the baudrate ..............................................................................................................................175
15 Frame Relay configuration .......................................................................................................................... 177
Introduction ........................................................................................................................................................178
Frame Relay configuration task list ......................................................................................................................178
Configuring Frame Relay encapsulation ........................................................................................................178
Configuring the LMI type .............................................................................................................................179
Configuring the keep-alive interval ...............................................................................................................179
Enabling fragmentation ................................................................................................................................180
Entering Frame Relay PVC configuration mode ...........................................................................................181
Configuring the PVC encapsulation type ......................................................................................................182
Binding the Frame Relay PVC to IP interface ...............................................................................................182
10
SmartWare Software Configuration Guide
Table of Contents
Enabling a Frame Relay PVC ........................................................................................................................184
Disabling a Frame Relay PVC .......................................................................................................................184
Debugging Frame Relay ................................................................................................................................185
Displaying Frame Relay information .............................................................................................................186
Integrated service access ................................................................................................................................187
Example 1: Frame Relay on e1t1 without a channel-group ...........................................................................189
16 PRI port configuration................................................................................................................................ 191
Introduction ........................................................................................................................................................192
PRI port configuration task list............................................................................................................................192
Enable/Disable PRI port ...............................................................................................................................193
Configuring PRI port-type ............................................................................................................................193
Configuring PRI clock-mode ........................................................................................................................193
Configuring PRI line-code ............................................................................................................................193
Configuring PRI framing ..............................................................................................................................194
Configuring PRI line-build-out (E1T1 in T1 mode only) .............................................................................195
Configuring PRI used-connector (E1T1 in E1 mode only) ...........................................................................195
Configuring PRI application mode (E1T1 only) ...........................................................................................195
Configuring PRI LOS threshold (E1T1 only) ...............................................................................................196
Configuring PRI Loopback detection (E1T1 only) .......................................................................................196
Configuring PRI encapsulation .....................................................................................................................197
Create a Channel-Group ...............................................................................................................................198
Configuring Channel-Group Timeslots ........................................................................................................198
Configuring Channel-Group Encapsulation .................................................................................................198
Entering HDLC Configuration Mode ..........................................................................................................199
Configuring HDLC CRC-Type ...................................................................................................................199
Configuring HDLC Encapsulation ...............................................................................................................200
PRI Debugging .............................................................................................................................................200
PRI Configuration Examples ........................................................................................................................201
Example 1: ISDN ....................................................................................................................................202
Example 2: RBS without a channel-group ...............................................................................................202
Example 3: RBS with a channel-group ....................................................................................................202
Example 4: Frame Relay without a channel-group ...................................................................................203
Example 5: Framerelay with a channel-group ..........................................................................................204
Example 6: PPP without a channel-group ...............................................................................................204
Example 7: PPP with a channel-group .....................................................................................................204
17 BRI port configuration................................................................................................................................ 205
Introduction ........................................................................................................................................................206
BRI port configuration task list............................................................................................................................206
Enable/Disable BRI port ...............................................................................................................................206
Configuring BRI clock-mode ........................................................................................................................206
Configuring BRI Power-Feed ........................................................................................................................207
Configuring BRI encapsulation .....................................................................................................................207
Creating a channel group ..............................................................................................................................207
11
SmartWare Software Configuration Guide
Table of Contents
Configuring channel-group timeslots ............................................................................................................208
Configuring channel-group encapsulation .....................................................................................................208
Entering HDLC configuration mode ............................................................................................................208
Configuring HDLC encapsulation ................................................................................................................208
BRI Debugging .............................................................................................................................................209
BRI Configuration Examples ........................................................................................................................210
Example 1: ISDN with auto clock/uni-side settings ................................................................................210
Example 2: ISDN with manual clock/uni-side settings ............................................................................210
Example 3: Multi-Link PPP over two B-Channels ..................................................................................211
18 ISDN Overview ........................................................................................................................................... 212
Introduction ........................................................................................................................................................213
ISDN reference points ..................................................................................................................................213
Possible SmartNode port configurations .......................................................................................................214
ISDN UNI Signaling ....................................................................................................................................214
ISDN Configuration Concept .............................................................................................................................216
ISDN Layering .............................................................................................................................................216
19 ISDN configuration .................................................................................................................................... 217
Introduction ........................................................................................................................................................218
ISDN configuration task list................................................................................................................................218
Enter Q.921 configuration mode ..................................................................................................................218
Configuring Q.921 parameters .....................................................................................................................218
Configuring Q.921 encapsulation .................................................................................................................219
Enter Q.931 configuration mode ..................................................................................................................219
Configuring Q.931 parameters .....................................................................................................................220
Configuring Q.931 encapsulation .................................................................................................................222
Debugging ISDN ..........................................................................................................................................222
ISDN Configuration Examples .....................................................................................................................223
20 RBS configuration....................................................................................................................................... 225
Introduction ........................................................................................................................................................226
RBS configuration task list ..................................................................................................................................226
Enter RBS configuration mode .....................................................................................................................226
Configuring RBS protocol ............................................................................................................................226
Configuring RBS encapsulation ....................................................................................................................227
Debugging RBS ............................................................................................................................................227
RBS Configuration Examples ........................................................................................................................228
21 DSL Port Configuration.............................................................................................................................. 230
Introduction ........................................................................................................................................................231
Line Setup ...........................................................................................................................................................231
Configuring PPPoE .............................................................................................................................................231
Configuration Summary......................................................................................................................................232
Setting up permanent virtual circuits (PVC)........................................................................................................233
Using PVC channels in bridged Ethernet mode ............................................................................................233
12
SmartWare Software Configuration Guide
Table of Contents
Using PVC channels with PPPoE .................................................................................................................233
Diagnostics ...................................................................................................................................................234
Troubleshooting DSL Connections .....................................................................................................................234
22 Basic IP routing configuration .................................................................................................................... 235
Introduction ........................................................................................................................................................236
Routing tables ...............................................................................................................................................236
Static routing ................................................................................................................................................236
Policy routing ...............................................................................................................................................236
Basic IP routing configuration task list ................................................................................................................236
Configuring static IP routes ..........................................................................................................................237
Deleting static IP routes ................................................................................................................................238
Displaying IP route information ...................................................................................................................238
Configuring policy routing ...........................................................................................................................239
Examples .............................................................................................................................................................240
Basic static IP routing example ......................................................................................................................240
Changing the default UDP port range for RTP and RTCP .................................................................................241
23 RIP configuration........................................................................................................................................ 242
Introduction ........................................................................................................................................................243
Routing protocol .................................................................................................................................................243
RIP configuration task list ...................................................................................................................................244
Enabling send RIP ........................................................................................................................................244
Enabling an interface to receive RIP ..............................................................................................................245
Specifying the send RIP version ....................................................................................................................245
Specifying the receive RIP version .................................................................................................................246
Enabling RIP learning ...................................................................................................................................246
Enabling an interface to receive RIP ..............................................................................................................247
Enabling RIP announcing .............................................................................................................................247
Enabling RIP auto summarization ................................................................................................................248
Specifying the default route metric ................................................................................................................248
Enabling RIP split-horizon processing ...........................................................................................................249
Enabling the poison reverse algorithm ...........................................................................................................249
Enabling holding down aged routes ..............................................................................................................250
Setting the RIP route expiry ..........................................................................................................................250
Displaying RIP configuration of an IP interface ............................................................................................251
Displaying global RIP information ................................................................................................................251
24 Access control list configuration.................................................................................................................. 253
Introduction ........................................................................................................................................................254
About access control lists .....................................................................................................................................254
What access lists do .......................................................................................................................................254
Why you should configure access lists ...........................................................................................................254
When to configure access lists .......................................................................................................................255
Features of access control lists .......................................................................................................................255
Access control list configuration task list..............................................................................................................256
13
SmartWare Software Configuration Guide
Table of Contents
Mapping out the goals of the access control list .............................................................................................256
Creating an access control list profile and enter configuration mode .............................................................257
Adding a filter rule to the current access control list profile ...........................................................................257
Adding an ICMP filter rule to the current access control list profile ..............................................................259
Adding a TCP, UDP or SCTP filter rule to the current access control list profile .........................................261
Binding and unbinding an access control list profile to an IP interface ..........................................................263
Displaying an access control list profile .........................................................................................................264
Debugging an access control list profile .........................................................................................................264
Examples .............................................................................................................................................................266
Denying a specific subnet ..............................................................................................................................266
25 SNMP configuration ................................................................................................................................... 267
Introduction ........................................................................................................................................................268
Simple Network Management Protocol (SNMP) ................................................................................................268
SNMP basic components ..............................................................................................................................268
SNMP basic commands ................................................................................................................................268
SNMP management information base (MIB) ...............................................................................................269
Network management framework .................................................................................................................269
Identification of a SmartNode via SNMP............................................................................................................269
SNMP tools.........................................................................................................................................................270
SNMP configuration task list ..............................................................................................................................270
Setting basic system information..........................................................................................................................270
Setting access community information ................................................................................................................272
Setting allowed host information .........................................................................................................................274
Specifying the default SNMP trap target .............................................................................................................274
Displaying SNMP related information ................................................................................................................275
Using the AdventNet SNMP utilities ..................................................................................................................275
Using the MibBrowser ..................................................................................................................................276
Using the TrapViewer ...................................................................................................................................277
Standard SNMP version 1 traps...........................................................................................................................279
SNMP interface traps ..........................................................................................................................................280
26 SNTP client configuration .......................................................................................................................... 282
Introduction ........................................................................................................................................................283
SNTP client configuration task list ......................................................................................................................283
Selecting SNTP time servers .........................................................................................................................284
Defining SNTP client operating mode ..........................................................................................................284
Defining SNTP local UDP port ....................................................................................................................285
Enabling and disabling the SNTP client .......................................................................................................286
Defining SNTP client poll interval ...............................................................................................................286
Defining SNTP client constant offset to GMT .............................................................................................287
Defining the SNTP client anycast address .....................................................................................................287
Enabling and disabling local clock offset compensation .................................................................................288
Showing SNTP client related information ....................................................................................................289
Debugging SNTP client operation ................................................................................................................289
14
SmartWare Software Configuration Guide
Table of Contents
Recommended public SNTP time servers............................................................................................................290
NIST Internet time service ............................................................................................................................290
Additional information on NTP and a list of other NTP servers ...................................................................291
27 DHCP configuration................................................................................................................................... 292
Introduction ........................................................................................................................................................293
DHCP-client configuration tasks.........................................................................................................................294
Enable DHCP-client on an IP interface ........................................................................................................294
Release or renew a DHCP lease manually (advanced) ...................................................................................296
Get debug output from DHCP-client ...........................................................................................................296
DHCP-server configuration tasks ........................................................................................................................297
Configure DHCP-server profiles ...................................................................................................................297
Use DHCP-server profiles and enable the DHCP-server ...............................................................................299
Define the bootfile (Option 67) for the DHCP-server ..................................................................................300
Define the TFTP server (Option 66) for the DHCP-server ...........................................................................300
Check DHCP-server configuration and status ...............................................................................................300
Get debug output from the DHCP-server .....................................................................................................301
Configure DHCP-relay .................................................................................................................................302
Create/Modify DHCP-Relay profile .......................................................................................................302
Enable/Disable DHCP-Relay Agent ........................................................................................................303
28 DNS configuration ...................................................................................................................................... 304
Introduction ........................................................................................................................................................305
DNS configuration task list .................................................................................................................................305
Enabling the DNS resolver ............................................................................................................................305
Enabling the DNS relay ................................................................................................................................306
29 DynDNS configuration ............................................................................................................................... 308
Introduction ........................................................................................................................................................309
DynDNS configuration task list ..........................................................................................................................309
Creating a DynDNS account ........................................................................................................................309
Configuring the DNS resolver ......................................................................................................................309
Configuring basic DynDNS settings .............................................................................................................310
Configuring the DynDNS server ..................................................................................................................310
Configuring advanced DynDNS settings (optional) ......................................................................................311
Defining a mail exchanger for your hostname .........................................................................................311
Troubleshooting ...........................................................................................................................................311
30 PPP configuration....................................................................................................................................... 313
Introduction ........................................................................................................................................................314
PPP configuration task list...................................................................................................................................315
Creating an IP interface for PPP ...................................................................................................................315
Disable interface IP address auto-configuration from PPP .............................................................................317
Creating a PPP subscriber .............................................................................................................................317
Trigger forced reconnect of PPP sessions using a timer .................................................................................319
Disable interface IP address auto-configuration from PPP .............................................................................319
15
SmartWare Software Configuration Guide
Table of Contents
Configuring a PPPoE session ........................................................................................................................319
Configuring PPP over a HDLC Link ............................................................................................................321
Creating a PPP profile ...................................................................................................................................321
Configuring the local and remote PPP MRRU .............................................................................................323
Displaying PPP configuration information ...................................................................................................324
Debugging PPP ............................................................................................................................................325
Sample configurations .........................................................................................................................................329
PPP over Ethernet (PPPoE) ..........................................................................................................................329
Without authentication, encapsulation multi, with NAPT ......................................................................329
With authentication, encapsulation PPPoE .............................................................................................329
PPP over a HDLC Link (Serial Port) ............................................................................................................330
Without authentication, numbered interface ...........................................................................................330
With authentication, unnumbered interface ............................................................................................330
PPP over a HDLC Link (E1T1 Port) ............................................................................................................330
Without authentication, numbered interface ...........................................................................................330
PPP Dial-up over ISDN ......................................................................................................................................331
PPP Dialer ....................................................................................................................................................331
Create a dialer .........................................................................................................................................332
Create outbound destinations ..................................................................................................................332
Configure recovery strategy .....................................................................................................................333
Create inbound destinations ....................................................................................................................334
Debug dialer functionality .......................................................................................................................336
Example – Dial-on demand feature .........................................................................................................336
Dial-up .........................................................................................................................................................337
Dial-up on demand .................................................................................................................................337
Dial-up on monitor .................................................................................................................................338
Dial-up nailed .........................................................................................................................................338
.....................................................................................................................................................................338
31 CS context overview .................................................................................................................................... 339
Introduction ........................................................................................................................................................340
CS context configuration task list ........................................................................................................................341
Planning the CS configuration ............................................................................................................................341
Configuring general CS settings...........................................................................................................................343
Configuring the clock source ...................................................................................................................343
Debugging the clock source .....................................................................................................................344
Selecting PCM law compression ..............................................................................................................345
Configuring call routing ......................................................................................................................................345
Creating and configuring CS interfaces................................................................................................................346
Specify call routing ........................................................................................................................................346
Configuring dial tones .........................................................................................................................................347
Configuring voice over IP parameters ..................................................................................................................347
Configuring ISDN ports .....................................................................................................................................348
Configuring FXS ports ........................................................................................................................................348
16
SmartWare Software Configuration Guide
Table of Contents
Configuring an H.323 VoIP connection .............................................................................................................348
Configuring a SIP VoIP connection ....................................................................................................................348
Activating CS context configuration ....................................................................................................................349
Planning the CS context ...............................................................................................................................352
Configuring general CS settings ....................................................................................................................353
Configuring call routing ................................................................................................................................353
Configuring VoIP settings ............................................................................................................................355
Configuring BRI ports ..................................................................................................................................355
Configuring an H.323 VoIP connection .......................................................................................................356
Activating the CS context configuration ........................................................................................................356
Showing the running configuration ...............................................................................................................358
32 VPN configuration ...................................................................................................................................... 362
Introduction ........................................................................................................................................................363
Authentication ..............................................................................................................................................363
Encryption ....................................................................................................................................................363
Transport and tunnel modes .........................................................................................................................364
Permanent IKE Tunnels ..........................................................................................................................364
Key management ..........................................................................................................................................364
VPN configuration task list .................................................................................................................................365
Creating an IPsec transformation profile .......................................................................................................365
Creating an IPsec policy profile .....................................................................................................................365
Creating/modifying an outgoing ACL profile for IPsec .................................................................................367
Configuration of an IP interface and the IP router for IPsec ..........................................................................368
Displaying IPsec configuration information ..................................................................................................368
Debugging IPsec ...........................................................................................................................................369
Key management (IKE) .......................................................................................................................................370
Main differences between manual & IKE IPSEC configurations .............................................................370
Creating an ISAKMP transform profile ...................................................................................................371
Creating an ISAKMP IPSEC policy profile .............................................................................................372
Creating/modifying an outgoing ACL profile for IPSEC .........................................................................373
Configuration of an IP interface and the IP router for IPSEC .................................................................373
Policy matching ......................................................................................................................................373
Sample configuration snippet ..................................................................................................................373
Troubleshooting ...........................................................................................................................................374
Encrypted Voice - Performance considerations ....................................................................................................375
Performance considerations ...........................................................................................................................375
Enabling RTP encryption support .......................................................................................................................375
Using an alternate source IP address for specific destinations ...............................................................................376
Sample configurations .........................................................................................................................................377
IPsec tunnel, DES encryption .......................................................................................................................377
SmartNode configuration ........................................................................................................................377
Cisco router configuration .......................................................................................................................378
IPsec tunnel, AES encryption at 256 bit key length, AH authentication with HMAC-SHA1-96 ..................378
17
SmartWare Software Configuration Guide
Table of Contents
SmartNode configuration ........................................................................................................................378
Cisco router configuration .......................................................................................................................378
IPsec tunnel, 3DES encryption at 192 bit key length, ESP authentication with HMAC-MD5-96 ................379
SmartNode configuration ........................................................................................................................379
Cisco router configuration .......................................................................................................................379
33 CS interface configuration........................................................................................................................... 381
Introduction ........................................................................................................................................................382
CS interface configuration task list ......................................................................................................................382
Creating and configuring CS interfaces................................................................................................................383
Configuring call routing ......................................................................................................................................384
Configuring the interface mapping tables ............................................................................................................385
Configuring the precall service tables ...................................................................................................................388
34 ISDN interface configuration...................................................................................................................... 390
Introduction ........................................................................................................................................................391
ISDN interface configuration task list..................................................................................................................391
Configuring DTMF dialing (optional) ..........................................................................................................392
Configuring an alternate PSTN profile (optional) .........................................................................................392
Configuring ringback tone on ISDN user-side interfaces ..............................................................................393
Configuring call waiting (optional) ...............................................................................................................393
Disabling call-waiting on ISDN DSS1 network interfaces .............................................................................393
Configuring Call-Hold on ISDN interfaces ..................................................................................................394
Enabling Display Information Elements on ISDN Ports ...............................................................................394
Configuring date/time publishing to terminals (optional) .............................................................................394
Sending the connected party number (COLP) (optional) ..............................................................................395
Enabling sending of date and time on ISDN DSS1 network interfaces .........................................................395
Defining the ‘network-type’ in ISDN interfaces ............................................................................................395
ISDN Explicit Call Transfer support (& SIP REFER Transmission) ............................................................395
ISDN Advice of Charge support ...................................................................................................................397
ISDN DivertingLegInformation2 Facility .....................................................................................................401
Transmit Direction .................................................................................................................................401
Receive Direction ....................................................................................................................................401
T1 Caller-Name Support ..............................................................................................................................401
35 FXS interface configuration......................................................................................................................... 404
Introduction ........................................................................................................................................................405
FXS interface configuration task list ....................................................................................................................405
Configuring a subscriber number (recommended) ........................................................................................405
Configuring an alternate PSTN profile (optional) .........................................................................................406
Configuring caller-ID presentation (optional) ...............................................................................................406
Configuring flash hook processing (optional) ................................................................................................406
Configuring ringing-cadence (optional) ........................................................................................................407
Configuring the Message Waiting Indication feature for FXS .......................................................................408
Configuration .........................................................................................................................................408
Frequency-shift keying ............................................................................................................................409
18
SmartWare Software Configuration Guide
Table of Contents
FXS supplementary services description...............................................................................................................410
Call hold .......................................................................................................................................................411
Call waiting ...................................................................................................................................................411
Call waiting reminder ring ............................................................................................................................412
Drop passive call ...........................................................................................................................................412
Drop active call .............................................................................................................................................412
Call toggle .....................................................................................................................................................412
Call transfer ..................................................................................................................................................412
Conferencing ................................................................................................................................................413
Call park .......................................................................................................................................................413
36 FXO interface configuration ....................................................................................................................... 414
Introduction ........................................................................................................................................................415
FXO services description .....................................................................................................................................416
Creating an FXO interface...................................................................................................................................416
Deleting an FXO interface...................................................................................................................................417
FXO interface configuration task list ...................................................................................................................418
FXO off-hook on caller ID ...........................................................................................................................418
Configuring an alternate PSTN profile (optional) .........................................................................................418
Configuring when the digits are dialed (optional) .........................................................................................419
Configuring the number of rings to wait before answering the call (optional) ...............................................421
Configuring how to detect a call has disconnected (optional) ........................................................................422
Configuring how to detect an outgoing call is connected (optional) ..............................................................423
Configuring the destination of the call ..........................................................................................................424
FXO Mute dialing ........................................................................................................................................424
FXO interface examples ................................................................................................................................425
37 RBS interface configuration ........................................................................................................................ 426
Introduction ........................................................................................................................................................427
RBS interface configuration task list ....................................................................................................................427
Creating/Deleting a RBS interface .......................................................................................................................427
Configuring an alternate PSTN profile .........................................................................................................427
Configuring an alternate Tone-Set profile .....................................................................................................428
Configuring B-Channel allocation strategy ...................................................................................................428
Configuring additional disconnect signals .....................................................................................................428
Configuring number of Rings before Off-Hook ............................................................................................429
Configuring ready to dial strategy .................................................................................................................429
RBS interface debugging ...............................................................................................................................429
38 H.323 interface configuration ..................................................................................................................... 431
Introduction ........................................................................................................................................................432
H.323 interface configuration task list .................................................................................................................432
Binding the interface to an H.323 gateway ...................................................................................................433
Configuring an alternate VoIP profile (optional) ...........................................................................................434
Configuring CLIP/CLIR support (optional) .................................................................................................435
Enabling ‘early-proceeding’ on H.323 interfaces ...........................................................................................436
19
SmartWare Software Configuration Guide
Table of Contents
Enabling the early call connect (optional) .....................................................................................................436
Enabling the early call disconnect (optional) .................................................................................................437
Enabling the via address support (optional) ...................................................................................................437
Override the default destination call signaling port (Optional) ......................................................................437
Configuring status inquiry settings (optional) ...............................................................................................438
AOC-D Support for H.323 ..........................................................................................................................439
39 SIP interface configuration ......................................................................................................................... 441
Introduction ........................................................................................................................................................442
SIP interface configuration task list......................................................................................................................442
Binding the interface to a SIP gateway ..........................................................................................................443
Configure a remote host ................................................................................................................................443
Configuring a local host (Optional) ..............................................................................................................444
Using an alternate VoIP profile (Optional) ...................................................................................................444
Using an alternate SIP profile (Optional) ......................................................................................................445
Using an alternate Tone-Set profile (Optional) .............................................................................................445
Configuring early call connect / disconnect (Optional) .................................................................................446
Configuring address translation (Optional) ...................................................................................................446
Mapping call-control properties in SIP headers .......................................................................................446
Mapping SIP headers to call-control properties .......................................................................................447
Configuring ISDN Redirecting Number Tunneling Over SIP ................................................................447
Enabling SIP RFC Privacy, Asserted-Identity, & Preferred-Identity headers (RFC 3323/3325) ..............448
Updating caller address parameters ..........................................................................................................448
SIP Diversion Header ..............................................................................................................................449
Transmit Direction ...........................................................................................................................450
Receive Direction ..............................................................................................................................450
SIP REFER Transmission (& ISDN Explicit Call Transfer support) ............................................................451
AOC Over SIP (Optional) ............................................................................................................................453
Enabling the session timer (Optional) ...........................................................................................................454
Enabling the SIP penalty-box feature (Optional) ...........................................................................................454
Initiating a new SIP session for redirected SIP calls (Optional) .....................................................................454
Configure the SIP hold method (Optional) ..................................................................................................455
40 Call router configuration............................................................................................................................. 456
Introduction ........................................................................................................................................................458
Call router configuration task list.........................................................................................................................460
Map out the goals for the call router .............................................................................................................460
Enable advanced call routing on circuit interfaces .........................................................................................461
Configure general call router behavior ...........................................................................................................461
Configure address completion timeout ....................................................................................................461
Configure default digit collection timeout and terminating character ......................................................462
Configure number prefix for ISDN number types ........................................................................................463
Configure call routing tables .........................................................................................................................464
Create a routing table ..............................................................................................................................464
Called party number routing table ................................................................................................................466
20
SmartWare Software Configuration Guide
Table of Contents
Regular Expressions .................................................................................................................................466
Digit Collection ......................................................................................................................................468
Digit Collection Variants ........................................................................................................................469
Calling party number routing table .........................................................................................................472
Number type routing table ............................................................................................................................472
Numbering plan routing table .......................................................................................................................473
Name routing table .......................................................................................................................................474
IP address routing table .................................................................................................................................474
URI routing table ..........................................................................................................................................475
Presentation Indicator Routing Table ...........................................................................................................475
Screening Indicator Routing Table ...............................................................................................................476
Information transfer capability routing table .................................................................................................477
Call-router support for redirecting number and redirect reason .....................................................................478
Time of day routing table ..............................................................................................................................479
Day of Week Routing Table .........................................................................................................................479
Date routing table .........................................................................................................................................479
Deleting routing tables ..................................................................................................................................480
Configure mapping tables .............................................................................................................................481
E.164 to E.164 Mapping Tables ...................................................................................................................485
Custom SIP URIs from called-/calling-e164 properties .................................................................................488
Other mapping tables ...................................................................................................................................488
Deleting mapping tables ...............................................................................................................................489
Creating complex functions ..........................................................................................................................490
Deleting complex functions ..........................................................................................................................491
Digit collection & sending-complete behavior ..............................................................................................492
Sending-Complete ..................................................................................................................................492
Ingress interface .......................................................................................................................................492
Call-Router .............................................................................................................................................493
Egress Interface .......................................................................................................................................495
Creating call services .....................................................................................................................................497
Creating a hunt group service ........................................................................................................................497
Creating a distribution group service .............................................................................................................506
Distribution-Group Min-Concurrent setting ................................................................................................508
Call-router ‘limiter’ service ............................................................................................................................508
Priority service ..............................................................................................................................................509
CS Bridge service—‘VoIP Leased Line’ .........................................................................................................511
Configuring the service second-dialtone ........................................................................................................513
Deleting call services .....................................................................................................................................514
Activate the call router configuration ............................................................................................................514
Test the call router configuration ..................................................................................................................515
Configure partial rerouting ...........................................................................................................................521
Call reroute .............................................................................................................................................522
Enable acceptation of rerouting requests on ISDN. ...........................................................................522
Enable emission of rerouting requests on ISDN. ...............................................................................522
21
SmartWare Software Configuration Guide
Table of Contents
Enable sending of “302 moved temporary” message on SIP. .............................................................522
Allow Push-Back .....................................................................................................................................522
Enable push-back – aaa service ..........................................................................................................522
Enable push-back – bridge service .....................................................................................................523
Enable push-back – distribution-group service ..................................................................................523
Enable push-back – hunt group service .............................................................................................523
Enable push-back – limiter service ....................................................................................................523
Enable push-back – priority service ...................................................................................................523
41 SIP call-router services ................................................................................................................................ 524
Introduction ........................................................................................................................................................525
SIP conference-service .........................................................................................................................................525
SIP conference-service configuration task list ................................................................................................525
Entering conference-service configuration mode .....................................................................................525
Configuring the call routing destination ..................................................................................................525
Configuring the conference server ...........................................................................................................526
SIP location-service..............................................................................................................................................526
SIP location-service configuration task list ....................................................................................................527
Entering SIP location-service configuration mode ...................................................................................527
Binding a location service ........................................................................................................................528
Configuring multi-contact behavior ........................................................................................................528
Configuring the hunt timeout .................................................................................................................528
42 Tone configuration...................................................................................................................................... 529
Introduction ........................................................................................................................................................530
Tone-set profiles..................................................................................................................................................530
Tone configuration task list .................................................................................................................................531
Configuring call-progress-tone profiles ..........................................................................................................531
Configure tone-set profiles ............................................................................................................................532
Enable tone-set profile ..................................................................................................................................533
Show call-progress-tone and tone-set profiles ................................................................................................534
43 FXS port configuration ............................................................................................................................... 537
Introduction ........................................................................................................................................................538
Shutdown and enable FXS ports..........................................................................................................................538
Bind FXS ports to higher layer applications .........................................................................................................539
Configure country-specific FXS port parameters..................................................................................................539
Other FXS port parameters..................................................................................................................................540
Example ..............................................................................................................................................................541
44 FXO port configuration .............................................................................................................................. 542
Introduction ........................................................................................................................................................543
Shutdown and enable FXO ports.........................................................................................................................543
Bind FXO ports to higher layer applications........................................................................................................543
Configure country specific FXO port parameters.................................................................................................544
Other FXO port parameters ................................................................................................................................544
22
SmartWare Software Configuration Guide
Table of Contents
45 H.323 gateway configuration ...................................................................................................................... 546
Introduction ........................................................................................................................................................547
Gateway configuration task list ............................................................................................................................548
Binding the gateway to an IP interface ..........................................................................................................548
Enable the gateway ........................................................................................................................................548
Configure registration authentication service (RAS) (Optional) ....................................................................549
Configure H.235 Security (optional) ............................................................................................................550
H.235 configuration .....................................................................................................................................551
Advanced configuration options (optional) ...................................................................................................554
Enabling H.245 Tunneling .....................................................................................................................554
Enabling the fastconnect procedure .........................................................................................................555
Enabling the early H.245 procedure ........................................................................................................555
Changing the TCP port for inbound call-signaling connections ..............................................................556
Configuring the traffic class for H.323 signaling .....................................................................................556
Setting the response timeout ...................................................................................................................556
Setting the connect timeout ....................................................................................................................557
Configuring the terminal type for registration with the gatekeeper ..........................................................557
Troubleshooting ...........................................................................................................................................558
46 Context SIP gateway overview..................................................................................................................... 559
Introduction ........................................................................................................................................................560
Context SIP Gateway configuration task list........................................................................................................561
Creating a context SIP gateway .....................................................................................................................561
Creating a transport interface ........................................................................................................................562
Configuring the IP binding ...........................................................................................................................562
Configuring a priority ...................................................................................................................................562
Configuring a spoofed contact address ..........................................................................................................563
Binding location services ...............................................................................................................................563
Enabling/disabling the context SIP gateway ..................................................................................................563
Troubleshooting ..................................................................................................................................................564
Show status information ...............................................................................................................................564
Debug commands .........................................................................................................................................564
Configuration Examples ......................................................................................................................................565
Example 1 .....................................................................................................................................................565
Example 2 .....................................................................................................................................................565
Example 3 .....................................................................................................................................................565
Applications.........................................................................................................................................................566
Outbound Authentication ............................................................................................................................566
Inbound Authentication ...............................................................................................................................567
Outbound Registration .................................................................................................................................568
Inbound Registration ....................................................................................................................................570
B2B User Agent with Registered Clients .......................................................................................................571
47 VoIP profile configuration .......................................................................................................................... 573
Introduction ........................................................................................................................................................574
23
SmartWare Software Configuration Guide
Table of Contents
VoIP profile configuration task list ......................................................................................................................575
Creating a VoIP profile .................................................................................................................................575
Configure codecs ..........................................................................................................................................576
Configuring the transparent-clearmode codec ...............................................................................................578
Configuring the Cisco versions of the G.726 codecs .....................................................................................578
Configuring DTMF relay .............................................................................................................................579
Configuring RTP payload types ....................................................................................................................579
Configuring RTP payload type for transparent-clearmode ............................................................................580
Configuring RTP payload types for the g726-32k and g726-32k-cisco coders ..............................................580
Configuring RTP payload type for Cisco NSE ..............................................................................................580
Configuring Cisco NSE for Fax ....................................................................................................................580
Configuring the dejitter buffer (advanced) ....................................................................................................581
Enabling/disabling filters (advanced) .............................................................................................................583
Configuring Fax transmission .......................................................................................................................584
T.38 CED retransmission .............................................................................................................................587
T.38 No-Signal Retransmission ....................................................................................................................588
Fax bypass method ........................................................................................................................................588
Configuring fax failover ................................................................................................................................588
Configuring modem transmission .................................................................................................................589
Modem bypass method .................................................................................................................................589
Configuring the traffic class for Voice and Fax data ......................................................................................590
Configuring IP-IP codec negotiation .............................................................................................................590
Examples .............................................................................................................................................................591
Home office in an enterprise network ...........................................................................................................591
Home office with fax ....................................................................................................................................593
Soft phone client gateway ..............................................................................................................................594
48 PSTN profile configuration......................................................................................................................... 597
Introduction ........................................................................................................................................................598
PSTN profile configuration task list ....................................................................................................................598
Creating a PSTN profile ...............................................................................................................................598
Configuring the echo canceller ......................................................................................................................599
Configuring output gain ...............................................................................................................................599
49 SIP profile configuration............................................................................................................................. 601
Introduction ........................................................................................................................................................602
SIP profile configuration task list.........................................................................................................................602
Entering the configuration mode for a SIP profile .........................................................................................602
Mapping from a SIP disconnect cause ...........................................................................................................602
Mapping to a SIP cause .................................................................................................................................603
Mapping from a SIP redirection reason .........................................................................................................603
Mapping to a SIP redirection code ................................................................................................................603
50 Authentication Service................................................................................................................................. 604
Introduction ........................................................................................................................................................605
Authentication Service configuration task list ......................................................................................................605
24
SmartWare Software Configuration Guide
Table of Contents
Creating an Authentication Service ...............................................................................................................605
Configuring a Realm .....................................................................................................................................606
Configuring the authentication protocol .......................................................................................................606
Creating credentials ......................................................................................................................................606
Configuration Examples ......................................................................................................................................606
51 Location Service .......................................................................................................................................... 607
Introduction ........................................................................................................................................................608
Location Service configuration task list ................................................................................................................608
Creating a Location Service ...........................................................................................................................608
Adding a domain ..........................................................................................................................................608
Creating an identity ......................................................................................................................................609
Authentication outbound face .................................................................................................................610
Authentication inbound face ...................................................................................................................611
Registration outbound face ......................................................................................................................613
Registration inbound face ........................................................................................................................615
Call outbound face ..................................................................................................................................616
Call inbound face ....................................................................................................................................617
Creating an identity group ............................................................................................................................618
Inheriting from an identity group to an identity ...........................................................................................618
Configuring the Message Waiting Indication feature for SIP ........................................................................619
Subscription ............................................................................................................................................619
Notification .............................................................................................................................................620
Configuration .........................................................................................................................................620
Message Waiting Indication through Call-Control .......................................................................................622
Configuration Examples ......................................................................................................................................623
52 VoIP debugging........................................................................................................................................... 624
Introduction ........................................................................................................................................................625
Debugging strategy..............................................................................................................................................625
Filtering debug monitor output ...........................................................................................................................626
Verifying IP connectivity .....................................................................................................................................626
Debugging call signaling......................................................................................................................................627
Debugging ISDN signaling ...........................................................................................................................627
Verify an incoming call ...........................................................................................................................628
Verify an outgoing call ............................................................................................................................629
Verify ISDN layer 2 and 3 status .............................................................................................................631
Debugging FXS Signaling .............................................................................................................................632
Verify an incoming call ...........................................................................................................................632
Verify an outgoing call ............................................................................................................................633
Debugging H.323 Signaling .........................................................................................................................634
Verify an incoming call ...........................................................................................................................634
Verify an outgoing call ............................................................................................................................636
Debugging SIP signaling ...............................................................................................................................638
Verify an incoming call ...........................................................................................................................638
25
SmartWare Software Configuration Guide
Table of Contents
Verify an outgoing call ............................................................................................................................638
Using SmartWare’s internal call generator .....................................................................................................639
Debugging voice data ..........................................................................................................................................640
Check system logs .........................................................................................................................................642
How to submit trouble reports to Patton ......................................................................................................642
A Terms and definitions ................................................................................................................................ 644
Introduction ........................................................................................................................................................645
SmartWare architecture terms and definitions .....................................................................................................645
B Mode summary ........................................................................................................................................... 650
Introduction ........................................................................................................................................................651
C Command summary ................................................................................................................................... 654
Introduction ........................................................................................................................................................655
New Configuration Commands ..........................................................................................................................656
Other...................................................................................................................................................................656
Show help .....................................................................................................................................................656
Show command history ................................................................................................................................656
Restart system ...............................................................................................................................................656
D Internetworking terms & acronyms ........................................................................................................... 657
Abbreviations.......................................................................................................................................................658
E Used IP ports & available voice codecs ...................................................................................................... 662
Used IP ports ......................................................................................................................................................663
Available voice codecs .........................................................................................................................................664
26
List of Figures
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
Basic system (abstract) model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Typical carrier network application with a SmartNode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Typical enterprise network with SmartNode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Typical LAN telephony system with a SmartNode gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Configuration concept overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Setup for initial configuration via the console port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Login display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
SmartNode memory regions logically defined in SmartWare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Boot procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Sample configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Local memory regions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Remote memory regions for SmartWare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
System banner with message to operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Authentication procedure with a RADIUS server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
How to use AAA methods and AAA profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
IP context and related elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Dynamic NAPT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Static NAPT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Dynamic NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Static NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Binding of an Ethernet port to an IP interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Packet routing in SmartWare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Example of Hierarchical Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Elements of link scheduler configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Scenario with Web server regarded as a single source host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Structure of a Service-Policy Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Using a Service Policy Profile on an IP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
IP interface wan is bound to PVC 1 on port serial 0 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Typical Integrated Service Access Scenario with dedicated PVCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
IP Context with logical IP interfaces bound to Ethernet port, serial port PVC 1 and PVC 2 . . . . . . . . . . . . . 188
ISDN reference points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
ISDN signaling side . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Integration of ISDN access lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
ISDN layering model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
PBX connected to ISDN port 1/0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Configuring the G.SHDSL card for PPPoE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Internetwork with three routers and four networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
Using traffic filters to prevent traffic from being routed to a network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Deny a specific subnet on an interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
AdventNet MibBrowser displaying some of the System Group objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
AdventNet MibBrowser Settings Button on the Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
AdventNet TrapViewer displaying received traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
AdventNet Trap Details window of TrapViewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
DHCP-client and DHCP-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
DNS relay diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
PPP configuration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
CS context configuration components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
27
SmartWare Software Configuration Guide
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
Remote office in an Enterprise network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Direct call routing from one SmartNode to another . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
SmartNode in an Enterprise network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
CS Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
CS interfaces on the CS context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Incoming call passing an interface mapping table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
Call passing an input and an output mapping table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
ISDN interfaces on the CS context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Example SIP network connecting two device to give a home office access to the CO PBX . . . . . . . . . . . . . . . 396
FXS interfaces on the CS context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
FXO interfaces on the CS context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
H.323 interfaces on the CS context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
SIP interfaces on the CS context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
Example SIP network connecting two devices to give a home office access to the CO PBX . . . . . . . . . . . . . . 452
Direct call routing vs. advanced call routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Routing table outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
Mapping table outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Mapping table examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484
Hunt group service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498
Distribution group service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
Distribution group service examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507
‘Limiter’ service diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
Priority service diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
CS Bridge service—‘VoIP Leased Line’ diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Bridge services diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
Call routing example network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517
CS context and call router elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
Registration and Lookup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
Assign tone-sets to a PSTN interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
Gateway between IP and CS contexts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
Routing Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560
VoIP profile association . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
DTMF Relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Jitter and dejitter buffer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581
Adaptive versus static dejitter buffer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
Multiple tandem and sequential post filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Fax relay and Fax bypass . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Home office in an enterprise network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
PSTN profile association . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
Echo Cancellation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
Applying output gain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
Mode overview, 1 of 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Mode Overview, 2 of 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652
Mode Overview, 3 of 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653
EBNF syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
28
List of Tables
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
General conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Mouse conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Command edit shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Command cross reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
TOS values and their meaning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Traffic control info (TCI) field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Values defining detail of the queuing statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
PVC Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
PVC channels in bridged Ethernet mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
PVC channels in PPPoE mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Diagnostics commans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Details available in the Trap Details window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Time servers operated by NIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
FXS services with permanent patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
FXS services with configurable patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
ISDN number types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Routing table types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
Wildcard symbols used as keys in E.164 tables (calling-e164, called-e164) . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Wildcard symbols used as keys in E.164 tables (calling-e164, called-e164) . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
Mapping table types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Hunt group drop causes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
29
About this guide
The objective of this SmartWare Software Configuration Guide is to provide information concerning the syntax
and usage of the command set. For hardware specfic information, refer to the getting started guide that came
with your unit.
This section describes the following:
• Who should use this guide (see “Audience”)
• How this document is organized (see “Structure”)
• Typographical conventions and terms used in this guide (see “Typographical conventions used in this document” on page 34)
Audience
This guide is intended for the following users:
• System administrators who are responsible for installing and configuring networking equipment and who
are familiar with the SmartWare.
• System administrators with a basic networking background and experience, but who might not be familiar
with the SmartWare.
• Operators
• Installers
• Maintenance technicians
How to read this guide
SmartWare is a complex and multifaceted operating system. Without the necessary theoretical background you
will not be able to understand and use all the features available. Therefore, we recommend reading at least the
chapters listed below to get a general idea about SmartWare and the philosophy of contexts used for IP and circuit switching related configuration.
• Appendix A, "Terms and definitions" on page 644 contains the terms and their definitions that are used
throughout this SmartWare Software Configuration Guide
• Chapter 1, "System overview" on page 38 provides an overview of the main elements of a SmartWare system.
• Chapter 9, "IP context overview" on page 114
• Chapter 31, "CS context overview" on page 339
30
SmartWare Software Configuration Guide
About this guide
Structure
This guide contains the following chapters and appendices:
• Chapter 1, "System overview" on page 38 provides an overview of the main elements of a SmartWare system.
• Chapter 2, "Configuration concepts" on page 44 introduces basic SmartWare configuration concepts.
• Chapter 3, "Command line interface (CLI)" on page 49 gives an overview of the CLI and the basic features
that allow you to navigate the CLI and edit commands effectively.
• Chapter 4, "Accessing the CLI" on page 53 describes the procedures for entering SmartWare commands via
the command line interface (CLI), to obtain help, to change operator mode and to terminate a session.
• Chapter 5, "System image handling" on page 65 describes how to load and maintain system images and
driver software.
• Chapter 6, "Configuration file handling" on page 76 describes how to upload and download configuration
files from and to a SmartNode.
• Chapter 7, "Basic system management" on page 90 describes parameters that report basic system information to the operator or administrator, and their configuration.
• Chapter 8, "RADIUS Client Configuration" on page 102 provides an overview of the authentication,
authorization, and accounting (AAA) component in SmartWare and describes how to configure the
RADIUS client, a subpart of the AAA component.
• Chapter 9, "IP context overview" on page 114 outlines SmartWare Internet protocol (IP) context, together
with its related components.
• Chapter 10, "IP interface configuration" on page 120 provides a general overview of SmartNode interfaces
and describes the tasks involved in their configuration.
• Chapter 11, "NAT/NAPT configuration" on page 132 provides a general overview of the network address
port translation and describes the tasks involved in its configuration.
• Chapter 12, "Ethernet port configuration" on page 141 provides an overview of Ethernet ports and
describes the tasks involved in their configuration through SmartWare.
• Chapter 13, "Link scheduler configuration" on page 151 describes how to use and configure SmartWare
quality of service (QoS) features.
• Chapter 14, "Serial port configuration" on page 170 provides an overview of the serial port and describes
the tasks involved in its configuration through SmartWare.
• Chapter 15, "Frame Relay configuration" on page 177 provides an overview of how to configure frame relay
through SmartWare.
• Chapter 16, "PRI port configuration" on page 191 provides an overview of the T1/E1 ports, their characteristics and the tasks involved in the configuration.
• Chapter 17, "BRI port configuration" on page 205 provides an overview of the BRI (Basic Rate Interface)
ports, their characteristics and the tasks involved in the configuration.
• Chapter 18, "ISDN Overview" on page 212 provides an overview of ISDN ports and describes the tasks
involved in configuring ISDN ports in SmartWare.
31
SmartWare Software Configuration Guide
About this guide
• Chapter 19, "ISDN configuration" on page 217 describes the configuration of the Q.921 and Q.931 protocol and how to bind the ISDN protocol to an application.
• Chapter 20, "RBS configuration" on page 225 describes the configuration of the Robbed Bit Signaling
(RBS) protocol and how to bind it to the Call Control application.
• Chapter 37, "RBS interface configuration" on page 426 provides an overview of RBS interfaces, and the
tasks involved in their configuration.
• Chapter 21, "DSL Port Configuration" on page 230 provides an overview of the the DSL ports (ADSL and
G.SHDSL), their characteristics and the tasks involved in the configuration.
• Chapter 22, "Basic IP routing configuration" on page 235 provides an overview of IP routing and describes
the tasks involved in configuring static IP routing in SmartWare.
• Chapter 23, "RIP configuration" on page 242 provides an overview of the routing information protocol
(RIP) and describes the tasks involved in configuring RIP features within SmartWare.
• Chapter 24, "Access control list configuration" on page 253 provides an overview of IP access control lists
and describes the tasks involved in their configuration through SmartWare.
• Chapter 25, "SNMP configuration" on page 267 on page 238 provides overview information about the
simple network management protocol (SNMP) and describes the tasks used to configure those of its features
supported by SmartWare.
• Chapter 26, "SNTP client configuration" on page 282 describes how to configure a simple network time protocol (SNTP) client.
• Chapter 27, "DHCP configuration" on page 292 provides an overview of the dynamic host configuration
control protocol (DHCP) and describes the tasks involved in its configuration.
• Chapter 28, "DNS configuration" on page 304 describes how to configure the domain name system
(DNS) component.
• Chapter 29, "DynDNS configuration" on page 308 describes configuring the dynamic DNS
(DynDNS) service.
• Chapter 30, "PPP configuration" on page 313 describes how to configure the point-to-point protocol over
different link layers.
• Chapter 31, "CS context overview" on page 339 gives an overview of SmartWare circuit-switching (CS) context and its associated components and describes the tasks involved in its configuration.
• Chapter 32, "VPN configuration" on page 362 describes how to configure the VPN connections between
two SmartNodes or between a SmartNode and a third-party device.
• Chapter 33, "CS interface configuration" on page 381 gives an overview of interfaces in the CS context and
describes the tasks involved its configuration.
• Chapter 34, "ISDN interface configuration" on page 390 provides an overview of ISDN interfaces, and the
tasks involved in their configuration.
• Chapter 35, "FXS interface configuration" on page 404 provides an overview of FXS interfaces, and the
tasks involved their configuration.
32
SmartWare Software Configuration Guide
About this guide
• Chapter 36, "FXO interface configuration" on page 414 provides an overview of FXO interfaces and the
tasks involved in configuring them.
• Chapter 38, "H.323 interface configuration" on page 431 provides an overview of H.323 interfaces used by
H.323 gateways and describes the specific tasks involved in their configuration.
• Chapter 39, "SIP interface configuration" on page 441 provides an overview of SIP interfaces used by SIP
gateways and describes the specific tasks involved in their configuration.
• Chapter 40, "Call router configuration" on page 456 provides an overview of call router tables, mapping
tables and call services and describes the tasks involved in configuring the call router in SmartWare.
• Chapter 41, "SIP call-router services" on page 524 provides an overview of specific SIP call router services
in SmartWare.
• Chapter 42, "Tone configuration" on page 529 gives an overview of SmartWare call-progress-tone profiles
and tone-set profiles and describes the tasks involved in their configuration.
• Chapter 43, "FXS port configuration" on page 537 provides an overview of POTS signaling and SmartNode FXS ports and describes the tasks involved in configuring FXS ports in SmartWare.
• Chapter 44, "FXO port configuration" on page 542 provides an overview of POTS signaling and SmartNode FXO ports and describes the tasks involved in configuring FXO ports in SmartWare.
• Chapter 45, "H.323 gateway configuration" on page 546 provides an overview of the H.323 gateway and
describes the tasks involved in its configuration.
• Chapter 46, "Context SIP gateway overview" on page 559 provides an overview of the SIP gateway and
describes the tasks involved in its configuration.
• Chapter 47, "VoIP profile configuration" on page 573 gives an overview of SmartWare VoIP profiles, how
they are used and describes the tasks involved in VoIP profile configuration.
• Chapter 48, "PSTN profile configuration" on page 597 gives an overview of SmartWare PSTN profiles, and
describes how they are used and the tasks involved in PSTN profile configuration.
• Chapter 49, "SIP profile configuration" on page 601 gives an overview of mappings between SIP codes and
Q.931 causes.
• Chapter 50, "Authentication Service" on page 604 explains how to create and manage authentication services in SmartWare.
• Chapter 51, "Location Service" on page 607 explains how to configure location services in SmartWare.
• Chapter 52, "VoIP debugging" on page 624 helps you to localize a system component that is responsible for
faults during operation of a SmartNode device.
• Appendix A, "Terms and definitions" on page 644 contains the terms and their definitions that are used
throughout this SmartWare Software Configuration Guide.
• Appendix B, "Mode summary" on page 650 illustrates the modes hierarchy.
• Appendix C, "Command summary" on page 654 is a command reference.
• Appendix D, "Internetworking terms & acronyms" on page 657 contains terms and definitions relating to
internetworking.
33
SmartWare Software Configuration Guide
About this guide
• Appendix E, "Used IP ports & available voice codecs" on page 662 describes the used IP ports and available
voice codecs in SmartWare.
• Appendix F, "Notes for upgrading from R3.10 to R3.20" on page 618 describes how to upgrade a
SmartNode device from Release 3.10 to 3.20.
Precautions
The following are used in this guide to help you become aware of potential problems:
Note
A note presents additional information or interesting sidelights.
The alert symbol and IMPORTANT heading calls attention to
important information.
IMPORTANT
Typographical conventions used in this document
This section describes the typographical conventions and terms used in this guide.
General conventions
In this guide we use certain typographical conventions to distinguish elements of commands and examples. In
general, the conventions we use conform to those found in IEEE POSIX publications. The procedures
described in this manual use the following text conventions:
Table 1. General conventions
Convention
Meaning
Garamond blue type
Indicates a cross-reference hyperlink that points to a figure, graphic, table, or
section heading. Clicking on the hyperlink jumps you to the reference. When
you have finished reviewing the reference, click on the Go to Previous
View button
in the Adobe® Acrobat® Reader toolbar to return to your
starting point.
Futura bold type
Commands and keywords are in boldface font.
Futura bold-italic type
Parts of commands, which are related to elements already named by the
user, are in boldface italic font.
Italicized Futura type
Variables for which you supply values are in italic font
Garamond italic type
Garamond bold type
<>
Indicates the names of fields or windows.
[]
Elements in square brackets are optional.
{a | b | c}
Alternative but required keywords are grouped in braces ({ }) and are separated by vertical bars ( | )
node
The leading IP address or nodename of a SmartNode is substituted with
node in boldface italic font.
node
The leading node on a command line represents the nodename of the
SmartNode
Indicates the names of command buttons that execute an action.
Angle brackets indicate function and keyboard keys, such as ,
, , and so on.
34
SmartWare Software Configuration Guide
About this guide
Table 1. General conventions
Convention
#
Meaning
An hash sign at the beginning of a line indicates a comment line.
35
SmartWare Software Configuration Guide
About this guide
Mouse conventions
The following conventions are used when describing mouse actions:
Table 2. Mouse conventions
Convention
Meaning
Left mouse button
This button refers to the primary or leftmost mouse button (unless you have
changed the default configuration).
Right mouse button
This button refers the secondary or rightmost mouse button (unless you have
changed the default configuration).
Point
This word means to move the mouse in such a way that the tip of the pointing
arrow on the screen ends up resting at the desired location.
Click
Means to quickly press and release the left or right mouse button (as instructed in
the procedure). Make sure you do not move the mouse pointer while clicking a
mouse button.
Double-click
Means to press and release the same mouse button two times quickly
Drag
This word means to point the arrow and then hold down the left or right mouse button (as instructed in the procedure) as you move the mouse to a new location.
When you have moved the mouse pointer to the desired location, you can release
the mouse button.
Service and support
Patton Electronics offers a wide array of free technical services. If you have questions about any of our other
products we recommend you begin your search for answers by using our technical knowledge base. Here, we
have gathered together many of the more commonly asked questions and compiled them into a searchable
database to help you quickly solve your problems.
Patton support headquarters in the USA
• Online support: Available at www.patton.com
• E-mail support: E-mail sent to support@patton.com will be answered within 1 business day
• Telephone support: Standard telephone support is available five days a week—from 8:00 am to
5:00 pm EST (1300 to 2200 UTC/GMT)—by calling +1 (301) 975-1007
• Support via VoIP: Contact Patton free of charge by using a VoIP ISP phone to call
sip:support@patton.com
• Fax: +1 (253) 663-5693
Alternate Patton support for Europe, Middle East, and Africa (EMEA)
• Online support: Available at www.patton-inalp.com
• E-mail support: E-mail sent to support@patton-inalp.com will be answered within 1 business day
• Telephone support: Standard telephone support is available five days a week—from 8:00 am to
5:00 pm CET (0900 to 1800 UTC/GMT)—by calling +41 (0)31 985 25 55
• Fax: +41 (0)31 985 25 26
Service and support
36
SmartWare Software Configuration Guide
About this guide
Warranty Service and Returned Merchandise Authorizations (RMAs)
Patton Electronics is an ISO-9001 certified manufacturer and our products are carefully tested before shipment. All of our products are backed by a comprehensive warranty program.
Note
If you purchased your equipment from a Patton Electronics reseller, ask your
reseller how you should proceed with warranty service. It is often more convenient for you to work with your local reseller to obtain a replacement.
Patton services our products no matter how you acquired them.
Warranty coverage
Our products are under warranty to be free from defects, and we will, at our option, repair or replace the product should it fail within one year from the first date of shipment. Our warranty is limited to defects in workmanship or materials, and does not cover customer damage, lightning or power surge damage, abuse, or
unauthorized modification.
Returns for credit
Customer satisfaction is important to us, therefore any product may be returned with authorization within 30
days from the shipment date for a full credit of the purchase price. If you have ordered the wrong equipment or
you are dissatisfied in any way, please contact us to request an RMA number to accept your return. Patton is
not responsible for equipment returned without a Return Authorization.
Return for credit policy
• Less than 30 days: No Charge. Your credit will be issued upon receipt and inspection of the equipment.
• 30 to 60 days: We will add a 20% restocking charge (crediting your account with 80% of the purchase price).
• Over 60 days: Products will be accepted for repairs only.
RMA numbers
RMA numbers are required for all product returns. You can obtain an RMA by doing one of the following:
• Completing a request on the RMA Request page in the Support section at www.patton.com
• By calling +1 (301) 975-1007 and speaking to a Technical Support Engineer
• By sending an e-mail to returns@patton.com
All returned units must have the RMA number clearly visible on the outside of the shipping container. Please use
the original packing material that the device came in or pack the unit securely to avoid damage during shipping.
Shipping instructions
The RMA number should be clearly visible on the address label. Our shipping address is as follows:
Patton Electronics Company
RMA#: xxxx
7622 Rickenbacker Dr.
Gaithersburg, MD 20879-4773 USA
Patton will ship the equipment back to you in the same manner you ship it to us. Patton will pay the return
shipping costs.
Warranty Service and Returned Merchandise Authorizations (RMAs)
37
Chapter 1
System overview
Chapter contents
Introduction ..........................................................................................................................................................39
SmartWare embedded software .............................................................................................................................40
Applications...........................................................................................................................................................41
Carrier networks .............................................................................................................................................41
Enterprise networks ........................................................................................................................................42
LAN telephony ...............................................................................................................................................43
38
SmartWare Software Configuration Guide
1 • System overview
Introduction
This chapter provides an overview of the main elements of a SmartNode system.
A complete SmartNode system or network, as installed in any of the application scenarios introduced in section
“Applications” on page 41, is typically composed of the following main elements plus a third-party network infrastructure:
• The first and most obvious element is the SmartNode devices (also referred to as hardware platforms or network nodes) that provide the physical connectivity, the CPU and DSP resources. All SmartNode models
support packet-routed and circuit-switched traffic equally well.
• The second element comprises the embedded software—called SmartWare—running on the SmartNode
hardware platforms.
• Finally, a third-party IP network and transmission infrastructure provides IP connectivity between the
above elements. This infrastructure can range from a simple Ethernet hub or switch to highly complex networks including multiple access technologies, backbone transmission, and services nodes.
Introduction
39
SmartWare Software Configuration Guide
1 • System overview
Figure 1 depicts the basic system model of a Patton SmartNode. All SmartNode devices have the following
main components:
• 64k circuit switching between on-board ISDN ports and between ISDN and PSTN interface cards. The
circuit switching engine uses dedicated hardware resources and therefore can bypass the VoIP gateway and
packet routing engine.
• A gateway (GW) that converts telephone circuits into Internet protocol (IP) packet streams and vice versa.
H.323-compliant and SIP Voice over IP (VoIP) is supported.
• An IP router with on-board ports and optional data interface cards is QoS enabled, thereby allowing classification, shaping, and scheduling of multiple service classes.
For more detailed hardware information, refer to the getting started guide that came with your SmartNode system.
Local
Telephony
Circuit Switch
Public Telephony
Node
VoIP
Gateway
IP WAN
IP Router
IP LAN
Figure 1. Basic system (abstract) model
SmartWare embedded software
SmartWare is the application software that runs on the SmartNode hardware platforms. SmartWare is available
in several releases. Refer to SmartWare release notes for detailed information about hardware support.
A SmartWare build is a binary image file. It is usually divided into several checksum-protected files to improve
download efficiency and security. The download to the SmartNode is handled in sequence by using a download batchfile. Refer to chapter 5, “System image handling” on page 65 for details on SmartWare image downloads.
SmartWare embedded software
40
SmartWare Software Configuration Guide
1 • System overview
Applications
The Patton SmartNode product family consists of highly flexible multi-service IP network devices, which fit a
range of networking applications. This section provides an overview of the following SmartNode applications
and the main elements in a SmartNode network.
• Carrier networks—SmartNodes are used as customer gateways or integrated access devices at the customer
premises. These applications are also called Integrated Service Access (ISA).
• Enterprise networks—SmartNodes are used as WAN routers and voice gateways for inter-site networking.
These applications are also called multiservice intranets (MSI).
• LAN telephony—SmartNodes serve as gateways between the LAN and the local PBX or PSTN access.
These applications are also called LAN voice gateway (LVG).
Carrier networks
The network termination (NT) device in a multi-service IP based provider network plays a vital role. It provides the service access point for the subscriber with respect to physical connectivity and protocol interoperability.
Since the access bandwidth in most cases represents a network bottleneck, the NT must also ensure traffic classification and the enforcement of service level agreements (SLA) on the access link. In broadband access networks, this NT is also called an Integrated Access Device (IAD) or customer gateway.
SmartNode products offer unique features as customer gateways for business services. It provides amongst others full ISDN feature support, local switching and breakout options and mass provisioning support.
1
2
3
4
5
6
7
8
9
*
0
#
PSTN
1
2
3
4
5
6
7
8
9
*
0
#
GW
Subscriber PBX
Node
M
Access
Backbone
Services
Internet
Subscriber LAN
Figure 2. Typical carrier network application with a SmartNode.
Figure 2 shows the deployment of SmartNodes in carrier networks. Each subscriber site is equipped with a
SmartNode that connects the subscriber LAN on one side with the provider network and services on the other.
Applications
41
SmartWare Software Configuration Guide
1 • System overview
Typical services in these networks are softswitch-based telephony, PSTN access through V5.2 gateways, PBX
networking services, and LAN interconnection.
Typical access technologies for these networks include xDSL, WLL, PowerLine, cable and conventional leased
lines. With the use of an external modem, the SmartNode can connect to leased lines or any bridged-Ethernet
broadband access.
Enterprise networks
In company-owned and operated wide area networks, SmartNodes can be used to converge voice and data
communications on the same IP link.
In combination with centralized services such as groupware and unified messaging, the SmartNodes provide
migration and investment protection for legacy telephony systems.
1
2
3
4
1
2
3
6
4
5
6
7
8
9
7
8
9
*
5
0
#
*
0
#
1
2
3
1
2
3
PSTN
PSTN
Carrier A Carrier B
4
5
6
4
5
6
7
8
9
7
8
9
*
0
#
*
0
#
PBX site A
PBX site B
Node
LAN site A
WAN
Node
LAN site B
Figure 3. Typical enterprise network with SmartNode
Figure 3 shows the deployment of SmartNodes in enterprise networks. Each site (headquarter, branch or home
office) is equipped with a SmartNode that connects the local LAN and telephony infrastructure with the IP
WAN and the local PSTN carrier.
Applications
42
SmartWare Software Configuration Guide
1 • System overview
PSTN
IPPBX
LAN
Node
IP Phones
Figure 4. Typical LAN telephony system with a SmartNode gateway
LAN telephony
With its voice-over-IP gateway features, the SmartNode can be used as a standalone gateway for VoIP telephony (see figure 4).
A standalone gateway has performance reliability and scalability advantages compared with PC-based gateway
cards. In this application, the SmartNode also offers a migration path to enterprise or carrier networking.
Figure 4 shows the deployment of a SmartNode as a LAN voice gateway.
The PSTN connections can be scaled from a single ISDN basic rate access to multiple primary rate lines. With
Q.SIG, integration in private PBX networks is also supported.
Applications
43
Chapter 2
Configuration concepts
Chapter contents
Introduction ..........................................................................................................................................................45
Contexts and Gateways..........................................................................................................................................46
Context ...........................................................................................................................................................46
Gateway ..........................................................................................................................................................46
Interfaces, Ports, and Bindings...............................................................................................................................47
Interfaces ........................................................................................................................................................47
Ports and circuits ............................................................................................................................................47
Bindings ..........................................................................................................................................................47
Profiles and Use commands...................................................................................................................................48
Profiles ............................................................................................................................................................48
Use Commands ..............................................................................................................................................48
44
SmartWare Software Configuration Guide
2 • Configuration concepts
Introduction
This chapter introduces basic SmartWare configuration concepts. A good understanding of these concepts is
vital for the configuration tasks explained in the remaining chapters of this guide.
Patton strongly recommends that you read through this chapter because it introduces the fundamental ideas
behind the structure of the command line interface. Once you understand and know this structure, you will
find it much more intuitive to navigate through the CLI and configure specific features.
This chapter includes the following sections:
• Contexts and gateways (see page 46)
• Interfaces, ports, and bindings (see page 47)
• Profiles and Use commands (see page 48)
Patton SmartNodes are multi-service network devices that offer high flexibility for the inter-working of circuitswitched and packet-routed networks and services. In order to consistently support a growing set of functions,
protocols, and applications, SmartWare configuration is based on a number of abstract concepts that represent
the various SmartWare components.
H.323 GW
“h323”
bind
commands
Gateway
bind command
VoIP use command
Profile
NAPT
Profile
Context
Interfaces
SIP GW
“sip”
Service
Policy
Profile
Context
IP
router
use command
use command
ACL
Profile
bind command
bind command
Toneset
Profile
VoIP
Profile
use command
Context
CS
switch
use
commands
use
commands
bind command
bind command
PVC
Circuit
Telephone port
Telephone port
Serial
Ethernet
Ports
Figure 5. Configuration concept overview
Figure 5 shows the various elements of a complete SmartNode configuration. Each of these elements implements one of the configuration concepts described in this chapter. The figure also shows the relationships and
associations between the different elements. The relations are specified through bind (arrow) and use (bulletIntroduction
45
Toneset
Profile
SmartWare Software Configuration Guide
2 • Configuration concepts
lines) commands. For example, you need bind commands to bind a physical port to a logical interface, and use
commands to assign profiles to contexts.
The sections that follow refer to figure 5 on page 45 and describe the concepts and elements in more
detail.
Contexts and Gateways
Context
A context represents one specific networking technology or protocol, namely IP (Internet Protocol) or CS (circuit-switching). A context can be seen as virtual dedicated equipment within the SmartNode. For example:
• A CS context contains the circuit-switching functions of the SmartNode. It can be thought of as an embedded multiplexer or cross-connect within the SmartNode
• An IP context contains the routing functions of the SmartNode. It can be thought of as an embedded
router within the SmartNode
The contexts are identified by a name and contain the configuration commands that are related to the technology
they represent. A separate configuration can be built by means of the context concept for newly supported network layer technologies without complicating the configuration methods of existing features. For example, as
bridging, ATM, or FR switching becomes available so a bridging, ATM, or FR context can be introduced.
Each context contains a number of interfaces, which build the connections to other SmartWare elements and
the outside world. Figure 5 on page 45 shows two contexts:
• one of type IP named router
• one of type CS named switch
Note
SmartWare currently supports only one instance of the CS and IP context types.
Example
The IP context named router can contain static routes, RIP, and NAT configuration parameters. The default
circuit-switching context named switch can contain number translations, local breakout conditions, and leastcost routing parameters.
Gateway
The concept of a gateway is introduced for the communication between contexts of different types. A gateway
handles connections between different technologies or protocols. For example, a VoIP gateway connects an IP
context to a circuit-switching context.
The gateways are each of a specific type and are identified by a name. Each named gateway contains its configuration parameters. With this concept, multiple vitual gateways can be instantiated and used at the same time.
Contexts and Gateways
46
SmartWare Software Configuration Guide
2 • Configuration concepts
Interfaces, Ports, and Bindings
Interfaces
The concept of an interface in SmartWare differs from that in traditional networking devices. Traditionally, the
term interface is often synonymous with port or circuit, which are physical entities. In SmartWare however, an
interface is a logical construct that provides higher-layer protocol and service information, such as layer 3
addressing. Interfaces are configured as part of a context, and are independent of physical ports and circuits.
The decoupling of the interface from the physical layer entities enables many of the advanced features offered
by SmartWare.
In order for the higher-layer protocols to become active, you must associate an interface with a physical port or
circuit. This association is referred to as a binding in SmartWare. Refer to the “Bindings” section for more
information. In figure 5 on page 45, the IP context shows three interfaces and the CS context shows four interfaces. These interfaces are configured within their contexts. The bindings shown in the figure are not present
when the interfaces are configured; they are configured later.
Ports and circuits
Ports and circuits in SmartWare represent the physical connectors and channels on the SmartNode hardware.
The configuration of a port or circuit includes parameters for the physical and data link layer such as line
clocking, line code, framing and encapsulation formats or media access control. Before any higher-layer user
data can flow through a physical port or circuit, you must associate that port or circuit with an interface on a
context. This association is referred to as a binding. Refer to the “Bindings” section for more information.
Examples of ports are: Ethernet, Serial, DSL, FXS or FXO. Ports are numbered according to the label (or
abbreviation) printed on the hardware.
Example: Ethernet 0/1, Serial 0/0, BRI 3/2
Some ports may contain multiple circuits. For example, serial ports can contain one or more Frame Relay Permanent Virtual Circuits (PVC). If a port has one or more circuits configured, the individual circuits are bound
to interfaces on a context. The port itself may not be bound in that case.
Example: frame-relay pvc 112.
Figure 5 on page 45 shows five ports. Three ports are bound directly to an IP interface. One port has a single
circuit configured, which is bound to the IP context. Two ISDN ports are bound to CS interfaces.
Bindings
Bindings form the association between circuits or ports and the interfaces configured on a context. No user
data can flow on a circuit or Ethernet port until some higher-layer service is configured and associated with it.
Bindings are configured statically in the port or circuit configuration. The binding is created bottom-up, that is
from the port to the interface.
In the case of VoIP CS interfaces, bindings are configured statically in the CS interface configuration. The
binding is created from the interface to the gateway.
Bindings from ports to interfaces shown in figure 5 on page 45.
Interfaces, Ports, and Bindings
47
SmartWare Software Configuration Guide
2 • Configuration concepts
Profiles and Use commands
Profiles
Profiles provide configuration shortcuts. They contain specific settings that can be used in multiple contexts,
interfaces, or gateways. This concept allows to avoid repetitions of groups of configuration commands that are
the same for multiple elements in a configuration.
Profiles used in the IP and CS contexts are shown in figure 5 on page 45.
Use Commands
Use commands form the association between profiles and contexts, gateways, or interfaces. For example, when
a profile is used in a context, all the configuration settings in that profile become active within the context.
Profiles and Use commands
48
Chapter 3
Command line interface (CLI)
Chapter contents
Introduction ..........................................................................................................................................................50
Command modes ..................................................................................................................................................50
CLI prompt ....................................................................................................................................................50
Navigating the CLI .........................................................................................................................................51
Initial mode ..............................................................................................................................................51
System changes ..........................................................................................................................................51
Configuration ...........................................................................................................................................51
Changing Modes .......................................................................................................................................51
Command editing .................................................................................................................................................51
Command help ...............................................................................................................................................51
The No form ..................................................................................................................................................51
Command completion ....................................................................................................................................51
Command history ...........................................................................................................................................52
Command Editing Shortcuts ..........................................................................................................................52
49
SmartWare Software Configuration Guide
3 • Command line interface (CLI)
Introduction
The primary user interface to SmartWare is the command line interface (CLI). You can access the CLI via the
SmartNode console port or through a Telnet session. The CLI lets you configure the complete SmartWare
functionality. You can enter CLI commands online or as a configuration script in the form of a text file. The
CLI also includes monitoring and debugging commands. CLI commands are simple strings of keywords and
user-specified arguments.
This chapter gives an overview of the CLI and the basic features that allow you to navigate the CLI and edit
commands effectively. The following topics are covered:
• Command Modes
• Command Editing (see page 51)
Command modes
The CLI is composed of modes. There are two mode groups: the exec mode group and the configuration mode
group. Within the exec mode group there are two modes: operator exec and administrator exec. The configuration mode group contains all of the remaining modes. A command mode is an environment within which a
group of related commands is valid. All commands are mode-specific, and certain commands are valid in more
than one mode. A command mode provides command line completion and context help within the mode. The
command modes are organized hierarchically. The current working mode is indicated by the CLI prompt.
Appendix B, “Mode summary” on page 650 contains a detailed overview of all command modes, and
appendix C, “Command summary” on page 654 describes the commands that are valid in each mode.
CLI prompt
For interactive (online) sessions, the system prompt is displayed as:
nodename>
In the operator exec mode, the system prompt is displayed as:
nodename#
In the administrator exec mode and in the different configuration modes, the system prompt is displayed as:
nodename(mode)[name]#
Where:
• nodename is the currently configured name of the SmartNode, the IP address or the hardware type of the
device that is being configured
• mode is a string indicating the current configuration mode, if applicable.
• name is the name of the instance of the current configuration mode
Example: the prompt in radius-client mode, assuming the nodename node and the instance deepblue is:
node(radius)[deepblue]#
The CLI commands used to enter each mode and the system prompt that is displayed when you are working
in each mode is summarized in appendix B, “Mode summary” on page 650.
Introduction
50
SmartWare Software Configuration Guide
3 • Command line interface (CLI)
Navigating the CLI
Initial mode
When you initiate a session, you can log in with operator or administrator privileges. Whichever login you use,
the CLI is always set to operator exec (non-privileged exec) mode by default upon startup. This mode allows
you to examine the state of the system using a subset of the available CLI commands.
System changes
In order to make changes to the system, the administrator exec (privileged exec) mode must be entered. The
enable user interface command is used for this purpose (the enable command is only accessible if you are
logged in as an administrator). Once in administrator exec mode, all of the system commands are available to
you.
Configuration
To make configuration changes, the configuration mode must be entered by using the configure command in
the administrator exec mode.
Changing Modes
The exit command moves the user up one level in the mode hierarchy (the same command works in any of
configuration modes). For example, when in pvc configuration mode, typing exit will take you to framerelay
configuration mode.
The exit command terminates a CLI session when typed from the operator exec mode.
A session can also be terminated by using the logout command within any mode.
Command editing
Command help
To see a list of all CLI commands available within a mode, type a question mark > or the key at the
system prompt in the mode of interest. A list of all available commands is displayed. Commands that have
become available in the current mode are displayed at the bottom of the list, separated by a line. Commands
from higher hierarchy levels are listed at the top.
You can also type the question mark or the key while in the middle of entering a command. Doing so
displays the list of allowed choices for the current keyword in the command. Liberal use of the question mark
functionality is an easy and effective way to explore the command syntax.
The No form
Almost every command supports the keyword no. Typing the no keyword in front of a command disables the
function or “deletes” a command from the configuration. For example, to enable the DHCP server trace tool,
enter the command debug dhcp-server. To subsequently disable the DHCP server trace, enter the command
no debug dhcop-server.
Command completion
You can use the key in any mode to carry out command completion. Partially typing a command name
and pressing the key causes the command to be displayed in full up to the point where a further choice
has to be made. For example, rather than typing configure, typing conf and pressing the key causes the
Command editing
51
SmartWare Software Configuration Guide
3 • Command line interface (CLI)
CLI to complete the command at the prompt. If the number of characters is not sufficient to uniquely identify
the command, the CLI will provide a list with all commands starting with the typed characters. For example, if
you enter the string co in the configure mode and press , the selections configure, copy, and context are
displayed.
Command history
SmartWare maintains a list of previously entered commands that you can go through by pressing the and keys, and then pressing to enter the command.
The show history command displays a list of the commands you can go through by using the arrow keys.
Command Editing Shortcuts
SmartWare CLI provides a number of command shortcuts that facilitate editing of the command line. Command editing shortcuts are summarized in table 3 on page 52. The syntax - means press the
key
while holding down the keyboard’s control key (sometimes labeled Control, Ctl, or Ctrl, depending on the keyboard and operating system of your computer).
- is handled differently; press and release the escape key (often labeled Esc on many keyboards) and
then press the key.
Table 3. Command edit shortcuts
Keyboard
Description
- or
- or
- or
- or
-
-
-
-
-
-
-
-
-
-
-
-
Recall previous command in the command history.
Recall next command in the command history.
Move cursor forward one character.
Move cursor backward one character.
Move cursor forward one word.
Move cursor backward one word.
Move cursor to beginning of line.
Move cursor to end of line.
Delete to end of line.
Delete to beginning of line.
Delete character.
Delete word.
Quit editing the current line.
Refresh (redraw) the display.
Transpose characters.
Insert a code to indicate to the system that the keystroke immediately following should be treated as normal text, not a CLI command.
For example, pressing the question mark > character in the CLI prints a
list of possible tokens. If you want to use the ? in a configuration command, e.g. to enter a regular expression, press Ctrl-v immediately followed by the question mark >.
Command editing
52
Chapter 4
Accessing the CLI
Chapter contents
Introduction ..........................................................................................................................................................54
Accessing the SmartWare CLI task list...................................................................................................................54
Accessing via the console port .........................................................................................................................55
Console port procedure .............................................................................................................................55
Telnet Procedure .......................................................................................................................................56
Using an alternate TCP listening port for the Telnet server .............................................................................56
Disabling the Telnet server ..............................................................................................................................56
Logging on ......................................................................................................................................................56
Selecting a secure password .............................................................................................................................57
Password encryption .......................................................................................................................................58
Factory preset administrator account .........................................................................................................58
Creating an operator account ....................................................................................................................58
Creating an administrator account ............................................................................................................59
Opening a secure configuration session over SSH ...........................................................................................59
Displaying the CLI version .............................................................................................................................60
Displaying account information ......................................................................................................................60
Switching to another account ..........................................................................................................................61
Checking identity and connected users ...........................................................................................................61
Command index numbers ...............................................................................................................................62
Ending a Telnet or console port session ..........................................................................................................64
Showing command default values ...................................................................................................................64
53
SmartWare Software Configuration Guide
4 • Accessing the CLI
Introduction
SmartNode products are designed for remote management and volume deployment. The management and
configuration of SmartNodes is therefore based on IP network connectivity. Once a SmartNode is connected
to, and addressable in, an IP network, you can remotely perform all configuration, management, and maintenance tasks.
This chapter describes the procedures for entering SmartWare commands via the command line interface (CLI),
to obtain help, to change operator mode, and to terminate a session. You can access a SmartNode as follows:
• Directly, via the console port (if available)
• Remotely, via the IP network (by using a Telnet application)
The ports available for connection and their labels are shown in the getting started guide that came with your
unit.
Remember that the CLI supports a command history and command completion. By scrolling with the up and
down arrow keys, you can find many of your previously entered commands. Another timesaving tool is command completion. If you type part of a command and then press the key, the SmartWare shell will
present you with either the remaining portion of the command or a list of possible commands. These features
are described in chapter 3, “Command line interface (CLI)” on page 49. The telnet server can be disabled
if desired.
IMPORTANT
Although SmartWare supports concurrent sessions via Telnet or
the console port, we do not recommend working with more than
one session to configure a specific SmartNode. However, using
one session for configuration and another for debugging is a
good idea.
Accessing the SmartWare CLI task list
The following sections describe the basic tasks involved in accessing the SmartWare command line interface.
Depending on your application scenario, some tasks are mandatory while others could be optional.
• Accessing via the console port (see page 55)
• Accessing via a Telnet session (see page 55)
• Using an alternate TCP listening port for the Telnet server (see page 56)
• Disabling the Telnet server (see page 56)
• Logging on (see page 56)
• Selecting a secure password (see page 57)
• Configuring operators and administrators (see page 58)
• Displaying the CLI version (see page 60)
• Displaying account information (see page 60)
• Switching to another log-in account (see page 61)
• Checking identity and connected users (see page 61)
Introduction
54
SmartWare Software Configuration Guide
4 • Accessing the CLI
• Ending a Telnet or console port session (see page 64)
Accessing via the console port
If a console port is available, the host computer can be connected directly to it with a serial cable (see figure 6).
The host must use a terminal emulation application that supports serial interface communication.
Serial interface
Console
Node
Node
Host
Figure 6. Setup for initial configuration via the console port
Note
You do not need to configure IP settings if you access the SmartNode via the
console port.
Console port procedure
Before using the CLI to enter configuration commands, do the following:
1. Set up the hardware as described in the getting started guide.
2. Configure your serial terminal as described in the getting started guide.
3. Connect the serial terminal to your SmartNode. Use a serial cable according to the description in the getting started guide included with your SmartNode device.
4. Power on your SmartNode. A series of boot messages are displayed on the terminal screen. At the end of
the boot sequence, press the key and the login screen will be displayed.
5. Proceed with logging in.
Accessing the SmartWare CLI task list
55
SmartWare Software Configuration Guide
4 • Accessing the CLI
Accessing via a Telnet session
This is the most commonly used and recommended method for connecting to a SmartNode. It is way faster
than console access.The Telnet host accesses the SmartNode via its network interface.
Note
If the IP configuration of the Ethernet port (LAN port) is not known or is
incorrectly configured, you will have to use the console interface.
Telnet Procedure
Before you begin to use the CLI to input configuration commands, do the following:
1. Set up the SmartNode as described in the getting started guide included with your SmartNode device.
2. Connect the host (PC) or hub to the SmartNode as described in the getting started guide.
3. Power on your SmartNode and wait until the Run LED lights.
4. Open a Telnet session to the IP address shown in the getting started guide.
5. Proceed with logging in.
Using an alternate TCP listening port for the Telnet server
The following command defines an alternate listening port for the telnet server.
Mode: Configure
Step
1
Command
[name](cfg)# terminal telnet port
Purpose
Uses TCP port for accepting
telnet connections
Disabling the Telnet server
The telnet server can be disabled using the following command.
Mode: Configure
Step
1
Command
[name](cfg)# no terminal telnet
Purpose
Disables the telnet server
Logging on
Accessing your SmartNode via the local console port or via a Telnet session opens a login screen. The following
description of the login process is based on a Telnet session scenario but is identical to that used when accessing
via the local console port.
The opening Telnet screen you see resembles that shown in figure 7. The window header bar shows the IP
address of the target SmartNode.
A factory preset administrator account with name administrator and an empty password is available when you
first access the unit. For that reason, use the name administrator after the login prompt and simply press the
key after the password prompt.
Accessing the SmartWare CLI task list
56
SmartWare Software Configuration Guide
4 • Accessing the CLI
Figure 7. Login display
Upon logging in you are in operator execution mode, indicated by the “>” as command line prompt. Now you
can enter system commands.
Note
Details on screen in figure 7, such as the IP address in the system prompt
and window header bar, may be different on your unit.
IMPORTANT
You are responsible for creating a new administrator account to
maintain system security. Patton Electronics accepts no responsibility for losses or damage caused by loss or misuse of passwords. Please read the following sections to secure your network
equipment properly.
Selecting a secure password
It is not uncommon for someone to try to break into (often referred to as hacking) a network device. The network administrator should do everything possible to make the network secure. Carefully read the questions
below and see if any applies to you:
• Do your passwords consist of a pet’s name, birthdays or names of friends or family members, your license
plate number, social security number, favorite number, color, flower, animal, and so on?
• Do you use the same password repeatedly? (Example: Your ATM PIN, cell phone voice mail, house alarm
setting code, etc.)
• Could your password or a portion thereof be found in the dictionary?
• Is your password less than six characters long?
To prevent unauthorized access, you should select passwords that are not dictionary words or any of the abovementioned examples. Every password should be at least 6 characters long and include at least one capital letter,
one number, and one lowercase letter.
A good example of a password is: 3Bmshtr
You are probably asking yourself, “How am I going to remember that?” It’s easy, the password above is an acronym taken from: “three blind mice, see how they run.” Making a good password is that easy—but please, don’t
use the above example password for your SmartNode device!
Accessing the SmartWare CLI task list
57
SmartWare Software Configuration Guide
4 • Accessing the CLI
Password encryption
Unencrypted passwords can be stolen by hackers using protocol analyzers to scan packets or by examining the
configuration file—to protect against that type of theft, SmartWare encrypts passwords by default. Encryption
prevents the password from being readable in the configuration file.
• Plain text
• Encrypted text (for example, the password mypassword always appears in encrypted form as
HUAvCYeILWZz3hQvS0IEpQ== encrypted when doing a show command)
The command show running-config always displays the passwords in encrypted format. To encrypt a password, enter the password in plain format and retrieve the encrypted format from the running-config or store it
permanently into the startup-config (with the command copy running-config startup-config).
Factory preset administrator account
SmartWare contains a factory preset administrator account with the name administrator and an empty password. After adding a new administrator account, the factory preset administrator account is automatically
deleted and only the newly created administrator account is available. You can create more than one administrator account, but there has to be at least one administrator account defined. If, for some reason, the last
administrator account is deleted, the factory preset administrator account with the name administrator and an
empty password is automatically recreated.
Configuring operators and administrators
Creating an operator account
Operators do not have the privileges to run the enable command and therefore cannot modify the system
configuration. Operators can view partial system information.
Creating a new operator account is described in the following procedure:
Mode: Operator execution
Step
1
2
3
4
Command
Purpose
node>enable
Enters administration execution mode
node#configure
Enters configuration mode
node(cfg)# operator name password password Creates a new operator account name and
password password
copy running-config startup-config
Saves the change made to the running configuration of the SmartNode, so that it will be
used following a reload
Example: Create an operator account
The following example shows how to add a new operator account with a login name support and a matching
password of s4DF&qw. The changed configuration is then saved.
node>enable
node#configure
node(cfg)#operator support password s4DF&qw
Accessing the SmartWare CLI task list
58
SmartWare Software Configuration Guide
4 • Accessing the CLI
node(cfg)#copy running-config startup-config
Creating an administrator account
Administrators can run the enable command and access additional information within the SmartWare configuration modes. Therefore administrators can modify the system configuration, as well as view all relevant system information.
Creating a new administrator account is described in the following procedure:
Mode: Operator execution
Step
1
2
3
4
Command
Purpose
node>enable
Enters administration execution mode
node#configure
Enters configuration mode
node(cfg)# administrator name password password Creates a new administrator account
name and password password
node(cfg)#copy running-config startup-config
Permanently stores the new administrator
account parameters.
Example: Create an administrator account
The following example shows how to add a new administrator account with a login name super and a matching
password Gh3*Ke4h.
node>enable
node#configure
node(cfg)#administrator super password Gh3*Ke4h
node(cfg)#copy running-config startup-config
Opening a secure configuration session over SSH
A partial implementation of secure shell according RFC 4251, RFC 4252, RFC 4253 and RFC 4254 is provided. It is possible to open a secure configuration session over SSH to a SmartNode.
Note
The Web-GUI and the copy tftp function are still unsecure!
The SSH Transport Layer supports the following Algorithms: “ssh-rsa” public key for signing, “diffie-hellmann-group1-sha1” and “diffie-hellmann-group14-sha1” for key exchange, “3des-cbc”, “aes256-cbc”, “aes192cbc” and “aes128-cbc” for encryption, “hmac-sha1” and “hmac-md5” for data integrity. For user authentication, only the method “password” is supported. On the Connection Layer, only the request for an interactive
command shell is supported.
After the first startup of SmartWare, the RSA server host key is going to be calculated. This calculation is done
in the background and with low priority, so that the SmartNode can operate normally. Until the RSA server
host key is calculated, which takes several minutes, it is not possible to open SSH sessions. The RSA server host
key is calculated only once and always remains the same.
Accessing the SmartWare CLI task list
59
SmartWare Software Configuration Guide
4 • Accessing the CLI
Mode: Configure
Step
1
Command
Purpose
[name](cfg)#terminal ssh use authentication
used for user authentication. The AAA
profile “default” is uses as when not
specified otherwise.
Mode: Enable
Step
1
Command
Purpose
[name]#show ssh
Displays status information of the SSH
server.
Mode: Enable
Step
1
Command
Purpose
[name]#debug ssh
Prints debug information of the SSH
server.
Displaying the CLI version
This procedure displays the version of the currently running CLI.
Mode: Operator execution
Step
1
Command
node>show version cli
Purpose
Displays the CLI version
Example: Displaying the CLI version
The following example shows how to display the version of the current running CLI on your device, if you
start from the operator execution mode.
node>show version cli
CLI version : 3.00
Displaying account information
You can use the show command to display information about existing administrator and operator accounts.
This command is not available for an operator account.
The following procedure describes how to display account information:
Mode: Administrator execution
Step
1
Command
node#show accounts
Accessing the SmartWare CLI task list
Purpose
Displays the currently-configured administrator and operator
accounts
60
SmartWare Software Configuration Guide
4 • Accessing the CLI
Example: Display account information
The following example shows how to display information about existing administrator and operator accounts.
node#show accounts
administrator accounts:
super
operator accounts:
support
Switching to another account
A user can use the su command to switch from one user account to working in another. With this command,
a user can change from his current account to another existing account ‘name’. After executing su with the
account name to which the user wants to change as argument, he must enter the password of the particular
account to get privileged access.
Mode: Administrator or operator execution
Step
1
Command
node>su account-name
Purpose
Changes to the user account account-name.
Example: Switching to another account
The following example shows how to change from your current user account to an administrator account,
starting from the operator execution mode. In the example below the who command is used to check the
identity within both accounts
login: support
password:
node>who
You are operator support
node>su super
Enter password:
node>who
You are administrator super
Checking identity and connected users
The who command displays who is logged in or gives more detailed information about users and process
states. Depending on the execution mode, the command displays varying information. In administrator execution mode, the command output is more detailed and shows information about the ID, user name, state, idle
time, and location. In operator execution mode, only the user name being used at the moment is reported,
which helps checking the identity.
Mode: Administrator or operator execution
Step
1
Command
Purpose
node#who Shows more detailed information about the users ID, name, state, idle time and
location
or
node>who Shows the user login identity
Accessing the SmartWare CLI task list
61
SmartWare Software Configuration Guide
4 • Accessing the CLI
Example: Checking identity and connected users
The following example shows how to report who is logged in or more detailed information about users and
process states, depending on the execution mode in which you are working.
Used in administrator execution mode:
node#who
ID User name
*
0 administrator
1 support
Note
State
exec
exec
Idle
00:00:00
00:01:56
Location
172.16.224.44:1160
172.16.224.44:1165
The “*” character identifies the user executing the who command. ID represents the ID of the account. State represents the actual running condition of
the user, which can be logout, login, exec, or config.
Used in operator execution mode:
node>who
You are operator support
Command index numbers
A command index number (indicated by the boldface 1, 2, and 3 index numbers in the example below) indicates the position of a command in a list of commands (that is, a command with index 1 will appear higher in
the configuration file than one with index 3).
192.168.1.1(pf-voip)[default]#show running-config
...
profile voip default
codec 1 g711ulaw64k rx-length 20 tx-length 20
codec 2 g711alaw64k rx-length 20 tx-length 20
codec 3 g723-6k3 rx-length 30 tx-length 30
dejitter-max-delay 200
...
commands that make use of index numbers always show the index in the running config. However, the index
can be omitted when entering the command. If you enter such a command with an index, it is inserted into list
at the position defined by the index. If you enter such a command without an index, it is placed at the bottom
of the list. Also, you can change a commands position in a listing (moving it up or down in the list) by changing its index number.
Example 1: Moving the G.723 codec from position 3 in the list to position 1 at the top of the list.
Listing before changing the G.723 codec index number:
profile voip default
codec 1 g711ulaw64k rx-length 20 tx-length 20
codec 2 g711alaw64k rx-length 20 tx-length 20
codec 3 g723-6k3 rx-length 30 tx-length 30
dejitter-max-delay 200
...
Listing after changing index number:
Accessing the SmartWare CLI task list
62
SmartWare Software Configuration Guide
4 • Accessing the CLI
192.168.1.1(pf-voip)[default]#codec 3 before 1
192.168.1.1(pf-voip)[default]#show running-config
...
profile voip default
codec 1 g723-6k3 rx-length 30 tx-length 30
codec 2 g711ulaw64k rx-length 20 tx-length 20
codec 3 g711alaw64k rx-length 20 tx-length 20
dejitter-max-delay 200
...
Note
Succeeding indexes are automatically renumbered.
Example 2: Moving the G.723 codec back position 3
This command moves the G.723 codec from the top to third place. As a result, the other two codecs move up
in the list as their indexes are automatically renumbered to accommodate the new third-place codec.
192.168.1.1(pf-voip)[default]#codec 1 after 3
192.168.1.1(pf-voip)[default]#show running-config
...
profile voip default
codec 1 g711ulaw64k rx-length 20 tx-length 20
codec 2 g711alaw64k rx-length 20 tx-length 20
codec 3 g723-6k3 rx-length 30 tx-length 30
dejitter-max-delay 200
...
Example 3: Inserting a codec at a specific position in the list.
This command assigns the G.729 codec the index number 1 so the codec appears at the top of the list.
192.168.1.1(pf-voip)[default]#codec 1 g729 tx-length 30 rx-length 30 silence-supression
192.168.1.1(pf-voip)[default]#show running-config
...
profile voip default
codec 1 g729 rx-length 30 tx-length 30 silence-supression
codec 2 g711ulaw64k rx-length 20 tx-length 20
codec 3 g711alaw64k rx-length 20 tx-length 20
codec 4 g723-6k3 rx-length 30 tx-length 30
dejitter-max-delay 200
...
Accessing the SmartWare CLI task list
63
SmartWare Software Configuration Guide
4 • Accessing the CLI
Ending a Telnet or console port session
Use the logout command in the operator or administration execution mode to end a Telnet or console port session. To confirm the logout command, you must enter yes on the dialog line as shown in the example below.
Mode: Operator execution
Step
Command
Purpose
1
node>logout
Terminates the session after a confirmation by the user.
Example: End a Telnet or console port session
The following example shows how to terminate a session from the administrator execution configuration
mode.
node>logout
Press 'yes' to logout, 'no' to cancel :
After confirming the dialog with “yes”, the Telnet session is terminated.
Note
Using the command exit in the operator execution mode also terminates a
Telnet or console port session, but without any confirmation dialog.
Showing command default values
If a command is set to its default value, it is not displayed in the running-config in order to make it more readable. There are a few exceptions to this rule. The command cli config defaults makes commands also appearin
the running-config that are set to default values. no li config defaults turns it off.
Accessing the SmartWare CLI task list
64
Chapter 5
System image handling
Chapter contents
Introduction ..........................................................................................................................................................66
Memory regions in SmartWare..............................................................................................................................67
System image handling task list .............................................................................................................................68
Displaying system image information ..............................................................................................................69
Copying system images from a network server to Flash memory .....................................................................69
Upgrading the software directly ......................................................................................................................71
Auto provisioning of firmware and configuration ..................................................................................................72
Boot procedure......................................................................................................................................................74
Factory configuration ............................................................................................................................................75
Default Startup Configuration ........................................................................................................................75
IP Addresses in the Factory Configuration ......................................................................................................75
65
SmartWare Software Configuration Guide
5 • System image handling
Introduction
This chapter describes how to load, maintain, and update the various software images in the SmartNode. The
SmartWare system software consists of the application image and the driver images. The images are stored in
persistent (non-volatile) memory. The application image is the software which actually operates the
SmartNode. Driver images are used to operate the various optional PMC interface cards.
This chapter includes the following sections:
• Memory regions in Smartware
• System image handling task list (see page 68)
• Boot procedure and bootloader (see page 74)
Note
Section “System image handling task list” on page 68 describes the standard
way to upgrade the SmartWare. If you encounter problems that won’t let you
upgrade using the standard method, refer to section “Factory configuration”
on page 75.
Note
Refer to appendix F, “Notes for upgrading from R3.10 to R3.20” on
page 618 for information on converting from SmartWare release R3.10
to R3.20
• Factory configuration (see page 75)
Patton SmartNode devices are shipped with default system software which is stored in persistent memory.
Along with the default system software (application image and driver images), a factory configuration, factoryconfig, has been loaded into the SmartNode at the factory. This configuration file sets the initial basic operating
parameters of the SmartNode, such as enabling the Ethernet ports, setting the default IP addresses and the
DHCP server.
Other configuration files may be stored in the SmartNode persistent memory. A configuration file is an ordered
list of commands. Some of the various configuration files are
• factory-config (read-only)
• startup-config
• running-config
• user-config1, user-config2, etc. (these are specific application configurations created by the user)
Backups of the configuration files can be stored on a remote trivial file transfer protocol (TFTP) server. The
remote tftp server must be accessible via one of the SmartNode IP interfaces. Tftp cannot be used from the
console interface.
The following sections focus on SmartWare memory regions, as well as the software components you can copy
into the memory or move between a TFTP server and the memory of the SmartNode. As SmartWare uses a
specific vocabulary in naming those software components, refer to appendix A, “Terms and definitions” on 644
to ensure that you understand the concepts.
Introduction
66
SmartWare Software Configuration Guide
5 • System image handling
Memory regions in SmartWare
The SmartNode’s memory contains several logical regions and several physical regions as shown in figure 8 on
page 68, each separate from the other.
Note
You will use a remote TFTP server for uploading and downloading the
application image, the driver images, and the various configuration files to
the SmartNode. The command syntax in SmartWare requires you to prefix
the file path on the TFTP server with tftp: followed by the absolute file path.
You need to start from the root directory of the TFTP server.
The three physical regions of memory are the remote tftp server’s memory, the Volatile memories, and the Persistent memory in the SmartNode. The remote tftp server has one logical region, tftp:, which can contain various configuration files and batch files for system software upgrade/download. Within the SmartNode the
Volatile physical region contains one logical region, system:, which is random access memory (RAM). When no
power is applied to the SmartNode, the system: region contains no data, no configuration—nothing; it is volatile. The system: region contains the current running configuration, called running-config.
The third and last physical memory region is the Persistent portion. It has two logical regions called flash:
and nvram:.
• The logical region flash: stores the application image, the driver images and the bootloader image. These
images are not lost when the SmartNode is powered off.
• The logical region nvram: stores the various configuration files. The factory default configuration file is
always present in nvram:, and can be restored as the running-config by pressing the reset button. For those
models that do not have a reset button, use the copy command. The startup-config and user-specific configurations are also stored in nvram:.
The factory configuration is read-only. It is contained in the logical region nvram: of the SmartNode. It is
used—if no user-specific configuration is available—to start-up SmartWare with a minimal functionality. This
configuration is named factory-config in SmartWare terminology.
On powering up a SmartNode (or pressing the Reset button on applicable units) with no pre-configured user
configuration files, the default factory-config file is also the startup-config and the running-config. Upon changing
any configuration parameters, the changes are made to the running-config in the system: region of the Volatile
memory. Unless these changes are copied into startup-config or another user-named configuration file, all configuration changes will be lost if the SmartNode is powered down.
A dedicated user-specific configuration must be created and stored in the nvram: region of persistent memory.
In fact, you may create numerous user-specific configurations in the same SmartNode, but if only one dedicated user-specific config is required, you may save it in startup-config by using the copy running-config
startup-config command. Any future time you restart the SmartNode, it will use this saved configuration. In
other words, the startup-config configuration file becomes your default operating configuration.
If you have created and saved numerous user-defined operating configuration files, you can change the startup
default configuration file simply by copying the selected config file into startup-config and rebooting
the SmartNode.
Any configuration stored in logical region nvram: or system: can be copied to a remote server by using TFTP.
Memory regions in SmartWare
67
SmartWare Software Configuration Guide
5 • System image handling
Operating configurations cannot be executed from the persistent memory, so the configuration used for operating the SmartNode is copied into the volatile memory of the SmartNode prior to normal operation. This
procedure takes place after the system bootstrap, where the application image (i.e. SmartWare) is started and a
configuration must be available. Shortly before SmartWare has completed all startup processes, the configuration startup-config is copied from nvram: in persistent memory to the running-config configuration in system: in
volatile memory.
You can back up the running-config to nvram: or to a remote TFTP server with a user-defined name.
Note
When returning to the factory-config by using the copy factory-config starcommand, all user-specific configurations saved in nvram:
remain even after reload.
tup-config
Storing the current Running Configuration remotely
Memory Regions in
Embedded Software
Configuration File Upload
Remote (TFTP Server)
Storing the current Configuration locally
Local
Persistent
tftp:
Volatile
flash:
• Configuration
Files
• Batchfiles for
System Image
download
• Application Image
• Bootloader Image
• Microcode Image
Image / Microcode Download
nvram :
• Factory
Configuration
“factory-config”
(read-only)
• Startup
Configuration
“startup-config”
• User specific
Configuration
“user-config”
system:
• current Running
Configuration
“running-config”
Only on Startup to execute the
Startup or Factory Configuration
Configuration File Download
Figure 8. SmartNode memory regions logically defined in SmartWare
System image handling task list
To load and maintain system images, perform the tasks described in the following sections:
• Displaying system image information
• Copying system images from a network server to the Flash memory (see page 69)
• Copying the driver software from a network server to the Flash memory (see page 71)
System image handling task list
68
SmartWare Software Configuration Guide
5 • System image handling
Displaying system image information
This procedure displays information about system images and driver software
Mode: Administrator execution
Step
1
Command
show version
Purpose
Lists the system software release version, information about optional interface
cards mounted in slots and other information that is the currently running system
software. If you have just completed a download of new system software from the
tftp server, you must execute the reload command in order to be running with the
new system software. This applies equally to driver software.
Example: Display system image information
The following example shows the information that is available for a SmartNode 2000 series device with an
optional IC-4BRV interface card mounted in slot 2.
node#show version
Productname
Software Version
Supplier
Provider
Subscriber
: SN4638/5BIS/UI
: R3.T 2006-12-04 H323 SIP BRI
:
:
:
Information for Slot 0:
SN4638/5BIS/UI (Admin State: Application Started, Real State:
Application Started)
Hardware Version : 1, 3
Serial number
: 00A0BA0209B1
PLD Version
: 0x46010102
Software Version : R3.T 2006-12-04 H323 SIP BRI
Copying system images from a network server to Flash memory
As mentioned previously, the system image file contains the application software that runs SmartWare; it is
loaded into the flash memory at the Patton Electronics Co. factory. Since most of the voice and data features of
the SmartNode are defined and implemented in the application software, upgrading to a new release might be
necessary if you want to have additional voice and data features available. A new system image file must be
stored permanently into the flash memory of your SmartNode to be present when booting the device.
Since the system image file is preloaded at the Patton Electronics Co. factory, you will have to download a new
SmartWare application software only if a major software upgrade is necessary or if recommended by Patton
Electronics Co. Under normal circumstances, downloading a system image file should not be needed.
Downloading a new system image file means storing it permanently at a defined location within the SmartNode flash memory. To store the system image file, you must use a special download script file. This script file
defines how to handle the system image file and where to store it. You cannot download any system image file
without an appropriate script file.
Each line in the script file is a command for the CLI of your SmartNode. To download a system image file,
which will replace the currently running SmartWare application software, a script file with only one command
is necessary.
System image handling task list
69
SmartWare Software Configuration Guide
5 • System image handling
Comment lines must have a hash character # in column one and can appear anywhere in the script file. Comment lines contain information for administrators or operators who maintain or use the script file.
The following example shows a script file used to download a system image and command line syntax definition file from a TFTP server.
# script file for system image download
# Patton Electronics Co. 2001-10-24
image.bin 1369474 21; ver 2300.1,2300.2;
cli.xml
+/flash/cli/spec.xml
*UÊDä
Note
The script file includes a 32-bit CRC on the last line, displayed as four characters when seen in an ordinary text editor. Do not delete the line containing
the CRC entry or the download will fail!
You can download the script file with the copy command. The copy command source defines the TFTP path
to the script file and the target is set to use the script parser. After downloading the script file, the system image
file and command line syntax definition file download starts automatically.
Mode: Administrator execution
Step
1
Command
node(cfg)# copy tftp://node-ip-address/b flash:
Purpose
Downloads the script file b from the TFTP
server at address node-ip-address and starts
the system image download process. This
progress is visualized with a counter, counting up from 0 to 100% according to the
downloaded amount of the file size for each
file that needs to be downloaded.
Example: Copy system images from a network server to the Flash memory
The following example shows how to download the driver software image file from the TFTP server at IP
address 172.16.36.80. The download is defined by a script file, which has to be downloaded first. After downloading the script file, the driver software image file is downloaded automatically.
SN>enable
SN#configure
SN(cfg)#copy tftp://172.16.36.80/sn2300/build22032/b flash:
Completed image download
Completed file download /flash/cli/spec.xml
SN(cfg)#
Note
When encountering problems due to memory exhaustion (message Parsing
batch file...% APP - OUT OF MEMORY). shutdown the H.323 gateway
prior to initiating the download command as follows (which will temporarily free the required memory): node(gw-h323)[h323]#shutdown
System image handling task list
70
SmartWare Software Configuration Guide
5 • System image handling
After the successful download, either issue the reload command (in order to start the IPNode with the new
software) or restart the H.323 gateway, thus enabling calls again (with the current software):
node(gw-h323)[h323]#no shutdown
Upgrading the software directly
It is possible to upgrade the software directly by passing the name of the delivered zip-file to the CLI command
“copy”. The SmartWare downloads the whole ZIP file. During this time the download progress is displayed in
bytes. After downloading, the ZIP file containing batch file “bw” or “b” will be extracted and executed. This
leads to writing the SmartWare image, which is also part of the ZIP file, to the flash. The web pages are
updated too. After writing the image to the flash, the Smartware needs to be reloaded with the command
reload.
Mode: enable
Step
1
Command
node(cfg)# copy tftp:///
/.zip :flash
Purpose
Downloads the specified delivery file from
the TFTP server and starts the driver software image upgrade process.
Example: An example of such a Smartware upgrade session, where the new software is in the file
SN1000_SIP_R3.T_2006-08-10.zip which is stored on a tftp-server with the ip address 192.186.22.44:
node#copy tftp://192.186.22.44/SN1000_SIP_R3.T_2006-08-10.zip flash:
Download...
3124510 Bytes
Downloading image...completed (2715796 bytes)
Erasing flash...completed.
Writing to flash...completed
Processing files...completed
node#reload
System image handling task list
71
SmartWare Software Configuration Guide
5 • System image handling
Auto provisioning of firmware and configuration
The new auto provisioning capability enables you to automatically distribute up-to-date configurations and
firmware to a large number of units using TFTP. It works as follows:
The unit downloads a specific file from a TFTP server. If this file has changed since the last download, it is
stored and executed. If the file on the server did not change since the last download, no action is taken. If the
units are configured to do auto provisioning, a network operator can only update the firmware files on the
TFTP server, which automatically distributes it to all units. The “profile provisioning” configures this. Here’s
an example for firmware provisioning:
profile provisioning FIRMWARE
destination script
location 1 tftp://172.16.1.2/firmware/b
location 2 tftp://172.16.1.33/firmware/b
activation reload graceful
Explanation:
Step
Command
1
[name] (pf-prov)[FIRMWARE]#destination script
2
[name] (pf-prov)[FIRMWARE]#location 1
tftp://172.16.1.2/firmware/b
[name] (pf-prov)[FIRMWARE]#location 2
tftp://172.16.1.33/firmware/b
3
4
[name] (pf-prov)[FIRMWARE]#activation reload
graceful
Purpose
Chooses the unit’s script interpreter as destination of the downloaded file. Use this
for firmware updates. Script files are the
b, b1, … files that come with each unit
firmware update.
Specifies the location of the file to check
for changes.
Specifies alternate locations of the file. If
the first could not be contacted, the second is tried, and so on.
Specifies how the new firmware is to be
activated. Choose between immediate or
graceful reload.
Here’s an example for configuration provisioning:
profile provisioning CONFIG
destination configuration
location 1 tftp://tftp1.provider.net/configs/$(system.mac).cfg location 2 tftp://172.16.1.33/configs/$(system.mac).cfg activation reload graceful
Explanation:
Step
1
Command
[name] (pf-prov)[CONFIG]#destination
configuration
Auto provisioning of firmware and configuration
Purpose
Chooses the unit’s startup-configuration as
destination of the downloaded file.
72
SmartWare Software Configuration Guide
Step
5 • System image handling
Command
2
[name] (pf-prov)[CONFIG]#location 1
tftp://tftp1.provider.net /configs/
$(system.mac).cfg
3
[name] (pf-prov)[CONFIG]#location 2
tftp://172.16.1.33/configs/$(system.mac).cfg
4
[name] (pf-prov)[CONFIG]#activation reload
graceful
Purpose
Specifies the location of the file to check
for changes. $(system.mac) is a placeholder for the unit’s MAC address of
ETH 0/0. Using host names instead of IP
addresses works only if DNS resolver is
enabled and configured.
Specifies alternate locations of the file. If
the first could not be contacted, the second is tried, and so on.
Specifies how the new configuration
should be activated. Choose between
immediate or graceful reload.
Note the placeholder used in the file location. Placeholders can be used for each part of the location, be it
server address, path or filename. The following place holders are available:
• $(system.mac)—MAC address of ETH 0/0 (without “:” between the hexadecimal characters)
• $(system.serial)—serial number of the unit
• $(dhcp.66)—DHCP option 66 (TFTP server IP), as delivered by the DHCP server (only if DHCP
is enabled)
• $(dhcp.67)—DHCP option 67 (Boot file name), as delivered by the DHCP server (only if DHCP
is enabled)
To use and debug provisioning:
Step
Command
1
[name] (cfg)provisioning execute FIRMWARE
2
[name] (cfg)debug provisioning
Purpose
Executes the provisioning profile
FIRMWARE once
Enables debug output for all
provisioning operations
To continuously poll for firmware or configuration changes, use the provisioning execute command together
with the new timer command as described below. Here’s how to do both firmware and configuration provisioning, with a polling interval of 10 minutes.
timer FIRMWARE_UPDATE now + 2 minutes every 10 minutes “provisioning execute FIRMWARE”
timer CONFIG_UPDATE now + 2 minutes every 10 minutes “provisioning execute CONFIG”
Auto provisioning of firmware and configuration
73
SmartWare Software Configuration Guide
5 • System image handling
Boot procedure
During a normal boot procedure of a SmartNode, the bootstrap application checks for an application image in
the persistent memory of the logical region nvram:. The application image is then executed, i.e. the SmartWare
is started module by module. One of the last start-up tasks to finish in bringing up the entire system is handling the operating configuration. The configuration startup-config is copied from the logical region nvram: in
nonvolatile memory to the logical region running-config in the volatile memory. The SmartWare now uses the
running-config to set up the operating configuration of the SmartNode. Figure 9 illustrates the boot procedure.
Power-On
Bootstrap
Bootloader
pressed
Reset Button
released
Application
Image
invalid
valid
Application
start Software Modules
pressed
System Button
released
use startup-config
use factory-config
System Up
Figure 9. Boot procedure
There are two situations during bootstrap when the bootloader takes control:
• “If the user has pressed the system button, it launches the bootloader, the bootstrap application checks the
status of the Reset button (not available for SN4xxx) on the back panel of the SmartNode.”
• If a valid application image is not available
Boot procedure
74
SmartWare Software Configuration Guide
5 • System image handling
The bootloader ensures that basic operations, network access, and downloads are possible in case of interrupted
or corrupted application image downloads.
After downloading an application image (that is, new system software/software upgrade), the bootloader
ensures that basic operations, network access, and downloads are possible in case of interrupted or corrupted
application image downloads. After downloading an application image, the bootstrap will only switch to the
newly loaded application image if it is valid. If it is not valid, the bootstrap still uses the application image
which existed prior to doing a software upgrade.
If the application image is valid, it is started and SmartWare is brought into operation module by module.
During this system initialization phase (when the message Press reset button to restore factory defaults... appears
on the console screen), the status of the reset button on the back panel of the SmartNode is checked. If the button has been pressed, the factory configuration is loaded into the volatile memory and is used to parameterize
the SmartWare (not available for SN4xxx). If the button has not been pressed, the startup configuration is
loaded into the volatile memory and is used to parameterize the SmartWare.
Factory configuration
SmartNodes are delivered with a factory configuration stored in the logical region nvram: of the memory. It is used
to initially parameterize the network and component settings of SmartWare, which makes sense at the very beginning. Moreover, in case of SmartWare malfunction, you can reset to the initial state by reloading the factory configuration. The factory configuration consists of the default settings for the IP networking subsystem.
Once the user-specific configuration is created and stored as startup configuration, the factory configuration is
no longer used but it remains in the persistent memory. It is possible to switch back to the factory configuration at any time during the operation of a SmartNode.
Default Startup Configuration
The SmartNodes delivered from the factory contain both a factory configuration and a default startup configuration. While the factory configuration contains only basic IP connectivity settings, the default startup configuration includes settings for most SmartWare functions. Note that if you press and hold the system button
(Reset) for 5 seconds the factory configuration is copied onto the startup configuration (overwrite). The default
startup config is then lost.
IP Addresses in the Factory Configuration
The factory configuration contains the following IP interfaces and address configurations bound by the Ethernet ports 0/0 and 0/1:
interface eth0
ipaddress dhcp
mtu 1500
interface eth1
ipaddress 192.168.1.1 255.255.255.0
mtu 1500
Avoid downloading any system image if you do not completely
understand what you have to do!
IMPORTANT
Factory configuration
75
Chapter 6
Configuration file handling
Chapter contents
Introduction ..........................................................................................................................................................77
Understanding configuration files ...................................................................................................................77
Factory configuration ............................................................................................................................................79
Configuration file handling task list.......................................................................................................................79
Copying configurations within the local memory ............................................................................................80
Replacing the startup configuration with a configuration from Flash memory ................................................81
Copying configurations to and from a remote storage location ........................................................................82
Replacing the startup configuration with a configuration downloaded from TFTP server ...............................83
Displaying configuration file information .......................................................................................................83
Modifying the running configuration at the CLI .............................................................................................84
Modifying the running configuration offline ...................................................................................................85
Deleting a specified configuration ...................................................................................................................86
Encrypted file download .................................................................................................................................87
Encrypted Configuration Download .........................................................................................................87
Use Cases ..................................................................................................................................................88
76
SmartWare Software Configuration Guide
6 • Configuration file handling
Introduction
This chapter describes how to upload and download configuration files from and to SmartWare. A configuration file is a batch file of SmartWare commands used in the software modules that perform specific functions of
the SmartNode. This chapter also describes some aspects of configuration file management. Refer to chapter 5,
“System image handling” on page 65 for more information.
This chapter includes the following sections:
• Factory configuration (see page 79)
• Configuration file handling task list (see page 79)
All Patton SmartNode devices are shipped with a factory configuration file, which is stored in their flash memory.
A configuration file is like a script file containing SmartWare commands that can be loaded into the system.
Configuration files may also contain only partial configurations. This allows you to keep a library of command
sequences that you may want to use as required. By default, the system automatically loads the factory configuration from the flash memory if no user-specific configuration is defined as the startup configuration.
Changing the current running configuration is possible as follows:
• You may change the running configuration interactively. Interactive configuring requires that you access the
CLI by using the enable command to enter administrator execution mode. You must then switch to the
configuration mode with the command configure. Once in configuration mode, enter the configuration
commands that are necessary to configure your SmartNode.
• You can also create a new configuration file or modify an existing one offline. You can copy configuration
files from the flash memory to a remote server. Transferring configuration files between the flash memory
and a remote system requires the Trivial File Transfer Protocol (TFTP). The TFTP server must be reachable
through one of the SmartNode network interfaces.
See chapter 4, “Accessing the CLI” on page 53 for information concerning access to the CLI.
The following sections focus on SmartWare memory regions and software components that can be copied
within the memory or uploaded/downloaded between a TFTP server and the memory of the SmartNode.
Since SmartWare uses a specific vocabulary in naming those software components, refer to appendix A, “Terms
and definitions” on page 644 to ensure that you understand the concepts. Refer to chapter 5, “System image
handling” on page 65 for a brief description of how SmartWare uses system memory.
Understanding configuration files
Configuration files contain commands that are used to define the functionality of SmartWare. During system
startup, the command parser reads the factory or startup configuration file command-by-command, organizes the
arguments, and dispatches each command to the command shell for execution. If you use the CLI to enter a command during operation, you alter the running configuration accordingly. In other words, you are modifying a live,
in-service system configuration.
Introduction
77
SmartWare Software Configuration Guide
6 • Configuration file handling
Figure 10, shows the characteristics of a configuration file. It is stored on a TFTP server in the file myconfig.cfg
for later download. The command syntax used to enter commands with the CLI and add commands in configuration files is identical. For better comprehension, you can add comments in configuration files. To add a line
with a comment to your configuration file, simply begin the line with the hash (#) character. The command
parser skips everything after the hash character to the end of the line.
#----------------------------------------------------------------#
# My Configuration File
#----------------------------------------------------------------#
# SNTP configuration used for time synchronization
cli version 3.00
sntp-client
sntp-client server primary 172.16.1.10 port 123 version 4
sntp-client poll-interval 600
sntp-client gmt-offset + 01:00:00
# system definitions
system
clock-source 1 2
hostname node
# IP context configuration
context ip router
route 0.0.0.0 0.0.0.0 172.19.32.2 1
route 172.19.41.0 255.255.255.0 172.19.33.250
route 172.19.49.0 255.255.255.0 172.19.33.250
# interface LAN used for connection to internal network
interface lan
ipaddress 172.19.33.30 255.255.255.0
mtu 1500
# interface WAN used for connection to access network
interface wan
ipaddress 172.19.32.30 255.255.255.0
mtu 1500
# CS context configuration
context cs switch
no shutdown
# routing table configuration
routing-table called-e164 rtab
route 2.. dest-interface telecom-operator
# interface used to access the PSTN telecom operator
interface isdn telecom-operator
route call dest-interface h323
# interface used to access the VoIP telecom provider
interface h323 voip-provider
route call dest-table rtab
remoteip 172.19.33.60
Introduction
78
SmartWare Software Configuration Guide
6 • Configuration file handling
bind gateway h323
# H.323 gateway primarily used
gateway h323
faststart
no ras
gatekeeper-discovery auto
bind interface lan router
no shutdown
port ethernet 0 0
medium auto
encapsulation ip
bind interface lan router
no shutdown
port ethernet 0 1
medium 10 half
encapsulation ip
bind interface wan router
no shutdown
Figure 10. Sample configuration file
Each configuration file stored in the flash memory needs a unique name. The user has to assign a file name to
any user-specific configuration. SmartWare predefines some names for configuration files. These are the factory
configuration (factory-config), startup configuration (startup-config), and running configuration (runningconfig) file names. Refer to appendix A, “Terms and definitions” on page 644 to learn more about configuration file types.
Factory configuration
SmartNodes are delivered with a factory configuration in the logical region nvram:. This factory configuration
initially parameterizes the most useful network and component settings of SmartWare.
Once a user-specific configuration is created and stored as the startup configuration, the factory configuration
is no longer used, but still remains in the persistent memory. It is possible to switch back to the factory configuration at any time during the operation of a SmartNode configuration. The getting started guide included
with your SmartNode device describes the restoration procedure for restoring the default settings.
Configuration file handling task list
This section describes how to create, load, and maintain configuration files. Configuration files contain a set of
user-configured commands that customize the functionality of your SmartNode device to suit your own operating requirements.
The tasks in this chapter assume that you have at least a minimal configuration running on your system. You
can create a basic configuration file by using the configure command; see section “Modifying the running
configuration at the CLI” on page 84 for details.
To display, copy, delete, and download or upload configuration files, perform the tasks described in the following sections:
Factory configuration
79
SmartWare Software Configuration Guide
6 • Configuration file handling
• Copying configurations within the local memory (see page 80)
• Replacing the startup configuration with a configuration from the Flash memory (see page 81)
• Copying configurations to and from a remote storing location (see page 82)
• Replacing the startup configuration with a configuration downloaded from the TFTP server (see page 83)
• Displaying configuration file information (see page 83)
• Modifying the running configuration at the CLI (see page 84)
• Modifying the running configuration offline (see page 85)
• Deleting a specified configuration (see page 86)
• Downloading encrypted files (see page 87)
Copying configurations within the local memory
Configuration files may be copied into the local memory in order to switch between different configurations.
Remember the different local memory regions in SmartWare as shown in figure 11.
Store the current Running
Configuration persistently
Local Memory Regions
Local
Persistent
Copy Configuration Files within
the persistent Memory Region
Volatile
nvram:
system:
• Factory
Configuration
“factory-config”
(read-only)
• Startup
Configuration
“startup-config”
• User specific
Configuration
“user-config”
• current Running
Configuration
“running-config”
Only on Startup to execute
the Startup or Factory
Configuration
Figure 11. Local memory regions
In most cases, the interactively modified running configuration known as the running-config, which is located
in the volatile memory region system:, is copied into the persistent memory region nvram:. This running config
is stored under the name startup-config and replaces the existing startup configuration.
Configuration file handling task list
80
SmartWare Software Configuration Guide
6 • Configuration file handling
You can copy the current running configuration into the persistent memory region nvram: under a user-specified name, if you want to preserve that configuration.
In addition, an already existing configuration is usually copied into the persistent memory region nvram: by
using a user-specified name, for conservation or later activation.
As shown in figure 11 the local memory regions are identified by their unique names, like nvram:, which is
located in flash memory, and system:, which is the system RAM, i.e. the volatile memory. As already mentioned, configuration files in the same memory region need a unique name. For example, it is not possible to
have two configuration files with the name running-config in the memory region nvram:.
As you might expect, the copy command does not move but replicates a selected source to a target configuration file in the specified memory region. Therefore the source configuration file is not lost after the copy process. There are three predefined configuration file names for which it is optional to specify the memory region,
namely factory-config, startup-config and running-config.
Mode: Administrator execution
Step
1
Command
node#copy {factory-config | startupconfig | running-config | nvram: sourcename } nvram:target-name
Purpose
Copies the selected source configuration file
source-name as target configuration file targetname into the local memory.
Example: Backing up the startup configuration
The following example shows how to make a backup copy of the startup configuration. It is copied under the
name backup into the flash memory region nvram:.
node#copy startup-config nvram:backup
Replacing the startup configuration with a configuration from Flash memory
It is possible to replace the startup configuration by a configuration that is already present in the flash memory.
You can do so by copying it to the area of the flash memory where the startup configuration is stored.
Mode: Administrator execution
Step
1
Command
node# copy nvram:backup startup-config
Note
Purpose
Replaces the existing persistent startup configuration with the startup configuration
backup already present in flash memory.
The configuration backup can be a previously backed up configuration or
previously downloaded from a TFTP server.
Configuration file handling task list
81
SmartWare Software Configuration Guide
6 • Configuration file handling
Copying configurations to and from a remote storage location
Configuration files can be copied from local memory (persistent or volatile region) to a remote data store. From
within SmartWare, the remote TFTP server is represented by the memory region tftp: in combination with the IP
address of the TFTP server and the name and path of the configuration file. We will explain the usage of the
remote memory region tftp: in the following section more detailed. Another typical task is uploading the current
running configuration to the remote data store for backup purpose, or if an extensive configuration file is to be
edited on the remote host. In this case the running configuration, named running-config, which is to be found in
the volatile memory region system: is transferred to the TFTP server. On the TFTP server the running configuration is stored to a file whose name is defined as one of the arguments of the copy command.
Configuration File Upload
Remote Memory
Regions
Store the current Running
Configuration remotely
Local (Intelligent Access Device)
Remote (TFTP Server)
Persistent
tftp:
• Configuration Files
• Batchfiles for
System Image
download
Volatile
nvram:
system:
• Factory
Configuration
“factory-config”
(read-only)
• Startup
Configuration
“startup-config”
• User specific
Configuration
“user-config”
• current Running
Configuration
“running-config”
Configuration File Download
Figure 12. Remote memory regions for SmartWare
Finally, configuration files, i.e. the startup configuration or a user-specific configuration that is stored in the
persistent memory region nvram: are often uploaded to the remote data store for backup, edit or cloning purposes. The latter procedure is very helpful when you have several SmartNode devices, each using a configuration which does not greatly differ from the others, or which is the same for all devices. During the
configuration of the first SmartNode according to your requirements, the running configuration of this device,
named running-config and located in the volatile memory region system:, is edited. Next, the configuration is
tested and if everything is as required, the running configuration is copied as startup configuration, named startup-config, into the persistent memory region nvram: of the target device. After this, the startup configuration is
transferred to the TFTP server, where it can be distributed to other SmartNode devices. These devices therefore
get clones of the starting system if the configuration does not need any modifications.
Configuration file handling task list
82
SmartWare Software Configuration Guide
6 • Configuration file handling
Replacing the startup configuration with a configuration downloaded from
TFTP server
From within the administration execution mode, you can replace the startup-configuration by downloading a
configuration from the TFTP server into the flash memory area where to store the startup configuration.
Mode: Administrator execution
Step
1
Command
Purpose
node(cfg)# copy tftp://ip-address[:port]/
new-startup nvram:startup-config
Downloads the configuration file new-startup from
the TFTP server at address ip-address replacing the
existing persistent startup configuration. Optionally
you can enter the UDP port where the TFTP server listens. If the port is not specified, the default port 69 is
used. This progress is visualized with a counter,
counting up from 0 to 100% according to the downloaded amount of the file size. Should the download
fail, an error message % File Transfer - Get failed is
displayed.
Example: Sample configuration download from the TFTP server
The following example shows how to replace the persistent startup configuration in the flash memory of a
SmartNode by overwriting it with the configuration contained in the file new-startup located on the TFTP
server at IP address 172.16.36.80.
1. Download the startup configuration with the copy command into the flash memory area where to store
the startup configuration.
node>enable
node#configure
node(cfg)#copy tftp://172.16.36.80/user/new-startup nvram:startup-config
Download...100%
node(cfg)#
2. Check the content of the persistent startup configuration by listing its command settings with the show
command.
node#show nvram:startup-config
Displaying configuration file information
This procedure describes how to display information about configuration files
Mode: Administrator execution
Command
show nvram:
show running-config
show startup-config
Configuration file handling task list
Purpose
Lists all persistent configurations
Displays the contents of the running configuration file
Displays the contents of the startup configuration file
83
SmartWare Software Configuration Guide
IMPORTANT
Note
6 • Configuration file handling
It is recommended that you never save a configuration in startupconfig or a user-specific configuration with the cli config defaults
command because the additional list of default commands consumes significant portions of the nvram: memory.
Application files can be very long when displayed (by using the show command). To make them easier to read, many default commands are not displayed when executing the show running-config command. However, the
administrator may want to see the entire configuration, including these normally “hidden” default commands. To see all commands, execute the cli
config defaults command. By issuing a show running-config command
afterwards, you will see all the commands, a list which is significantly longer.
To hide these hidden commands again, issue the no cli config
defaults command.
Modifying the running configuration at the CLI
SmartWare accepts interactive modifications on the currently running configuration via the CLI. Interactive
configuring needs access to the CLI. Use the enable command to enter administrator execution mode, and
then switch to the configuration mode by typing the command configure. Once in configuration mode, you
can enter the configuration commands that are necessary to your SmartNode’s operation. When you configure
SmartWare by using the CLI, the shell executes the commands as you enter them.
When you log in using the CLI, all commands you enter directly modify the running configuration located in
the volatile memory region system: (or RAM) of your SmartNode. Because it is located in volatile memory, to
be made permanent, your modifications must be copied to the persistent (non-volatile) memory. In most cases
you will store it as the upcoming startup configuration in the persistent memory region nvram: under the name
startup-config. On the next start-up the system will initialize itself using the modified configuration. After the
startup configuration has been saved to persistent memory, you have to restart the SmartNode by using the
reload command to cause the system to initialize with the new configuration.
The execution command reload accepts with the following options:
• graceful—reloads the system only if no voice calls are ongoing. If there are voice calls, the system waits until
they all are closed to reload.
• forced—reloads the system without prompting for confirmation or for saving the running-configuration
(no need to type yes or no). The question whether to save the running-configuration is automatically
answered with no, the question whether to reload or not with yes.
Mode: Administrator execution
Step
1
2
3
4
Command
Purpose
node#configure
Enters administrator configuration mode
Enter all necessary configuration commands.
node(cfg)#copy running-config startup-config Saves the running configuration file as the
upcoming startup configuration
node(cfg)#reload
Restarts the system
Configuration file handling task list
84
SmartWare Software Configuration Guide
6 • Configuration file handling
Example: Modifying the running configuration at the CLI
The following example shows how to modify the currently running configuration via the CLI and save it as the
startup configuration.
node#configure
node(cfg)#…
node(cfg)#copy running-config startup-config
node(cfg)#reload
Press 'yes' to restart, 'no' to cancel : yes
The system is going down
Modifying the running configuration offline
In cases of complex configuration changes, which are easier to do offline, you may store a configuration on a
TFTP server, where you can edit and save it. Since the SmartNode is acting as a TFTP client, it initiates all file
transfer operations.
First, upload the running configuration, named running-config, from the SmartNode to the TFTP server. You
can then edit the configuration file located on the TFTP server by using any regular text editor. Once the configuration has been edited, download it back into the SmartNode as upcoming startup configuration and store
it in the persistent memory region nvram: under the name startup-config. Finally, restart the SmartNode by
using the reload command to activate the changes.
Mode: Administrator execution
Step
1
2
3
4
Command
Purpose
node#copy running-config tftp://node-ipaddress[:port]/current-config
Uploads the current running configuration as file
current-config to the TFTP server at address nodeip-address. Optionally you can enter the UDP
port where the TFTP server listens. If the port is
not specified, the default port 69 is used. This
progress is visualized with a counter, counting up
from 0 to 100% according to the downloaded
amount of the file size. If the upload should fail
an error message “% File Transfer - Put failed” is
displayed.
Offline editing of the configuration file currentconfig on the TFTP server using any regular text
editor.
node#copy tftp://node-ip-address/current-config Downloads the modified configuration file curnvram: startup-config
rent-config from the TFTP server at address nodeip-address into the persistent memory region
nvram: by using the name startup-config. This
progress is visualized with a counter, counting up
from 0 to 100% according to the downloaded
amount of the file size. Should the download fail,
an error message “% File Transfer - Get failed” is
displayed.
node#reload
Restarts the system
Configuration file handling task list
85
SmartWare Software Configuration Guide
6 • Configuration file handling
Example: Modifying the running configuration offline
The following example shows how to upload the running configuration from the SmartNode to the file current-config on a TFTP server at IP address 172.16.36.80. The uploaded configuration file is written into the
root directory specified by the TFTP server settings, and overwrites any existing file with the same name. Read
your TFTP server manual to get a thorough understanding of its behavior. After this, the configuration file is
available for offline editing on the TFTP server. Once the configuration file current-config has been modified, it
is downloaded from the TFTP server, at IP address 172.16.36.80, into the persistent memory region nvram:
using the name startup-config. It will become active after a reload.
node#copy running-config tftp://172.16.36.80/user/current-config
Upload...100%
At this point in time, the offline editing of the configuration file current-config on the TFTP server takes place.
node#copy tftp://172.16.36.80/user/ current-config nvram:startup-config
Download...100%
node#reload
Press 'yes' to restart, 'no' to cancel : yes
The system is going down
Deleting a specified configuration
This procedure describes how to delete configuration files from the SmartNode flash memory region nvram:.
Mode: Administrator execution
Step
1
2
Command
node#show nvram:
node#erase name
Purpose
Lists the loaded configurations
Deletes the configuration name from the flash memory.
Example: Deleting a specified configuration
The following example shows how to delete a specific configuration from among a set of three available configurations in Flash memory. The configuration named minimal is to be deleted, since it is no longer used.
1. Use the command show nvram: to list all available configurations.
node#show nvram:
Persistent configurations:
backup
minimal
startup-config
factory-config
2. Delete the configuration named minimal explicitly.
node#erase nvram:minimal
3. Enter again the command show nvram: to check if the selected configuration was deleted successfully
from the set of available configurations.
node#show nvram:
Persistent configurations:
backup
Configuration file handling task list
86
SmartWare Software Configuration Guide
6 • Configuration file handling
startup-config
factory-config
Encrypted file download
This section explains how configuration files can be transported encrypted over IP.
TFTP as a configuration download mechanism has the advantage of being extremely simple (trivial) and applicable in any network without any requirements for specialized management servers or applications. It has the
disadvantage of being completely insecure.
The security hole of downloading complete configurations—which may contain IP addresses, login names,
ect.—using TFTP becomes particularly pressing in combination with the auto-provisioning feature which
allows large scale distribution of configurations in entire networks.
To alleviate this problem and maintain the simplicity of TFTP downloads support for encrypted configuration
file downloads is introduced.
Goal: Prevent maliciously intercepted configurations to be readable by unauthorized users.
Pre-requisites: Only authorized users have configuration access to the SmartNode. The configurations can be
stored in plain form on the SmartNode. SNMP Write Access shall be restricted by means of communities and
ACLs to prevent unauthorized SNMP initiated configuration downloads. Telnet access shall be restricted by
means of credentials and ACLs.
Encrypted Configuration Download
An external encryption tool on the PC is used to encrypt the configuration file:
enctool encrypt []
The encrypted configuration file can then be downloaded with TFTP triggered by
• The CLI copy command: copy tftp:///
• Auto provisioning
• SNMP
• HTTP
On the SmartNode the encryption is detected and the configuration file is automatically decrypted before
stored to flash.
A custom encryption key can be:
• Downloaded to the SmartNode
• Specified with the PC encryption tool
The encryption key may include the MAC address and/or serial number of the SmartNode using the placeholders $(system.mac) and $(system.serial) respectively.
An encrypted configuration file can be uploaded to a TFTP server on request, specifying the encrypted flag:
copy tftp:/// encrypted
On the PC the encryption tool can be used to decrypt the file:
Configuration file handling task list
87
SmartWare Software Configuration Guide
6 • Configuration file handling
enctool decrypt []
A log file lists the last up/downloads:
show log file-transfer
Use Cases
Install a custom encryption key (optional)
You can install a custom encryption key with the SmartNode. The encryption key is used to automatically
decrypt an encrypted configuration file that is downloaded later. A default encryption key is already installed
on the SmartNode.
To install an encryption key you have to create a file on your TFTP server that contains the key. Then you have
to download this key file to the SmartNode using the copy command of the SmartNode.
The key file shall contain a key string of at most 24 characters on a single line. Spaces, tabs and LF/CR characters are trimmed. The key must not contain LF/CR or the null character and must not start or end with a space
or tab. If the key contains more than 24 characters, only the first 24 characters are considered.
The key may contain variables that are resolved when the key file is downloaded to a SmartNode. Using this
mechanism you can specify device-specific encryption keys. We currently support the following variables:
• $(system.mac): The MAC address of the first ethernet port. Execute the show port ethernet command on a
SmartNode to display the MAC address of a SmartNode. This value without the colon separators and with
all lower-case hexadecimal letters is used instead of the variable on the SmartNode.
• $(system.serial): The serial number of the SmartNode. Execute the show version command on the SmartNode to display the serial number.
When your key file contains the following line:
123$(system.serial)abc$(system.mac)XYZ
The command show port ethernet shows the following:
Ethernet Configuration
------------------------------------Port
: ethernet 0 0 0
State
: OPENED
MAC Address
: 00:0C:F1:87:D9:09
Speed
: 10MBit/s
Duplex
: Half
Encapsulation : ip
Binding
: interface eth0 router
The command show version displays the following:
[...]
Serial number : 100000020002
[...]
The encryption key on this SmartNode will be interpreted as:
Configuration file handling task list
88
SmartWare Software Configuration Guide
6 • Configuration file handling
123100000020002abc000cf187d909XYZ
Then you have to download the created key file to the SmartNode. Open a telnet session and type in the following commands:
>enable
#copy tftp:/// key:
where is the IP address of your TFTP server and is the path to the key file relative to the
TFTP root.
IMPORTANT
The downloaded key also defines how the passwords are
encrypted in your configuration files. After you downloaded a
key file you have to regenerate the startup-config from the
running-config by executing the command.
copy running-config startup-config
If you don’t do this, the device will fail executing the commands
that have encrypted password arguments in the startup-config.
Encrypt a configuration file
Use the encryption tool to encrypt a configuration file on your PC. Therefore you have to enter the
following command.
enctool encrypt []
Where is the path of the non-encrypted input configuration file and is the path of
the encrypted output configuration file. specifies the encryption key which shall be used to encrypt the
configuration file. If omitted the default key is used.
Download an encrypted configuration file
Now you can download the configuration file as usual using the CLI copy-command, the auto-provisioning
feature, HTTP or SNMP download. The SmartNode automatically detects that a downloaded file is encrypted
and tries to decrypt the file using the pre-installed key.
Upload an encrypted configuration file
The SmartNode immediately decrypts a configuration file after downloading it. This is the configuration
file is stored non-encrypted in the flash memory. Thus when you upload a configuration it is
uploaded non-encrypted.
You may upload an encrypted configuration file specifying the encrypted flag at the end of the copy command:
#copy startup-config tftp:/// encrypted
This encrypts the configuration file before sending it to the TFTP server. Use the enctool decrypt command
on the PC to regain the original configuration.
Configuration file handling task list
89
Chapter 7
Basic system management
Chapter contents
Introduction ..........................................................................................................................................................91
Basic system management configuration task list ...................................................................................................91
Managing feature license keys .........................................................................................................................92
Setting system information .............................................................................................................................93
Setting the system banner ................................................................................................................................94
Setting time and date ......................................................................................................................................95
Display clock information ...............................................................................................................................95
Display time since last restart ..........................................................................................................................96
Configuring the Web server ............................................................................................................................96
Determining and defining the active CLI version ............................................................................................96
Restarting the system ......................................................................................................................................97
Displaying the system logs ..............................................................................................................................97
Displaying reports ...........................................................................................................................................98
Controlling command execution .....................................................................................................................98
Timed execution of CLI command ...............................................................................................................100
Displaying the checksum of a configuration ..................................................................................................100
Configuration of terminal sessions ................................................................................................................100
90
SmartWare Software Configuration Guide
7 • Basic system management
Introduction
This chapter describes parameters that report basic system information to the operator or administrator, and
their configuration. The following are basic parameters that can be established when setting up a new system:
• Defining the system's hostname
• Setting the location of the system
• Providing reference contact information
• Setting the clock
Additionally, the following tasks are described in this chapter:
• Checking the CRC of configuration files
• Displaying the currently running SmartWare commands
• Moving SmartWare commands into the foreground
• Setting the system banner
• Enabling the embedded web server
Basic system management configuration task list
All tasks in the following sections are optional, though some such as setting time and calendar services and system information are highly recommended.
To configure basic system parameters, perform the tasks described in the following sections.
• Managing feature license keys (see page 92)
• Setting system information (see page 93)
• Setting the system banner (see page 94)
• Setting time and date (see page 95)
• Displaying clock information (see page 95)
• Displaying time since last restart (see page 96)
• Configuring and starting the web server (see page 96)
• Determining and defining the active CLI version (see page 96)
• Restarting the system (see page 97)
• Displaying the system event log (see page 97)
• Controlling command execution (see page 98)
• Setting timed execution of CLI commands (see page 100)
• Displaying the checksum of a configuration (see page 100)
• Configuration of terminal sessions (see page 100)
• Identifying a unit by flashing all LED’s (see page 100)
Introduction
91
SmartWare Software Configuration Guide
7 • Basic system management
Managing feature license keys
Several features of the firmware require a system specific license key to be installed to enable the feature.
This section describes how to install the feature license keys on your equipment. Because license keys comprise
very long strings of characters, the standard way of installing them is to download the file containing the
license keys from a TFTP server to the equipment. Therefore, a TFTP server must be present in the IP network
where you can store the license keys file obtained from the distributor. If no TFTP server is available, the
license key can also be manually typed (or copied and pasted) in a console or Telnet window. Both procedures
are described below.
Mode: Configure
Step
1
Command
node(cfg)#copy tftp://tftp-server/path/filename licenses:
Purpose
Downloads the license key file and install the
licenses.
Example: Installing license keys from a TFTP server
The following example shows the command used to install license keys, which are stored in a license file on a
TFTP server.
node(cfg)#copy tftp://172.16.4.3/keystore/myLicense.lic licenses:
Mode: Configure
Step
1
2
Command
node(cfg)#install license license-key
Purpose
Install the license key
Repeat step 1 for any additional license keys
Example: Installing license keys from the console
The following example shows the command used to install license keys manually on the console.
node(cfg)#install license 10011002R1Ws63yKV5v28eVmhDsVGj/JwKqIdpC4Wr1BHaNtenXUYF/
2gNLoihifacaTPLKcV+uQDG8LJis6EdW6uNk/
GxVObDEwPFJ5bTV3bIIfUZ1eUe+8c5OpCCd7PSAe83Ty2c/
CnZPSlEjIrVlJrr8VhOr1DYxkEV9evBp+tSY+y9sCeXhDWt5Xq15SAPlznTLQmym7fDakvm+zltzswX/
KX13sdkR0ub9IX4Sjn6YrvkyrJ2dCGivTTB3iOBmRjV1u
After installing license keys, you can check if the license keys have been added successfully to your system using
the following command.
Mode: Configure
Step
1
Command
node(cfg)#show licenses
Purpose
Display all installed licenses
Example: Displaying installed licenses
The following example shows the command used to display all installed licenses on a system and a sample of its
output.
Basic system management configuration task list
92
SmartWare Software Configuration Guide
7 • Basic system management
node(cfg)#show licenses
VPN [vpn]
License serial number: 14343534
Status: Active
node(cfg)#
Setting system information
The system information includes the following parameters:
• Contact
• Hostname
• Location
• Provider
• Subscriber
• Supplier
By default there is no information specified for any of the above parameters.
System contact information tells the user how to contact the information service, e.g. the help line of the service provider. The contact information may be any alphanumeric string, including spaces, that is no longer
than one line. This entry corresponds to the MIB II system sysContact object.
The system name, also called the hostname, is used to uniquely identify the SmartNode in your network. The
selected name should follow the rules for ARPANET hostnames. Names must start with a letter, end with a letter or digit, and have as interior characters only letters, digits, and hyphens. Names must be 63 characters or
fewer. For more information, refer to RFC 1035. This entry corresponds to the MIB II system sysName object.
After setting the hostname of the SmartNode the CLI prompt will be replaced with the chosen name.
Assigning explanatory location information to describe the system physical location of your SmartNode (e.g.
server room, wiring closet, 3rd floor, etc.) is very supportive. This entry corresponds to the MIB II system sysLocation object.
The system provider information is used to identify the provider contact for this SmartNode device, together
with information on how to contact this provider. The provider is a company making services available to subscribers. The provider information may be any alphanumeric string, including spaces, that is no longer than
one line. This entry corresponds to the Patton Electronics enterprise-specific MIB provider object.
The system subscriber information is used to get in touch with subscriber for this SmartNode device, together
with information on how to contact this subscriber. The subscriber is a company or person using one or more
services from a provider. The subscriber information may be any alphanumeric string, including spaces, that is
no longer than one line. This entry corresponds to the Patton Electronics enterprise-specific MIB subscriber
object.
The system supplier information is used to get in touch with the supplier for this SmartNode device, together
with information on how to contact this supplier. The supplier is a company delivering SmartNode devices to
a provider. The supplier information may be any alphanumeric string, including spaces, that is no longer than
one line. This entry corresponds to the Patton Electronics enterprise-specific MIB supplier object.
Basic system management configuration task list
93
SmartWare Software Configuration Guide
7 • Basic system management
Mode: Configure
Step
1
2
3
4
5
6
Command
node(cfg)#system
node(cfg)#system
node(cfg)#system
node(cfg)#system
node(cfg)#system
node(cfg)#system
Note
Purpose
contact information
hostname information
location information
provider information
subscriber information
supplier information
Sets
Sets
Sets
Sets
Sets
Sets
the
the
the
the
the
the
contact information to information
hostname to information
location information to information
provider information to information
subscriber information to information
supplier information to information
If the system information must have more than one word, enclose it in double quotes.
Example: Setting system information
The following example shows the commands used to configure the contact information for your device, if you
start from the operator execution mode.
node(cfg)#system contact "Bill Anybody, Phone 818 700 1504"
node(cfg)#system hostname node
node(cfg)#system location “Wiring Closet, 3rd Floor”
node(cfg)#system provider “Best Internet Services, contact@bis.com, Phone 818 700
2340”
node(cfg)# system subscriber “Mechanical Tools Inc., jsmith@mechtool.com, Phone 818
700 1402”
node(cfg)# system supplier “WhiteBox Networks Inc., contact@whitebox.com, Phone 818
700 1212”
Setting the system banner
The system banner is displayed on all systems that connect to your SmartNode via Telnet or a serial connection
(see figure 13). It appears at login and is useful for sending messages that affect administrators and operators,
such as scheduled maintenance or system shutdowns. By default no banner is present on login.
To create a system banner use the banner command followed by the message you want displayed. If the banner message has to be formed out of more than one word the information is enclosed by double quotes. Adding
the escape sequence “\n” to the string forming the banner creates a new line on the connected terminal screen.
Use the no banner command to delete the message.
Mechanical Tools Inc.
jsmith@mechtool.com
Phone 818 700 1402
login:
Figure 13. System banner with message to operators
Mode: Configure
Step
1
Command
node(cfg)#banner message
Basic system management configuration task list
Purpose
Sets the message for the system banner to message
94
SmartWare Software Configuration Guide
7 • Basic system management
Example: Setting the system banner
The following example shows how to set a message for the system banner for your device, if you start from the
configuration mode.
node(cfg)#banner \n#\n# The password of all operators has changed\n# please contact
the administrator\n#"
Setting time and date
All SmartNode devices provide time-of-day and date services. These services allow the products to accurately
keep track of the current time and date. The system clock specifies year, month, day, hour, minutes, and
optionally seconds. The time is in 24-hour format yyyy-mm-ddThh:mm:ss and is retained after a reload.
Mode: Configure
Step
1
Command
Purpose
node(cfg)#clock set yyyy-mm-ddThh:mm:ss
Note
Sets the system clock to yyyy-mm-ddThh:mm:ss
The integrated SNTP client allows synchronization of time-of-day and date
to a reference time server. Refer to chapter 26, “SNTP client configuration”
on page 282 for more details.
Example: Setting time and date
The following example shows the commands used to set the system clock of your device to August 6, 2001 at
16:55:57, if you start from the operator execution mode.
node(cfg)#clock set 2001-08-06T16:55:57
Display clock information
This procedure describes how to display the current date and time
Mode: Both in operator and administrator execution
Step
1
Command
node>show clock
Purpose
Display the local time.
Example: Display clock information
The following example shows the commands used to display the time and date settings of your device in local
time, if you start from the operator execution mode.
node>show clock
2001-08-06T16:55:57
Basic system management configuration task list
95
SmartWare Software Configuration Guide
7 • Basic system management
Display time since last restart
This procedure describes how to display the time since last restart
Mode: Operator execution
Step
1
Command
node>show uptime
Purpose
Display the time since last restart.
Example:
The following example shows how to display the uptime of your device, if you start from the configuration mode.
node>show uptime
The system is up for 54 days, 23 hours, 44 minutes, 18 seconds
Configuring the Web server
The embedded web server has two parameters that are configurable.
Note
Changing the language parameter does not affect the language of the web
configuration pages.
Mode: Configure
Step
1
Command
node(cfg)#webserver language
{de | en}
node(cfg)#webserver port portnumber
2
Purpose
Sets the language to either German (de) or English (en).
Sets the listening port number in the 1 to 65535, default
port number for the web server is 80.
Example: Configuring and starting the Web server
The following example shows how to set the web server language and the listening port of your device, if you
start from the configuration mode.
node(cfg)#webserver language en
node(cfg)#webserver port 80
Determining and defining the active CLI version
SmartWare allows having a number of CLI version installed together, whereas only one CLI version is activated. There are commands available to determine the currently running CLI version and if necessary switch to
another CLI version. The idea of having several CLI version available on a system is mostly to offer reduced or
enhanced command sets to users.
Mode: Configure
Step
1
2
Command
node(cfg)#show version cli
node(cfg)#cli version version.revision
Basic system management configuration task list
Purpose
Displays the currently running CLI version
Selects the active CLI version in the form version.revision
96
SmartWare Software Configuration Guide
7 • Basic system management
Example: Defining the desired CLI version
The following example shows how to determine the running CLI version and define CLI version 2.10 for your
device, if you start from the configuration mode.
node(cfg)#show version cli
CLI version : 3.00
node(cfg)#cli version 2.10
Restarting the system
In case the SmartNode has to be restarted, the reload command must be used. The reload command includes
a two-dialog, where the user is allowed to store any unsaved configuration data and finally confirms the
system restart.
Restarting the system interrupts running data transfers and all
voice calls.
IMPORTANT
The execution command reload has been enhanced with the following options:
• graceful—reloads the system only if no voice calls are ongoing. If there are voice calls, the system waits until
they all are closed to reload.
• forced—reloads the system without prompting for confirmation or for saving the running-configuration
(no need to type yes or no). The question whether to save the running-configuration is automatically
answered with no, the question whether to reload or not with yes.
Mode: Administrator execution
Step
1
Command
node#reload
Purpose
Restarts the system
Example: Restarting the system
The following example shows how to restart the currently running system, if you start from the administrator
execution mode.
node#reload
System configuration has been changed.
Press 'yes' to store, 'no' to drop changes : yes
Press 'yes' to restart, 'no' to cancel : yes
The system is going down
Displaying the system logs
The system logs contain warnings and information from the system components of SmartWare. In case of
problems it is often useful to check the event or the supervisor logs for information about malfunctioning system components. The event log stores general events such as flash full, DSP failed etc., comparable with the
event log on Windows NT. The supervisor log stores information from the system supervisor such as memory
full, task failed etc.
Basic system management configuration task list
97
SmartWare Software Configuration Guide
7 • Basic system management
System resets may have a number of reasons, the most prominent being a manual reset issued on the Telnet/
console (‘reload’). Other reset reasons include power off failures and system failures. In order to pinpoint the
problem, the reset log contains the reset cause.
Mode: Administrator execution
Step
1
2
Command
Purpose
node#show log [event]
Show event log.
node#show log supervisor Show log of the system supervisor. Used For example, after an unexpectedly reboot.
node#show log reset
Output a list of reset reasons (with date and time).
node#show log boot
Displays the console and log messages captured during startup of the
unit.
node#show log login
Displays a list of succeeded and failed CLI login attempts.
node#show log fileDisplays the history of all recently executed file transfer operations
transfer
(up to 50 entries).
3
4
5
6
Displaying reports
The show reports command is used to dump combined system information. The show reports command
sequentially executes the following log commands:
show
show
show
show
show
show
show
show
show
show
show
show
version
clock
uptime
licenses
memory stat
log reset
log boot
log event
log supervisor
factory-config
startup-config
running-config
Mode: Administrator execution
Step
1
Command
node#show reports
Purpose
Dumps the combined system information.
Controlling command execution
The SmartWare command shell includes a basic set of commands that allow you to control the execution of
other running commands. In SmartWare, the commands jobs and fg are used for such purposes. The command jobs lists all running commands, and fg allows switching back a suspended command to the foreground. Moreover using - suspends an active command and lets the system prompt reappear. With
- the currently active command can be terminated.
Basic system management configuration task list
98
SmartWare Software Configuration Guide
7 • Basic system management
Mode: Administrator execution
Step
1
2
3
4
5
6
Command
node#
node#jobs
node#fg jobid
node#
Purpose
Execute the first command
Suspend the active command and get system prompt back
Execute the second command
Shows the currently running commands
Brings job with jobid back to foreground
Terminates the currently running command
Example: Controlling Command Execution
The following example shows how to suspend an active command, list the running commands, switch back a
suspended command and terminate a currently active command on your device, if you start from the configuration mode.
node>ping 172.16.36.80 1000 timeout 3
Sending 1000 ICMP echo requests to 172.16.36.80, timeout is 3 seconds:
Reply from 172.16.36.80: Time <10ms
Reply from 172.16.36.80: Time <10ms
Reply from 172.16.36.80: Time <10ms
Reply from 172.16.36.80: Time <10ms
- suspend active command
% Suspended
System prompt reappears and is ready to execute further commands
node>show ip interface
-----------------------------------------------------------Context:
router
…
Show the currently running commands
node>jobs
* [run ] jobs
0 [bg ] ping
Bring job 0 to foreground
node>fg
% Resumed [ping]
Reply from 172.16.36.80: Time <10ms
Reply from 172.16.36.80: Time <10ms
- terminate current command
% Aborted (ping)
Basic system management configuration task list
99
SmartWare Software Configuration Guide
7 • Basic system management
Timed execution of CLI command
The command timer allows the timed execution of CLI commands. The timer command is incremental; this
means for each time it is entered, a new timer is created. All timers appear in the running-configuration, except
if they have been created with the volatile option. It is possible to specify for each timer the start time and the
reoccurrence. Use the CLI help (tab completion) for detailed description of all configuration options.
Some examples:
timer FIRMWARE_UPDATE now + 2 minutes every 10 minutes “provisioning execute FIRMWARE”
Starts a timer named FIRMWARE_UPDATE, whose first execution time is 2 minutes after the command is
entered (2 minutes after device startup if the command is in the startup-configuration), and is executed every
10 minutes afterwards. This timer does not expire. The executed CLI command is provisioning
execute FIRMWARE.
timer volatile RELOAD midnight + 1 hour “reload graceful”
Starts a volatile timer named RELOAD (does not appear in the running-configuration, and thus is not stored in
the startup-configuration). The timer is executed once, 1 hour after midnight, and reloads the
system gracefully.
Displaying the checksum of a configuration
In SmartWare configuration files, e.g. startup configuration, running configuration, and user-specific configuration, contain a checksum entry. This checksum informs the user about the validity and helps distinguish configuration files on the basis of the checksum.
Mode: Administrator execution
Step
1
Command
node#show crc filename
Purpose
Displays checksum of a configuration
Example: Displaying the checksum of a configuration
The following example shows how to display the checksum of the configuration test of your device, if you start
from the configuration mode.
node#show crc nvram:test
File nvram: test:
checksum: 0xfaddc88a
Configuration of terminal sessions
In certain cases it may be desirable to change the settings of the current terminal session.
Mode: System
Step
1
Command
[name] (sys)#terminal height
Basic system management configuration task list
Purpose
Configures the terminal height.
100
SmartWare Software Configuration Guide
Step
Command
2
[name] (sys)#[no] terminal idle-timelogout
3
[name] (sys)#terminal more
4
[name] (sys)#terminal width
7 • Basic system management
Purpose
After 30 minutes without user input, a terminal session
is automatically closed. If longer session periods are
required (logging/debugging) this command allows
to increase the session timeout, or to disable it completely.
Enables pausing of display for commands which produce more output than the current terminal window
can display at once.
Configures the terminal width.
When there are many VoIP units in the same location, use this command to flash all the LED’s on a specific
unit for a specified period of time. This makes identification of the physical unit very easy.
Step
1
Command
[name] #blink
Basic system management configuration task list
Purpose
Enter an integer for the period of time you want the
LED’s to flash on the physical unit.
101
Chapter 8
RADIUS Client Configuration
Chapter contents
Introduction ........................................................................................................................................................103
The AAA component ..........................................................................................................................................103
General AAA Configuration ..........................................................................................................................104
RADIUS configuration........................................................................................................................................106
Configuring RADIUS clients ........................................................................................................................107
Configuring RADIUS accounting .................................................................................................................108
Configuring the RADIUS server ...................................................................................................................110
Attributes in the RADIUS request message .............................................................................................110
Attributes in the RADIUS accept message ...............................................................................................111
Configuring the local database accounts ..............................................................................................................111
Storing call logs with quality information ............................................................................................................113
102
SmartWare Software Configuration Guide
8 • RADIUS Client Configuration
Introduction
This chapter provides an overview of the authentication, authorization, and accounting (AAA) component and
describes how to configure the RADIUS client, a subpart of the AAA component. It is important to understand how AAA works before configuring the RADIUS client. This chapter also describes the local database
accounts configuration, which is another subpart of AAA.
To use the authentication and authorization service on SmartWare you have to configure the AAA component,
the RADIUS component and the local database accounts.
This chapter includes the following sections:
• The AAA component
• RADIUS configuration (see page 106)
• Configuration of the local database accounts (see page 111)
The AAA component
Authentication, authorization, and accounting (AAA) is a term for controlling access to client resources,
enforcing policies, auditing usage, and providing information necessary to invoice users for services.
Authentication provides a way of identifying a user (usually in the form of a login window where the user is
expected to enter a username and password) before allowing access to a client. The AAA component compares
the user's authentication login information with credentials stored in a database. If the information is verified,
the user is granted access to the network. Otherwise, authentication fails and network access is denied.
Following authentication, authorization determines the activities, resources, or services a user is permitted to
access. For example, after logging into a system, a user may try to issue commands, the authorization process
determines whether the user has the authority to issue such commands.
Accounting, which keeps track of the resources a user consumes while connected to the client, can tally the
amount of system time used or the amount of data transferred during a user’s session. The accounting process
records session statistics and usage information that is used for authorization control, billing, and monitoring
resource utilization.
AAA information can be stored in a local database or in a database on a remote server. A current standard by
which network access servers interface with the AAA server is the Remote Authentication Dial-In User Service
(RADIUS).
Introduction
103
SmartWare Software Configuration Guide
8 • RADIUS Client Configuration
Figure 14 illustrates the authentication procedure for a user logging into a SmartNode that is configured to use
RADIUS as authentication method.
AAA Server
(RADIUS)
3. Authentication accepted
4. Access granted
IP
2. Authentication requested
User
1. Login Request
Node
Figure 14. Authentication procedure with a RADIUS server
General AAA Configuration
The AAA component consists of AAA profiles and AAA methods. A service (e.g. Telnet) has to specify a profile it
wants to apply to all login requests. The profile then specifies the sequence in which methods are applied to obtain
AAA information. Figure 15 illustrates the correlation between the Telnet login and console login services.
AAA method
Service
Telnet
radius_deepblue
1
AAA profile
2
cli-login
radius_extern
3
local database
Console
1
consolelogin
none
2
Figure 15. How to use AAA methods and AAA profiles
The Telnet service uses an AAA profile called cli-login. This profile specifies that the following methods are used
in the order they appear in the configuration:
1. Query RADIUS server radius_deepblue.
2. Query RADIUS server radius_extern.
The AAA component
104
SmartWare Software Configuration Guide
8 • RADIUS Client Configuration
3. Query the local database (see “Configuring the local database accounts” on page 111 for information on
how to configure the local database)
If, e.g. radius_deepblue is not available, radius_extern will be queried after a timeout. But if radius_deepblue
gives an answer that rejects the login request, the remaining methods are not used and the login is denied. The
same applies to the console service, which uses the profile console-login. This profile uses the following sequence
of methods:
1. Ask radius server radius_deepblue.
2. Ask predefined method none. This method always grants access as system operator.
If radius_deepblue is not available, access will be granted by the method none. If radius_deepblue rejects the
login request, console access is denied. If radius_deepblue confirms the request, console access is granted.
Do the following to configure the AAA component.
Mode: Configure
Step
Command
1
node(cfg)#profile authentication name
2
node(pf-auth)[name]#method [index]
{local | none | {radius name}}
3
4
5
6
7
8
node(pf-auth)[name]#server-timeout
seconds
node(pf-auth)[name]#exit
node(cfg)#terminal Telnet use
authentication profile-name
node(cfg)#terminal console use
authentication profile-name
node(cfg)#show profile authentication
[name]
Purpose
Creates an authentication profile with name
name and enters profile authentication configuration mode.
Adds an AAA method to the profile. For RADIUS
you have to specify a name. For information on
how to configure local accounts and RADIUS
servers, refer to chapter 9, “IP context overview”
on page 114. With index you can add a method
between to others.
Repeat step 2 for all AAA methods you want to
add
Sets the timeout after that the next AAA method
in the list is requested if no answer is received.
Goes back to the parent configuration mode
Specifies which AAA profile the Telnet login service
has to use.
Specifies which AAA profile the console login
service has to use.
Displays the configured profiles
Example: Create the AAA profiles for login over Telnet and login over console, as they are shown in figure 15,
and use them on the Telnet login and console login services.
node>enable
node#configure
node(cfg)#profile authentication remote-radius
node(pf-auth)[remote-~]#method radius radius_deepblue
node(pf-auth)[remote-~]#method radius radius_extern
node(pf-auth)[remote-~]#method local
node(pf-auth)[remote-~]#server-timeout 15
The AAA component
105
SmartWare Software Configuration Guide
8 • RADIUS Client Configuration
node(pf-auth)[remote-~]#exit
node(cfg)#
node(cfg)#profile authentication local-only
node(pf-auth)[local-o~]#method local
node(pf-auth)[local-o~]#method none
node(pf-auth)[local-o~]#exit
node(cfg)#terminal Telnet use authentication remote-radius
node(cfg)#terminal console use authentication local-only
node(cfg)#show profile authentication
Authentication Profile: default
Server-Timeout: 10
Methods:
local (Type=local)
none (Type=none)
Authentication Profile: remote-radius
Server-Timeout: 15
Methods:
radius_deepblue (Type=radius)
radius_extern (Type=radius)
local (Type=local)
Authentication Profile: local-only
Server-Timeout: 10
Methods:
local (Type=local)
none (Type=none)
node(cfg)#
Possible lock-out —If you delete the local and none methods
from the default AAA profile, or if you create and use a profile
without methods local and none, you will be unable to access
IMPORTANT your device if the network or RADIUS server is not available.
Note
If you do not configure AAA, a default AAA profile exists containing the
AAA local as the first AAA method and the AAA none as the second. The Telnet login and the console login service use this profile. If an emergency
occurs, you can reload this default configuration by reloading the factory
configuration as described in section “Boot procedure” on page 74.
RADIUS configuration
RADIUS is a protocol for carrying authentication, authorization, and configuration information between a
network access server (NAS) that desires to authenticate its links and a shared authentication server. A NAS
operates as a client of RADIUS. The client is responsible for passing user information to designated RADIUS
servers and then acting on the response that is returned. RADIUS servers are responsible for receiving user connection requests, authenticating the user, and then returning all configuration information necessary for the
client to deliver service to the user.
RADIUS configuration
106
SmartWare Software Configuration Guide
8 • RADIUS Client Configuration
Transactions between the RADIUS client and server are authenticated through the use of a shared secret, which is
never sent over the network—the same secret must thus be known to the server and the client by configuration.
Using this secret as an encryption key, user passwords are sent encrypted between the client and RADIUS server.
Configuring RADIUS clients
If the AAA profiles you have defined make use of the RADIUS AAA method, you must configure the corresponding RADIUS clients. To configure RADIUS clients, do the following steps:
Mode: Configure
Step
Command
1
node(cfg)#radius-client name
2
node(radius)[name]#radius-server hostname
node(radius)[name]#shared-secret
authentication secret
node(radius)[name]#exit
node(cfg)#show radius-client name
3
4
5
Purpose
Adds a RADIUS client with name name and
enters RADIUS-client configuration mode
Sets the hostname (or IP address) of the remote
RADIUS server
Sets the password shared between the RADIUS
client and the remote RADIUS server.
Goes back to the parent configuration mode
Displays configured RADIUS servers
Example: Configure the RADIUS clients as shown in figure 15.
node>enable
node#configure
node(cfg)#radius-client radius_deepblue
node(radius)[radius_~]#radius-server deepblue
node(radius)[radius_~]#shared-secret authentication 78f8a23b
node(radius)[radius_~]#exit
node(cfg)#radius-client radius_extern
node(radius)[radius_~]#radius-server 219.144.12.1
node(radius)[radius_~]#shared-secret authentication dd9351e13cc335
node(radius)[radius_~]#exit
node(cfg)#
node(cfg)#show radius-client
RADIUS clients:
radius_deepblue
radius_extern
node(cfg)#show radius-client radius_deepblue
AAA RADIUS Module: radius_deepblue
Authentication Shared Secret: 78f8a23b
Timeout: 6
Sessions:
UDP Interface:
Configured Server Hostname: deepblue
node(cfg)#show radius-client radius_extern
AAA radius Module: radius_extern
Authentication Shared Secret: dd9351e13cc335
Timeout: 6
Sessions:
UDP Interface:
Configured Server Hostname: 219.144.12.1
RADIUS configuration
107
SmartWare Software Configuration Guide
8 • RADIUS Client Configuration
node(cfg)#
Configuring RADIUS accounting
The RADIUS accounting functionality can be added to a call-router configuration by inserting an AAA callcontrol service between two call-router elements. Any call that is then routed through the AAA service will
cause call detail records (CDRs) to be sent to the radius server. Normally an accounting start record is sent
when the call is connected and the accounting stop record is sent, when the call is disconnected. If enabled, the
AAA service is also able to send interim update records, after a specified interval. The AAA service can include
the following standard RADIUS attributes in the CDRs:
ATTRIBUTE
ATTRIBUTE
ATTRIBUTE
ATTRIBUTE
ATTRIBUTE
ATTRIBUTE
Acct-Status-Type
Acct-Session-Time
Acct-Session-Id
NAS-Identifier
Called-Station-Id
Calling-Station-Id
Additionally, the following vendor specific attributes are available to support voice service specific information:
#
# dictionary.patton
#
VENDOR
Patton
1768
#
#
Name
Id
Type
Vendor Note
#
ATTRIBUTE Setup-Time 32 string Patton a)
ATTRIBUTE Connect-Time 33 string Patton a)
ATTRIBUTE Disconnect-Time 34 string Patton a)
ATTRIBUTE Disconnect-Cause 35 integer Patton b)
ATTRIBUTE Disconnect-Source 36 string Patton c)
ATTRIBUTE Called-Unique-Id 48 string Patton d)
ATTRIBUTE Called-IP-Address 49 ipaddr Patton
ATTRIBUTE Called-Numbering-Plan 50 string Patton e)
ATTRIBUTE Called-Type-Of-Number 51 string Patton f)
ATTRIBUTE Calling-Unique-Id 80 string Patton d)
ATTRIBUTE Calling-IP-Address 81 ipaddr Patton
ATTRIBUTE Calling-Numbering-Plan 82 string Patton e)
ATTRIBUTE Calling-Type-Of-Number 83 string Patton f)
ATTRIBUTE Calling-Presentation-Indicator 88 string Patton g)
ATTRIBUTE Calling-Screening-Indicator 89 string Patton h)
a)
b)
c)
d)
e)
f)
g)
h)
Format of timestamps is "WWW MMM DD HH:MM:SS YYYY" Example: "Wed Jun 15 09:20:55 2005"
ITU-T Q.931 cause value (1-127)
{ originator | terminator | internal }
Contains the Call-Id for SIP or H.323
{ e.164 | data | telex | national | private }
{ international | national | network specific | subscriber | abbreviated }
{ allowed | restricted | unavailable }
{ user-provided, not screened | user-provided, verified and passed | user-provided, verified and failed | network provided }
Note
The subset of information elements that is actually included in a CDR is
dependant on the type of call and the information already available at the
time the CDR is sent.
RADIUS configuration
108
SmartWare Software Configuration Guide
8 • RADIUS Client Configuration
The following procedure guides you through the steps necessary to enable RADIUS accounting in an
existing configuration:
Mode: Configure
Step
1
2
Command
Purpose
node(cfg)# radius-client
Create a new RADIUS client
node(radius)[client-name]# Define the RADIUS server to be used. If the UDP port is omitradius-server []
Note For accounting RADIUS servers often use
port 1813)
Note There might also be RADIUS servers, which still
use the old RADIUS ports 1645 or 1646)
3
node(radius)[client-name]# Define the shared secret to access the RADIUS server
shared-secret authentication
4
node(radius)[client-name]# Create an AAA profile, which uses the RADIUS client
profile aaa
5
node(pf-auth)[pf-name]#
Define your newly created radius client as the AAA method
method radius
Note If you require redundancy, you can create multiple radius clients and add all of them to the
AAA profile.
6
node(pf-auth)[pf-name]#
Switch to the circuit-switching context.
context cs
7
node(ctx-cs)[ctx-name]#
Create an AAA call-control service
service aaa
8
node(svc-aaa)[svc-name]# Define the newly created AAA profile to be used for accountaccounting use profile
ing using this AAA service.
9
node(svc-aaa)[svc-name]# Define the NAS-Identifier string to be included in RADIUS
nas-identifier
10
node(svc-aaa)[svc-name]# Optionally, you can also configure the AAA service to
(Optional) authentication use profile
request authentication using the calls calling E.164 number.
If this is required, you can define the AAA profile used for
authentication using this command.
11
node(svc-aaa)[svc-name]#
(Optional) accounting-failure-action
[drop-calls | ignore]
RADIUS configuration
Define, if calls shall be dropped, if accounting fails. The
default is to ignore accounting failures.
109
SmartWare Software Configuration Guide
Step
8 • RADIUS Client Configuration
Command
Purpose
12
node(svc-aaa)[svc-name]#
(Optional) accounting-start-trigger
[setup | connect]
Define, if accounting shall be started at call-setup or call-connect time. The default is at call-connect time.
Note If setup is specified, an interim update will be
sent at call-connect time.
Note The Acct-Session-Time is always calculated from
call-connect to call-disconnect time)
13
node(svc-aaa)[svc-name]# Define the interval, after which an interim update shall be
(Optional) [no] interim-update-interval sent, if necessary. The default is not to send periodic interim
updates.
14
node(svc-aaa)[svc-name]# Create a port for the routing path, you want to route through
port
the AAA service.
15
node(port)[port-name]#
Define the routing destination for all calls received over
route call-dest- …..
this port.
16
node(svc-aaa)[svc-name]#
accounting-start-trigger
[setup | connect]
17
Go to the routing element, which is the source of the traffic to
be sent to this AAA service and configure its routing destination to this AAA service port using the following command:
route call dest-service .
Repeat steps 14 to 16 for each for each additional routing
path you want to route through the AAA service
Configuring the RADIUS server
Each message to and from a RADIUS server includes several attributes. Attributes are, For example, in a login
request, the name and password of the user that requires to log in. For more information about each attribute, or
other possible attributes, see RFC 2865 or the documentation of the radius server you use.
Attributes in the RADIUS request message
The SmartNode sends a RADIUS request with the following attributes:
Attribute
number
1
2
26
Attribute Type
Description
User-Name
Indicates the name of the user to be authenticated
User-Password
Protocol
Indicates the password of the user to be authenticated
Is a vendor specific attribute that indicates the protocol with that the
user wants to log on. Currently it can have the value 'console' or 'Telnet'. Thus it is possible for the RADIUS Server to grant access depending on whether the user wants to log on over console or Telnet
RADIUS configuration
110
SmartWare Software Configuration Guide
8 • RADIUS Client Configuration
Attributes in the RADIUS accept message
After the user and his credentials are approved by the authentication procedure on the RADIUS server, the
SmartNode expects a RADIUS accept message with the following attributes:
Attribute
number
6
Attribute Type
Service-Type
18
Reply-Message
27
Session-Timeout
28
Idle-Timeout
Description
If the value is set to 'administrative', the user has administrator rights on
the SmartNode, otherwise operator rights
Contains the text that is printed to the user after login. If the attribute is not
included in the message, no text will be printed
Number of seconds the user is allowed to logged on. If the attribute is
not included, the default value is infinite
Number of seconds to stay in idle state before automatic logout proceeds. If the attribute is not included, the default value is 30 minutes. The
command terminal idle-time-logout overwrites the value set by the
attribute
Most of the attributes are standard RADIUS attributes and are supported by the RADIUS servers. You have to
specify a value for each of them as it is described in your RADIUS server’s user manual.
The attribute Protocol (26) is vendor specific and defined by Patton. Servers not equipped to interpret the vendor-specific information will ignore it. It is defined as follows:
0
1
2
3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
Type
| Length
|
Vendor-Id
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Vendor-Id (cont)
| Vendor-Type | Vendor-Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Vendor-String ...
+-+-+-+-+-+-+-+-+-+-+-+-
Type: 26
Length: Length of the whole attribute including the vendor data
Vendor-Id: 1768
Vendor-Type: 16
Vendor-Length: Length of all vendor data including Vendor-Type and Vendor-Length
Vendor-String: Not null terminated String with the value console or Telnet
Configuring the local database accounts
The final step in configuring the authentication and authorization service in SmartWare is to set up local user
accounts. The local database—which is queried with the AAA method local as described previously—can contain administrator and operator accounts. For example, to grant access to the local SmartNode if all RADIUS
Configuring the local database accounts
111
SmartWare Software Configuration Guide
8 • RADIUS Client Configuration
servers are down or the network is not reachable, you can create an emergency user in the local database so that
you can still access the SmartNode. Perform the following steps to configure the local accounts.
Mode: Configure
Step
1
2
3
4
Command
node(cfg)#[no] administrator name password password
node(cfg)#[no] operator name password
password
node(radius)[name]#shared-secret
authentication secret
node(pf-auth)[name]#show accounts
Purpose
Adds an administrator account to the local database. The no form removes an existing account
Adds an operator account to the local database.
The no form removes an existing account
Sets the password shared between the RADIUS
client (the SmartNode) and the remote RADIUS
server.
Display existing accounts
Example: Create an administrator and an operator account
node>enable
node#configure
node(cfg)#administrator meier password pencil
node(cfg)#operator james password ""
node(cfg)#show accounts
Administrator accounts:
meier
Operator accounts:
james
node(cfg)
Note
If you are creating an account that does not require a password, type "" to
indicate that no password is needed. For example, if you were configuring an
account for an operator named James that did not need a password, the
entry would be:
node(cfg)#operator james password ""
Configuring the local database accounts
112
SmartWare Software Configuration Guide
8 • RADIUS Client Configuration
Storing call logs with quality information
It is possible to store call logs with quality information in the local aaa data sink. To do so, a service aaa is
needed where the calls are routed through. Create a profile aaa with the method local. Then create a service aaa
to route the calls through.
Example:
profile aaa default
method 1 local
context cs switch
routing-table called-e164 TAB_OUT
route 200 dest-interface IF_SIP
interface isdn IF_BRI_00
route call dest-service QoS_LOG.OUT.bri
interface sip IF_SIP
bind context sip-gateway sip
route call dest-service QoS_LOG.OUT.ethernet
service aaa QoS_LOG.OUT
accounting use profile aaa LOCAL_AAA
port bri
route call dest-table TAB_OUT
port ethernet
route call dest-interface IF_BRI_00
To see the collected logs use the command show accounting or use the Web-GUI to see the logs. In the WebGUI, go to the 'Reports' page and select “Call Quality Log” in the tab bar on top of the page. On that page,
ou will also have the option to export the log as a comma separated text file.
Storing call logs with quality information
113
Chapter 9
IP context overview
Chapter contents
Introduction ........................................................................................................................................................115
IP context overview configuration task list...........................................................................................................116
Planning your IP configuration ...........................................................................................................................117
IP interface related information .....................................................................................................................117
QoS related information ...............................................................................................................................117
Configuring physical ports...................................................................................................................................117
Creating and configuring IP interfaces.................................................................................................................117
Configuring NAPT .............................................................................................................................................118
Configuring static IP routing...............................................................................................................................118
Configuring RIP..................................................................................................................................................118
Configuring access control lists............................................................................................................................119
Configuring quality of service (QoS) ...................................................................................................................119
114
SmartWare Software Configuration Guide
9 • IP context overview
Introduction
This chapter outlines the SmartWare Internet protocol (IP) context and its related components. You will get the
fundamental understanding on how to set up your SmartNode to make use of IP related services.
The following sections describe the configuration steps necessary to put together certain IP services and the references to the related chapters that explain the issue in more details.
To understand the information given in the following chapters, carefully read to the end of the current chapter.
Before proceeding, make sure that you feel comfortable with the underlying SmartWare configuration concept
by reading chapter 2, “Configuration concepts” on page 44.
The IP context in SmartWare is a high level conceptual entity that is responsible for all IP-related protocols and
services for data and voice. The IP context performs much the same function as a standalone IP router, and
since every context is defined by a name, the IP context is named router by default. This IP context can contain
interface static routes, RIP parameters, NAPT, QoS and access control profiles.
In figure 16 on page 115, the IP context with all its related elements is contained within the area on the left,
which has a gray fill. The right side displays the related CS context, which communicates with the IP context
via different types of gateways. Since the CS context and its related components are not the subject of this
chapter, they are illustrated in figure 16 with gray lines instead of black ones.
H.323 GW
Gateway
bind commands
bind command
NAPT
Profile
Context
Interfaces
ACL
Profile
Context
CS
switch
use command
bind command
bind command
bind command
bind command
PVC
Circuit
ISDN
FXS
Serial
Ethernet
Ports
Service
Policy
Profile
Context
IP
router
use command
SIP GW
Figure 16. IP context and related elements
Introduction
115
SmartWare Software Configuration Guide
9 • IP context overview
The IP context undertakes the task of doing all IP-related transport of data and voice packets via the logical interfaces and available gateways. In addition, using profiles—which together with the IP context pinpoint how to
handle packets for specific services—enhances the possible field of application. Moreover, voice packets are
transported via a voice gateway to the CS context for further processing and forwarding to the PSTN.
IP context overview configuration task list
As previously described, this chapter outlines the IP context configuration. It does not give you all the details of
a configuration task, but refers you to the chapters in which you will find the full description.
• You can find all the information you need to configure an IP Interface in chapter 10, “IP interface configuration” on page 120.
• You can find the information regarding network address port translation (NAPT) in chapter 11, “NAT/
NAPT configuration” on page 132.
• If you need to configure a physical port, chapter 12, “Ethernet port configuration” on page 141 or
chapter 14, “Serial port configuration” on page 170 may prove helpful.
• To set up the IP router contained in SmartWare, chapter 22, “Basic IP routing configuration” on page 235
and chapter 23, “RIP configuration” on page 242 give you the required information.
• For essential knowledge related to network security requirements, refer to chapter 24, “Access control list
configuration” on page 253.
• If your network shall provide better service to selected network traffic, chapter 13, “Link scheduler configuration” on page 151 will help you to get in-depth knowledge about quality of service (QoS) management
with SmartWare.
The following sections describe the basic tasks involved in IP context configuration. Many parameters have
acceptable default values, which in most cases do not need to be explicitly configured. Hence not all of the configuration tasks below are required. Depending on your application scenario, some tasks are mandatory or
might be optional. The following tasks use a bottom-up approach, starting from the ports, followed by the
interfaces up to the services running on the SmartNode. The first tasks below shall help you obtaining the necessary overview, in view of the fact that there is always a risk getting lost in details before gaining a general
understanding of the whole network.
• Planning your IP configuration (see page 117)
• Configuring Ethernet and serial ports (see page 117)
• Creating and configuring IP interfaces (see page 117)
• Configuring NAPT (see page 118)
• Configuring static IP routing (see page 118)
• Configuring RIP (see page 118)
• Configuring access control lists (see page 119)
• Configuring quality of service (see page 119)
IP context overview configuration task list
116
SmartWare Software Configuration Guide
9 • IP context overview
Planning your IP configuration
The following subsections provide network connection considerations for several types of physical ports types.
Patton recommends that you draw a network overview diagram displaying all neighboring IP nodes and serial
connected elements. Do not begin configuring the IP context until you have completed the planning of your
IP environment.
IP interface related information
Setting up the basic IP connectivity for your SmartNode requires the following information:
• IP addresses used for Ethernet LAN and WAN ports
• IP Subnet mask used for Ethernet LAN and WAN ports
• Length for Ethernet cables
• IP addresses of the central H.323 gatekeeper or SIP registrar
• IP addresses of the central PSTN gateway for H.323 and SIP based calls
• IP address of the central TFTP server used for configuration upload and download
QoS related information
Check with your access service provider if there are any QoS related requirements, which you need to know
prior to configuring SmartWare QoS management. Check the following with your access service provider:
• What is the dedicated bandwidth, which you have agreed with your access service provider?
• How does your provider perform packet classification, e.g. which ToS bits have to be used to define the supported classes of service?
Configuring physical ports
The configuration of a port includes parameters for the physical and data link layer such as framing and encapsulation formats or media access control. Before any higher-layer user data can flow through a physical port, you
must associate that port with an interface within the IP context. This association is referred to as a binding.
For information and examples on how to configure ports, refer to the respective port type’s chapter.
Creating and configuring IP interfaces
The number and names of IP interfaces depend upon your application scenario. An interface is a logical construct that provides higher-layer protocol and service information, such as layer 3 addressing. Hence interfaces
are configured as part of the IP context and represent logical entities that are only usable if a physical port is
bound to them.
An interface name can be any arbitrary string, but for ease of identification you should use self-explanatory
names that describe the use of the interface.
Several IP-related configuration parameters are necessary to define the behavior of such an interface. The most
obvious parameters are the IP address and an IP net mask that belongs to it.
For information and examples on how to create and configure an IP interface, refer to chapter 10, “IP interface
configuration” on page 120.
Planning your IP configuration
117
SmartWare Software Configuration Guide
9 • IP context overview
Configuring NAPT
Network address port translation (NAPT), which is an extension to NAT, uses TCP/UDP ports in addition to
network addresses (IP addresses) to map multiple private network addresses to a single outside address. NAPT
enables small offices to save money by requiring only one official outside IP address to connect several hosts via
a SmartNode to the access network. Moreover, NAPT provides additional security, because the IP addresses of
hosts attached via the SmartNode are invisible to the external world. You can configure NAPT by creating a
profile that is afterwards used on an explicit IP interface. In SmartWare terminology, an IP interface uses a
NAPT profile, as shown in figure 16 on page 115.
For information and examples on how to configure NAPT refer to chapter 11, “NAT/NAPT configuration”
on page 132.
Configuring static IP routing
SmartWare allows to define static routing entries, which are table mappings established by the network administrator prior to the beginning of routing. These mappings do not change unless the network administrator
alters them. Algorithms that use static routes are simple to design and work well in environments in which network traffic is relatively predictable and where network design is relatively simple.
For information and examples on how to configure static IP routing, refer to chapter 22, “Basic IP routing
configuration” on page 235.
Configuring RIP
The Routing Information Protocol (RIP) is a distance-vector protocol that uses hop count as its metric. RIP is
widely used for routing traffic in the global Internet and is an interior gateway protocol (IGP), which means
that it performs routing within a single autonomous system.
RIP sends routing-update messages at regular intervals and also when the network topology changes. When a
router receives a routing update that includes changes to an entry, it updates its routing table to reflect the new
route. The metric value for the path is increased by one, and the sender is indicated as the next hop. RIP routers maintain only the best route (the route with the lowest metric value) to a destination. After updating its
routing table, the router immediately begins transmitting routing updates to inform other network routers of
the change. These updates are sent independently of the regularly scheduled updates that RIP routers send.
RIP uses a single routing metric (hop count) to measure the distance between the source and a destination network. Each hop in a path from source to destination is assigned a hop-count value, which is typically 1. When
a router receives a routing update that contains a new or changed destination-network entry, the router adds
one to the metric value indicated in the update and enters the network in the routing table. The IP address of
the sender is used as the next hop.
RIP prevents routing loops from continuing indefinitely by implementing a limit on the number of hops
allowed in a path from the source to a destination. The maximum number of hops in a path is 15. If a router
receives a routing update that contains a new or changed entry, and if increasing the metric value by one causes
the metric to be infinity (i.e. 16), the network destination is considered unreachable.
For information and examples on how to configure Routing Information Protocol (RIP) refer to chapter 23,
“RIP configuration” on page 242.
Configuring NAPT
118
SmartWare Software Configuration Guide
9 • IP context overview
Configuring access control lists
Packet filtering helps to control packet movement through the network. Such control can help to limit network traffic and to restrict network use by certain users or devices.
An access control list is a sequential collection of permit and deny conditions that apply to packets on a certain
interface. Access control lists can be configured for all routed network protocols (IP, ICMP, TCP, UDP, and
SCTP) to filter the packets of those protocols as the packets pass through a SmartNode. SmartWare tests packets against the conditions in an access list one by one. The first match determines whether SmartWare accepts
or rejects the packet. Because SmartWare stops testing conditions after the first match, the order of the conditions is critical. If no conditions match, the software rejects the address.
For information and examples on how configure access control lists, refer to chapter 24, “Access control list
configuration” on page 253.
Configuring quality of service (QoS)
The link scheduler enables the definition of QoS profiles for network traffic on a certain interface, as shown in
figure 16 on page 115. QoS refers to the ability of a network to provide improved service to selected network
traffic over various underlying technologies including Frame Relay, Ethernet and 802.x type networks, and IProuted networks. In particular, QoS features provide improved and more predictable network service by providing the following services:
• Supporting dedicated bandwidth
• Improving loss characteristics
• Avoiding and managing network congestion
• Shaping network traffic
• Setting traffic priorities across the network
The QoS features described in chapter 13, “Link scheduler configuration” on page 151 address these diverse
and common needs.
Configuring access control lists
119
Chapter 10 IP interface configuration
Chapter contents
Introduction ........................................................................................................................................................121
IP interface configuration task list........................................................................................................................121
Creating an IP interface ................................................................................................................................121
Deleting an IP interface ................................................................................................................................122
Setting the IP address and netmask ...............................................................................................................123
Configuring a NAPT DMZ interface ............................................................................................................123
ICMP message processing .............................................................................................................................124
ICMP redirect messages ................................................................................................................................124
Router advertisement broadcast message .......................................................................................................124
Defining the MTU and MSS of the interface ................................................................................................125
Configuring an interface as a point-to-point link ..........................................................................................126
Displaying IP interface information ..............................................................................................................126
Displaying dynamic ARP entries ...................................................................................................................127
Flushing dynamic ARP entries ......................................................................................................................127
Processing gratuitous ARP requests ...............................................................................................................127
Testing connections with the ping command ................................................................................................127
IP link supervision ........................................................................................................................................128
Check connectivity of an IP link .............................................................................................................129
Show IP link status ..................................................................................................................................129
Debug connectivity .................................................................................................................................129
Debug ARP ...................................................................................................................................................129
Traceroute ....................................................................................................................................................130
Configuring the IGMP Proxy..............................................................................................................................131
120
SmartWare Software Configuration Guide
10 • IP interface configuration
Introduction
This chapter provides a general overview of IP interfaces and describes the tasks involved in their configuration.
An interface is a logical entity that provides higher-layer protocol and service information, such as Layer 3
addressing. Interfaces are configured as part of a context and are independent of physical ports and circuits.
The separation of the interface from the physical layer allows for many advanced features. For higher layer protocols to become active, a physical port or circuit must be bound to an interface. IP interfaces can be bound
physically to Ethernet, SDSL or Frame Relay ports according to the appropriate transport network layer.
IP interface configuration task list
To configure interfaces, perform the tasks in the following sections:
• Creating an IP interface (see page 121)
• Deleting an IP interface (see page 122)
• Setting the IP address and netmask (see page 123)
• ICMP message processing (see page 124)
• ICMP redirect messages (see page 124)
• Router advertisement broadcast message (see page 124)
• Defining the MTU of the interface (see page 125)
• Configuring an interface as a point-to-point link (see page 126)
• Displaying IP interface information (see page 126)
• Testing connections with the ping command (see page 127)
Creating an IP interface
Interface names can be any arbitrary string. Use self-explanatory names for your interfaces, which reflect their usage.
Mode: Context IP
Step
1
2
Command
Purpose
node(ctx-ip)[router]#interface name Creates the new interface name, which represents an IP
interface. This command also places you in interface
configuration mode for the interface just created.
node(if-ip)[name]#
You are now in the interface configuration mode, where
you can enter specific configuration parameters for the
IP interface name.
Introduction
121
SmartWare Software Configuration Guide
10 • IP interface configuration
Example: Create IP interfaces
The procedure illustrated below assumes that you would like to create an IP interface named lan Use the following commands in administrator configuration mode.
node>enable
node#configure
node(cfg)#context ip router
node(ctx-ip)[router]#interface lan
node(if-ip)[lan]#
Deleting an IP interface
Almost every configuration command has a no form. In general, use the no form to disable a feature or function. Use the command without the no keyword to re-enable a disabled feature or to enable a feature that is
disabled by default.
Deleting an existing interface in the IP context is often necessary.
Mode: Context IP
Step
1
Command
node(ctx-ip)[router]#no interface name
Purpose
Deletes the existing interfaces name
Example: Delete IP interfaces
The procedure below assumes that you would like to delete an IP interface named external. Use the following
commands in IP context configuration mode.
List the existing interfaces:
node(ctx-ip)[router]#interface >
New interface
lan
Existing interface
wan
Existing interface
external
Existing interface
internal
Existing interface
Delete the interfaces named eth3 with the no interface command:
node(ctx-ip)[router]#no interface external
List the interfaces again to check if the appropriate interface was deleted:
node(ctx-ip)[router]#interface >
New interface
lan
Existing interface
wan
Existing interface
internal
Existing interface
IP interface configuration task list
122
SmartWare Software Configuration Guide
10 • IP interface configuration
Setting the IP address and netmask
Each IP interface needs its explicit IP address and an appropriate net mask to be set. You can use the
ipaddress interface configuration command to perform the following tasks:
• Set the IP address to ip-address
• Set the network mask to netmask
• Enable IP processing for the IP interface name without assigning an explicit IP address
The ipaddress command offers the following options:
unnumbered Enables IP processing on an interface without assigning an explicit IP address to the interface.
ip-address
Specifies the IP address of the subscriber in the form A.B.C.D.
netmask
Specifies the network mask in the form A.B.C.D.
dhcp
Enables the DHCP client on this interface. For more information on DHCP-client configuration refer to chapter 27, “DHCP configuration” on page 292.
Mode: Context IP. This command also places you in interface configuration mode.
Step
Command
Purpose
1
node(ctx-ip)[router]#interface name
2
node(if-ip)[name]# ipaddress {unnumbered | (ip-address netmask) | dhcp}
Selects the existing interface name, which shall be
configured
Sets the IP address ip-address and netmask netmask for interface name
Example: Configure IP interface address and netmask
To set the IP address to 192.168.1.3 and net mask to 255.255.255.0 for the IP interface lan, use the following
commands in IP context configuration mode.
node(ctx-ip)[router]#interface lan
node(if-ip)[lan]#ipaddress 192.168.1.3 255.255.255.0
Configuring a NAPT DMZ interface
The NAPT allows one or more specific IP interfaces to be excluded from NAPT translations although their
traffic is routed through an IP interface to which a NAPT profile is bound. This configuration is usually necessary, for DMZ networks connected to an Ethernet port, which uses public IP addresses.
Mode: interface ip
Step
1
Command
[name] (if-ip)[if-name]# [no] naptinside
IP interface configuration task list
Purpose
If no napt-inside is specified, the interface is excluded from
NAPT. if however napt-inside is specified, the interface will
be handled normally by the NAPT.
123
SmartWare Software Configuration Guide
10 • IP interface configuration
ICMP message processing
The IP suite offers a number of services that control and manage IP connections. The Internet Control Message Protocol (ICMP) provides many of these services. Routers send ICMP messages to hosts or other routers
when a problem is discovered with the Internet header. For detailed information on ICMP, see RFC 792.
SmartWare supports the following ICMP message processing features:
• ICMP redirect messages
• Router advertisement broadcast message
ICMP redirect messages
Routes are sometimes less than optimal. For example, the router may be forced to resend a packet through the
same interface on which it was received. In this case, an ICMP redirect message is sent to the originator of the
packet telling that the router is on a subnet directly connected to the receiving device, and that it must forward
the packet to another system on the same subnet. The software sends an ICMP redirect message to the originator of the packet because the originating host presumably could have sent that packet to the next hop without
involving this device at all. The redirect message instructs the sender to remove the receiving device from the
route and substitute a specified device representing a more direct path. This feature is enabled by default.
ICMP message processing offers two options for host route redirects:
• accept—accepts ICMP redirect messages
• send—sends ICMP redirect messages
Mode: Interface
Step
1
2
Command
Purpose
node(ctx-ip)[router]#interface name
Selects the interface name for ICMP message processing configuration
node(if-ip)[name]#icmp redirect { accept | send} Enables to send or accept ICMP redirect
messages
Example: ICMP redirect messages
The following example shows how to configure ICMP messages processing to accept ICMP redirect messages
on the IP interface lan. Use the following commands in IP context configuration mode.
node(ctx-ip)[router]#interface lan
node(if-ip)[lan]#icmp redirect accept
Router advertisement broadcast message
This message configures the behavior of the router when receiving an ICMP router solicitation message, and
determines if the router shall send periodic ICMP router advertisement messages or not.
By default, ICMP router advertisement messages are sent, either as a reply to ICMP router solicitation messages or periodically. If the feature is disabled, ICMP router advertisement messages are not sent in any case,
neither as a reply to ICMP router solicitation messages nor periodically.
IP interface configuration task list
124
SmartWare Software Configuration Guide
10 • IP interface configuration
Mode: Interface
Step
Command
1
node(ctx-ip)[router]#interface name
2
node(if-ip)[name]# icmp router-discovery
Purpose
Selects the interface name for ICMP message processing configuration
Enables to send router advertisement broadcast
messages
Example: Router advertisement broadcast message
The following example shows how to enable sending router advertisement broadcast messages on IP interface
lan. Use the following commands in IP context configuration mode.
node(ctx-ip)[router]#interface lan
node(if-ip)[lan]#icmp router-discovery
Defining the MTU and MSS of the interface
All interfaces have a default MTU packet size. You can adjust the IP MTU size so that the IP packet that
exceeds the MTU set for an interface is exceeded. The default MTU packet size is set to 1500 for an interface.
In cases where fragmentation is not allowed along the IP connection, forcing a reduction of the MSS (maximum segment size) is the only viable solution.
Note
All devices on a physical medium must have the same protocol MTU in
order to operate accurately.
Procedure: To set the MTU packet size or the MSS to size on the interface name
Mode: Interface
Step
Command
Purpose
1
node(ctx-ip)[router]#interface name Selects the interface name for ICMP message processing
configuration
2
node(if-ip)[name]#mtu size
Sets the IP MTU packet size to size of the interface name.
The MTU packet size value must be in the range from 48
to 1500.
3
node(if-ip)[name]#tcp adjust-mss { Limits to the MSS (Maximum Segment Size) in TCP SYN
(optional) rx|tx } { mtu | mss }
packets to mss or to MTU (Maximum Transmit Unit) - 40
Bytes, if ‘mtu’ is used. ‘rx’ applies to packets which
arrive inbound at this IP interface, ‘tx’ to packets which
leave outbound of this IP interface.
It is recommended to use ‘mtu’ inbound and outbound.
Example: Defining the MTU of the interface
IP interface configuration task list
125
SmartWare Software Configuration Guide
10 • IP interface configuration
The following example shows how to define the MTU of the IP interface lan to 1000 and to adjust the MSS in
both directions to MTU-40. Use the following commands in IP context configuration mode.
node(ctx-ip)[router]#interface lan
node(if-ip)[lan]#mtu 1000
node(if-ip)[lan]#tcp adjust-mss rx mtu
node(if-ip)[lan]#tcp adjust-mss tx mtu
Configuring an interface as a point-to-point link
A point-to-point network joins a single pair of routers. It is in particular used for interfaces, which have a binding to a Frame Relay PVC.
Mode: Configure
Step
1
2
3
Command
Purpose
node(cfg)#context ip router
Selects the IP router context
node(ctx-ip)[router]#interface name Selects the defined interface name for configuration
node(if-ip)[name]#point-to-point
Configures the interface ifname as point-to-point link
Example: Configuring an interface as a point-to-point link
The following example shows how to define the interface lan as point-to-point link. Use the following commands in configuration mode.
node(cfg)#context ip router
node(ctx-ip)[router]#interface lan
node(if-ip)[lan]#point-to-point
Displaying IP interface information
The show ip interface command displays IP information for all interfaces. The command is available in
operator execution mode or in any of the administrator execution modes.
Mode: Operator execution or any administrator execution
Step
1
Command
node>show ip interface
Purpose
Displays the IP information for all interfaces
Example: Displaying IP interface information
The following example shows how to display the IP information for all interfaces by using the show ip
interface command from operator execution mode.
node>show ip interface
-----------------------------------------------------------Context:
router
Name:
lan
IP Address:
172.16.40.77 255.255.0.0
MTU:
1500
ICMP router-discovery:
enabled
ICMP redirect:
send only
State:
OPENED
Binding:
ethernet 0 0 0/ethernet/ip
IP interface configuration task list
126
SmartWare Software Configuration Guide
10 • IP interface configuration
-----------------------------------------------------------Context:
router
Name:
wan
IP Address:
172.17.100.210 255.255.255.0
MTU:
1500
ICMP router-discovery:
enabled
ICMP redirect:
send only
State:
CLOSED
Binding:
ethernet 0 0 1/ethernet/ip
…
Displaying dynamic ARP entries
The following command can be used to display the dynamically learned ARP entries on an IP interface or on
the entire system.
Step
1
Command
[name]#show arp []
Purpose
Display the ARP entries for the specified or all IP interfaces.
Flushing dynamic ARP entries
The following command can be used to flush the dynamically learned ARP entries on an IP interface or on the
entire system.
Step
1
Command
[name]#arp flush[]
Purpose
Flushes the ARP entries for the specified or all IP interfaces.
Processing gratuitous ARP requests
The following command can be used to accept and process gratuitous ARP requests and replies. ARP requests
and replies in which the target protocol address and sender protocol address are the same are considered.
Because of security reasons, this feature is deactivated as default and must be enabled by the user.
Mode: configure
Step
1
Command
[name](cfg)#[no] arp gratuitous
Purpose
Enables or disables the processing of gratuitous arp requests
and replies.
Testing connections with the ping command
As an aid to diagnosing basic network connectivity, many network protocols support an echo protocol. The
protocol involves sending a special datagram to the destination host, then waiting for a reply datagram from
that host. Results from this echo protocol can help in evaluating the path-to-host reliability, delays over the
path, and whether the host can be accessed or is functioning.
IP interface configuration task list
127
SmartWare Software Configuration Guide
10 • IP interface configuration
Mode: Either operator or administrator execution
Step
1
Command
node#ping [ ] [timeout ]
[packet-size ] [ttl
] [traffic-class ]
Purpose
Sends ICMP ECHO_REQUEST packets to network hosts at IP
address
Where the parameters are defined as follows:
• [] optional parameter which indicates how many pings are sent
• [timeout ] optional parameter which indicates the time-out period of the ping
• [packet-size ] optional parameter which indicates the number of octets in the ping
• [ttl ] optional parameter which indicates the time-to-live value
• [traffic-class ] which indicates the IP packets in a traffic class are routed via the defined
Nexthop in the routing table entry for that traffic-class. Default: local-default.
When using ping for fault isolation, you should first run it on the respective IP interface to verify that the local
LAN or WAN interface is up and running. Then, you should “ping” hosts and gateways further away. Roundtrip times and packet loss statistics are computed. If duplicate packets are received, they are not included in the
packet loss calculation, although the round trip time of these packets is used to calculate the minimum/average/maximum round-trip time numbers. When five ICMP echo requests packets have been sent and received,
a brief summary is displayed.
Example: Testing connections with the ping command
The following example shows how to invoke the echo protocol to the destination host at IP address
172.16.1.10 by using the ping command from operator execution mode.
node>ping 172.16.1.10
Sending 5 ICMP echo requests to 172.16.1.10, timeout is 1 seconds:
Reply from 172.16.1.10: Time <10ms
Reply from 172.16.1.10: Time <10ms
Reply from 172.16.1.10: Time <10ms.
Reply from 172.16.1.10: Time <10ms
Reply from 172.16.1.10: Time <10ms
Ping statistics for 172.16.1.10:
Packets: Sent 5, Received 5, Lost 0 (0% loss),
RTT:
Minimum <10ms, Maximum <10ms, Average <10ms
IP link supervision
IP Link Supervision is one of the modules you have to configure in order to use the PPP dial-up over ISDN
feature. Also consider the dial-up command (page 337) on the IP interface and the interface dialer mode
(page 331) in context cs.
IP link supervision can be used to periodically check the reachability of some hosts over a specific link. Therefore an ICMP echo request is sent to the configured IP address. After a configurable number of failed requests
the host is considered unreachable. If all configured hosts are unreachable, the interface will be closed for nor-
IP interface configuration task list
128
SmartWare Software Configuration Guide
10 • IP interface configuration
mal traffic and the IP router removes all routes pointing to that interface. Now, traffic previously flowing over
that interface is routed through the interface with IP routes of a higher metric. However the interface continues to send ICMP echo requests. After a configurable number of ICMP replies the host is reachable again, and
the interface will be opened for normal traffic.
Check connectivity of an IP link
Mode: context ip/interface
Step
1
Command
Purpose
[name] (if-ip) [interface]#[no] check-connectivity ping [sourceaddress ] [tolerance-down
] [tolerance-up ]
[interval ] [timeout ]
Configures or removes a host to ping. Sourceaddress specifies the IP source address for the
ICMP packets. Tolerance-down specifies the
number of pings allowed to fail (Default 3).
Tolerance-up specifies the number of successful pings required to activate link (Default 1).
Interval specifies the interval in which the
pings are sent (Default 10). Timeout specifies
the time in seconds to wait for an answer
(Default 3).
Show IP link status
The following command shows the status of connectivity.
Mode: enable
Step
1
Command
Purpose
[name]#show ip connectivity []
Shows the status of connectivity.
Debug connectivity
The following command enables logging of connectivity events.
Mode: enable
Step
1
Command
Purpose
[name]#debug connectivity
Enables logging of connectivity events and
state changes.
Debug ARP
You may use the debug arp and show arp commands to assist you in debugging IP connectivity and its corresponding interfaces.
IP interface configuration task list
129
SmartWare Software Configuration Guide
10 • IP interface configuration
Mode: Either operator or administrator execution
Step
1
2
Command
node(cfg)# [no] debug arp
node(cfg)# show arp
Purpose
Enables or disables the ARP debug monitor.
Summarizes the ARP information for each of the Ethernet ports.
Traceroute
This procedure describes how to print the route (list of hops) packets take to the network host.
Step
Command
Purpose
1
node#traceroute
[probe-count
] [timeout
] [destinationport ] [minttl ] [max-ttl
] [verbose ]
[packet-size ]
[mtu ] [traffic-class ]
Prints the route that the packets take to the network host.
Optionally, a traffic-class can be specified in the ‘traceroute’ command. ‘traceroute’ follows the route of the specified traffic-class.
Default: local-default
Example: Debug ARP output
node(cfg)#debug arp
node(cfg)#ping 10.9.10.11
Sending 5, 56 bytes, ICMP echo requests to 10.9.10.11:
17:25:40 ARP
> Entry 10.9.10.11: Sending first request
17:25:40 ARP
> Tx ARP Request: Who has 10.9.10.11 tell 10.9.10.1 at
00:A0:BA:00:92:4F
17:25:40 ARP
> Rx ARP Reply: 10.9.10.11 is at 00:50:04:74:94:6C tell 10.9.10.1 at
00:A0:BA:00:92:4F
17:25:40 ARP
> Entry 10.9.10.11: Updated by 00:50:04:74:94:6C
56 bytes from 10.9.10.11: Time 10ms
17:25:40 ARP
> Rx ARP Request: Who has 10.9.10.1 tell 10.9.10.3 at
00:09:5B:53:D2:B0
17:25:40 ARP
> Entry 10.9.10.3: Updated by 00:09:5B:53:D2:B0
17:25:40 ARP
> Tx ARP Reply: 10.9.10.1 is at 00:A0:BA:00:92:4F tell 10.9.10.3 at
00:09:5B:53:D2:B0
% Aborted
Ping statistics for 10.9.10.11:
Packets: Sent 1, Received 1, Lost 0 (0% loss),
RTT:
Minimum 10ms, Maximum 10ms, Average 10ms
IP interface configuration task list
130
SmartWare Software Configuration Guide
10 • IP interface configuration
Example: Display the ARP information.
node(cfg)#show arp
IP Interface eth0:
----------------------------------------------------------------------------Remote IP
Remote MAC
State
TTL
TxReq RxRep Usage
----------------------------------------------------------------------------69.138.216.1
00:01:5C:22:46:C2 reachable
342s
2
2
12
----------------------------------------------------------------------------IP Interface eth1:
----------------------------------------------------------------------------Remote IP
Remote MAC
State
TTL
TxReq RxRep Usage
----------------------------------------------------------------------------10.9.10.20
00:11:1A:4C:B1:1C reachable
408s
1454
1451 67939
10.9.10.12
00:02:2D:BB:13:FB reachable
326s
533
571 16819
10.9.10.2
00:09:5B:6F:93:06 reachable
518s
0
515
1054
10.9.10.166
00:09:5B:41:30:33 stale
556s
2
9
2277
10.9.10.10
00:80:AD:78:BB:DD reachable
394s
0
2
1982
10.9.10.11
00:50:04:74:94:6C reachable
433s
1
1
2
10.9.10.3
00:09:5B:53:D2:B0 reachable
521s
0
2
18
-----------------------------------------------------------------------------
Configuring the IGMP Proxy
To enable the IGMP proxy functionality, you need to define which interface shall be used to receive multicast
streams (upstream interface) and to which interfaces the multicast streams shall be forwarded (downstream
interfaces). The router then listens on the downstream interfaces for IGMP join messages and forwards them
to the upstream interface.
Mode: Context IP
Step
1
2
3
4
Command
node(ctx-ip)[ctx-name]#
interface
node(if-ip)[if-name]# igmp
interface-type proxyupstream
node(ctx-ip)[ctx-name]#
interface
node(if-ip)[if-name]# igmp
interface-type proxydownstream
5
Configuring the IGMP Proxy
Purpose
Go to the IP interface, which shall act as the IGMP proxy
upstream interface
Define the interface as the IGMP proxy upstream interface
Go to an IP interface, which shall act as an IGMP proxy downstream interface
Define the interface as an IGMP proxy downstream interface
Repeat steps 3 & 4 for any additional interface, which shall act
as an IGMP proxy downstream interface.
131
Chapter 11 NAT/NAPT configuration
Chapter contents
Introduction ........................................................................................................................................................133
Dynamic NAPT ...........................................................................................................................................133
Static NAPT .................................................................................................................................................134
Dynamic NAT ..............................................................................................................................................134
Static NAT ...................................................................................................................................................135
NAPT traversal .............................................................................................................................................135
NAT/NAPT configuration task list .....................................................................................................................136
Creating a NAPT profile ...............................................................................................................................136
Configuring a NAPT DMZ host .............................................................................................................137
Defining NAPT port ranges ....................................................................................................................137
Preserving TCP/UDP port numbers in NAPT ........................................................................................138
Defining the UDP NAPT type ...............................................................................................................138
Activate NAT/NAPT ....................................................................................................................................139
Displaying NAT/NAPT configuration information ......................................................................................139
Configuring NAT static protocol entries .......................................................................................................140
132
SmartWare Software Configuration Guide
11 • NAT/NAPT configuration
Introduction
This chapter provides a general overview of Network Address (Port) Translation and describes the tasks
involved in its configuration.
For further information about the functionality of Network Address Translation (NAT) and Network Address
Port Translation (NAPT), consult the RFCs 1631 and 3022. This chapter applies the terminology defined in
RFC 2663.
SmartWare provides four types of NAT/NAPT:
• Dynamic NAPT (Cisco terminology: NAT Overload)
• Static NAPT (Cisco terminology: Port Static NAT)
• Dynamic NAT
• Static NAT
You can combine these types of NAT/NAPT without any restriction. One type of profile, the ‘NAPT Profile’,
holds the configuration information for all four types where configuration is required. The remainder of this
Section shortly explains the behavior of the different NAT/NAPT types.
Dynamic NAPT
Dynamic NAPT is the default behavior of the NAT/NAPT component. It allows hosts on the local network to
access any host on the global network by using the global interface address as source address. It modifies not
only the source address, but also the source port, so that it can tell different connections apart (NAPT source
ports are in the range 8,000 to 16,000). UDP and TCP connections from the local to the global network trigger the creation of a dynamic NAPT entry for the reverse path. If a connection is idle for some time (UDP: 2
minutes, TCP: 12 hours) or gets closed (only TCP), the dynamic NAPT entry is removed.
An enhancement of the Dynamic NAPT allows to define subsets of hosts on the local network that shall use
different global addresses. Up to 20 subsets with their respective global addresses are possible. Such a global
NAPT address can be any IP address as long as the global network routes the traffic to the global interface of
the NAT/NAPT component.
Figure 17 illustrates the basic and enhanced behavior of the Dynamic NAPT. The big arrows indicate the
direction of the connection establishment. Although only a local host can establish a connection, traffic always
flows in both directions.
Introduction
133
SmartWare Software Configuration Guide
11 • NAT/NAPT configuration
Global Network
Local Network
(Local Interface Address) 192.168.1.1
WAN
LAN
131.1.1.1 (Global Interface Address)
131.1.1.10 - 131.1.1.15 (Global NAT Address Pool)
Source Address modified
192.168.1.30 - 192.168.1.39
131.1.1.10 - 131.1.1.15
Destination Address modified
Figure 17. Dynamic NAPT
Static NAPT
Dynamic NAPT does not permit hosts on the global network to access hosts on the local network. Static
NAPT makes selected services (i.e. ports) of local hosts globally accessible. Static NAPT entries map global
addresses/ports to local addresses/ports. The global address can either be the address of the global interface or a
configured global NAPT address. Usually, the local and the global port of a static NAPT entry are the same;
however, they may be different.
(Local Interface Address) 192.168.1.1
WAN
LAN
131.1.1.1 (Global Interface Address)
131.1.1.3 (Global NAPT Address)
Source Address modified
131.1.1.1:80
192.168.1.20:80
131.1.1.3:23
192.168.1.20:23
Destination Address modified
Figure 18. Static NAPT
Note
Be careful when mapping ports the SmartNode uses itself (e.g. Telnet,
TFTP) because the SmartNode might become inaccessible.
Dynamic NAT
NAT only modifies addresses but not ports. Dynamic NAT assigns a global address from a global NAT address
pool each time a local host wants to access the global network. It creates a dynamic NAT entry for the reverse
path. If a connection is idle for some time (2 minutes), the dynamic NAT entry is removed. Should Dynamic
NAT run out of global addresses, it lets Dynamic NAPT handle the connection (which may lead to an unexpected behavior).
Introduction
134
SmartWare Software Configuration Guide
11 • NAT/NAPT configuration
Dynamic NAT is particularly useful for protocols that do not build on UDP or TCP but directly on IP (e.g.
GRE, ESP). See also section “NAPT traversal” on page 135.
(Local Interface Address) 192.168.1.1
WAN
LAN
131.1.1.1 (Global Interface Address)
131.1.1.20 (Global NAT Address)
Source Address modified
192.168.1.40
131.1.1.20
Destination Address modified
Figure 19. Dynamic NAT
Static NAT
Dynamic NAT does not permit hosts on the global network to access hosts on the local network. Static NAT
makes local hosts globally accessible. Static NAT entries map global addresses to local addresses. The global
address must be a configured global NAT address. It cannot be the address of the global interface since this
would break connectivity to the SmartNode itself.
Static NAT is particularly useful for protocols that do not build on UDP or TCP but directly on IP (e.g. GRE,
ESP). See also section “NAPT traversal” on page 135.
(Local Interface Address) 192.168.1.1
WAN
LAN
131.1.1.1 (Global Interface Address)
131.1.1.20 (Global NAT Address)
Source Address modified
192.168.1.40
131.1.1.20
Destination Address modified
Figure 20. Static NAT
NAPT traversal
Protocols that do not build on UDP or TCP but directly on IP (e.g. GRE, ESP), and protocols that open additional connections unknown to the NAT/NAPT component (e.g. FTP, H.323, SIP), do not easily traverse
a NAPT.
The SmartWare NAPT can handle one GRE (Generic Routing Encapsulation) connection and one ESP
(Encapsulating Security Payload) connection at a time. It also routes ICMP messages back to the source of the
concerned connection or to the source of an ICMP Ping message.
To enable NAPT traversal of protocols that open additional connections, the NAPT component must analyze
these protocols at the Application Level in order to understand which NAPT entries for additional connections
Introduction
135
SmartWare Software Configuration Guide
11 • NAT/NAPT configuration
it should create and which IP addresses/ports it must modify (e.g. for voice connections in addition to signaling connections). It performs this task for the protocol FTP. Other protocols such as H.323 and SIP cannot
traverse the SmartWare NAPT.
NAT/NAPT configuration task list
To configure the NAT/NAPT component, perform the tasks in the following sections:
• Creating a NAPT profile (see page 136)
• Activating NAT/NAPT (see page 136)
• Displaying NAT/NAPT configuration information (see page 139)
Creating a NAPT profile
A NAPT profile defines the behavior of the NAT/NAPT component, comprising all four types of NAT/NAPT
(this profile is called ‘NAPT profile’ and not ‘NAT/NAPT profile for historical reasons). Several NAPT profiles
are admissible but there is only one NAT/NAPT component.
Procedure: To create a NAPT profile and to configure the required types of NAT/NAPT
Mode: Configure
Step
1
Command
Purpose
node(cfg)#profile napt name
Creates the NAPT profile name and activates the
basic behavior of the Dynamic NAPT
2
node(pf-napt)[name]#range local- Configures and activates the enhanced behavior of
(optional) ip-range-start local-ip-range-stop
the Dynamic NAPT: local-ip-range-start and local-ipglobal-ip
range-stop define the subset of local hosts that use
the global NAT address global-ip to access to global
network.
(max. 20 entries)
The IP ranges of different Dynamic NAPT entries must
not overlap each other.
3
node(pf-napt)[name]#static
Creates a Static NAPT entry: local-ip/local-port is
(optional) { udp | tcp } local-ip local-port
mapped to global-ip/global-port. If global-port is
[global-ip] [global-port]
omitted, local-port is used on both sides. If global-ip
is omitted, the global address is the address of the
global interface.
(max. 20 UDP and 20 TCP entries)
4
node(pf-napt)[name]#range local- Configures and activates the Dynamic NAT: local-ip(optional) ip-range-start local-ip-range-stop
range-start and local-ip-range-stop define the subset
global-ip-start global-ip-stop
of local hosts that use an address from the global
NAT address pool to access to global network. global-ip-start and global-ip -stop define the global NAT
address pool.
(max. 20 entries)
The IP ranges of different Dynamic NAT entries must
not overlap each other.
NAT/NAPT configuration task list
136
SmartWare Software Configuration Guide
Step
Command
11 • NAT/NAPT configuration
Purpose
5
node(pf-napt)[name]#static local- Creates a Static NAT entry: local-ip is mapped to
(optional) ip global-ip
global-ip.
(max. 20 entries)
6
node(pf-napt)[name]#static
Creates a static NAT entry: traffic of the IP protocol
(optional) { ah|esp|gre|ipv6 } local_ip
AH, ESP, GRE, or IPv6 respectively directed to the
[global_ip].
global_ip is forwarded to the local_ip.
Use no in front of the above commands to delete a specific entry or the whole profile.
Note
The command icmp default is obsolete.
Example: Creating a NAPT Profile
The following example shows how to create a new NAPT profile access that contains all settings necessary to
implement the examples in section “Introduction” on page 133.
node(cfg)#profile napt access
node(pf-napt)[access]#range 192.168.1.10 192.168.1.19 131.1.1.2
node(pf-napt)[access]#static tcp 192.168.1.20 80
node(pf-napt)[access]#static tcp 192.168.1.20 23 131.1.1.3
node(pf-napt)[access]#range 192.168.1.30 192.168.1.39 131.1.1.10 131.1.1.15
node(pf-napt)[access]#static 192.168.1.40 131.1.1.20
node(pf-napt)[access]static ah 192.168.1.41 131.1.1.120
Configuring a NAPT DMZ host
The NAPT allows a DMZ host to be configured, which receives any inbound traffic on the global NAPT
interface, which:
• Is not translated by any static or dynamic NAPT entry and
• Is not handled by the device itself.
The following procedure shows how a DMZ host can be configured.
Mode: profile napt
Step
1
Command
Purpose
[name] (pf-napt)[pf-name]# [no]
Configures a DMZ host. The global-ip-address must
dmz-host only be specified, if the DMZ host shall handle the
[]
inbound traffic for a different NAPT global IP address
than the gateways global interface IP address.
Defining NAPT port ranges
The TCP/UDP port ranges to be used by the NAPT can be defined using the following procedure. The default
port ranges for both TCP/UDP are 8000 to 15999.
NAT/NAPT configuration task list
137
SmartWare Software Configuration Guide
11 • NAT/NAPT configuration
Mode: profile napt
Step
1
2
Command
Purpose
[name] (pf-napt)[pf-name]# tcp-port- Define the TCP port range
range
[name] (pf-napt)[pf-name]# udpDefine the UDP port range
port-range
Preserving TCP/UDP port numbers in NAPT
The NAPT can be configured to preserve the TCP/UDP port number of outbound packets sent from local
hosts towards the global NAPT interface. If this option is enabled the NAPT tries not to change these port
numbers. If the port is however already in use, the NAPT will ignore this setting and assign a port number
from the configured TCP/UDP port ranges.
Mode: profile napt
Step
1
2
Command
Purpose
[name] (pf-napt)[pf-name]# [no]
preserve-tcp-ports
[name] (pf-napt)[pf-name]# [no]
preserve-udp-ports
Enable/disable preserving of TCP ports.
Enable/disable preserving of UDP ports.
Defining the UDP NAPT type
The NAPT type to be applied for UDP packets is configurable using the following procedure. The NAPT supports the UDP translation types shown in the following list. The list is ordered by the security of the NAPT
type starting with the highest security type.
• symmetric
• port-restricted-cone
• address-restricted-cone
• full-cone
You find a detailed description of these NAPT types in section 5 of RFC3489. To allow STUN to work
through the NAPT the full-cone setting is usually required. The default setting is symmetric.
Mode: profile napt
Step
1
Command
Purpose
[name] (pf-napt)[pf-name]# udp-handling {symmetric|address- Define the UDP
restricted-cone|port-restricted-cone|full-cone}
translation type
NAT/NAPT configuration task list
138
SmartWare Software Configuration Guide
11 • NAT/NAPT configuration
Activate NAT/NAPT
To activate a NAT/NAPT component, bind its NAPT profile to an IP interface. This binding identifies the
global interface of the respective NAT/NAPT component. All other IP interfaces are local relative to this NAT/
NAPT.
Note
If both a NAPT profile and an ACL profile are bound to the same IP interface, the ACL (Access Control List) acts on the local side of the NAT/
NAPT component.
Procedure: To activate a NAT/NAPT component
Mode: Configure
Step
1
2
3
Command
node(cfg)#context ip router
node(ctx-ip)[router]#interface
name
node(if-ip)[name]#use profile
napt profile
Purpose
Selects the IP router context
The NAPT profile shall be used on the interface name
Defines that the NAPT profile profile shall be used on
the interface name
Example: Configuring NAPT Interface
The following example shows how to activate a NAT/NAPT component with the NAPT profile access on the
IP interface lan.
node(cfg)#context ip router
node(ctx-ip)[router]#interface lan
node(if-ip)[lan]#use profile napt access
Displaying NAT/NAPT configuration information
Two commands are available to display an existing NAPT profile. There is no command yet to display the
dynamic entries of a NAT/NAPT component.
Procedure: To display NAT/NAPT configuration information
Mode: Configure
Step
Command
1
2
node(cfg)#show profile napt
node(cfg)#show profile napt
name
or
node(cfg)#show napt interface
name
NAT/NAPT configuration task list
Purpose
Displays the available NAPT profiles
Displays the NAPT profile name
or
Displays the NAPT profile bound to the IP interface
name
139
SmartWare Software Configuration Guide
11 • NAT/NAPT configuration
Example: Display NAT/NAPT configuration information
node(pf-napt)[access]#show profile napt access
NAPT profile access:
-------------------------STATIC NAPT MAPPINGS
Protocol
Local IP
Local Port
-------------------------------tcp
192.168.1.20
80
tcp
192.168.1.20
23
STATIC NAT
Protocol
-------ah
Global IP
--------------0.0.0.0
131.1.1.3
Global Port
----------80
23
PROTOCOL MAPPINGS
Local IP
Global IP
--------------- --------------192.168.1.41
131.1.1.120
STATIC NAT MAPPINGS
Local IP
Global IP
--------------- --------------192.168.1.40
131.1.1.20
STATIC NAPT RANGE
Local IP Start
--------------192.168.1.10
MAPPINGS
Local IP Stop
Global IP
--------------- --------------192.168.1.19
131.1.1.15
STATIC NAT RANGE MAPPINGS
Local IP Start Local IP Stop
Global IP Start Global IP Stop
--------------- --------------- --------------- --------------192.168.1.30
192.168.1.39
131.1.1.10
131.1.1.15
Configuring NAT static protocol entries
The following command adds a static NAT entry, which causes any packets of the specified protocol received
on the global side of the NAT to be forwarded to the host specified on the local side of the NAT.
node(pf-napt)[ name]#static { udp | tcp } local-ip local-port [ global-ip] [ global-port]
Mode: profile napt
Step
1
Command
Purpose
[name](pf-napt)# static Adds a static NAT protocol entry
[]
NAT/NAPT configuration task list
140
Chapter 12 Ethernet port configuration
Chapter contents
Introduction ........................................................................................................................................................142
Ethernet port configuration task list ....................................................................................................................142
Entering the Ethernet port configuration mode ............................................................................................142
Configuring medium for an Ethernet port ....................................................................................................142
Configuring Ethernet encapsulation type for an Ethernet port ......................................................................143
Binding an Ethernet port to an IP interface ..................................................................................................143
Multiple IP addresses on Ethernet ports ........................................................................................................144
Configuring a VLAN ....................................................................................................................................145
Configuring layer 2 CoS to service-class mapping for an Ethernet port .........................................................146
Adding a receive mapping table entry ......................................................................................................147
Adding a transmit mapping table entry ...................................................................................................148
Closing an Ethernet port ...............................................................................................................................148
Using the built-in Ethernet sniffer .......................................................................................................................149
141
SmartWare Software Configuration Guide
12 • Ethernet port configuration
Introduction
This chapter provides an overview of Ethernet ports and describes the tasks involved in configuring Ethernet
ports through the SmartWare.
Ethernet port configuration task list
To configure Ethernet ports, perform the tasks described in the following sections. Most of the task are required to
have an operable Ethernet port, some of the tasks are optional, but might be required for your application.
• Entering the Ethernet port configuration mode (see page 142)
• Configuring medium for an Ethernet port (see page 142)
• Configuring Ethernet encapsulation type for an Ethernet port (see page 143)
• Binding an Ethernet port to an IP interface (see page 143)
• Configuring multiple IP addresses on the Ethernet ports (see page 144)
• Configuring a VLAN (see page 145)
• Configuring layer 2 CoS to service-class mapping for an Ethernet port (advanced) (see page 146)
• Closing an Ethernet port (see page 148)
Entering the Ethernet port configuration mode
To enter port configuration mode and begin configuring an Ethernet port, enter the command port ethernet
slot port in administrator execution mode. The keywords slot and port represent the number of the respective
physical entity.
Configuring medium for an Ethernet port
All Ethernet ports are configured by default to auto-sense both the port speed and the duplex mode. This is the
recommended configuration. Command options are (if supported by the platform):
• 10—for 10 Mbps
• 100—for 100 Mbps
• 1000—for Gigabit Ethernet
• auto—for auto-sense the port speed
• half—for half-duplex
• full—for full-duplex
This procedure describes how to configure the medium for the Ethernet port on slot and port
Mode: Configure
Step
Command
1
node(cfg)#port ethernet slot port
2
node(prt-eth)[slot/port]#medium (10 |
100 | 1000 | auto} (half | full)
Introduction
Purpose
Enters Ethernet port configuration mode for the
interface on slot and port.
Configures the interface on slot and port to
medium according to the selected option.
142
SmartWare Software Configuration Guide
12 • Ethernet port configuration
Example: Configuring medium for an Ethernet port
The following example shows how to configure medium auto-sense for the Ethernet port on slot 0 and port 0
of a SmartNode 4524 device.
node(cfg)#port ethernet 0 0
node(prt-eth)[0/0]#medium auto
Configuring Ethernet encapsulation type for an Ethernet port
This procedure describes how to configure the encapsulation type to IP for the Ethernet port on slot and port.
Mode: Configure
Step
Command
1
node(cfg)#port ethernet slot port
2
node(prt-eth)[slot/port]#encapsulation ip
Purpose
Enters Ethernet port configuration mode for the
interface on slot and port.
Configures the encapsulation type to IP.
Example: Configuring Ethernet encapsulation type for an Ethernet port
The following example shows how to configure the encapsulation type to IP for the Ethernet port on slot 0 and
port 0.
node(cfg)#port ethernet 0 0
node(prt-eth)[0/0]#encapsulation ip
Binding an Ethernet port to an IP interface
You must bind the Ethernet port to an existing IP interface. When executing the bind command, the
requested interface must exist. If no IP context is given, the system attaches the interface to the default IP context known as router.
Ethernet port configuration task list
143
SmartWare Software Configuration Guide
12 • Ethernet port configuration
Figure 21 shows the logical binding of the Ethernet port at slot 0 on port 0 to the IP interface lan which is
defined in the IP context router.
Context
IP
“router”
interface lan
interface wan
bind command
bind command
Port
Ethernet
00
Port
Ethernet
01
Figure 21. Binding of an Ethernet port to an IP interface
This procedure describes how to bind the Ethernet port to an already existing IP interface
Mode: Configure
Step
Command
1
node(cfg)#port ethernet slot port
2
node(prt-eth)[slot/port]#bind interface name router
Purpose
Enters Ethernet port configuration
mode for the interface on slot and
port
Binds the Ethernet port to the already
existing IP interface if-name
Example: Binding an Ethernet port to an IP interface
The following example shows how to bind the Ethernet port on slot 0 and port 0 to an already existing IP
interface lan.
node(cfg)#port ethernet 0 0
node(prt-eth)[0/0]#bind interface lan router
Multiple IP addresses on Ethernet ports
It is possible to use multiple IP addresses on an Ethernet port by binding the port to multiple IP interfaces.
Each of the IP interfaces uses an IP address of one of the subnets on the Ethernet ports.
The procedures below demonstrate how IP addresses of two different networks can be used on an Ethernet
port. However, if necessary any number of IP interfaces can be bound to an Ethernet port.
Ethernet port configuration task list
144
SmartWare Software Configuration Guide
12 • Ethernet port configuration
Mode: Configure
Step
1
Command
Purpose
[name] (cfg)# context ip
Enter the IP context configuration
mode.
2 [name] (ctx-ip)[router]# interface
Create the first IP interface.
3 [name] (if-ip)[ ]# ipaddress
face
4 [name] (if-ip)[ ]# interface
Create the second IP interface.
5 [name] (if-ip)[ ]# ipaddress Set the IP address for the second IP
interface
6 [name] (if-ip)[ ]# port ethernet
Enter Ethernet port configuration
mode
7 [name] (prt-eth)[/]# encapsulation ip
Set the encapsulation to IP
8 [name] (prt-eth)[/]# bind interface
9 [name] (prt-eth)[/]# bind interface
face
10 [name] (prt-eth)[/]# no shutdown
Enable the Ethernet port
Configuring a VLAN
By default no VLAN ports are configured on an Ethernet port. One or more VLAN ports can be created on
each Ethernet port.
You must bind the VLAN port to an existing IP interface. When executing the bind command, the requested
interface must exist.
For incoming VLAN packets each of the 8 possible layer 2 class of services (CoS) can be mapped to a traffic
class. Unless otherwise specified all CoS values map to the default traffic class.
By default all VLAN ports are initially disabled. They can be enabled with the no shutdown command. The
corresponding Ethernet port must also be enabled for the VLAN port to work. If the Ethernet port is disabled,
all associated VLAN ports are also disabled.
When a VLAN port is closed, the IP interface that is bound to this port is also closed. All static routing entries
that are using this interface change their state to invalid and all dynamic routing entries will be removed from
the route table manager.
Ethernet port configuration task list
145
SmartWare Software Configuration Guide
12 • Ethernet port configuration
Mode: Configure
Step
Command
1
node(config)#port ethernet slot port
2
3
node(prt-eth)[slot/port]#vlan id
node(vlan)[id]#encapsulation {ip|pppoe|multi}
4
node(vlan)[id]#bind interface name [router]
5
node(vlan)[id]#map cos layer-2-CoS-value to traffic-class-name
6
7
node(vlan)[id]#no shutdown
node(vlan)[id]#exit node(prt-eth)[slot/port]# no shutdown
Purpose
Enter Ethernet port configuration.
Create new VLAN port.
Defines the payload type(s) to
be used on this VLAN:
• ip: IP traffic only (not used
for PPP)
• pppoe: PPPoE sessions only
• multi: both IP traffic and
PPPoE sessions
For more information on the
PPP/PPPoE configuration see
chapter 30, “PPP configuration”
on page 313.
Bind the VLAN port to the existing interface name. If no IP context is given, the system attaches
the interface to the default IP
context known as router.
Selects the layer 2 CoS (Class of
Service) to traffic class mapping. The traffic class must
already exist.
Activate the VLAN port.
Make sure the hosting Ethernet
port is also activated.
Configuring layer 2 CoS to service-class mapping for an Ethernet port
To enable to transport real-time and delay sensitive services such as VoIP traffic across the network, the firmware application software supports the delivery of Quality of Service (QoS) information in the ToS (Type of
Service) field. This is an eight-bit field, the second field in the IP header packet. To define the Class of Service
(CoS) to service class mapping, the cos command is used, with one of the following arguments:
• default—Default service class when no Layer 2 CoS present
• rx-map—Receive mapping table - Layer 2 CoS to service class mapping
• tx-map—Transmit mapping table - Service class to Layer 2 CoS mapping
This procedure describes how to change layer 2 CoS to service class mapping.
Ethernet port configuration task list
146
SmartWare Software Configuration Guide
12 • Ethernet port configuration
Mode: Configure
Step
1
2
Command
Purpose
node(cfg)#port ethernet slot port
Enters Ethernet port configuration mode for the interface on
slot and port
node(prt-eth)[slot/port]#map cos layer 2 class of service value Selects the layer 2 CoS to trafficto traffic class name
class mapping. The traffic class
name can be freely chosen.
If the frame format is set to standard, the cos default command value defines which class of service to use for
the data traffic.
The cos rx-map and cos tx-map commands above need service class mapping table entries, which has to be
entered as additional command argument. The command syntax is:
• cos rx-map—layer 2 class of service value as service class value
• cos tx-map—service class value as layer 2 class of service value
Do the following to configure the class of service map:
1. Configure the class of service map table for the outgoing data traffic. Every provided service can be
mapped to a Class of Service.
2. Configure the class of service map table for the incoming data traffic. Every received Class of Service can be
assigned to a service type.
Adding a receive mapping table entry
The receive mapping table defines the conversion of receiving Layer 2 CoS to service class value into a firmware-specific service class value. Each conversion is stored as a mapping table entry, so the receive mapping
table consists of several mapping table entries.
This procedure describes how to add a receive mapping table entry.
Mode: Configure
Step
Command
Purpose
1
node(cfg)#port ethernet slot port
Enters Ethernet port configuration mode for the
interface on slot and port.
2
node(prt-eth)[slot/port]#cos rx-map layer
2 class of service value as service class value
Adds a receive mapping table entry, which converts a layer 2 class of service into a service class
value.
Example: Adding a receive mapping table entry
The following example shows how to add a receive mapping table entry, which converts a layer 2 class of service value of 2 into a service class value of 4 for the Ethernet port on slot 0 and port 0 of a SmartNode.
node(cfg)#port ethernet 0 0
node(prt-eth)[0/0]#cos rx-map 2 as 4
Ethernet port configuration task list
147
SmartWare Software Configuration Guide
12 • Ethernet port configuration
Adding a transmit mapping table entry
The transmit mapping table defines the conversion of transmitting firmware-specific service class value into a
Layer 2 CoS to service class value. Each conversion is stored as a mapping table entry, so the transmitting mapping table consists of several mapping table entries.
This procedure describes how to add a transmit mapping table entry.
Mode: Configure
Step
Command
Purpose
1
node(cfg)#port ethernet slot port
2
node(prt-eth)[slot/port]#cos tx-map service class value as layer 2 class of
service value
Enters Ethernet
port configuration mode for
the interface on
slot and port.
Adds a transmit
mapping table
entry, which
converts a service class value
into a layer 2
class of service.
Example: Adding a transmit mapping table entry
The following example shows how to add a transmit mapping table entry, which converts a service class value
of 4 into a layer 2 class of service value of 2 for the Ethernet port on slot 0 and port 0.
node(cfg)#port ethernet 0 0
node(prt-eth)[0/0]#cos tx-map 4 as 2
Closing an Ethernet port
An Ethernet port can be closed with the shutdown command. This command also disables and closes the IP
interface that is bound to that port. All static routing entries that are using this interface change their state to
‘invalid’ and all dynamic routing entries will be removed from the route table manager.
This command can be used as soon as an encapsulation type is defined and the port was bound successful to an
IP interface.
This procedure describes how to disable the Ethernet port on slot and port.
Mode: Configure
Step
1
2
Command
Purpose
node(cfg)#port ethernet slot port
Enters Ethernet port configuration mode for the interface on
slot and port
node(prt-eth)[slot/port]#shutdown Disables Ethernet port on slot and port
The no prefix causes to open the port with the interface to which it is bound.
Ethernet port configuration task list
148
SmartWare Software Configuration Guide
12 • Ethernet port configuration
Example: Disabling an Ethernet port
The following example shows how to disable the Ethernet port on slot 0 and port 0.
node(cfg)#port ethernet 0 0
node(prt-eth)[0/0]#shutdown
Checking the state of the Ethernet port on slot 0 and port 0 shows that the interface was closed.
node(prt-eth)[0/1]#show port ethernet 0 1
Ethernet Configuration
------------------------------------Port
:
State
:
MAC Address
:
Speed
:
Duplex
:
Encapsulation :
Binding
:
Frame Format
:
Default Service:
ethernet 0 0 1
CLOSED
00:30:2B:00:1D:D4
10Mbps
Half
ip
wan@router
standard
0
Moreover the IP interface, which is bound to the Ethernet port on slot 0 and port 0 gets also closed. Checking
the state of the IP interface wan indicates this with the CLOSED for parameter state.
node(prt-eth)[0/1]#show ip interface
…
-----------------------------------------------------------Context:
router
Name:
wan
IP Address:
172.17.100.210 255.255.255.0
MTU:
1500
ICMP router-discovery:
enabled
ICMP redirect:
send only
State:
CLOSED
Binding:
ethernet 0 0 1/ethernet/ip
…
Using the built-in Ethernet sniffer
The software contains a built-in sniffer, which can be used to capture data packets on Ethernet ports. The
sniffer saves the captured data to a file in the systems flash file system. The file can later be uploaded via TFTP
for viewing. The files can be viewed with many sniffer applications, for example, Ethereal. The capture buffer
can hold a maximum of 1000 packets or 100kByte of data.
The sniffer is controlled via the following CLI command:
Command
[name] (cfg)# [no] sniff ethernet
[wrap]
Using the built-in Ethernet sniffer
Purpose
Enable/disable the sniffer
149
SmartWare Software Configuration Guide
12 • Ethernet port configuration
The following is an example of how the sniffer is normally used:
Step
1
2
3
Command
Purpose
[name] (cfg)# sniff ethernet
0 1 [wrap]
Enable the sniffer on ethernet port 0 1. (Normally the sniffer stops
capturing, if the capture buffer is full. However, if the ‘wrap’ option is
specified, the sniffer starts discarding the oldest packets and retains
the newest ones, if the capture buffer is full.)
Now the sniffer is active and will capture the datapackets on the
specified ethernet port.
[name] (cfg)# no sniff ether- Disable the sniffer on ethernet port 0 1. (Note, that the captured
net 0 1]
data is not stored to flash memory unless you issue this command)
The file in the flash memory will be named as follows:
nvram:ethernet-0--.cap
4
5
[name] (cfg)# copy
nvram:ethernet-0-0-1.cap
tftp://tftp.mypc.net/
capture.cap
[name] (cfg)# erase
nvram:ethernet-0-0-1.cap
6
In this example the name will be:
nvram:ethernet-0-0-1.cap
Copy the capture file via TFTP to a workstation.
Erase the capture file on the system to save flash memory.
Now the capture file capture.cap can be viewed on a workstation
with Ethereal for example.
Note
It is possible to capture packets on multiple Ethernet ports at the same time.
Using the built-in Ethernet sniffer
150
Chapter 13 Link scheduler configuration
Chapter contents
Introduction ........................................................................................................................................................152
Applying scheduling at the bottleneck ...........................................................................................................152
Using traffic classes .......................................................................................................................................152
Introduction to Scheduling ...........................................................................................................................153
Priority ....................................................................................................................................................153
Weighted fair queuing (WFQ) ................................................................................................................153
Shaping ...................................................................................................................................................153
Burst tolerant shaping or wfq ..................................................................................................................154
Hierarchy ................................................................................................................................................154
Quick references ..................................................................................................................................................155
Setting the modem rate .................................................................................................................................155
Command cross reference .............................................................................................................................156
Link scheduler configuration task list...................................................................................................................156
Defining the access control list profile ...........................................................................................................157
Packet classification .................................................................................................................................157
Creating an access control list ..................................................................................................................158
Creating a service policy profile .....................................................................................................................159
Specifying the handling of traffic-classes ........................................................................................................161
Defining fair queuing weight ...................................................................................................................161
Defining the bit-rate ...............................................................................................................................162
Defining absolute priority .......................................................................................................................162
Defining the maximum queue length ......................................................................................................162
Specifying the type-of-service (TOS) field ...............................................................................................162
Specifying the precedence field ................................................................................................................163
Specifying differentiated services codepoint (DSCP) marking .................................................................163
Specifying layer 2 marking ......................................................................................................................164
Defining random early detection .............................................................................................................165
Discarding Excess Load ...........................................................................................................................165
Quality of Service for routed RTP streams ....................................................................................................165
Devoting the service policy profile to an interface .........................................................................................167
Displaying link arbitration status ..................................................................................................................168
Displaying link scheduling profile information .............................................................................................168
Enable statistics gathering .............................................................................................................................168
151
SmartWare Software Configuration Guide
13 • Link scheduler configuration
Introduction
This chapter describes how to use and configure the Quality of Service (QoS) features. Refer to chapter 24,
“Access control list configuration” on page 253 more information on the use of access control lists.
This chapter includes the following sections:
• Quick references (see page 155)
• Packet Classification (see page 157)
• Assigning bandwidth to traffic classes (see page 155)
• Link scheduler configuration task list (see page 156)
QoS in networking refers to the capability of the network to provide a better service to selected network traffic.
In the context of VoIP, the primary issue is to control the coexistence of voice and data packets such that voice
packets are delayed as little as possible. This chapter shows you how to configure SmartWare to best use the
access link.
In many applications you can gain a lot by applying the minimal configuration found in the quick reference
section, but read sections “Applying scheduling at the bottleneck” and “Using traffic classes” first to understand
the paradox of why we apply a rate-limit to reduce delay and what a “traffic-class” means.
Applying scheduling at the bottleneck
When a SmartNode acts as an access router and voice gateway, sending voice and data packets to the Internet,
the access link is the point where intelligent use of scarce resources really makes a difference. Frequently, the
access link modem is outside of the SmartNode and the queueing would happen in the modem, which does
distinguish between voice and data packets. To improve QoS, you can configure the SmartNode to send no
more data to the Internet than the modem can carry. This keeps the modem’s queue empty and gives the
SmartNode control over which packet is sent over the access link at what time.
Using traffic classes
The link scheduler needs to distinguish between different types of packets. We refer to those types as “trafficclasses”. You can think of the traffic-class as if every packet in the SmartNode has a tag attached to it on which
the classification can be noted. The access control list “stage” (ACL) can be used to apply such a traffic-class
name to some type of packet based on its IP-header filtering capabilities. The traffic-class tags exist only inside
the SmartNode, but layer 2 priority bits (802.1pq class-of-service) and IP header type-of-service bits (TOS
field) can be used to mark a specific packet type for the other network nodes. By default the traffic-class tag is
empty. Only two types of packets are automatically marked by the SmartWare: voice packets and data packets
origination from or destined to the SmartNode itself are marked as “local-voice” and “local-default” respectively. Please refer to figure 22 on page 153 when using the ACL to classify traffic. It illustrates the sequence of
processing stages every routed packet passes. Only stages that have been installed in the data path with a “use
profile...” statement in the corresponding interface configuration are present. Both an input direction ACL on
the receiving interface as well as an output ACL on the transmitting interface can be used to classify a packet
for special handling by the output link scheduler on the transmit interface. But as visible from the figure no
ACL can be used for an input link scheduler.
Introduction
152
SmartWare Software Configuration Guide
13 • Link scheduler configuration
Local applications (CLI, Web Server)
Routing
IPSec encryption/
decryption
Access control
list (ACL)
Network address
translation (NAT)
Voice
processing
Voice mux/
demux
Sequence of processing stages
passed by a routed packet
Link Scheduler
To/from network port (Ethernet, PPPoE,
Frame relay, etc.)
Figure 22. Packet routing in SmartWare
The QoS features in SmartWare are a combination of an access control list (used for packet classification) and
a service-policy profile (used by the link arbiter to define the arbitration mode and the order in which packets
of different classes are served).
Introduction to Scheduling
Scheduling essentially means to determine the order in which packets of the different traffic-classes are served.
The following sections describe the ways this arbitration can be done.
Priority
One way of ordering packets is to give priority to one traffic-class and to serve the other traffic-classes when the
first has nothing to send. SmartWare uses the priority scheme to make sure that voice packets generated by the
SmartNode will experience as little delay as possible. Voice packets can receive this treatment because they will
not use up the entire bandwidth.
Weighted fair queuing (WFQ)
This arbitration method assures a given minimal bandwidth for each source. An example: you specify that traffic-class A gets three times the bandwidth of traffic-class B. So A will get a minimum of 75% and B will get a
minimum of 25% of the bandwidth. But if no class A packets are waiting B will get 100% of the bandwidth.
Each traffic-class is in fact assigned a relative weight, which is used to share the bandwidth among the currently
active classes. Patton recommends that you specify the weight as percent which is best readable.
Shaping
There is another commonly used way to assign bandwidth. It is called shaping and it makes sure that each traffic-class will get just as much bandwidth as configured and not more. This is useful if you have subscribed to a
Introduction
153
SmartWare Software Configuration Guide
13 • Link scheduler configuration
service that is only available for a limited bandwidth e.g. low delay. When connecting the SmartNode to a DiffServ network shaping might be a required operation.
Burst tolerant shaping or wfq
For weighted fair queuing and shaping there is a variation of the scheduler that allows to specify if a traffic class
may temporarily receive a higher rate as long as the average stays below the limit. This burstiness measure
allows the network to explicitly assign buffers to bursty sources.
When you use shaping on the access link the shaper sometimes has the problem that multiple sources are
scheduled for the same time - and therefore some of them will be served too late. If the rate of every source had
to strictly obey its limit, all following packets would also have to be delayed by the same amount, and further
collisions would reduce the achieved rate even further. To avoid this effect, the SmartWare shaper assumes that
the burstiness needed for sources to catch up after collisions is implicitly allowed. Future versions of SmartWare
might allow setting the burst rate and bursting size if more control over its behavior is considered necessary.
Burst tolerance has a different effect when used with weighted fair queuing. Think of it as a higher initial rate
when a source device starts transmitting data packets. This allows giving a higher weight to short data transfers.
This feature is sometimes referred to as a service curve.
Hierarchy
An arbiter can either use wfq or shaping to determine which source to serve next. If you want the scheduler to
follow a combination of decision criteria you can combine different schedulers in hierarchy to do a multi-level
arbitration.Hierarchical scheduling is supported in SmartWare with service-policy profiles used inside servicepolicy profiles.In figure 23 an example of hierarchical scheduling is illustrated. The 1 st level arbiter Level_1 uses
weighted fair queuing to share the bandwidth among source classes VPN, Web and incorporates the traffic
from the 2nd level arbiter Low_Priority, which itself uses shaping to share the bandwidth among source classes
Mail and Default.
Introduction
154
SmartWare Software Configuration Guide
13 • Link scheduler configuration
Mode
WFQ
priority
local voice
min. 30%
VPN
min. 40%
Level_1
Web
min. 30%
Mail
Low_Priority
Default
Mode
Shaper
Define 2nd level
arbiter
Define 1st level
arbiter
Use arbiter on
an interface
Figure 23. Example of Hierarchical Scheduling
Quick references
The following sections provide a minimal “standard” link scheduler configuration for the case where voice and
data share a (DSL/cable) modem link. You will also find a command cross reference list for administrators
familiar with Cisco’s IOS QoS features and having to become acquainted with SmartWare QoS configuration.
Setting the modem rate
To match the voice and data multiplexing to the capacity of the access link is the most common application of
the SmartWare link scheduler.
1. Create a minimal profile.
profile service-policy modem-512
rate-limit 512 header-length 20 atm-modem
source traffic-class local-voice
priority
2. Apply the profile just created to the interface connected to the modem.
context ip
interface wan
use profile service-policy modem-512 out
Some explanations:
• “modem-512” is the title of the profile which is referred to when installing the scheduler
Quick references
155
SmartWare Software Configuration Guide
13 • Link scheduler configuration
• “rate-limit 512” allows no more than 512 kbit/sec to pass which avoids queueing in the modem.
• “header-length 20” specifies how many framing bytes are added by the modem to “pack” the IP packet on
the link. The framing is taken into account by the rate limiter.
• “atm-modem” tells the rate limiter that the access link is ATM based. This option includes the ATM overhead into the rate limit calculation. Please add 8 bytes to the header-length for AAL5 in this case.
• “source traffic-class” enters a sub-mode where the specific handling for a traffic-class is described. The list of
sources in the service-policy profile tells the arbiter which “traffic sources” to serve.
• “local-voice” is the predefined traffic-class for locally terminated voice packet streams.
• “priority” means that packet of the source being described are always passed on immediately, packets of
other classes follow later if the rate limit permits.
Command cross reference
Comparing SmartWare with the Cisco IOS QoS software command syntax often helps administrators to
straightforwardly configure SmartNode devices. In table 4 the Cisco IOS Release 12.2 QoS commands are in
contrast with the respective SmartWare commands.
Table 4. Command cross reference
Action
Specifies the name of the policy map or profile
to be created or modified.
Specifies the name of the class map or class to
be created.
For IOS specifies average or peak bit rate
shaping. For SmartWare assigns the average
bit rate to a source.
For IOS specifies or modifies the bandwidth
allocated for a class belonging to a policy
map. Percent defines the percentage of available bandwidth to be assigned to the class. For
SmartWare assigns the weight of the selected
source (only used with wfq).
IOS command
SmartWare command
policy-map policy-mapprofile service-policy
name
profile-name
class-map class-map-name source traffic-class classname
shape {average | peak} cir rate bit-rate
[bc] [be]
bandwidth {bandwidthkbps | percent percent}
share percent-of-bandwidth
Link scheduler configuration task list
To configure QoS features, perform the tasks described in the following sections. Depending on your requirements some of the tasks are required while other tasks are optional.
• Defining the access control list profile
• Creating a service-policy profile (see page 159)
• Specifying the handling of traffic-classes (see page 161)
• Devoting the service policy profile to an interface (see page 167)
• Displaying link arbitration status (see page 168)
• Displaying link scheduling profile information (see page 168)
Link scheduler configuration task list
156
SmartWare Software Configuration Guide
13 • Link scheduler configuration
• Enable statistics gathering (see page 168)
Packet
Classification
ACL
Profile
Predefined
Classes
Different Types (Classes) of Traffic
The service-policy profile
defines the arbitration
mode and order in which
packets of different
classes are served.
Link Arbiter
Service
Policy
Profile
This interface is used as
access link and normally
represents the bottleneck
of the system.
IP Interface “wan”
Figure 24. Elements of link scheduler configuration
Defining the access control list profile
Packet classification
The basis for providing any QoS lies in the ability of a network device to identify and group specific packets.
This identification process is called packet classification. In SmartWare access control lists are used for packet
classification.
An access control list in SmartWare consists of a series of packet descriptions like “addressed to xyz”. Those
descriptions are called rules. For each packet the list of descriptions is sequentially checked and the first rule
that matches decides what happens to the packet. As far as filtering is concerned the rule decides if the packet is
discarded (“deny”) or passed on (“permit”). You can also add a traffic-class to the rule and if this rule is the first
matching rule for a packet it is tagged with the traffic-class name.
Some types of packets you do not have to tag with ACL. Voice and data packets from of for the SmartNode
itself are automatically tagged with predefined traffic-class names: Predefined internal classes for voice and
other data are:
• local-voice—VoIP packets that originate from the SmartNode itself.
Link scheduler configuration task list
157
SmartWare Software Configuration Guide
13 • Link scheduler configuration
• local-default—All other packets that originate from the SmartNode itself.
• default—All traffic that has not otherwise been labeled.
Creating an access control list
The procedure to create an access control list is described in detail in chapter 24, “Access control list configuration” on page 253.
At this point a simple example is given, that shows the necessary steps to tag any outbound traffic from a Web
server. The scenario is depicted in figure 25. The IP address of the Web server is used as source address in the
permit statement of the IP filter rule for the access control list.
172.16.1.0
lan
wan
IP Access
Network
Node
Node
172.16.1.1/24
17.254.0.91/16
Web-Server
172.16.1.20/24
Figure 25. Scenario with Web server regarded as a single source host
A new access control list has to be created. In the example above, the traffic-class that represents outbound Web
related traffic is named Web.
Access control list have an implicit “deny all” entry at the very end, so packets that do not match the first criteria of outbound Web related traffic will be dropped. That is why a second access control list entry—one that
allows all other traffic—is necessary.
This procedure describes creating an access control list for tagging web traffic from the single source host at a
certain IP address.
Link scheduler configuration task list
158
SmartWare Software Configuration Guide
13 • Link scheduler configuration
Mode: Configure
Step
1
2
3
Command
Purpose
node(cfg)#profile acl name
Creates a new access
control list profile named
name
node(pf-acl)[name]#permit ip host ip-address any traffic-class Creates an IP access conclass-name
trol list entry that permits
access for host at IP
address ip-address, and
specifies that packets
matched by this rule
belong to the traffic-class
class-name.
node(pf-acl)[name]#permit ip any any
Creates an IP access control list entry that permits
IP traffic to or from all IP
addresses.
Example: Defining the access control list profile
In the example below a new access control list profile named Webserver is created. In addition an IP access control list entry that permits access for host at IP address 172.16.1.20, and specifies that packets matched by this
rule belong to the traffic-class Web is added. Finally an IP access control list entry that permits IP traffic to or
from all IP addresses is added to the access control list.
node(cfg)#profile acl Webserver
node(pf-acl)[Webserv~]#permit ip host 172.16.1.20 any traffic-class Web
node(pf-acl)[Webserv~]#permit ip any any
After packet classification is done using access control lists, the link arbiter needs rules defining how to handle the
different traffic-classes. For that purpose you create a service-policy profile. The service policy profile defines how
the link arbiter has to share the available bandwidth among several traffic classes on a certain interface.
Creating a service policy profile
The service-policy profile defines how the link scheduler should handle different traffic-classes. The overall
structure of the profile is as follows:
Link scheduler configuration task list
159
SmartWare Software Configuration Guide
13 • Link scheduler configuration
profile service-policy
common settings
link rate, arbitration
common parameters
source traffic-class
settings for class x
bandwidth, packet mark
queue-size, etc.
source traffic-class
settings for class y
source traffic-class default
settings for all other
traffic-classes not listed
Figure 26. Structure of a Service-Policy Profile
The template shown above specifies an arbiter with three inputs which we call “sources”: x, y and “default”.
The traffic-class “default” stands for all other packets that belong neither to traffic-class x nor y. There is no
limit on the number of sources an arbiter can have.
Example: Creating a service policy profile
The following example shows how to create a top service-policy profile named sample. This profile does not
include any hierarchical sub-profiles. The bandwidth of the outbound link is limited to 512 kbps therefore the
interface rate-limit is set to 512. In addition weighted fair queuing (wfq) is used as arbitration scheme among
the source classes.
profile service-policy sample
rate-limit 512
mode wfq
source traffic-class local-voice
priority
source traffic-class Web
share 30
source traffic-class local-default
share 20
source traffic-class default
queue-limit 40
share 50
The first line specifies the name of the link arbiter profile to configure. On the second line the global bandwidth limit is set. The value defining the bandwidth is given in kilobits per second. Each service-policy profile
must have a “rate-limit” except if no scheduling is used i.e. the link scheduler is used for packet marking only
(like setting the TOS byte).
How the bandwidth on an IP interface is shared among the source classes is defined on the third line. The
mode command allows selecting between the weighted fair queuing and shaping arbitration mode. The default
mode is wfq - the command shown above can therefore be omitted.
Link scheduler configuration task list
160
SmartWare Software Configuration Guide
13 • Link scheduler configuration
The following lines configure the source traffic-classes. When using weighted fair queuing (wfq) each userspecified source traffic-class needs a value specifying its share of the overall bandwidth. For this purpose the
share command is used, which defines the relative weights of the source traffic-classes and policies.
At a some point the source traffic-class default must be listed. This class must be present, because it defines how
packets, which do not belong to any of the traffic-classes listed in the profile are to be handled. When all listed
“traffic-classes” have “priority” the handling of the remaining traffic is implicitly defined and the “default” section can be omitted. Similarly if no scheduling is used i.e. the link scheduler is used for packet marking only
(e.g. setting the TOS byte) the “default” section can also be omitted.
The table below shows the basic syntax of the service-policy profile structure:
Mode: Configure
Step
Command
1
node(cfg)# profile service-policy name
2
node(pf-srvpl)[name]#rate-limit value
3
node(pf-srvpl)[name]#mode {shaper | wfq}
4
node(pf-srvpl)[name]#source {traffic-class | policy}
src-name
5
node (src)[src-name]…
6
node (src)[src-name]exit
7
node(pf-srvpl)[name]#…
8
node(pf-srvpl)[name]#exit
Purpose
Creates a new service policy profile
named name
Limits global interface rate to value in
kbps. Be aware, that the actual ratelimit on a given interface has to be
defined for reliable operation.
Sets the arbitration scheme to mode
shaper or weighted fair queuing (wfq).
If not specified wfq is default.
Enters source configuration mode for a
traffic-class or a hierarchical lower
level service-policy profile named srcname.
At this point the necessary commands
used to specify the handling of the traffic-class(es) have to be entered.
Leaves the source configuration mode
(optional)
Repeat steps 4 to 6 for all necessary
source classes or lower level service
policy profiles.
Leaves the service-policy profile mode
Specifying the handling of traffic-classes
Several commands are available to specify what happens to a packet of a specific traffic-class.
Defining fair queuing weight
The command share is used with wfq link arbitration to assign the weight to the selected traffic-class. When
defining a number of source classes, the values are relative to each other. It is recommended to split 100—
which can be read as 100%—among all available source classes, e.g. with 20, 30 and 50 as value for the respective share commands, which represent 20%, 30% and 50%.
Link scheduler configuration task list
161
SmartWare Software Configuration Guide
13 • Link scheduler configuration
Mode: Source
Command
Purpose
node(src)[name]#share percentage
Defines fair queuing weight (relative to other sources) to percentage for the selected class or policy name
Defining the bit-rate
The command rate is used with shaper link arbitration to assign the (average) bit-rate to the selected source.
When enough bandwidth is available each source will exactly receive this bandwidth (but no more), when
overloaded the shaper will behave like a wfq arbiter. Bit-rate specification for shaper (kilobits).
Mode: Source
Command
node(src)[name]#rate [kilobits |
remaining]
Purpose
Defines the (average) bit-rate to the selected in kbps kilobits or as
remaining if a second priority source is getting the unused bandwidth for the selected class or policy name
Defining absolute priority
This command priority can only be applied to classes, but not to lower level polices. The class is given absolute
priority effectively bypassing the link arbiter. Care should be taken, as traffic of this class may block all other
traffic. The packets given “priority” are taken into account by the “rate-limit”. Use the command police to
control the amount of “priority” traffic.
Mode: Source
Command
node(src)[name]#priority
Purpose
Defines absolute priority effectively bypassing the link arbiter for the
selected class or policy name
Defining the maximum queue length
The command queue-limit specifies the maximum number of packets queued for the class name. Excess packets are dropped. Used in “class” mode—queuing only happens at the leaf of the arbitration hierarchy tree. The
no form of this command reverts the queue-limit to the internal default value, which depends on
your configuration.
Mode: Source
Command
node(src)[name]#queue-limit
number-of-packets
Purpose
Defines the maximum number of packets queued for the selected class
or policy name
Specifying the type-of-service (TOS) field
The set ip tos command specifies the type-of-service (TOS) field value applied to packets of the class name. TOS
and DSCP markings cannot be used at the same time. The no form of this command disables TOS marking.
Link scheduler configuration task list
162
SmartWare Software Configuration Guide
13 • Link scheduler configuration
The type-of-service (TOS) byte in an IP header specifies precedence (priority) and type of service (RFC791,
RFC1349). The precedence field is defined by the first three bits and supports eight levels of priority. The next
four bits—which are set by the set ip tos command—determine the type-of-service (TOS).
Table 5. TOS values and their meaning
TOS Value SmartWare Value
1000
0100
0010
0001
0000
8
4
2
1
0
Meaning
Minimize delay.
Maximize throughput.
Maximizes reliability.
Minimize monetary costs.
All bits are cleared, normal service, “default TOS.”
Historically those bits had distinct meanings but since they were never consistently applied routers will ignore
them by default. Nevertheless you can configure your routers to handle specific TOS values and SmartWare
allows you to inspect the TOS value in the ACL rules and to modify the TOS value with the link scheduler set
ip tos command.
Mode: Source
Command
Purpose
node(src)[name]#set ip tos value Defines the type-of-service (TOS) value applied to packets of for the
selected class or policy name. Standard ToT values are 0, 1, 2, 4,
and 8, as given in table 5 on page 163, but any number from 0 to
15 can be configured.
Specifying the precedence field
The set ip precedence command specifies the precedence marking applied to packets of the class name. Precedence and DSCP markings cannot be used at the same time.
The type-of-service (TOS) byte in an IP header specifies precedence (priority) and type of service (RFC791,
RFC1349). The precedence field is defined by the first three bits and supports eight levels of priority. The lowest priority is assigned to 0 and the highest priority is 7.
The no form of this command disables precedence marking.
Mode: Source
Command
node(src)[name]#set ip precedence value
Purpose
Defines the precedence marking value applied to packets of for the selected class or policy name. The range
for value is from 0 to 7, but only values from 0 to 5
should be used.
Specifying differentiated services codepoint (DSCP) marking
Differentiated services enhancements to the Internet protocol are intended to enable the handling of “trafficclasses” throughout the Internet. In this context the IP header TOS field is interpreted as something like a
Link scheduler configuration task list
163
SmartWare Software Configuration Guide
13 • Link scheduler configuration
“traffic-class” number called. With SmartWare you can inspect the DSCP value in the ACL rules and modify
the DSCP value with the link scheduler set ip dscp command.
Note
When configuring service differentiation on the SmartNode, ensure that
codepoint settings are arranged with the service provider.
The command set ip dscp sets the DS field applied to packets of the class name. Additionally shaping may be
needed to make the class conformant. The no form of this command disables packet marking.
Mode: Source
Command
Purpose
node(src)[name]#set ip dscp value
Defines the Differentiated Services Codepoint value applied to
packets of for the selected class or policy name. The range for
value is from 0 to 63.
Specifying layer 2 marking
The IEEE ratified the 802.1p standard for traffic prioritization in response to the realization that different traffic classes have different priority needs. This standard defines how network frames are tagged with user priority
levels ranging from 7 (highest priority) to 0 (lowest priority). 802.1p-compliant network infrastructure devices,
such as switches and routers, prioritize traffic delivery according to the user priority tag, giving higher priority
frames precedence over lower priority or non-tagged frames. This means that time-critical data can receive preferential treatment over non-time-critical data.
Under 802.1p, a 4-byte Tag Control Info (TCI) field is inserted in the Layer 2 header between the Source
Address and the MAC Client Type/Length field of an Ethernet Frame. Table 6 lists the tag components.
Table 6. Traffic control info (TCI) field
Tag Control Field
Tagged Frame Type Interpretation
3-Bit Priority Field (802.1p)
Canonical
12-Bit 802.1Q VLAN Identifier
Description
Always set to 8100h for Ethernet frames (802.3ac tag format)
Value from 0 to 7 representing user priority levels (7 is the highest)
Always set to 0
VLAN identification number
802.1p-compliant infrastructure devices read the 3-bit user priority field and route the frame through an internal buffer/queue mapped to the corresponding user priority level.
The command set layer2 cos specifies the layer 2 marking applied to packets of this class by setting the 3-bit
priority field (802.1p). The no form of this command disables packet marking.
Please note that the Ethernet port must be configured for 802.1Q framing. Standard framing has no class-ofservice field.
Mode: Source
Command
Purpose
node(src)[name]#set layer2 cos value Defines the Class-Of-Service value applied to packets of for the
selected class or policy name. The range for value is from 0 to 7.
Link scheduler configuration task list
164
SmartWare Software Configuration Guide
13 • Link scheduler configuration
Defining random early detection
The command random-detect is used to request random early detection (RED). When a queue carries lots of
TCP transfers that last longer than simple web requests, there is a risk that TCP flow-control might be inefficient. A burst-tolerance index between 1 and 10 may optionally be specified (exponential filter weight). The no
form of this command reverts the queue to default “tail-drop” behavior.
Mode: Source
Command
Purpose
node(src)[name]#random-detect {burst-tolerance}
Defines random early detection (RED) for
queues of for the selected traffic-class or policy
name. The range for the optional value bursttolerance is from 1 to 10.
Discarding Excess Load
The command police controls traffic arriving in a queue for class name. The value of the first argument average-kilobits defines the average permitted rate in kbps, the value of the second argument kilobits-ahead defines
the tolerated burst size in kbps ahead of schedule. Excess packets are dropped.
This procedure describes defining discard excess load
Mode: Source
Command
node(src)[name]#police average-kilobits
burst-size kilobits-ahead
Purpose
Defines how traffic arriving in a queue for the selected
class or policy name has to be controlled. The value average-kilobits for average rate permitted is in the range
from 0 to 10000 kbps. The value kilobits-ahead for burst
size tolerated ahead of schedule is in the range from 0 to
10000.
Quality of Service for routed RTP streams
SmartWare supports including routed RTP packets in the QoS process. This is possible for plain streams as
well as for encrypted streams in up- and downlink direction. The identification of the packets that have to be
included in the QoS process base upon their size. In the service-policy profile exists a command that allows
mapping of a specific packet size or a range to a traffic class.
There are two predefined ranges the user can choose. One of them is ‘routed-voice’ that specifies a packet size
range from 50 Byte to 280 Byte the other one is ‘routed-voice-encrypted’ that specifies a packet size range from
92 Byte to 324 Byte. By selecting this predefined ranges all voice packets from G.729/10ms to G.711/30ms
will be assigned to the configured traffic-class.
Be aware that also other packets matching the configured size or range will be assigned to the specified trafficclass. All values to be configured are in Byte and are IP Packet sizes (IP Header plus Payload).
Link scheduler configuration task list
165
SmartWare Software Configuration Guide
13 • Link scheduler configuration
Mode: profile service-policy/profile
Command
Purpose
[name] (pf-srvp)[]# [no] map packet-size
Assigns IP packets of a predefined or speci{routed-voice | routed-voice-encrypted | [ fied range to a traffic-class. To name a spe] } traffic-class
cific size, configure lower-range and upperrange with the same value.
The following procedure guides through the steps required for creating, configuring and using service policy
profiles on a WAN link that has an upstream and downstream capacity of 256kBit/s and is based on ADSL
technology. The access device must be able to process the RTP traffic generated by a VoIP Phone located in the
LAN like the local generated RTP stream.
Mode: Configure
Step
Command
Purpose
1
[name] (cfg)# profile service-policy
[name] (pf-srvp)[]# rate-limit 256
atm-modem
[name] (pf-srvp)[]# map packetsize routed-voice traffic-class local-voice
[name] (pf-srvp)[]# source trafficclass local-voice
[name] (src)[local-v~]# priority
Creates a new service policy profile will be configured for the uplink.
Configures the uplink capacity.
2
3
4
5
6
7
8
9
10
11
12
13
14
Specifies that routed voice traffic will be processed like local generated voice traffic.
Enters traffic-class configuration mode
Specifies that local-voice has priority. Because
route-voice is mapped to local-voice, also routedvoice has priority.
[name] (src)[local-v~]# profile service-policy Creates a new service policy profile will be con
figured for the downlink.
[name] (pf-srvp)[]# rate-limit 256 Configures the downlink capacity and sets a
atm-modem voice-margin 80
voice-margin of 80kBit/s
[name] (pf-srvp)[]# map packet- Specifies that routed voice traffic will be prosize routed-voice traffic-class local-voice cessed like local generated voice traffic.
[name] (pf-srvp)[]# source traffic- Enters traffic-class configuration mode
class local-voice
[name] (src)[local-v~]# priority
Specifies that local-voice has priority. Because
route-voice is mapped to local-voice, also routedvoice has priority.
[name] (src)[local-v~]# context ip
Changes to IP configuration mode
[name] (ctx-ip)[router]# interface
Enters WAN interface configuration mode
[name] (if-ip)[]# use profile service- Assigns the downlink profile on the WAN interpolicy in
face.
[name] (if-ip)[]# use profile service- Assigns the uplink profile on the WAN interface.
policy out
Link scheduler configuration task list
166
SmartWare Software Configuration Guide
13 • Link scheduler configuration
Devoting the service policy profile to an interface
Any service policy profile needs to be bound to a certain IP interface to get activated. According the terminology of SmartWare a service policy profile is used on a certain IP interface, as shown in figure 27.
Service
Policy
Profile
Context
IP
“router”
use command
bind command
PVC
Serial
Ethernet
Figure 27. Using a Service Policy Profile on an IP Interface
Therefore the use profile service-policy command allows attaching a certain service policy profile to an IP
interface that is defined within the IP context. This command has an optional argument that defines whether
the service policy profile is activated in receive or transmit direction.
Providers may use input shaping to improve downlink voice jitter in the absence of voice support. The default
setting no service-policy sets the interface to FIFO queuing.
Mode: Interface
Step
1
Command
node(if-ip)[if-name]#use profile servicepolicy name {in | out}
Purpose
Applies the service policy profile name to the
selected interface if-name. Depending on selecting the optional in or out argument the service
policy profile is active on the receive or transmit
direction. Be aware that service policy profiles
can only be activated on the transmit direction at
the moment.
Example: Devoting the service policy profile to an interface
The following example shows how to attach the service policy profile Voice_Prio to the IP interface wan that is
defined within the IP context for outgoing traffic.
node>enable
node#configure
node(cfg)#context ip router
Link scheduler configuration task list
167
SmartWare Software Configuration Guide
13 • Link scheduler configuration
node(ctx-ip)[router]#interface wan
node(if-ip)[wan]#use profile service-policy Voice_Prio out
Displaying link arbitration status
The show service-policy command displays link arbitration status. This command supports the optional
argument interface that select a certain IP interface. This command is available in the operator mode.
Mode: Operator execution
Step
1
Command
Purpose
node>show service-policy {interface name} Displays the link arbitration status
Example: Displaying link arbitration status
The following example shows how to display link arbitration status information.
node>show service-policy
available queue statistics
-------------------------default
- packets in queue: 10
Displaying link scheduling profile information
The show profile service-policy command displays link scheduling profile information of an existing service-policy profile. This command is only available in the administrator mode.
Mode: Administrator execution
Step
1
Command
Purpose
node#show profile service-policy name Displays link scheduling profile information of the
service-policy profile name
Example: Displaying link scheduling profile information
The following example shows how to display link scheduling profile information of an existing service-policy
profile VoIP_Layer2_CoS.
node#show profile service-policy VoIP_Layer2_CoS
VoIP_Layer2_CoS
default (mark layer 2 cos -1)
Enable statistics gathering
Using the debug queue statistics commands enables statistic gathering of link scheduler operations.
Link scheduler configuration task list
168
SmartWare Software Configuration Guide
13 • Link scheduler configuration
The command has optional values (in the range of 1 to 4) that define the level of detail (see table 7).
Table 7. Values defining detail of the queuing statistics
Optional Value Implication on Command Output
0
1
2
3
4
Note
Statistic gathering is switched off
Display amount of packets passed (did
not have to wait), queued (arrived earlier than rate permitted) and discarded
(due to overflowing queue)
Also collects byte counts for the categories listed above
Also keeps track of the peek queue
lengths ever reached since the last configuration change or reload
Adds delay time monitoring
The debug features offered by SmartWare require the CPU resources of your
SmartNode. Therefore do not enable statistic gathering or other debug features if it is not necessary. Disable any debug feature after use with the no
form of the command.
You can enable queue statistics for all queues of a link scheduler by placing the debug queue statistics command in the profile header. Queue statistics are reset whenever the configuration is changed or SmartWare is
reloaded.
Mode: Source
Step
1
Command
Purpose
node(src)[name]#debug queue statistics level Enables statistic gathering for the selected class
or policy name. The optional argument level,
which is in the range from 1 to 4, defines the verbosity of the command output.
Example: Enable statistics gathering for all queues of a profile
The following example shows how to enable statistic gathering for all traffic-classes
node>enable
node#configure
node(cfg)#profile service-policy sample
node(pf-srvpl)[sample]#debug queue statistics 4
Link scheduler configuration task list
169
Chapter 14 Serial port configuration
Chapter contents
Introduction ........................................................................................................................................................171
Serial port configuration task list .........................................................................................................................171
Disabling an interface ...................................................................................................................................171
Enabling an interface ....................................................................................................................................172
Configuring the serial encapsulation type ......................................................................................................173
Configuring the hardware port protocol ........................................................................................................173
Configuring the active clock edge ..................................................................................................................174
Configuring the baudrate ..............................................................................................................................175
170
SmartWare Software Configuration Guide
14 • Serial port configuration
Introduction
This chapter provides an overview of the serial port and describes the tasks involved in its configuration
includes the following sections:
• Serial port configuration task list
• Configuration tasks
• Examples
The V.35 standard is recommended for speeds up to 48 kbps, although in practice it is used successfully at 4
Mbps. The X.21 standard is recommended for data interfaces transmitting at rates up to 2 Mbps and is used
primarily in Europe and Japan.
The synchronous serial interface supports full-duplex operation and allows interconnection to various serial
network interface cards or equipment. Refer to the getting started guide included with your SmartWare for
specific information regarding the connector pinout and the selection of cables to connect with third-party
equipment.
Serial port configuration task list
Perform the tasks in the following sections to configure a synchronous serial interface:
• Disabling an interface (see page 171)
• Enabling an interface (see page 172)
• Configuring the serial encapsulation type (see page 173)
• Configuring the hardware port protocol (see page 173)
• Configuring the active clock edge (see page 174)
• Configuring the baudrate
Disabling an interface
Before you replace a compact serial cable or attach your SmartNode to other serial equipment, use the
shutdown command to disable the serial interfaces. This prevents anomalies and hardware faults. When you
shut down an interface, it has the state CLOSED in the show port serial command display.
Note
Use the no shutdown command to enable the serial interface after the configuration procedure.
This procedure describes how to shut down a serial interface
Mode: Administrator execution
Step
1
2
3
Command
Purpose
node(cfg)#port serial slot port
Selects the serial interface on slot and port
node(prt-ser)[slot/port]#shutdown
Shuts the selected interface down
node(prt-ser)[slot/port]#show port serial Displays the serial interface configuration.
Introduction
171
SmartWare Software Configuration Guide
14 • Serial port configuration
Example: Disabling an interface
The example shows how to disable the built-in serial interface on slot 0 and port 0 of a SmartNode. Check that
State is set to CLOSED in the command output of show port serial.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#shutdown
node(prt-ser)[0/0]#show port serial
Serial Interface Configuration
-----------------------------Port
:
State
:
Hardware Port
:
Transmit Edge
:
Port Type
:
CRC Type
:
Max Frame Length:
Recv Threshold :
Encapsulation
:
serial 0 0 0
CLOSED
V.35
normal
DTE
CRC-16
2048
1
Enabling an interface
After configuring the serial interface or connecting other serial devices, use the no shutdown command to
enable the serial interfaces again. When you enable an interface, it has the state OPENED in the show port
serial command display.
Note
Use the shutdown command to disable the serial interface for any software
or hardware configuration procedure.
This procedure describes how to enable a serial interface.
Mode: Administrator execution
Step
1
2
3
Command
Purpose
node(cfg)#port serial slot port
Selects the serial interface on slot and port
node(prt-ser)[slot/port]#no shutdown
Enables the interface
node(prt-ser)[slot/port]#show port serial Displays the serial interface configuration.
Example: Enabling an interface
The example shows how to enable the built-in serial interface on slot 0 and port 0. Check that State is set to
OPENED in the command output of show port serial.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#no shutdown
node(prt-ser)[0/0]#show port serial
Serial Interface Configuration
-----------------------------Port
State
: serial 0 0 0
: OPENED
Serial port configuration task list
172
SmartWare Software Configuration Guide
Hardware Port
:
Transmit Edge
:
Port Type
:
CRC Type
:
Max Frame Length:
Recv Threshold :
Encapsulation
:
14 • Serial port configuration
V.35
normal
DTE
CRC-16
2048
1
Configuring the serial encapsulation type
The synchronous serial interface supports the Frame Relay and PPP serial encapsulation method. For more
information how to configure Frame Relay and PPP, please see Chapter15, “Frame Relay configuration” on
page 177 and Chapter 30, “PPP configuration” on page 313.
To set the encapsulation method used by a serial interface, use the encapsulation interface
configuration command.
This procedure describes how to set the encapsulation type of the serial interface.
Mode: Administrator execution
Step
Command
1
node(cfg)#port serial slot port
2
node(prt-ser)[slot/port]#[no] encapsulation
{framerelay | ppp}
node(prt-ser)[slot/port]#show port serial
3
Purpose
Selects the serial interface on slot and
port.
Sets the encapsulation type for the
selected interface.
Displays the serial interface configuration.
Example: Configuring the serial encapsulation type
The following example enables Frame Relay encapsulation for the serial interface on slot 0 and port 0. Check
that in the command output of show port serial Encapsulation is set to framerelay.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#encapsulation framerelay
node(prt-ser)[0/0]#show port serial
Serial Interface Configuration
-----------------------------Port
:
State
:
Hardware Port
:
Transmit Edge
:
Port Type
:
CRC Type
:
Max Frame Length:
Recv Threshold :
Encapsulation
:
serial 0 0 0
CLOSED
V.35
normal
DTE
CRC-16
2048
1
framerelay
Configuring the hardware port protocol
Note
Only available on certain devices.
Serial port configuration task list
173
SmartWare Software Configuration Guide
14 • Serial port configuration
Before using the serial interface the hardware port protocol has to be specified. There are two command
options available to select the suitable hardware port protocol:
• v35 for V.35 protocol to be used
• x21 for X.21 protocol to be used
Mode: Administrator execution
Step
1
2
3
Command
Purpose
node(cfg)#port serial slot port
Selects the serial interface on slot and port
node(prt-ser)[slot/port]#hardware-port {v35 | x21} Sets the hardware port protocol
node(prt-ser)[slot/port]#show port serial
Displays the serial interface configuration
Example: Configuring the hardware port protocol
The following example enables X.21 as hardware port protocol for the serial interface on slot 0 and port 0.
Check that Hardware Port is set to X.21 in the command output of show port serial.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#hardware-port x21
node(prt-ser)[0/0]#show port serial
Serial Interface Configuration
-----------------------------Port
:
State
:
Hardware Port
:
Transmit Edge
:
Port Type
:
CRC Type
:
Max Frame Length:
Recv Threshold :
Encapsulation
:
serial 0 0 0
CLOSED
X.21
normal
DTE
CRC-16
2048
1
framerelay
Configuring the active clock edge
Depending on the system configurations—i.e. when using long cables, with certain modem types or data
rates—synchronization problems may occur on the serial port. In these cases, it may be necessary to configure
the clock edge on which data is transmitted.
This procedure describes how to set the active clock edge of the serial interface
Mode: Port serial
Step
1
2
Command
node(prt-ser)[slot/port]# transmit-dataon-edge positive
node(prt-ser)[slot/port]# transmit-dataon-edge negative
Serial port configuration task list
Purpose
Configures the serial interface to transmit on the
positive edge of the clock (normal, default).
Configures the serial interface to transmit on the
negative edge of the clock (inverted).
174
SmartWare Software Configuration Guide
14 • Serial port configuration
Example: Configuring the active clock edge
The following example enables to send data on the negative edge on slot 0 and port 0. Check that Transmit
Clock is set to inverted in the command output of show port serial.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#transmit-data-on-edge negative
node(prt-ser)[0/0]#show port serial
Serial Interface Configuration
-----------------------------Port
:
State
:
Hardware Port
:
Transmit Edge
:
Port Type
:
CRC Type
:
Max Frame Length:
Recv Threshold :
Encapsulation
:
serial 0 0 0
CLOSED
X.21
inverted
DTE
CRC-16
2048
1
framerelay
Configuring the baudrate
A DCE interface has to provide the signal clocks. The desired baudrate can be configured.
Note
Only available on certain devices.
This procedure describes how to set the baudrate for the serial interface.
Mode: Port serial
Step
1
Command
node(prt-ser)[slot/port]# baudrate
baudrate
Purpose
Configures the baudrate for the serial interface.
Example: Configuring baudrate to 64,000 bps
The following example configures a baudrate of 64,000 bps on the serial interface. Verify that the command
output displays the correct baudrate. True baudrate in the Status section shows the
baudrate of the selected hardware.
show port serial detail 5
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#transmit-data-on-edge negative
node(prt-ser)[0/0]#show port serial detail 5
HDLC Driver: 0x8496b8
=====================
Slot:
Number of Ports:
0
1
Port: serial 0 0 0
------------------
Serial port configuration task list
175
SmartWare Software Configuration Guide
State:
OPENED
Configuration
Hardware Port:
Port Type:
CRC:
Transmit Edge:
Max Frame Length:
Baudrate:
Recv Threshold:
X.21
DCE
CRC-16
Normal
1920
64000 bps
1
Statistics
Received frames:
Rx good frames:
Rx CD lost:
Rx Overrun:
Rx CRC errors:
Rx abort sequence:
Rx non octet:
Rx frame len violation:
Rx DPLL error:
Sent frames:
Tx good frames:
Tx CTS lost:
Tx underrun:
116101
116099
0
0
0
0
2
0
0
116106
116106
0
0
Status
Link:
Control Line:
True Baudrate:
Up
enabled
64000 bps
Serial port configuration task list
14 • Serial port configuration
176
Chapter 15 Frame Relay configuration
Chapter contents
Introduction ........................................................................................................................................................178
Frame Relay configuration task list ......................................................................................................................178
Configuring Frame Relay encapsulation ........................................................................................................178
Configuring the LMI type .............................................................................................................................179
Configuring the keep-alive interval ...............................................................................................................179
Enabling fragmentation ................................................................................................................................180
Entering Frame Relay PVC configuration mode ...........................................................................................181
Configuring the PVC encapsulation type ......................................................................................................182
Binding the Frame Relay PVC to IP interface ...............................................................................................182
Enabling a Frame Relay PVC ........................................................................................................................184
Disabling a Frame Relay PVC .......................................................................................................................184
Debugging Frame Relay ................................................................................................................................185
Displaying Frame Relay information .............................................................................................................186
Integrated service access ................................................................................................................................187
Example 1: Frame Relay on e1t1 without a channel-group ...........................................................................189
177
SmartWare Software Configuration Guide
15 • Frame Relay configuration
Introduction
This chapter provides an overview of the Frame Relay protocol and describes the tasks involved in its configuration includes the following sections:
• Frame Relay configuration task list
• Configuration tasks
• Examples
Frame Relay is an example of a packet-switched technology. Packet-switched networks enable end stations to
dynamically share the network medium and the available bandwidth. Variable-length packets are used for more
efficient and flexible transfers. These packets are then switched between the various network segments until the
destination is reached. Statistical multiplexing techniques control network access in a packet-switched network. The advantage of this technique is that it provides more flexibility and more efficient use of bandwidth.
Frame Relay configuration task list
Perform the tasks in the following sections to configure Frame Real on various ports:
• Configuring Frame Relay encapsulation
• Configuring the LMI type
• Configuring the keep-alive interval
• Enabling fragmentation
• Entering Frame Relay PVC configuration mode
• Configuring the PVC encapsulation type
• Binding the Frame Relay PVC to IP interface
• Disabling a Frame Relay PVC
• Displaying Frame Relay information
Configuring Frame Relay encapsulation
Normally, Frame Relay is used over a HDLC framed link. Different kind of physical ports can be configured
for HDLC framed data transmission. On some ports the hdlc mode must be explicitly enabled (PRI, BRI),
other ports have a HDLC framed nature (Serial). That means, Frame Relay encapsulation can be configured in
different configuration modes. For this reason, the command description below refers to the configuration
mode in which Frame Relay can be enabled by setting the encapsulation to ‘framerelay’. This configuration
mode is called here ‘hdlc-sub’ but it is only an alias for the real mode. Once encapsulation framerelay has been
configured, the Frame Relay configuration mode can be entered.
Mode: hdlc-sub
Step
Command
Purpose
1
node(hdlc-sub)#[no] encapsulation framerelay
Enables/Disables Frame Relay
2
node(hdlc-sub)#framerelay
Enters the framerelay configuration mode
Introduction
178
SmartWare Software Configuration Guide
15 • Frame Relay configuration
Configuring the LMI type
For a Frame Relay network, the line protocol is the periodic exchange of local management interface (LMI)
packets between the SmartNode and the Frame Relay provider equipment. If the SmartNode is attached to a
public data network (PDN), the LMI type must match the type used on the public network.
You can set one of the following three types of LMIs:
• ansi for ANSI T1.617 Annex D,
• gof for Group of 4, which is the default for Cisco LMI, and
• itu for ITU-T Q.933 Annex A.
This procedure describes how to set the LMI type.
Mode: Frame Relay
Step
1
Command
Purpose
node(frm-rel)[slot/port]#lmi-type {ansi | gof | itu} Sets the LMI type
Example: Configuring the LMI type
The following example sets the LMI type to ANSI T1.617 Annex D for Frame Relay over the serial interface
on slot 0 and port 0.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#framerelay
node(frm-rel)[0/0]#lmi-type ansi
Configuring the keep-alive interval
A keep-alive interval must be set to configure the LMI. By default, this interval is 10 seconds and, according to
the LMI protocol, must be less than the corresponding interval on the switch. The keep-alive interval in seconds, which is represented by number, has to be in the range from 1 to 3600.
This procedure describes how to set the keep-alive interval
Mode: Frame Relay
Step
1
Command
node(frm-rel)[slot/port]#keepalive number
Purpose
Sets the LMI keep-alive interval
To disable keep-alives on networks that do not utilize LMI, use the no keepalive interface
configuration command.
Example: Configuring the keep-alive interval
The following example sets the keepalive interval to 10 seconds for Frame Relay over the serial interface on slot
0 and port 0.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#framerelay
node(frm-rel)[0/0]#keepalive 10
Frame Relay configuration task list
179
SmartWare Software Configuration Guide
15 • Frame Relay configuration
Enabling fragmentation
FRF.12 interface and end-to-end fragmentation of large IP packets is supported to reduce the delay imposed
on voice packets on slow links (less than 512 kbps). As opposed to IP fragmentation, Frame Relay fragmentation is transparent to the IP layer. This leaves IP packets unchanged, which may be important for IP-based
applications susceptible to IP fragmentation.
This procedure describes how to enable Frame Relay fragmentation
Mode: Frame Relay
Step
Command
1
node(frm-rel)[slot/port]#use profile service-policy name out
2
node(frm-rel)[slot/port]#fragment size
3
node(frm-rel)[slot/port]#pvc dlci
4
node(pvc)[dlci]#fragment size
Purpose
Uses the previously defined service policy profile on Frame
Relay layer (and not on IP interface level) in outward direction.
Defines the maximum size (in Bytes) of the Frame Relay payload (excluding Frame Relay header and trailer overhead)
for all PVCs (FRF.12 interface fragmentation).
See also the table below
Enters the PVC configuration mode by assigning a DLCI number to be used on the specified virtual circuit.
Defines the maximum size (in bytes) of the Frame Relay payload (excluding Frame Relay header and trailer overhead)
for this PVC only (FRF.12 end-to-end fragmentation).
See also the table below
Note
For proper functioning, do not specify a scheduler mode (burst-shaper,
burst-WFQ, shaper, WFQ) for the Frame Relay service policy profile. Furthermore, do not use the Frame Relay service policy profile on the IP layer,
but rather on the Frame Relay layer (mode framerelay). Make sure voice traffic is being given priority over data (command source class localvoice priority).
Note
FRF.12 end-to-end fragmentation and FRF.12 interface fragmentation are
incompatible. Thus make sure that both ends of a Frame Relay link run the
same fragmentation mode.
Note
When running data and voice over a Frame Relay link, it is advisable to only
configure fragmentation for the PVC that carries data traffic. This way, fragmentation protocol overhead and fragmentation processing overhead is only
spent for data traffic—voice packets (whose length should be smaller than the
fragmentation length) do not consume processing power and protocol overhead for fragmentation.
The purpose of end-to-end FRF.12 fragmentation is to support real-time and non-real-time data packets on
lower-speed links without causing excessive delay to the real-time data. The FRF.12 Implementation Agreement defines FRF.12 fragmentation. This standard was developed to allow long data frames to be fragmented
into smaller pieces (fragments) and interleaved with real-time frames. In this way, real-time and non-real-time
data frames can be carried together on lower-speed links without causing excessive delay to the real-time traffic.
Frame Relay configuration task list
180
SmartWare Software Configuration Guide
15 • Frame Relay configuration
End-to-end FRF.12 fragmentation is recommended for use on permanent virtual circuits (PVCs) that share
links with other PVCs transporting voice and on PVCs transporting Voice over IP (VoIP).
The fragmentation size depends on the available bandwidth, the chosen codec, and its packet length:
• The less bandwidth available per call, the smaller the fragment size has to be configured.
• The shorter the voice packets, the smaller the fragment size can be configured.
• The smaller the fragment size, the bigger the overhead for long data packets.
The following table shows the minimum fragment size depending on the configured codec and its packet
length without fragmenting the voice packets:
Codec (bytes)
Packet Period (ms)
Minimum Fragment Size
G.729
G.729
G.729
G.723
G.723
G.723
G.711
G.711
G.711
10
20
30
30
60
90
10
20
30
52
62
72
66
90
114
122
202
282
Entering Frame Relay PVC configuration mode
The permanent virtual circuit (PVC) is a virtual circuit that is permanently established. PVCs save bandwidth associated with circuit establishment and tear down in situations where certain virtual circuits must exist all the time.
The Frame Relay network provides a number of virtual circuits that form the basis for connections between
stations attached to the same Frame Relay network.
The resulting set of interconnected devices forms a private Frame Relay group, which may be either fully interconnected with a complete mesh of virtual circuits, or only partially interconnected.
In either case, each virtual circuit is uniquely identified at each Frame Relay interface by a Data Link Connection
Identifier (DLCI). In most circumstances, DLCIs have strictly local significance at each Frame Relay interface.
Assigning a DLCI to a specified Frame Relay sub interface is done in the PVC configuration mode. The DLCI
has to be in the range from 1 to 1022.
Note
A maximum of eight PVCs can be defined.
This procedure describes how to enter the PVC configuration.
Mode: Frame Relay
Step
1
Command
Purpose
node(frm-rel)[slot/port]#pvc dlci Enters the PVC configuration mode by assigning a DLCI number
to be used on the specified sub interface
Frame Relay configuration task list
181
SmartWare Software Configuration Guide
15 • Frame Relay configuration
Example: Entering Frame Relay PVC configuration mode
The following example enters the configuration mode for PVC with the assigned DLCI of 1 for Frame Relay
over the serial interface on slot 0 and port 0.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#framerelay
node(frm-rel)[0/0]#pvc 1
node(pvc)[1]#
Configuring the PVC encapsulation type
You must use the PVC configuration command encapsulation rfc1490 to set the encapsulation type to comply with the Internet Engineering Task Force (IETF) standard (RFC 1490). Use this keyword when connecting
to another vendor’s equipment across a Frame Relay network.
This procedure describes how to set the encapsulation type to comply with RFC 1490
Mode: Frame Relay/PVC
Step
1
Command
node(pvc)[dlci]#encapsulation rfc1490
Purpose
Sets RFC1490 PVC compliant encapsulation
Example: Configuring the PVC encapsulation type
The following example sets the encapsulation type to comply with RFC 1490 for PVC with the assigned DLCI
of 1 for Frame Relay over the serial interface on slot 0 and port 0.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#framerelay
node(frm-rel)[0/0]#pvc 1
node(pvc)[1]#encapsulation rfc1490
Binding the Frame Relay PVC to IP interface
A newly created permanent virtual circuit (PVC) for Frame Relay has to be bound to an IP interface for further
use. The logical IP interface has to be already defined and should be named according to the use of the serial
Frame Relay configuration task list
182
SmartWare Software Configuration Guide
15 • Frame Relay configuration
Frame Relay PVC. If serial Frame Relay PVC shall be used as WAN access, a suitable name for the logical IP
interface could be wan as in figure 28 below.
IP
interface
eth0
Context
IP
“router”
IP
interface
wan
IP
interface
eth1
PVC
Port
Ethernet
00
Port
Ethernet
01
Port
Serial
00
Figure 28. IP interface wan is bound to PVC 1 on port serial 0 0
This procedure describes how to bind the Frame Relay PVC DLCI on the serial interface to the logical IP
interface name, which is related to the IP context router.
Mode: PVC
Step
1
Command
node(pvc)[dlci]#bind interface name router
Purpose
Binds Frame Relay PVC dlci to the IP interface
name of IP context router
Example: Binding the Frame Relay PVC to IP interface
The following example binds the Frame Relay PVC 1 to the IP interface wan of IP context router to the serial
interface on slot 0 and port 0.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#framerelay
node(frm-rel)[0/0]#pvc 1
node(pvc)[1]#bind interface wan router
Frame Relay configuration task list
183
SmartWare Software Configuration Guide
15 • Frame Relay configuration
Enabling a Frame Relay PVC
After binding Framerelay PVC to an ip interface it must be enabled for packet processing. This procedure activates the PVC by opening the bound ip interface.
This procedure describes how to enable Framerelay PVC for packet processing
Mode: PVC
Step
1
Command
node(pvc)[dlci]#no shutdown
Purpose
Enables the Frame Relay PVC
Example: Disabling a Frame Relay PVC
The following example enables Frame Relay PVC with the DLCI 1 on the serial interface on slot 0 and port 0.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#framerelay
node(frm-rel)[0/0]#pvc 1
node(pvc)[1]#no shutdown
Check the PVC 1 status using show running-config and verify that the entry no shutdown occurs in the configuration part responsible for this PVC.
node(pvc)[1]#show running-config
Running configuration:
#----------------------------------------------------------------#
#
#
…
pvc 1
encapsulation rfc1490
bind interface wan router
no shutdown
Disabling a Frame Relay PVC
Frame Relay PVCs can be disabled whenever it is necessary. Be aware that disabling a specific PVC also disables
the related serial interface and vice versa.
This procedure describes how to disable the Frame Relay PVC DLCI on the serial interface.
Mode: PVC
Step
1
Command
node(pvc)[dlci]#shutdown
Purpose
Disables the Frame Relay PVC DLCI.
Example: Disabling a Frame Relay PVC
The following example disables Frame Relay PVC 1 on the serial interface on slot 0 and port 0.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#framerelay
node(frm-rel)[0/0]#pvc 1
Frame Relay configuration task list
184
SmartWare Software Configuration Guide
15 • Frame Relay configuration
node(pvc)[1]#shutdown
Check the PVC 1 status by using show running-config and verify that the entry shutdown occurs in the configuration part responsible for this PVC.
node(pvc)[1]#show running-config
Running configuration:
#----------------------------------------------------------------#
#
#
# 2500
#
…
pvc 1
encapsulation rfc1490
bind interface wan router
shutdown
exit
…
Debugging Frame Relay
A set of commands is available to check the status of the Framerelay connections, fragmentation process and
keepalive message exchange. Be aware that some monitors generate a lot of output and can seriously impact
your system performance.This procedure describes how to display the Frame Relay configuration settings for
the serial interface
Mode: Administrator execution
Command
[no] debug framerelay
[no] debug framerelay all
[no] debug framerelay error
[no] debug framerelay lmi
[no] debug framerelay management
[no] debug framerelay packets
Frame Relay configuration task list
Purpose
Prints the status of the different monitors (ON or
OFF)
Enables/Disables all framerelay debug monitors
Enables/Disables monitor which prints only
occurred errors.
Enables/Disables monitor which prints keepalive
events and messages
Enables/Disables monitor which prints management
and configuration events
Enables/Disables monitor which prints dlci, size and
fragmentation status of every incoming and outgoing packet. Be aware that this monitor can seriously
impact your system performance.
185
SmartWare Software Configuration Guide
15 • Frame Relay configuration
Displaying Frame Relay information
Since Frame Relay configuration for the serial interface is complex and requires many commands, it is helpful
to list the frame relay configuration on screen.
This procedure describes how to display the Frame Relay configuration settings for the serial interface.
Mode: Port serial
Step
1
Command
Purpose
node(prt-ser)[slot/port]#show framerelay Displays Frame Relay information.
Example: Displaying Frame Relay information
The following example shows the commands used to display Frame Relay configuration settings.
node>enable
node#configure
node(cfg)#show framerelay
Framerelay Configuration:
Port
LMI-Type
Keepalive
Fragmentation
---------------------------------------------------------serial 0 0 0
ansi
10
disabled
PVC Configuration:
Port
DLCI
State
Fragment Encaps
Binding
-------------------------------------------------------------serial 0 0 0
1
open
disabled rfc1490
wan@router
Frame Relay configuration task list
186
SmartWare Software Configuration Guide
15 • Frame Relay configuration
PSTN
Internet
GW
GW
Multi
Multi
Service
Service
Provider
Provider
PVC 1
Node
Node
2300
X.21
Modem
Modem
PVC 2
Leased Line
Network
VPN
VPN
Provider
Provider
Figure 29. Typical Integrated Service Access Scenario with dedicated PVCs
Integrated service access
The example in figure 29 shows a typical integrated service access scenario, where different service providers are
accessed via permanent virtual circuits (PVCs) on Frame Relay over the serial interface of a SmartNode.
The multi service provider (MSP) offers both Internet access and voice services based on IP. The virtual private
network (VPN) provider offers secure interconnections of local access networks (LAN) via its public wide area
network based on IP. Since both providers are working independently, the SmartNode needs a configuration,
which has two dedicated PVCs on Frame Relay. The first PVC, labeled as PVC 1, connects to the MSP access
device. The second PVC, labeled PVC 2, connects to the VPN provider access device on the leased line network.
A SmartNode is working as a DTE and accesses the leased line network via a leased line modem connected to
the serial interface. The hardware port protocol X.21 is used on the serial interface on slot 0 and port 0.
Devices accessing the MSP and VPN services are attached to the 100 Mbps Ethernet port 0/0 on the
SmartNode. For that reason, an IP context with three logical IP interfaces bound to Ethernet port 0/0, PVC 1
and PVC 2 on serial port 0/0 as shown in figure 29 has to be configured for the SmartNode. The IP interfaces
are labeled to represent the function of their configuration. Hence Ethernet port 0/0 is named lan, PVC 1 is
named external since external services are accessed via this PVC, and PVC 2 is named internal to indicate the
private network interconnection via this PVC.
Between the leased line modem and the SmartNode, ANSI T.617 type of LMI packets have to be exchanged. In
addition, the keep-alive interval has to be set to 20 seconds. To guarantee voice quality, fragmentation is enabled
on the PVC which carries voice (PVC 1) and a service profile is assigned which gives priority to voices packets.
Frame Relay configuration task list
187
SmartWare Software Configuration Guide
15 • Frame Relay configuration
Figure 30. IP Context with logical IP interfaces bound to Ethernet port, serial port PVC 1 and PVC 2
The related IP, serial interface and Frame Relay configuration procedure is listed below. Where necessary, comments are added to the configuration for better understanding.
1. Enter the configuration mode.
node>enable
node#configure
…
2. Set up the IP interface configuration first. Be aware that not all of the necessary settings are listed below.
node(cfg)#context ip router
node(ctx-ip)[router]#interface external
node(if-ip)[external]#interface internal
node(if-ip)[internal]#interface lan
node(if-ip)[lan]#exit
node(ctx-ip)[router]#interface internal
node(if-ip)[internal]#ipaddress 192.168.3.1 255.255.255.0
node(if-ip)[internal]#interface external
node(if-ip)[external]#ipaddress 192.168.2.1 255.255.255.0
node(if-ip)[external]#interface lan
node(if-ip)[lan]#ipaddress 192.168.1.1 255.255.255.0
…
3. Define a voice profile which gives priority to voice packets. Set the rate limit according to the bandwidth
available for voice and data on PVC 1 (512kBits/s in this case).
node(cfg)#profile service-policy VoicePrio
node(pf-srvpl)[VoicePr~]#rate-limit 512
node(pf-srvpl)[VoicePr~]#source class local-voice
node(src)[local-v~]#priority
node(src)[local-v~]#source class local-default
node(src)[local-d~]#priority
node(src)[local-d~]#source class default
…
Frame Relay configuration task list
188
SmartWare Software Configuration Guide
15 • Frame Relay configuration
4. Configure the serial interface settings.
node(cfg)#port serial 0 0
node(prt-ser)[0/0]#shutdown
node(prt-ser)[0/0]#encapsulation framerelay
node(prt-ser)[0/0]#hardware-port x21
node(prt-ser)[0/0]#port-type dte
…
5. Configure the Frame Relay. You must thus change to the Frame Relay configuration mode. Use the service-policy profile defined above to give voice priority over data.
node(prt-ser)[0/0]#framerelay
node(frm-rel)[0/0]#lmi-type ansi
node(frm-rel)[0/0]#keepalive 20
node(frm-rel)[0/0]#use profile service-policy VoicePrio out
…
6. Configure the introduced PVCs. Enable fragmentation for PVC 1. The voice uses codec G.723 at a packet
size of 30ms, so the minimum fragment size must be 66 Bytes. Setting the fragment size to 300 (Bytes)
introduces an additional delay of at most 4.7ms (300 * 8/512k) but does not cause too much fragmentation overhead on large data packets.
node(frm-rel)[0/0]#pvc 1
node(pvc)[1]#encapsulation rfc1490
node(pvc)[1]#fragment 300
node(pvc)[1]#bind interface external router
node(pvc)[1]#no shutdown
node(pvc)[1]#pvc 2
node(pvc)[2]#encapsulation rfc1490
node(pvc)[2]#bind interface internal router
node(pvc)[2]#no shutdown
…
7. Check that the Frame Relay settings are correct.
node(frm-rel)[0/0]#show framerelay
Framerelay Configuration:
Port
LMI-Type
Keepalive
Fragmentation
---------------------------------------------------------serial 0 0 0
ansi
20
disabled
PVC Configuration:
Port
DLCI
State
Fragment Encaps
Binding
-------------------------------------------------------------serial 0 0 0
1
open
300
rfc1490
external@router
serial 0 0 0
2
open
disabled rfc1490
internal@router
Example 1: Frame Relay on e1t1 without a channel-group
port e1t1 0 3
port-type e1
clock master
framing crc4
encapsulation hdlc
Frame Relay configuration task list
189
SmartWare Software Configuration Guide
15 • Frame Relay configuration
hdlc
encapsulation framerelay
framerelay
pvc 100
encapsulation rfc1490
bind interface pvc100 router
no shutdown
port e1t1 0 0
no shutdown
Example 2: Frame Relay on e1t1 with a channel-group
port e1t1 0 0
port-type e1
clock master
framing crc4
encapsulation channelized
channel-group myGroup
timeslots 13-17
encapsulation hdlc
hdlc
encapsulation framerelay
framerelay
lmi-type gof
keepalive 20
pvc 100
encapsulation rfc1490
bind interface pvc100 router
no shutdown
port e1t1 0 0
no shutdown
Frame Relay configuration task list
190
Chapter 16 PRI port configuration
Chapter contents
Introduction ........................................................................................................................................................192
PRI port configuration task list............................................................................................................................192
Enable/Disable PRI port ...............................................................................................................................193
Configuring PRI port-type ............................................................................................................................193
Configuring PRI clock-mode ........................................................................................................................193
Configuring PRI line-code ............................................................................................................................193
Configuring PRI framing ..............................................................................................................................194
Configuring PRI line-build-out (E1T1 in T1 mode only) .............................................................................195
Configuring PRI used-connector (E1T1 in E1 mode only) ...........................................................................195
Configuring PRI application mode (E1T1 only) ...........................................................................................195
Configuring PRI LOS threshold (E1T1 only) ...............................................................................................196
Configuring PRI Loopback detection (E1T1 only) .......................................................................................196
Configuring PRI encapsulation .....................................................................................................................197
Create a Channel-Group ...............................................................................................................................198
Configuring Channel-Group Timeslots ........................................................................................................198
Configuring Channel-Group Encapsulation .................................................................................................198
Entering HDLC Configuration Mode ..........................................................................................................199
Configuring HDLC CRC-Type ...................................................................................................................199
Configuring HDLC Encapsulation ...............................................................................................................200
PRI Debugging .............................................................................................................................................200
PRI Configuration Examples ........................................................................................................................201
Example 1: ISDN ....................................................................................................................................202
Example 2: RBS without a channel-group ...............................................................................................202
Example 3: RBS with a channel-group ....................................................................................................202
Example 4: Frame Relay without a channel-group ...................................................................................203
Example 5: Framerelay with a channel-group ..........................................................................................204
Example 6: PPP without a channel-group ...............................................................................................204
Example 7: PPP with a channel-group .....................................................................................................204
191
SmartWare Software Configuration Guide
16 • PRI port configuration
Introduction
This chapter provides an overview of the PRI (Primary Rate Interface) ports, their characteristics and the tasks
involved in the configuration. The SmartNode devices know three different kinds of PRI ports, E1, T1 and
E1T1 whereas an E1T1 port can either work as E1 or T1. This chapter describes the superset of all commands
are available on the different PRI ports. If a command is only executable for a specific port then this circumstance will be noted or highlighted in the command description. Further will be explained here, how to prepare
the ports for the usage of the different application protocols like ISDN, RBS, PPP or Frame Relay. Fore some
applications there must be the possibility to access user defined sets of timeslots of an E1 or T1 port. On
SmartNode’s this feature is called a Channel Group and it will be described in this chapter as well.
Terminology
Hardware Type: Dependent on the device it can either be E1, T1 or E1T1. The Hardware Type and its belonging Slot and Port Number must be specified for entering the configuration mode of a port. It is not possible to
change the Hardware Type, it is given by the system.
Port Type: This expression is used in relation with the E1T1 port and describes if the E1T1 port is currently
running in E1 or in T1 mode. On an E1 or T1 port, the Port Type can not be changed, it is static and matches
the Hardware Type.
PRI port configuration task list
This section describes the configuration tasks for the PRI port.
• Enable/Disable PRI port
• Configuring the PRI port type (E1T1 only)
• Configuring PRI clock mode
• Configuring PRI line code
• Configuring PRI framing (E1T1 only)
• Configuring PRI line build out (E1T1 in T1 mode only)
• Configuring PRI impedance/connector (E1T1 in E1 mode only)
• Configuring PRI application mode (E1T1 only)
• Configuring PRI LOS threshold (E1T1 only)
• Configuring PRI Loopback detection (E1T1 only)
• Configuring PRI encapsulation
• Create a Channel-Group
• Configuring channel-group timeslots
• Configuring channel-group encapsulation
• Entering HDLC configuration mode
• Configuration HDLC CRC-type
• Configuring HDLC encapsulation
Introduction
192
SmartWare Software Configuration Guide
16 • PRI port configuration
• PRI Debugging
Enable/Disable PRI port
By default, the PRI port is disabled. The following command is used for enabling or disabling it.
Mode: port
Step
1
Command
[name] (hw-type)[slot/port]# [no]
shutdown
Purpose
Enable/Disable the PRI port.
Default: shutdown (which is disabled)
Configuring PRI port-type
An E1T1 Port can either work in T1 or in E1 (G.704) mode. This mode can be changed dynamically as long
as no encapsulation or encapsulation ‘hdlc’ is set. Be aware that changing the port-type also resets the framing
and linecode parameters to the default values of the new port-type. If port-type change is not allowed due to
current configuration, an error message will be issued.
Mode: port e1t1
Step
1
Command
[name] (prt-e1t1)[slot/port]# port-type
{e1 | t1}
Purpose
Changes operation mode of the port.
Restriction: Only available for e1t1 ports
Default: e1
Configuring PRI clock-mode
The PRI Port can either work in clock-master or in clock-slave mode. This setting defines the clock dependency of the internal data processing. In clock-master mode the internal data processing is running on an independent clock source. In clock-slave mode the clock source for internal data processing is recovered from the
receive line interface. Be aware that always a port-pair of clock-master and clock-slave are connected together.
In the other case the data transmission will fail due to bit failures. This command has also the option ‘auto’ that
can be used if the application running on the port is also of an asymmetric nature like master/slave, server/client or user/net. Normally, the option ‘auto’ is used if the port is setup for ISDN. In this case, the clock mode
will automatically derived from the Q.921 protocol. If the UNI-Side (User-Network Interface) of Q.921 is set
to ‘net’, then clock mode of the port is automatically set to ‘master’ and if Q.921 is configured as ‘user’ it will
be set to ‘slave’.
Mode: port
Step
1
Command
Purpose
[name] (prt-e1t1)[slot/port]# clock {auto | Configures the clock-mode of the port.
master | slave}
Default: master
Configuring PRI line-code
Three different line codes can be selected on the PRI port whereas only ‘ami’ is standardized for E1 and T1. If
the port is running in E1 mode, ‘hdb3’ is also configurable and in T1 mode ‘b8zs’. If a linecode will be selected
that is not standardized for the current port mode, an error message will be advised.
PRI port configuration task list
193
SmartWare Software Configuration Guide
16 • PRI port configuration
Mode: port
Step
1
Command
[name] (prt-e1t1)[slot/port]# linecode
{ami | b8zs | hdb3}
Purpose
Configures the line-code of the port.
Default for e1: hdb3
Default for t1: b8zs
Configuring PRI framing
Four framing formats are available for selection on the E1T1 port. Unframed can only be used if the encapsulation is set for hdlc. All other currently available upper layer (encapsulation) protocols do not run in unframed
mode, but in one of the framed modes.
In structured mode, E1 can be configured for crc4 or non-crc4 and T1 has the framing option esf and sf.
• CRC4 (E1): Cyclic Redundancy Check 4. A CRC4 Multi-Frame consists of 16 continuous Basic-Frames.
Each Multi-Frame can be divided into two Sub Multi-Frames. The first bit of Timeslot 0 of each even Sub
Multi-Frame is called the C-Bit and belongs to the CRC4 check sum.
• ESF (T1): Extended Super Frame. The ESF if made up of 24 Basic-Frames. Each Basic-Frame includes one
overhead bit, the F-Bit. The 24 F-Bits of one Extended Super Frame are used for synchronization (6 Bit),
transmitting data link information (12 Bit) and for CRC6 calculation (6 Bit).
• SF (T1): Super Frame: The SF is made up of 12 Basic-Frames. Each Basic-Frame includes one overhead bit,
the F-Bit. The 12 F-Bits of one Super-Frame represent the frame alignment pattern that is used for synchronization.
• Unframed: The advantage of the unframed mode (obviously with hdlc encapsulation) is the utilization of
the whole link speed for user data transmission, 2.048MBit/s for E1 and 1.544MBit/s for T1. However
note that HDLC has its own overhead which decreases the actual data rate.
Mode: port e1t1
Step
1
Command
[name] (prt-e1t1)[slot/port]# framing
{crc4 | non-crc4 | esf | sf | unframed}
PRI port configuration task list
Purpose
Configures the framing of the port.
Restriction: Only available for e1t1 ports
E1 mode formats are: crc4, non-crc4, unframed.
T1 mode formats are: esf, sf, unframed.
Default for e1: crc4
Default for t1: esf
194
SmartWare Software Configuration Guide
16 • PRI port configuration
Configuring PRI line-build-out (E1T1 in T1 mode only)
The line build out configuration is used in long haul applications to prevent cross talk in the far end device.
Mode: port e1t1
Step
1
Command
[name] (prt-e1t1)[slot/port]# line-buildout {0 | -7.5 | -15 | -22.5}
Purpose
Specifies the pulse attenuation in dB on the line interface.
Restriction: Only available for e1t1 ports in T1
mode.
Default for t1: 0 dB
Configuring PRI used-connector (E1T1 in E1 mode only)
If the E1T1 WAN-Card provides several line interface connector types this command specifies which one is
currently in use. Sure, the signal is always on all connectors available but dependent on the wiring technology
the internal impedance matching must be adapted (RJ45 = 120 Ohm; BNC = 75 Ohm).
Mode: port e1t1
Step
1
Command
[name] (prt-e1t1)[slot/port]# used-connector {bnc | rj45}
Purpose
Specifies the currently used connector.
Restriction: Only available for e1t1 ports in E1
mode.
Default for e1: rj45
Configuring PRI application mode (E1T1 only)
The PRI port can be configured to work in either short-haul or in long-haul mode. Short-haul is the default
application and should be used for transmission distances up to 180m/600ft. For transmission distances up to
1800m/6000ft, select the long-haul application.
Mode: port e1t1
Step
1
Command
[name] (prt-e1t1)[slot/port]#application
{long-haul | short-haul}
PRI port configuration task list
Purpose
Specifies the e1/t1 application mode
Restriction: Only available for e1t1 ports
Default: short-haul
195
SmartWare Software Configuration Guide
16 • PRI port configuration
Configuring PRI LOS threshold (E1T1 only)
This command takes effect only if the PRI port is configured for long-haul applications. It specifies the sensitivity for Loss Of Signal threshold. A signal suffers more attenuation over long distances than over short distances. Therefore the LOS-Threshold must be set higher for longer transmission distances. This command has
a default value of -46dB what should be enough for distances up to 1600 m/5250 ft.
Mode: port e1t1
Step
1
Command
[ name] (prt-e1t1)[slot/port]#los-threshold {-4dB | -6dB | -8dB … -46dB | 48dB}
Purpose
Specifies Loss Of Signal Threshold
Restriction: Only available for e1t1 ports
Default: -46dB
Configuring PRI Loopback detection (E1T1 only)
In T1 mode the E1T1 PRI port has the capability for auto detection of inband sent loop back codes. Once a
loopback-up code is detected, the module automatically enables the proper loopback function and disables it a
soon as the corresponding loopback-down code appears. This feature is used by carrier equipment for testing
the line to the customer. It sends the loopback-up code to the customer device, then subsequently starts, for
example, a Pseudo Random Bit Sequence (PRBS) to determinate the quality of the connection.
Depending on the configured T1 framing, the right loopback code detection mode will be enabled as soon as
the command loop-back auto-detection will be executed. For framing type uses a different loopback code detection mechanism:
• ESF: The loopback codes are transmitted via the 4kBit/s EOC-Channel, that is part of the 8kBit/s F-Bit
Channel. The following codes are supported:
Command
Line Loopback Activate
Line Loopback Deactivate
Payload Loopback Activate
Payload Loopback Deactivate
Universal Loopback Deactivate
Loopback Retention
Binary Code
0 000111 0
0 011100 0
0 001010 0
0 011001 0
0 010010 0
0 010101 0
• SF and Unframed: An inband loop code pattern is sent for at least 5 seconds in all 24 timeslots. The following codes are supported:
Command
Line Loopback Activate
Line Loopback Deactivate
PRI port configuration task list
Binary Repetition Code
00001
001
196
SmartWare Software Configuration Guide
16 • PRI port configuration
The command has three other options that allow you to manually switch on/off different loops. All these additional options are applicable in T1 and E1 mode.
The ‘line-interface’ loop sends back the whole link bandwidth (2048kBit/s or 1544kBit/s).
In ‘payload’ the entire user data bandwidth (1984 kbps or 1536 kbps) is looped back.
For some tests it is helpful to loop back the system data. For example, system data are sent from the router to
the PRI port. To switch on this feature the option ‘back-plane’ must be selected.
Mode: port e1t1
Step
1
Command
Purpose
[ name] (prt-e1t1)[slot/port]#[no] loop-back Enables/Disables type of data loopback, line-inter{line-interface | back-plane | payload | auto- face, payload, back-plane, or auto-detection.
detection}
Restriction: Only available for e1t1 ports
Default: disabled
Configuring PRI encapsulation
The PRI encapsulation command prepares the port for a specific application protocol. After the right encapsulation type has been set, the configuration mode command for the selected protocol can be executed for protocol specific configuration.
• channelized: This special encapsulation type pushes the port in mode where it is possible to setup an application for a user defined set of timeslots. Normally, all timeslots of a port are under full control of the application specified with the encapsulation command. In ‘channelized’ mode, an application uses only the
specified timeslots. If the encapsulation is set to ‘channelized’, use the channel-group command to create a
new Channel Group an to enter its configuration mode. In the Channel Group configuration mode, the
same encapsulation types as on the port configuration mode are available again, except channelized.
• hdlc: Enables HDLC Framing on the selected port. After encapsulation hdlc has been specified, the hdlc
configuration mode can be entered to configure hdlc specific parameters and to define the link layer protocol must run over hdlc.
• q921: This encapsulation type automatically binds the signaling timeslot (D-channel) of the selected port to
the ISDN Layer 2 protocol. This is timeslot 16 for an E1 and timeslot 24 for a T1 port. If in the q921 configuration mode q931 is specified as next encapsulation, the control of all remaining timeslots (B-channels)
is given to the ISDN Layer 3 protocol. For more information please see Chapter18, “ISDN Overview” on
page 212 and Chapter19, “ISDN configuration” on page 217.
• rbs: Robbed Bit Signaling encapsulation is only available for T1 ports.
On specifying this encapsulation type, all the 24 timeslots will be bound to the RBS protocol. Enter the
RBS configuration mode for RBS specific configuration (see Chapter 20, “RBS configuration” on
page 225).
Mode: port
Step
1
Command
Purpose
[name] (prt-e1t1)[slot/port]#[no] encapsu- Specifies the encapsulation type of the PRI port.
lation {channelized | hdlc | q921 | rbs} Default: no encapsulation
PRI port configuration task list
197
SmartWare Software Configuration Guide
16 • PRI port configuration
Create a Channel-Group
If the desired encapsulated channel uses only selected time slots (not the entire PRI), then it is necessary to set
up a channel-group. To create a channel-group, set the PRI port’s encapsulation to channelized. (See section
“Configuring PRI encapsulation”.) On creating a new channel-group the channel-group configuration mode is
immediately entered. To remove an existing channel-group the ‘no’ form of the command has to be used.
Mode: port e1t1
Step
1
Command
Purpose
[name] (prt-e1t1)[slot/port]#[no] channel- Enters the channel-group configuration mode of
group group-name
group-name. If the group does not yet exist a new
one will be created. The ‘no’ form of the command
removes an existing channel-group.
Configuring Channel-Group Timeslots
The ‘timeslots’ command configures an arbitrary sequence of timeslots for use in data transmission. The syntax
of the command accepts comma-separated groups of timeslots. A group can be a single timeslot or a range of
timeslots. The channel-group timeslots do not have to be contiguous. The ‘no’ form of the command releases
all previously selected timeslots.
Example:
>timeslots 1,4,6
>timeslots 1,4-6
>timeslots 1-3,4-6
Selects three timeslots (1, 4 an 6)
Selects four timeslots (1, 4, 5 and 6)
Selects six timeslots (1, 2, 3, 4, 5 and 6)
Mode: channel-group group-name
Step
1
Command
[name] (ch-grp)[group-name]#[no]
timeslots timeslots
Purpose
Selects the timeslots to be used.
Default: no timeslots
Configuring Channel-Group Encapsulation
The encapsulation command prepares the Channel Group for a specific application protocol. After the right
encapsulation type has been set, the configuration mode command for the selected protocol can be executed
for protocol specific configuration.
• hdlc: Enables HDLC Framing on the selected Channel Group. After encapsulation hdlc has been specified,
the hdlc configuration mode can be entered to configure hdlc specific parameters and to define the link
layer protocol must run over hdlc. The number of selected timeslots in the Channel Group also defines the
data transmission rate of the hdlc protocol (n * 64kBit/s).
• q921: This encapsulation type can only be chosen if on the Channel Group only one timeslot is selected. It
is NOT possible to bind multiple timeslots to the q921 protocol.
• rbs: Robbed Bit Signaling encapsulation is only available for T1 ports.
On specifying this encapsulation type, all the timeslots specified in the Channel Group will be bound to the
PRI port configuration task list
198
SmartWare Software Configuration Guide
16 • PRI port configuration
RBS protocol. Enter the RBS configuration mode for RBS specific configurations (see Chapter 20, “RBS
configuration” on page 225).
Mode: channel-group group-name
Step
1
Command
Purpose
[name] (ch-grp)[group-name]#[no] encap- Specifies the encapsulation type of the channelsulation {hdlc | q921 | rbs}
group. Default: no encapsulation
Entering HDLC Configuration Mode
The hdlc configuration mode can be entered either from the “port e1t1” configuration mode or from the
“channel-group” configuration mode. If you cannot enter the hdlc mode, it may be due to an invalid or incomplete configuration, and an error message will be issued. In “port e1t1” configuration mode, you only need to
set the encapsulation for ‘hdlc’ in order to enter the hdlc configuration mode. In “channel-group” configuration mode the encapsulation must be set to ‘hdlc’ as well followed by configuring at least one timeslot per the
‘timeslots’ command.
Mode: port e1t1
Step
1
Command
[name] (prt-e1t1)[slot/port]# hdlc
Purpose
Entering the hdlc configuration mode
Mode: channel-group
Step
1
Command
[name] (ch-grp)[group-name]#hdlc
Purpose
Entering the hdlc configuration mode
Configuring HDLC CRC-Type
This command specifies the length of the checksum for calculating the CRC of the hdlc-frame. It can be either
a 16-bit or a 32-bit checksum.
Mode: hdlc
Step
1
Command
[name] (hdlc)#crc-type {crc16 | crc32}
PRI port configuration task list
Purpose
Selects the checksum-type to be used.
Default: crc16
199
SmartWare Software Configuration Guide
16 • PRI port configuration
Configuring HDLC Encapsulation
The hdlc encapsulation command specifies what kinds of upper layer data are contained in the hdlc frames.
Two encapsulation types are available, framerelay and ppp. For more details see Chapter 15, “Frame Relay configuration” on page 177 and Chapter 30, “PPP configuration” on page 313.
Mode: hdlc
Step
1
Command
[name] (hdlc)#encapsulation {framerelay | ppp}
Purpose
Specifies the encapsulation type of hdlc.
Default: no encapsulation
PRI Debugging
For the investigation of possible problems in link establishment, data transmission or synchronization, there
exists a debug command with the options ‘event’ and ‘error’. The command has a hierarchical characteristic
and can be applied to all ports of given type on the whole device, or to all ports of slot or just to one specific
port.
PRI port configuration task list
200
SmartWare Software Configuration Guide
16 • PRI port configuration
Mode: Operator execution
Step
1
Command
[name]#[no] debug hw-type
[ ( [ | [] ] ) | [ [event] |
[error] ] ]
Purpose
Enables/Disables the PRI event/error monitor for the
device a slot or a port.
Examples:
1)[no] debug e1t1
Enables/Disables the event and the error monitor for
all e1t1 ports of the device.
2)[no] debug e1 event
Enables/Disables the event monitor for all e1 ports
of the device.
3)[no] debug t1 error
Enables/Disables the error monitor for all t1 ports of
the device.
4)[no] debug e1 3
Enables/Disables the event and error monitor for all
e1 ports on slot 3.
5)[no] debug e1t1 1 event
Enables/Disables the event monitor for all e1t1
ports on slot 1.
6)[no] debug t1 2 error
Enables/Disables the error monitor for all t1 ports
on slot 2.
7)[no] debug t1 0 0
Enables/Disables the event and error monitor for the
t1 port 0 on slot 0.
8)[no] debug e1 1 0 event
Enables/Disables the event monitor for the e1 port 0
on slot 1.
9)[no] debug e1t1 2 0 error
Enables/Disables the error monitor for the e1t1 port
0 on slot 2.
Mode: Operator execution
Step
1
Command
[name]#show port hw-type
[ [ ] | [detail ] ]
Purpose
Prints information about the specified port with a
given detail level.
PRI Configuration Examples
Here is a group of seven configuration examples.
• Example 1: ISDN
• Example 2: RBS without a channel-group
• Example 3: RBS with a channel-group
PRI port configuration task list
201
SmartWare Software Configuration Guide
16 • PRI port configuration
• Example 4: Frame Relay without a channel-group
• Example 5: Frame Relay with a channel-group
• Example 6: PPP without a channel-group
• Example 7: PPP with a channel-group
Example 1: ISDN
port e1t1 0 0
port-type t1
clock auto
linecode b8zs
framing esf
encapsulation q921
q921
uni-side auto
encapsulation q931
q931
protocol ni2
uni-side net
bchan-number-order ascending
encapsulation cc-isdn
bind interface pri00 switch
port e1t1 0 0
no shutdown
Example 2: RBS without a channel-group
port e1t1 0 0
port-type t1
clock master
linecode b8zs
framing esf
encapsulation rbs
rbs
protocol ground-start exchange
encapsulation cc-rbs
bind interface pri00 switch
port e1t1 0 0
no shutdown
Example 3: RBS with a channel-group
port e1t1 0 0
port-type t1
clock master
linecode b8zs
framing esf
encapsulation channelized
channel-group group_1_8
timeslots 1-8
encapsulation rbs
rbs
PRI port configuration task list
202
SmartWare Software Configuration Guide
16 • PRI port configuration
protocol eam-wink-start
encapsulation cc-rbs
bind interface pri00_1_8 switch
channel-group group_9_16
timeslots 9-16
encapsulation rbs
rbs
protocol ground-start exchange
encapsulation cc-rbs
bind interface pri00_9_16 switch
channel-group group_17_24
timeslots 17-24
encapsulation rbs
rbs
protocol eam-double-wink-start
encapsulation cc-rbs
bind interface pri00_17_24 switch
port e1t1 0 0
no shutdown
Example 4: Frame Relay without a channel-group
port e1t1 0 0
port-type e1
framing crc4
encapsulation hdlc
hdlc
encapsulation framerelay
framerelay
lmi-type itu
pvc 100
encapsulation rfc1490
bind interface pvc100 router
no shutdown
port e1t1 0 0
no shutdown
PRI port configuration task list
203
SmartWare Software Configuration Guide
16 • PRI port configuration
Example 5: Framerelay with a channel-group
port e1t1 0 0
port-type e1
framing crc4
encapsulation channelized
channel-group myGroup
timeslots 13-17
encapsulation hdlc
hdlc
encapsulation framerelay
framerelay
lmi-type itu
pvc 100
encapsulation rfc1490
bind interface pvc100 router
no shutdown
port e1t1 0 0
no shutdown
Example 6: PPP without a channel-group
port e1t1 0 0
port-type e1
framing crc4
encapsulation hdlc
hdlc
encapsulation ppp
bind interface myPPP router
port e1t1 0 0
no shutdown
Example 7: PPP with a channel-group
port e1t1 0 0
port-type e1
framing crc4
encapsulation channelized
channel-group yourGroup
timeslots 1,9,16,23
encapsulation hdlc
hdlc
encapsulation ppp
bind interface myPPP router
port e1t1 0 0
no shutdown
PRI port configuration task list
204
Chapter 17 BRI port configuration
Chapter contents
Introduction ........................................................................................................................................................206
BRI port configuration task list............................................................................................................................206
Enable/Disable BRI port ...............................................................................................................................206
Configuring BRI clock-mode ........................................................................................................................206
Configuring BRI Power-Feed ........................................................................................................................207
Configuring BRI encapsulation .....................................................................................................................207
Creating a channel group ..............................................................................................................................207
Configuring channel-group timeslots ............................................................................................................208
Configuring channel-group encapsulation .....................................................................................................208
Entering HDLC configuration mode ............................................................................................................208
Configuring HDLC encapsulation ................................................................................................................208
BRI Debugging .............................................................................................................................................209
BRI Configuration Examples ........................................................................................................................210
Example 1: ISDN with auto clock/uni-side settings ................................................................................210
Example 2: ISDN with manual clock/uni-side settings ............................................................................210
Example 3: Multi-Link PPP over two B-Channels ..................................................................................211
205
SmartWare Software Configuration Guide
17 • BRI port configuration
Introduction
This chapter provides an overview of the BRI (Basic Rate Interface) ports, their characteristics and the tasks
involved in the configuration. A BRI port supports two 64kbit/s B-channels for switched voice or data connections, one 16kbit/s D-channel for signaling and always-on data transfer. This results a usable data bit rate of
144kBit/s.
BRI port configuration task list
This section describes the configuration tasks for the BRI port.
• Enable/Disable BRI port
• Configuring BRI clock mode
• Configuring BRI Power-Feed
• Configuring BRI encapsulation
• BRI Debugging
Enable/Disable BRI port
By default, the BRI port is disabled. The following command is used for enabling or disabling it.
Mode: port bri
Step
1
Command
Purpose
[name] (prt-bri)[slot/port]# [no] shutdown Enable/Disable the selected port.
Default: shutdown (which is disabled)
Configuring BRI clock-mode
The BRI Port can either work in clock-master or in clock-slave mode. This setting defines the clock dependency of the internal data processing. In clock-master mode the internal data processing is running on an independent clock source. In clock-slave mode the clock source for internal data processing is recovered from the
receive line interface. Be aware that always a port-pair of clock-master and clock-slave are connected together.
In the other case the data transmission will fail due to bit failures. This command has also the option ‘auto’ that
can be used if the application running on the port is also of an asymmetric nature like master/slave, server/client or user/net. Normally, the option ‘auto’ is used if the port is setup for ISDN. In this case, the clock mode
will automatically derived from the Q.921 protocol. If the UNI-Side (User-Network Interface) of Q.921 is set
to ‘net’, then clock mode of the port is automatically set to ‘master’ and in the other case to ‘slave’.
Mode: port bri
Step
1
Command
[name] (prt-bri)[slot/port]# clock {auto |
master | slave}
Introduction
Purpose
Configures the clock-mode of the port.
Default: auto
206
SmartWare Software Configuration Guide
17 • BRI port configuration
Configuring BRI Power-Feed
Enables the application of power on the BRI port to provide power to ISDN terminals. This command applies
only if the port is clock master (network side). It is only available on products with an internal, configurable
ISDN power supply.
Mode: port bri
Step
1
Command
[name] (prt-bri)[slot/port]#[no] powerfeed
Purpose
Enables/Disables power-feed on the selected port.
Default: disabled
Configuring BRI encapsulation
The BRI encapsulation command prepares the port for a specific application protocol. After the right encapsulation type has been set, the configuration mode command for the selected protocol can be executed for protocol specific configuration.
• q921: This encapsulation type automatically binds the signaling timeslot of the selected port to the ISDN
Layer 2 protocol. For the BRI port this is the 16kbit/s D-channel. If in the q921 configuration mode q931
is specified as next encapsulation, the control of the two remaining timeslots (B-channels) is given to the
ISDN Layer 3 protocol. For more information please consult Chapter 19, “ISDN configuration” on
page 217.
• channelized: This special encapsulation type pushed the port in a mode where it is possible to setup an
application for a user-defined timeslot. Normally, all timeslots of a port are under full control of the application specified with the encapsulation command. In ‘channelized’ mode, and application uses only the
specified timeslot. If the encapsulation is set to ‘channelized’, use the channel-group command to create a
new Channel Group and to enter its configuration mode. The requested can then be selected with the
Channel Group’s encapsulation command.
Mode: port bri
Step
1
Command
[name] (prt-bri)[slot/port]#[no] encapsulation { channelized | q921}
Purpose
Specifies the encapsulation type of the BRI port.
Default: q921
Creating a channel group
If the desired encapsulated channel uses only a selected time slot (not the entire BRI), then it is necessary to set
up a channel-group. To create a channel-group, set the BRI port’s encapsulation to channelized. (See s“Configuring BRI encapsulation”.) On creating a new channel-group the channel-group configuration mode is immediately entered. To remove an existing channel-group, the ‘no’ form of the command must be used.
Mode: port bri