Ulterius Technologies FDN40 Multi Service Business Gateway User Manual Manual

Ulterius Technologies, LLC Multi Service Business Gateway Manual

Manual

ulteriustech
.com
FDN40
Configuration User Manual
FDN40ConfigUM/20160505
Version No: 2.0
Contents
CHAPTER 1: INTRODUCTION _______________________________________________ 21
1.1 PURPOSE AND SCOPE .................................................................................21
1.2 ACRONYMS ................................................................................................21
1.3 REFERENCES .............................................................................................23
1.4 DOCUMENT CONVENTIONS ..........................................................................23
1.5 GENERAL CONFIGURATIONS ........................................................................24
1.5.1 CLI Modes..............................................................................................24
1.5.2 SNMP Configurations ............................................................................24
CHAPTER 2: SYSTEM FEATURES ___________________________________________ 27
2.1 TOPOLOGIES ..............................................................................................27
2.2 SYSTEM FEATURES / CONFIGURATIONS .......................................................28
2.2.1 Configuring the Default IP Address .......................................................28
2.2.1.1 CLI Configuration ----------------------------------------------------------------- 28
2.2.1.2 WEB Configuration --------------------------------------------------------------- 29
2.2.2 Configuring IP address for an Interface .................................................30
2.2.2.1 CLI Configuration ----------------------------------------------------------------- 30
2.2.2.2 WEB Configuration --------------------------------------------------------------- 31
2.2.3 Configuring the Base MAC Address ......................................................32
2.2.3.1 CLI Configuration ----------------------------------------------------------------- 32
2.2.3.2 WEB Configuration --------------------------------------------------------------- 33
2.2.4 Configuring the Login Authentication Method........................................33
2.2.4.1 CLI Configuration ----------------------------------------------------------------- 33
2.2.4.2 Web Configuration --------------------------------------------------------------- 33
2.2.5 Configuring the Restoration File Name .................................................34
2.2.5.1 CLI Configuration ----------------------------------------------------------------- 34
2.2.5.2 Web Configuration --------------------------------------------------------------- 35
2.2.6 Saving the Current Configurations for Restoration ................................36
2.2.7 Erasing a Saved Configuration File .......................................................37
2.2.8 Copying System Logs into Remote Location .........................................38
2.2.8.1 Web Configuration --------------------------------------------------------------- 38
2.2.9 Copying a File from Remote Site/Flash to Remote Site/Flash ..............39
2.2.9.1 Web Configuration --------------------------------------------------------------- 39
2.2.10 Configuring the Default VLAN Identifier .................................................40
2.2.10.1 CLI Configuration ----------------------------------------------------------------- 40
2.2.10.2 WEB Configuration --------------------------------------------------------------- 41
2.2.11 Configuring Switch Clock .......................................................................41
2.2.11.1 CLI Configuration ----------------------------------------------------------------- 41
2.2.11.2 Web Configuration --------------------------------------------------------------- 41
2.2.12 Enabling/Disabling Console CLI through Serial Port .............................41
2.2.12.1 CLI Configuration ----------------------------------------------------------------- 41
2.2.12.2 WEB Configuration --------------------------------------------------------------- 42
2.2.13 Enabling/Disabling HTTP .......................................................................42
2.2.14 Configuring HTTP Port Number ............................................................42
2.2.14.1 CLI Configuration ----------------------------------------------------------------- 42
2.2.14.2 Web Configuration --------------------------------------------------------------- 43
2.2.15 Configuring HTTP Authentication scheme ............................................43
2.2.15.1 CLI Configuration ----------------------------------------------------------------- 43
2.2.15.2 WEB Configuration --------------------------------------------------------------- 45
2.2.16 Enabling/Disabling Trap Generation on an Interface ............................45
2.2.16.1 CLI Configuration ----------------------------------------------------------------- 45
2.2.16.2 WEB Configuration --------------------------------------------------------------- 46
2.2.17 Configuring an Interface as Switch Port/ Router Port ............................47
Configuration User Manual 4
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
2.2.17.1 CLI Configuration ----------------------------------------------------------------- 47
2.2.17.2 Web Configuration --------------------------------------------------------------- 47
2.2.18 Configuring Debug Logging ...................................................................48
2.2.18.1 CLI Configuration ----------------------------------------------------------------- 48
2.2.18.2 Web Configuration --------------------------------------------------------------- 48
2.2.19 Configuring ACL Filters ..........................................................................49
2.2.19.1 CLI Configuration ----------------------------------------------------------------- 49
2.2.19.2 WEB Configuration --------------------------------------------------------------- 51
2.2.19.2.1 IP Standard Access List ---------------------------------------------------- 51
2.2.19.2.2 MAC Access List ------------------------------------------------------------- 52
2.2.20 Software image upgradation ..................................................................53
2.2.20.1 Software image upgrade through CLI --------------------------------------- 53
2.2.20.1.1 Upgrade from R1_1_2 image to R1_1_3 ------------------------------- 53
2.2.20.1.2 Upgrade from R1_1_3 image to > R1_1_3 ---------------------------- 55
2.2.20.2 Software image upgrade through WEB ------------------------------------- 55
2.2.21 Setting default OOB IP for system(first time in a new board) ................57
2.2.21.1 CLI Configuration ----------------------------------------------------------------- 57
2.2.21.2 WEB Configuration --------------------------------------------------------------- 58
CHAPTER 3: DHCP SERVER ________________________________________________ 59
3.1 PROTOCOL DESCRIPTION ............................................................................59
3.2 TOPOLOGY .................................................................................................59
3.3 CONFIGURATION GUIDELINES ......................................................................59
3.4 DEFAULT CONFIGURATIONS ........................................................................60
3.5 DHCP CONFIGURATIONS ............................................................................60
3.5.1 Enabling DHCP server ...........................................................................60
3.5.1.1 CLI Configuration ----------------------------------------------------------------- 60
3.5.1.2 WEB Configuration --------------------------------------------------------------- 61
3.5.2 Configuring Offer Reuse Time Out ........................................................61
3.5.2.1 CLI Configuration ----------------------------------------------------------------- 61
3.5.2.2 WEB Configuration --------------------------------------------------------------- 62
3.5.3 Configuring DHCP Address Pools .........................................................62
3.5.3.1 Creating a DHCP Address Pool ----------------------------------------------- 62
3.5.3.2 Configuring End IP for the Pool ----------------------------------------------- 63
3.5.3.3 Configuring Lease Time -------------------------------------------------------- 63
3.5.3.4 Configuring Utilization Threshold --------------------------------------------- 64
3.5.3.5 WEB Configuration for DHCP Address Pool ------------------------------- 65
3.5.4 Creating an Excluded Address in the Pool ............................................65
3.5.4.1 CLI Configuration ----------------------------------------------------------------- 65
3.5.4.2 WEB Configuration --------------------------------------------------------------- 66
3.5.5 Configuring DHCP Pool Options ...........................................................66
3.5.5.1 Configuring a Domain Name Option ----------------------------------------- 66
3.5.5.2 Configuring DNS Option with Single IP Address -------------------------- 67
3.5.5.3 Configuring NTP Option with Two IP Addresses ------------------------- 68
3.5.5.4 Configuring Default Router ----------------------------------------------------- 69
3.5.5.5 Configuring Options Specific to Address Pools --------------------------- 70
3.5.5.6 WEB Configuration for DHCP Pool Options ------------------------------- 71
3.5.6 Configuring Host Specific Options .........................................................71
3.5.6.1 CLI Configuration ----------------------------------------------------------------- 71
CHAPTER 4: RIP __________________________________________________________ 73
4.1 PROTOCOL DESCRIPTION ............................................................................73
4.2 TOPOLOGY .................................................................................................74
4.3 CONFIGURATION GUIDELINES ......................................................................74
4.3.1 Configuration in FDN40-1 ......................................................................74
4.3.2 Configuration in FDN40-2 ......................................................................75
4.3.3 Configuration in FDN40-3 ......................................................................76
Configuration User Manual 5
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
4.4 DEFAULT CONFIGURATIONS ........................................................................76
4.5 RIP CONFIGURATIONS ................................................................................76
4.5.1 Enabling and Disabling RIP ...................................................................76
4.5.1.1 Enabling RIP ----------------------------------------------------------------------- 76
4.5.1.2 Disabling RIP ---------------------------------------------------------------------- 77
4.5.1.3 WEB Configuration --------------------------------------------------------------- 77
4.5.2 Enabling RIP on an IP Network .............................................................77
4.5.2.1 CLI Configuration ----------------------------------------------------------------- 78
4.5.2.2 WEB Configuration --------------------------------------------------------------- 78
4.5.3 Configuring RIP Security .......................................................................79
4.5.3.1 CLI Configuration ----------------------------------------------------------------- 79
4.5.3.2 WEB Configuration --------------------------------------------------------------- 80
4.5.4 Configuring RIP Packets Retransmission Interval and Retries Count ..80
4.5.4.1 CLI Configuration ----------------------------------------------------------------- 80
4.5.4.2 WEB Configuration --------------------------------------------------------------- 82
4.5.5 Configuring RIP Neighbor ......................................................................82
4.5.5.1 CLI Configuration ----------------------------------------------------------------- 82
4.5.5.2 WEB Configuration --------------------------------------------------------------- 83
4.5.6 Configuring RIP Passive Interface .........................................................83
4.5.6.1 CLI Configuration ----------------------------------------------------------------- 83
4.5.6.2 WEB Configuration --------------------------------------------------------------- 85
4.5.7 Configuring Output-delay .......................................................................85
4.5.7.1 CLI Configuration ----------------------------------------------------------------- 85
4.5.7.2 WEB Configuration --------------------------------------------------------------- 87
4.5.8 Configuring Redistribution .....................................................................87
4.5.8.1 CLI Configuration ----------------------------------------------------------------- 87
4.5.8.2 WEB Configuration --------------------------------------------------------------- 88
4.5.8.3 Sample Configuration to Test Redistribution ------------------------------ 88
4.5.9 Configuring Default-metric .....................................................................91
4.5.9.1 CLI Configuration ----------------------------------------------------------------- 91
4.5.9.2 WEB Configuration --------------------------------------------------------------- 91
4.5.9.3 Sample Configuration to Test Default-metric ------------------------------ 91
4.5.10 Configuring Auto-summary ....................................................................94
4.5.10.1 CLI Configuration ----------------------------------------------------------------- 94
4.5.10.2 WEB Configuration --------------------------------------------------------------- 96
4.5.11 Configuring Interface Specific RIP Parameters .....................................96
4.5.11.1 Configuring RIP Default Route Propagation ------------------------------- 96
4.5.11.2 Configuring to Install Default Route ------------------------------------------ 97
4.5.11.2.1 Sample Configuration to test Default Route Origination and
Installation --------------------------------------------------------------------- 97
4.5.11.3 Configuring Version for Receiving RIP Advertisement ----------------- 100
4.5.11.4 Configuring Version for Transmitting RIP Advertisement -------------- 101
4.5.11.5 Configuring Timer Basic ------------------------------------------------------- 102
4.5.11.6 Configuring RIP Split Horizon ------------------------------------------------ 103
4.5.11.7 WEB Configuration for RIP Interface Paramters ------------------------- 104
4.5.12 Configuring RIP Summary-address .....................................................105
4.5.12.1 CLI Configuration ---------------------------------------------------------------- 105
4.5.12.2 WEB Configuration -------------------------------------------------------------- 105
4.5.12.3 Sample Configuration to configure RIP summary-address ------------ 106
4.5.13 Configuring Interface Specific Authentication ......................................107
4.5.13.1 CLI Configuration ---------------------------------------------------------------- 107
4.5.13.2 WEB Configuration -------------------------------------------------------------- 108
4.5.13.3 Sample Configuration for Enabling Authentication ---------------------- 108
4.5.13.4 Sample Configuration for Enabling Crypto Authentication ------------ 110
4.5.14 Configuring Debug Level for RIP .........................................................113
4.5.15 Configuring Route Map RIP ..............................................................113
Configuration User Manual 6
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
4.5.15.1 Configuring Route Map -------------------------------------------------------- 114
4.5.15.1.1 CLI Configuration ------------------------------------------------------------ 114
4.5.15.1.2 WEB Configuration ---------------------------------------------------------- 114
4.5.15.2 Configuring Route Map Match Criteria ------------------------------------- 114
4.5.15.2.1 CLI Configuration ------------------------------------------------------------ 114
4.5.15.2.2 WEB Configuration ---------------------------------------------------------- 116
4.5.15.3 Configuring RIP Distance ------------------------------------------------------ 116
4.5.15.3.1 CLI Configuration ------------------------------------------------------------ 116
4.5.15.3.2 WEB Configuration ---------------------------------------------------------- 117
4.5.15.4 Configuring Redistribution with Route Map ------------------------------- 117
4.5.15.4.1 CLI Configuration ------------------------------------------------------------ 117
4.5.15.5 WEB Configuration -------------------------------------------------------------- 118
CHAPTER 5: VLAN _______________________________________________________ 119
5.1 PROTOCOL DESCRIPTION ..........................................................................119
5.2 TOPOLOGY ...............................................................................................120
5.3 CONFIGURATION GUIDELINES ....................................................................120
5.4 DEFAULT CONFIGURATIONS ......................................................................121
5.5 VLAN CONFIGURATIONS ...........................................................................121
5.5.1 Configuring Static VLAN ......................................................................121
5.5.1.1 CLI Configuration ---------------------------------------------------------------- 121
5.5.1.2 WEB Configuration -------------------------------------------------------------- 123
5.5.2 Deleting a VLAN ..................................................................................124
5.5.2.1 CLI Configuration ---------------------------------------------------------------- 124
5.5.2.2 Web Configuration -------------------------------------------------------------- 124
5.5.3 Enabling VLANs ...................................................................................124
5.5.4 Classifying Frames to a VLAN .............................................................124
5.5.4.1 Port Based Classification ------------------------------------------------------ 124
5.5.4.2 WEB Configuration -------------------------------------------------------------- 125
5.5.5 Configuring Port Filtering .....................................................................126
5.5.5.1 Configuring Acceptable Frametype ----------------------------------------- 126
CHAPTER 6: NAT ________________________________________________________ 129
6.1 TOPOLOGY ...............................................................................................129
6.2 CONFIGURATION GUIDELINES ....................................................................130
6.3 DEFAULT CONFIGURATIONS ......................................................................130
6.4 NAT CONFIGURATIONS .............................................................................130
6.4.1 Enabling and Disabling NAT on an Interface .......................................130
6.4.1.1 CLI Configuration ---------------------------------------------------------------- 130
6.4.1.2 WEB Configuration -------------------------------------------------------------- 131
6.4.2 Enabling and Disabling NAPT .............................................................132
6.4.2.1 CLI Configuration ---------------------------------------------------------------- 132
6.4.2.2 WEB Configuration -------------------------------------------------------------- 133
6.4.3 Configuring Static NAT and NAPT ......................................................134
6.4.3.1 CLI Configuration ---------------------------------------------------------------- 134
6.4.3.2 WEB Configuration -------------------------------------------------------------- 135
6.4.4 Configuring Dynamic NAT ...................................................................136
6.4.4.1 CLI Configuration ---------------------------------------------------------------- 137
6.4.4.2 WEB Configuration -------------------------------------------------------------- 138
6.4.5 Configuring Virtual Server ....................................................................138
6.4.5.1 CLI Configuration ---------------------------------------------------------------- 138
6.4.5.2 WEB Configuration -------------------------------------------------------------- 139
CHAPTER 7: IPSEC _______________________________________________________ 141
7.1 PROTOCOL DESCRIPTION ..........................................................................141
7.2 TOPOLOGY ...............................................................................................142
7.3 IPSEC CONFIGURATIONS ..........................................................................142
Configuration User Manual 7
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
7.3.1 Enabling VPN Module ..........................................................................142
7.3.1.1 CLI Configuration ---------------------------------------------------------------- 142
7.3.1.2 WEB Configuration -------------------------------------------------------------- 143
7.3.2 Configuring VPN IPSec Policy .............................................................143
7.3.2.1 Creating VPN Policy ------------------------------------------------------------ 143
7.3.2.2 Configuring VPN Policy Type ------------------------------------------------- 144
7.3.2.3 Configuring IPSec mode ------------------------------------------------------- 145
7.3.2.4 Configuring Peer Identity ------------------------------------------------------ 147
7.3.2.5 Configuring IPSec Session Keys -------------------------------------------- 148
7.3.2.6 Configuring Access List -------------------------------------------------------- 149
7.3.2.7 Binding of Policy ----------------------------------------------------------------- 150
7.3.2.8 Removing Policy from Interface ---------------------------------------------- 151
7.3.2.9 Deleting Policy ------------------------------------------------------------------- 152
7.3.2.10 WEB Configuration for IPSec VPN Policy Parameters ----------------- 152
7.3.3 Sample Configuration ..........................................................................154
CHAPTER 8: IKE _________________________________________________________ 157
8.1 PROTOCOL DESCRIPTION ..........................................................................157
8.1.1 IKEv1 ...................................................................................................157
8.1.1.1 Phase 1 Main/Aggressive --------------------------------------------------- 157
8.1.1.1.1 Main Mode -------------------------------------------------------------------- 157
8.1.1.1.2 Aggressive Mode ------------------------------------------------------------ 158
8.1.1.2 Phase 2 - Quick Mode ---------------------------------------------------------- 158
8.1.2 IKEv2 ...................................................................................................158
8.2 IKE CONFIGURATIONS ..............................................................................159
8.2.1 Importing and Deleting RSA Key .........................................................159
8.2.1.1 Importing a RSA Key ----------------------------------------------------------- 159
8.2.1.2 Deleting a RSA Key Pair ------------------------------------------------------- 159
8.2.2 Configuring Certificates .......................................................................159
8.2.2.1 Importing a Certificate ---------------------------------------------------------- 159
8.2.2.2 Deleting a Certificate ----------------------------------------------------------- 161
8.2.2.3 Importing a CA Certificate ----------------------------------------------------- 161
8.2.2.4 Deleting a CA Certificate ------------------------------------------------------ 163
8.2.2.5 Importing a Peer Certificate --------------------------------------------------- 164
8.2.2.6 Deleting Peer Certificate ------------------------------------------------------- 165
8.2.3 Configuring Remote Identity and Authentication Method ....................166
8.2.3.1 Authentication Method Preshered-Key ------------------------------------- 166
8.2.3.2 Authentication Method RSA Certificate ------------------------------------ 166
8.2.3.3 Deleting a Configured Remote Identity ------------------------------------- 167
8.2.3.4 WEB Configuration -------------------------------------------------------------- 167
8.2.4 Creating VPN Policy ............................................................................168
8.2.4.1 CLI Configuration ---------------------------------------------------------------- 168
8.2.4.2 WEB Configuration -------------------------------------------------------------- 169
8.2.5 Configuring VPN IKE Policy Parameters .............................................170
8.2.5.1 Configuring IKE Version ------------------------------------------------------- 170
8.2.5.2 Configuring Key Mode ---------------------------------------------------------- 170
8.2.5.2.1 Certificate Mode ------------------------------------------------------------- 170
8.2.5.2.2 Preshared Key Mode ------------------------------------------------------- 171
8.2.5.3 Configuring Peer IP ------------------------------------------------------------- 171
8.2.5.4 Configuring IPSec Mode ------------------------------------------------------- 172
8.2.5.4.1 Tunnel Mode------------------------------------------------------------------ 172
8.2.5.5 Configuring Remote Identity -------------------------------------------------- 172
8.2.5.6 Configuring Local Identity------------------------------------------------------ 173
8.2.5.7 Configuring Phase 1 Parameters -------------------------------------------- 174
8.2.5.7.1 For IKEv1 ---------------------------------------------------------------------- 175
8.2.5.7.2 For IKEv2 ---------------------------------------------------------------------- 176
Configuration User Manual 8
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
8.2.5.8 Configuring Phase 2 Parameters -------------------------------------------- 177
8.2.5.8.1 ESP Protocol with Integrity ------------------------------------------------ 177
8.2.5.9 Configuring Access-list --------------------------------------------------------- 178
8.2.5.9.1 Access-list for Tunnel Policy ---------------------------------------------- 178
8.2.5.10 Attaching the Policy to the Interface ---------------------------------------- 179
8.2.5.11 Removing the Policy from the Interface ------------------------------------ 179
8.2.5.12 Deleting the Policy -------------------------------------------------------------- 180
8.2.5.13 Web Configuration for VPN IKE Policy ------------------------------------- 180
8.2.6 Displaying the VPN Statistics ..............................................................182
8.2.6.1 CLI Configuration ---------------------------------------------------------------- 182
8.2.6.2 WEB Configuration -------------------------------------------------------------- 182
8.3 IKE EXAMPLES .........................................................................................183
8.3.1 General Configuration ..........................................................................183
8.3.2 Configuring IKEv1 - Tunnel Mode - Preshared key .............................183
8.3.2.1 DUT1 Configuration ------------------------------------------------------------- 184
8.3.2.2 DUT2 Configuration ------------------------------------------------------------- 186
CHAPTER 9: FIREWALL ___________________________________________________ 189
9.1 TOPOLOGY ...............................................................................................189
9.2 DEFAULT CONFIGURATIONS ......................................................................189
9.3 FIREWALL CONFIGURATIONS .....................................................................189
9.3.1 Enabling and Disabling Firewall Module ..............................................190
9.3.1.1 CLI Configuration ---------------------------------------------------------------- 190
9.3.1.2 WEB Configuration -------------------------------------------------------------- 190
9.3.2 Configuring Firewall Filters for IPv4 .....................................................191
9.3.2.1 CLI Configuration ---------------------------------------------------------------- 191
9.3.2.2 WEB Configuration -------------------------------------------------------------- 194
9.3.3 Configuring Firewall Access List ..........................................................196
9.3.3.1 CLI Configuration ---------------------------------------------------------------- 196
9.3.3.2 WEB Configuration -------------------------------------------------------------- 204
9.3.4 Configuring Zones ...............................................................................206
9.3.4.1 CLI Configuration ---------------------------------------------------------------- 206
9.3.4.2 WEB Configuration -------------------------------------------------------------- 207
CHAPTER 10: IPS-IDS ______________________________________________________ 209
10.1 209
10.2 TOPOLOGY ...............................................................................................209
10.3 DEFAULT CONFIGURATIONS ......................................................................209
10.4 IPS-IDS CONFIGURATIONS .......................................................................210
10.4.1 Enabling and Disabling IPS-IDS Module .............................................210
10.4.1.1 CLI Configuration ---------------------------------------------------------------- 210
10.4.1.2 WEB Configuration -------------------------------------------------------------- 210
10.4.2 Enabling and Disabling IDS Logging ...................................................211
10.4.2.1 CLI Configuration ---------------------------------------------------------------- 211
10.4.2.2 WEB Configuration -------------------------------------------------------------- 212
10.4.3 Configuring IDS Logging Size and Log Size Threshold ......................213
10.4.3.1 CLI Configuration ---------------------------------------------------------------- 213
10.4.3.2 WEB Configuration -------------------------------------------------------------- 214
10.4.4 Configuring IPS status in firewall access-list .......................................214
10.4.4.1 CLI Configuration ---------------------------------------------------------------- 214
10.4.4.2 WEB Configuration -------------------------------------------------------------- 218
10.4.5 Displaying IPS Categories and IPS Rules ...........................................220
10.4.5.1 CLI Configuration ---------------------------------------------------------------- 220
10.4.5.2 WEB Configuration -------------------------------------------------------------- 222
CHAPTER 11: POE ________________________________________________________ 223
11.1 PROTOCOL DESCRIPTION ..........................................................................223
Configuration User Manual 9
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
11.2 TOPOLOGY ...............................................................................................223
11.3 POE CONFIGURATIONS ............................................................................224
11.3.1 Enabling POE Module .........................................................................224
11.3.1.1 CLI Configuration ---------------------------------------------------------------- 224
11.3.1.2 WEB Configuration -------------------------------------------------------------- 225
11.3.2 Enabling POE on port ..........................................................................225
11.3.2.1 CLI Configuration ---------------------------------------------------------------- 225
11.3.2.2 WEB Configuration -------------------------------------------------------------- 226
11.3.3 To apply power to a POE device .........................................................227
11.3.3.1 CLI Configuration ---------------------------------------------------------------- 227
11.3.3.2 WEB Configuration -------------------------------------------------------------- 228
11.3.4 To view the PSE status ........................................................................228
11.3.4.1 CLI Configuration ---------------------------------------------------------------- 228
11.3.4.2 WEB Configuration -------------------------------------------------------------- 229
CHAPTER 12: WI-FI ________________________________________________________ 231
12.1 TOPOLOGY ...............................................................................................231
12.2 CONFIGURATION GUIDELINES ....................................................................232
12.3 WI-FI CONFIGURATIONS ............................................................................232
12.3.1 Enabling WiFi interfaces ......................................................................232
12.3.1.1 CLI Configuration ---------------------------------------------------------------- 232
12.3.1.2 WEB Configuration -------------------------------------------------------------- 233
12.3.2 Disabling Wi-Fi interface ......................................................................233
12.3.2.1 CLI Configuration ---------------------------------------------------------------- 233
12.3.2.2 WEB Configuration -------------------------------------------------------------- 234
12.3.3 VAP creation and VLAN association ...................................................235
12.3.3.1 CLI Configuration ---------------------------------------------------------------- 235
12.3.3.2 WEB Configuration -------------------------------------------------------------- 236
12.3.3.2.1 VAP (SSID) Creation ------------------------------------------------------- 236
12.3.3.2.2 VLAN Association with VAP ---------------------------------------------- 237
12.3.3.2.3 SSID Summary -------------------------------------------------------------- 237
12.3.4 VAP deletion ........................................................................................237
12.3.4.1 CLI Configuration ---------------------------------------------------------------- 237
12.3.4.2 WEB Configuration -------------------------------------------------------------- 238
12.3.5 Rate-limit Configurations .....................................................................238
12.3.5.1 CLI Configurations -------------------------------------------------------------- 238
12.3.5.2 WEB Configuration -------------------------------------------------------------- 239
12.3.6 Configuring Mac-Filtering for VAP .......................................................240
12.3.6.1 CLI Configuration ---------------------------------------------------------------- 240
12.3.6.2 WEB Configuration -------------------------------------------------------------- 241
12.3.7 Configuring Authentication Algorithms for VAP ...................................241
12.3.7.1 CLI Configuration ---------------------------------------------------------------- 241
12.3.7.1.1 Open Authentication -------------------------------------------------------- 241
12.3.7.1.2 WEP Authentication -------------------------------------------------------- 242
12.3.7.1.3 WPA2 PSK AUTHENTICATION ----------------------------------------- 243
12.3.7.2 WEB Configuration -------------------------------------------------------------- 243
12.4 DISPLAYING THE CONFIGURATIONS ...........................................................244
12.5 WI-FI CLIENT ASSOCIATION ......................................................................246
12.5.1 CLI Configuration .................................................................................246
12.5.2 WEB Configuration ..............................................................................247
CHAPTER 13: NTP _________________________________________________________ 249
13.1 PROTOCOL DESCRIPTION ..........................................................................249
13.2 TOPOLOGY ...............................................................................................250
13.3 CONFIGURATION GUIDELINES ....................................................................250
13.4 DEFAULT CONFIGURATIONS ......................................................................250
13.5 NTP CONFIGURATIONS .............................................................................251
Configuration User Manual 10
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
13.5.1 Configuring NTP system ......................................................................251
13.5.1.1 Enabling the NTP system------------------------------------------------------ 251
13.5.1.2 Disabling the NTP system ----------------------------------------------------- 251
13.5.1.3 Configuring the NTP Client Mode ------------------------------------------- 252
13.5.1.4 2.WEB Configuration ----------------------------------------------------------- 252
13.5.1.4.1 Enabling/ Disabling NTP --------------------------------------------------- 252
13.5.1.4.2 Configuring NTP Client Mode -------------------------------------------- 253
13.5.2 Configuring NTP Server .......................................................................253
13.5.2.1 CLI Configuration ---------------------------------------------------------------- 253
13.5.2.2 Web Configuration -------------------------------------------------------------- 254
CHAPTER 14: QOS ________________________________________________________ 257
14.1 PROTOCOL DESCRIPTION ..........................................................................257
14.2 TOPOLOGY ...............................................................................................257
14.3 CONFIGURATION GUIDELINES ....................................................................258
14.4 DEFAULT CONFIGURATIONS ......................................................................258
14.5 QOS CONFIGURATIONS.............................................................................258
14.5.1 Configuring QoS Subsystem ...............................................................258
14.5.1.1 Enabling the QoS Subsystem ------------------------------------------------ 258
14.5.1.2 Disabling the QoS Subsystem ------------------------------------------------ 259
14.5.1.3 Making the QoS Subsystem Up ---------------------------------------------- 259
14.5.1.4 WEB Configuration -------------------------------------------------------------- 260
14.5.2 Configuring Rate-Limiting at Port level (Ingress port-rate limiting) ......260
14.5.2.1 CLI Configuration ---------------------------------------------------------------- 260
14.5.2.2 WEB Configuration -------------------------------------------------------------- 260
14.5.3 Configuring Storm-Control at Port level (Ingress port-storm control) ..261
14.5.3.1 CLI Configuration ---------------------------------------------------------------- 261
14.5.3.2 WEB Configuration -------------------------------------------------------------- 261
14.5.4 Configuring Per Queue Shaping (Egress per- port per- queue shaping)
.............................................................................................................262
14.5.4.1 CLI Configuration ---------------------------------------------------------------- 262
14.5.4.2 WEB Configuration -------------------------------------------------------------- 263
14.5.4.2.1 Shape Template ------------------------------------------------------------- 263
14.5.4.2.2 Queue Table ------------------------------------------------------------------ 264
14.5.5 Configuring Queue Template ..............................................................264
14.5.5.1 CLI Configuration ---------------------------------------------------------------- 264
14.5.5.2 WEB Configuration -------------------------------------------------------------- 265
14.5.5.2.1 QueueTemplate-------------------------------------------------------------- 265
14.5.5.2.2 Queue Table ------------------------------------------------------------------ 266
14.5.6 Configuring Queue Map .......................................................................266
14.5.6.1 CLI Configuration ---------------------------------------------------------------- 266
14.5.6.2 WEB Configuration -------------------------------------------------------------- 267
14.5.6.2.1 QueueTemplate-------------------------------------------------------------- 267
14.5.7 Configuring Scheduler .........................................................................267
14.5.7.1 CLI Configuration ---------------------------------------------------------------- 267
14.5.7.2 WEB Configuration -------------------------------------------------------------- 268
CHAPTER 15: OSPF _______________________________________________________ 269
15.1 PROTOCOL DESCRIPTION ..........................................................................269
15.2 TOPOLOGY ...............................................................................................270
15.3 CONFIGURATION GUIDELINES ....................................................................271
15.3.1 Configuration in FDN40-1 ....................................................................271
15.3.2 Configuration in FDN40-2 ....................................................................271
15.3.3 Configuration in FDN40-3 ....................................................................272
15.3.4 Configuration in FDN40-4 ....................................................................273
15.3.5 Configuration in FDN40-5 ....................................................................273
15.3.6 Configuration in FDN40-6 ....................................................................274
Configuration User Manual 11
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
15.3.7 Configuration in FDN40-7 ....................................................................275
15.3.8 Configuration in FDN40-6 ....................................................................275
15.3.9 Configuration in FDN40-9 ....................................................................276
15.4 DEFAULT CONFIGURATIONS ......................................................................276
15.5 OSPF CONFIGURATIONS ..........................................................................279
15.5.1 Enabling and Disabling OSPF .............................................................279
15.5.1.1 CLI Configuration ---------------------------------------------------------------- 279
15.5.1.2 WEB Configuration -------------------------------------------------------------- 279
15.5.2 Configuring Router-id ...........................................................................280
15.5.2.1 CLI Configuration ---------------------------------------------------------------- 280
15.5.2.2 WEB Configuration -------------------------------------------------------------- 280
15.5.3 Configuring OSPF Interface .................................................................281
15.5.3.1 CLI Configuration ---------------------------------------------------------------- 281
15.5.3.2 WEB Configuration -------------------------------------------------------------- 283
15.5.4 Configuring OSPF Interface Parameters .............................................284
15.5.4.1 CLI Configuration ---------------------------------------------------------------- 284
15.5.4.2 WEB Configuration -------------------------------------------------------------- 284
15.5.5 Configuring OSPF Interface Priority ....................................................284
15.5.5.1 CLI Configuration ---------------------------------------------------------------- 284
15.5.5.2 WEB Configuration -------------------------------------------------------------- 285
15.5.6 Configuring LSA Retransmission Level ...............................................285
15.5.6.1 CLI Configuration ---------------------------------------------------------------- 285
15.5.6.2 WEB Configuration -------------------------------------------------------------- 286
15.5.7 Configuring Hello Interval ....................................................................286
15.5.7.1 CLI Configuration ---------------------------------------------------------------- 286
15.5.7.2 WEB Configuration -------------------------------------------------------------- 286
15.5.8 Configuring Dead Interval ....................................................................286
15.5.8.1 CLI Configuration ---------------------------------------------------------------- 287
15.5.8.1 WEB Configuration -------------------------------------------------------------- 287
15.5.9 Configuring Network Type ...................................................................287
15.5.10 Configuring Interface Cost ...................................................................287
15.5.10.1 CLI Configuration ---------------------------------------------------------------- 287
15.5.10.2 WEB Configuration -------------------------------------------------------------- 288
15.5.11 Configuring OSPF Authentication ........................................................288
15.5.11.1 Configuring Simple Password Authentication ---------------------------- 289
15.5.11.1.1 CLI Configuration ------------------------------------------------------------ 289
15.5.11.1.2 WEB Configuration ---------------------------------------------------------- 291
15.5.11.2 Configuring Message-Digest Authentication ------------------------------ 292
15.5.11.2.1 CLI Configuration ------------------------------------------------------------ 292
15.5.11.2.2 WEB Configuration ---------------------------------------------------------- 293
15.5.11.3 Configuring Message-Digest with key constants ------------------------ 294
15.5.11.3.1 CLI Configuration ------------------------------------------------------------ 294
15.5.11.3.2 WEB Configuration ---------------------------------------------------------- 295
15.5.11.4 Configuring NULL Authentication -------------------------------------------- 295
15.5.11.4.1 CLI Configuration ------------------------------------------------------------ 295
15.5.11.4.2 WEB Configuration ---------------------------------------------------------- 296
15.5.12 Configuring Passive Interface ..............................................................296
15.5.12.1 CLI Configuration ---------------------------------------------------------------- 296
15.5.12.2 WEB Configuration -------------------------------------------------------------- 298
15.5.13 Configuring OSPF Area Parameters ...................................................298
15.5.13.1 Configuring Stub Area ---------------------------------------------------------- 298
15.5.13.1.1 CLI Configuration ------------------------------------------------------------ 299
15.5.13.1.2 WEB Configuration ---------------------------------------------------------- 299
15.5.13.2 Configuring ASBR Router ----------------------------------------------------- 300
15.5.13.2.1 CLI Configuration ------------------------------------------------------------ 300
15.5.13.2.2 WEB Configuration ---------------------------------------------------------- 300
Configuration User Manual 12
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
15.5.13.3 Configuring Redistribution ----------------------------------------------------- 300
15.5.13.3.1 CLI Configuration ------------------------------------------------------------ 300
15.5.13.3.2 WEB Configuration ---------------------------------------------------------- 307
15.5.13.4 Configuring NSSA Area -------------------------------------------------------- 307
15.5.13.4.1 CLI Configuration ------------------------------------------------------------ 307
15.5.13.4.2 WEB Configuration ---------------------------------------------------------- 307
15.5.13.5 Configuring Summary Address ----------------------------------------------- 307
15.5.13.5.1 CLI Configuration ------------------------------------------------------------ 307
15.5.13.5.2 WEB Configuration ---------------------------------------------------------- 308
15.5.13.6 Configuring Area-default Cost ------------------------------------------------ 309
15.5.13.6.1 CLI Configuration ------------------------------------------------------------ 309
15.5.13.6.2 WEB Configuration ---------------------------------------------------------- 317
15.5.13.7 Configuring NSSA asbr-default-route translator ------------------------- 318
15.5.13.7.1 CLI Configuration ------------------------------------------------------------ 318
15.5.13.7.2 WEB Configuration ---------------------------------------------------------- 318
15.5.13.8 Configuring NSSA Area Translation Role --------------------------------- 318
15.5.13.8.1 CLI Configuration ------------------------------------------------------------ 318
15.5.13.8.2 WEB Configuration ---------------------------------------------------------- 319
15.5.13.9 Configuring Stability Interval for NSSA ------------------------------------- 319
15.5.13.9.1 CLI Configuration ------------------------------------------------------------ 319
15.5.13.9.2 WEB Configuration ---------------------------------------------------------- 320
15.5.13.10 Configuring ABR-Type ----------------------------------------------------- 320
15.5.13.10.1 CLI Configuration ------------------------------------------------------------ 320
15.5.13.10.2 WEB Configuration ---------------------------------------------------------- 321
15.5.13.11 Configuring RFC 1583 Compatibility ----------------------------------- 321
15.5.13.11.1 CLI Configuration ------------------------------------------------------------ 321
15.5.13.11.2 WEB Configuration ---------------------------------------------------------- 321
15.5.13.12 Configuring Default-information Originate Always ------------------ 322
15.5.13.12.1 CLI Configuration ------------------------------------------------------------ 322
15.5.13.12.2 WEB Configuration ---------------------------------------------------------- 322
15.5.13.13 Configuring Redist-Config ------------------------------------------------ 322
15.5.13.13.1 CLI Configuration ------------------------------------------------------------ 322
15.5.13.13.2 WEB Configuration ---------------------------------------------------------- 328
15.5.13.14 Configuring Neighbor ------------------------------------------------------ 329
15.5.13.14.1 CLI Configuration ------------------------------------------------------------ 329
15.5.13.14.2 WEB Configuration ---------------------------------------------------------- 330
15.5.13.15 Configuring Virtual link ----------------------------------------------------- 330
15.5.13.15.1 CLI Configuration ------------------------------------------------------------ 330
15.5.13.15.2 WEB Configuration ---------------------------------------------------------- 331
15.5.13.16 Configuring Area-range --------------------------------------------------- 331
15.5.13.16.1 CLI Configuration ------------------------------------------------------------ 331
15.5.13.16.2 WEB Configuration ---------------------------------------------------------- 336
15.5.14 Configuring Route Map - OSPF ...........................................................336
15.5.14.1 Configuring Route Map -------------------------------------------------------- 336
15.5.14.1.1 CLI Configuration ------------------------------------------------------------ 336
15.5.14.1.2 WEB Configuration ---------------------------------------------------------- 337
15.5.14.2 Configuring Route Map Match Criteria ------------------------------------- 337
15.5.14.2.1 CLI Configuration ------------------------------------------------------------ 337
15.5.14.2.2 WEB Configuration ---------------------------------------------------------- 338
15.5.14.3 Configuring OSPF Distance --------------------------------------------------- 338
15.5.14.3.1 CLI Configuration ------------------------------------------------------------ 338
15.5.14.3.2 WEB Configuration ---------------------------------------------------------- 339
15.5.14.4 Configuring Redistribution with Route Map ------------------------------- 339
15.5.14.4.1 CLI Configuration ------------------------------------------------------------ 339
15.5.14.4.2 WEB Configuration ---------------------------------------------------------- 340
15.5.14.5 Topology Configuration for OSPF Testing--------------------------------- 340
Configuration User Manual 13
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
15.5.14.6 Redistribution Topology -------------------------------------------------------- 344
15.5.14.6.1 Redistribution Interface Configuration ---------------------------------- 345
15.5.14.6.2 Redistribution Protocol Configuration ---------------------------------- 345
15.5.14.7 OSPF Inbound Filtering with Route Map ---------------------------------- 349
15.5.14.7.1 Interface Configuration ----------------------------------------------------- 349
15.5.14.7.2 Protocol Configuration ----------------------------------------------------- 350
CHAPTER 16: DHCP RELAY AGENT __________________________________________ 355
16.1 PROTOCOL DESCRIPTION ..........................................................................355
16.2 TOPOLOGY ...............................................................................................356
16.3 CONFIGURATION GUIDELINES ....................................................................356
16.4 DEFAULT CONFIGURATIONS ......................................................................356
16.5 ENABLING DHCP RELAY ...........................................................................357
16.5.1.1 CLI Configuration ---------------------------------------------------------------- 357
16.5.1.2 WEB Configuration -------------------------------------------------------------- 358
16.6 CONFIGURING A DHCP SERVER ADDRESS ................................................358
16.6.1.1 CLI Configuration ---------------------------------------------------------------- 358
16.6.1.2 WEB Configuration -------------------------------------------------------------- 359
16.7 ENABLING RELAY AGENT INFORMATION .....................................................359
16.7.1.1 CLI Configuration ---------------------------------------------------------------- 359
16.7.1.2 WEB Configuration -------------------------------------------------------------- 360
16.8 CONFIGURING RELAY AGENT SUB-OPTIONS ...............................................360
16.8.1.1 CLI Configuration ---------------------------------------------------------------- 360
16.8.1.2 WEB Configuration -------------------------------------------------------------- 361
16.9 ENABLING TRACES FOR DHCP RELAY .......................................................361
16.10 ACQUIRING IP FROM A SERVER RESIDING OUTSIDE THE CLIENT NETWORK .362
CHAPTER 17: RAVPN ______________________________________________________ 369
17.1 PROTOCOL DESCRIPTION ..........................................................................369
17.2 TOPOLOGY ...............................................................................................370
17.3 RAVPN CONFIGURATIONS ........................................................................370
17.3.1 Enabling VPN Module ..........................................................................370
17.3.1.1 CLI Configuration ---------------------------------------------------------------- 370
17.3.1.2 WEB Configuration -------------------------------------------------------------- 371
17.3.2 Configuring pool IP address ................................................................371
17.3.2.1 CLI Configuration ---------------------------------------------------------------- 371
17.3.2.2 WEB Configuration -------------------------------------------------------------- 372
17.3.3 Configuring RAVPN Policy Type .........................................................372
17.3.3.1 CLI Configuration ---------------------------------------------------------------- 372
17.3.3.2 WEB Configuration -------------------------------------------------------------- 373
17.3.4 Configuring IPSec mode ......................................................................374
17.3.4.1 CLI Configuration ---------------------------------------------------------------- 374
17.3.5 Configuring Peer Identity .....................................................................375
17.3.5.1 CLI Configuration ---------------------------------------------------------------- 375
17.3.5.2 WEB Configuration -------------------------------------------------------------- 376
17.3.6 Configuring IPSec Session Keys .........................................................377
17.3.6.1 CLI Configuration ---------------------------------------------------------------- 377
17.3.6.2 WEB Configuration -------------------------------------------------------------- 378
17.3.7 Configuring Access List .......................................................................379
17.3.7.1 CLI Configuration ---------------------------------------------------------------- 379
17.3.7.2 WEB Configuration -------------------------------------------------------------- 380
17.3.8 Binding of Policy ..................................................................................380
17.3.8.1 CLI Configuration ---------------------------------------------------------------- 380
17.3.8.2 WEB Configuration -------------------------------------------------------------- 381
17.3.9 Removing Policy from Interface ...........................................................382
17.3.9.1 CLI Configuration ---------------------------------------------------------------- 382
17.3.9.2 WEB Configuration -------------------------------------------------------------- 383
Configuration User Manual 14
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
17.3.10 Deleting Policy .....................................................................................383
17.3.10.1 CLI Configuration ---------------------------------------------------------------- 383
17.3.10.2 WEB Configuration -------------------------------------------------------------- 383
17.3.11 Sample Configuration ..........................................................................385
17.3.11.1 RAVPN Server Configuration ------------------------------------------------- 386
Configuration User Manual 15
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Figures
Figure 6-1: Configuration for Basic System Features ................................................................................. 27
Figure 6-2: Configuration for Advanced System Features .......................................................................... 27
Figure 7-1: DHCP - Topology 1 ................................................................................................................... 59
Figure 13-1: RIP Topology 1 ....................................................................................................................... 74
Figure 13-2: RIP Topology 2 ....................................................................................................................... 74
Figure 16-1: Topology for VLAN Configuration ......................................................................................... 120
Figure 17-1 - NAT Topology ...................................................................................................................... 129
Screen 17-3: Static NAT and NAPT .......................................................................................................... 136
Figure 18-1: IPSec Topology ..................................................................................................................... 142
Figure 18-2: Topology Diagram for Sample IPSec Configuration ............................................................. 154
Figure 19-1: IKE Topology ......................................................................................................................... 183
Figure 20-1: Firewall Topology .................................................................................................................. 189
Figure 20-5: IPS Topology ......................................................................................................................... 209
Screen 20-7: IPS Basic Settings - Disabling IPS-IDS global status .......................................................... 211
Screen 20-14: Firewall Access List View IPS status .............................................................................. 220
Figure 21-1: Wi-Fi Topology ...................................................................................................................... 231
Figure 22-1: NTP Topology ....................................................................................................................... 250
Figure 23-1: QOS Topology ...................................................................................................................... 257
Figure 24-1: OSPF Topology ..................................................................................................................... 270
Screen 24-2: OSPF Basic Settings ........................................................................................................... 281
Figure 24-2: Topology For Testing Authentication .................................................................................... 289
Figure 24-3: Topology For Configuration of stub area, ASBR and route redistribution ............................ 301
Figure 24-4: Topology For NSSA, summary address and area-default Cost Configuration ..................... 310
Figure 24-5: Topology For testing default-information originate always and redist-config ........................ 323
Figure 24-6: Topology For testing virtual link and route summarization ................................................... 332
Figure 24-7: Topology Configuration for OSPF Testing ............................................................................ 340
Figure 24-8: Redistribution Topology Configuration .................................................................................. 345
Figure 24-9: Distribute-list In Topology Configurations ............................................................................. 349
Figure 29-1: DHCP Topology ................................................................................................................. 356
Figure 30-1: RAVPN - Topology ................................................................................................................ 370
Screen 30-1: VPN Policy - VPN Module Status ........................................................................................ 371
Screen 30-2: RAVPN Pool IP Address configuration ................................................................................ 372
Screen 30-3: RAVPN Policy Type Configuration ...................................................................................... 374
Screen 30-4: Peer Identity Configuration .................................................................................................. 377
Screen 30-5: IPSec Session Keys Configuration ...................................................................................... 379
Screen 30-6: Access List Configuration .................................................................................................... 380
Screen 30-7: Binding of Policy .................................................................................................................. 382
Screen 30-8: Removal of Policy from Interface ......................................................................................... 383
Screen 30-9: Deleting Policy ..................................................................................................................... 384
Figure 30-2: RAVPN Topology Sample Configuration ........................................................................... 385
Configuration User Manual 17
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Web Screens List
Screen 2-1: Factory Default Settings ........................................................................................................... 30
Screen 2-2: IPv4 Interface Setings .............................................................................................................. 31
Screen 2-3: System Information- Login Authentication ............................................................................... 34
Screen 2-4: Restore Configuration .............................................................................................................. 36
Screen 2-5: Log Transfer ............................................................................................................................. 39
Screen 2-6: Log Transfer ............................................................................................................................. 39
Screen 2-7: HTTP Configuration ................................................................................................................. 45
Screen 2-8: Port Basic Settings ................................................................................................................... 47
Screen 2-9: IP Standard ACL Configuration ............................................................................................... 52
Screen 2-10: MAC ACL Configuration ......................................................................................................... 52
Screen 2-11: Image Upgradation using normal ........................................................................................... 56
Screen 2-12: Image Upgradation using FallBack ........................................................................................ 57
Screen 2-13: IP Erase configuration ............................................................................................................ 58
Screen 3-1: DHCP Basic Settings ............................................................................................................... 61
Screen 3-2: DHCP Pool Settings ................................................................................................................. 65
Screen 3-3: DHCP Server IP Exclude Setings ............................................................................................ 66
Screen 3-4: DHCP Pool Options Settings ................................................................................................... 71
Screen 4-1: RIP VRF Creation .................................................................................................................... 77
Screen 4-2: RIP Interface ............................................................................................................................ 79
Screen 4-3: RIP Basic Settings ................................................................................................................... 80
Screen 4-4: RIP Neighbour List ................................................................................................................... 83
Screen 4-5: RIP Interface - Passive ............................................................................................................ 85
Screen 4-6: RRD RIP Configuration ............................................................................................................ 88
Screen 4-7: RIP Interface - Parameters .................................................................................................... 105
Screen 4-8: RIP Interface Specific Address Summarization ..................................................................... 106
Screen 4-9: RIP Security Settings ............................................................................................................. 108
Screen 4-10: RouteMap Creation .............................................................................................................. 114
Screen 4-11: RouteMap Match .................................................................................................................. 116
Screen 5-1: Static VLAN Configuration ..................................................................................................... 124
Screen 5-2: VLAN Port Settings ................................................................................................................ 126
Screen 6-1: Interface NAT Settings screen - NAT Status ......................................................................... 132
Screen 6-2: Interface NAT Settings screen - NAPT Status ....................................................................... 134
Screen 6-4: Address Pool screen .............................................................................................................. 138
Screen 6-5: Virtual Server Configuration ................................................................................................... 139
Screen 7-1: VPN Policy - VPN Module Status .......................................................................................... 143
Screen 7-2: VPN IPSec ............................................................................................................................. 153
Screen 8-1: VPN Global Setings ............................................................................................................... 167
Screen 8-2: VPN Policy ............................................................................................................................. 169
Screen 8-3: VPN IKE ................................................................................................................................. 181
Screen 8-4: VPN Statistics ........................................................................................................................ 182
Firewall Configurations .............................................................................................................................. 189
Screen 9-1: Firewall Basic Settings ........................................................................................................... 191
Screen 9-2: Firewall Filter Configuration ................................................................................................... 195
Screen 9-3: Firewall - ACL Configuration .................................................................................................. 205
Screen 9-4: Firewall Interface Configuration ............................................................................................. 208
Screen 10-1: IPS Basic Settings - Enabling IPS-IDS global status ........................................................... 211
Screen 10-2: IPS Basic Settings - Disabling IPS-IDS global status .......................................................... 211
Screen 10-3: IPS Basic Settings - Enabling IDS logging status ................................................................ 212
Screen 10-4: IPS Basic Settings - Disabling IDS logging status ............................................................... 213
Screen 10-5: IPS Basic Settings - Configure IDS logging file size ............................................................ 214
Screen 10-6: IPS Basic Settings - Disabling IDS logging status ............................................................... 214
Screen 10-7: Firewall Access List - Configure IPS status as enabled ...................................................... 219
Configuration User Manual 18
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 10-8: Firewall Access List - Configure IPS status as disabled ...................................................... 219
To view IPS status in the firewall access-list ............................................................................................. 219
Screen 10-9: Firewall Access List View IPS status ................................................................................ 220
Screen 10-10: IPS Signature Display signatures for not-suspicious category ....................................... 222
Screen 11-1: POE Basic Settings .............................................................................................................. 225
Screen 11-2: POE Port Configuration ....................................................................................................... 227
Screen 11-3: POE Port Configuration ....................................................................................................... 228
Screen 11-4: PSE Configuration ............................................................................................................... 229
Screen 12-1: AP RadioSettings - Enabling Radio Interfaces .................................................................... 233
Screen 12-2: AP RadioSettings - Disabling Wi-Fi Interface ...................................................................... 234
Screen 12-3: AP RadioSettings - Creating VAP (SSID) ............................................................................ 236
Screen 12-4: VAP ...................................................................................................................................... 237
Screen 12-5: SSID Summary .................................................................................................................... 237
Screen 12-6: AP RadioSettings - Deleting VAP (SSID) ............................................................................ 238
Screen 12-7: Rate Limit ............................................................................................................................. 239
Screen 12-8: VAP - MAC Filtering ............................................................................................................. 241
Screen 12-9: VAP Authentication with WEP .......................................................................................... 244
Screen 12-10: AP Radio Statistics ............................................................................................................ 247
Screen 13-1: NTP Basic Settings .............................................................................................................. 253
Screen 13-2: NTP Client Mode .................................................................................................................. 253
Screen 13-3: NTP Server Configurations .................................................................................................. 255
Screen 14-1: QoS Basic Settings .............................................................................................................. 260
Screen 14-2: Ingress Rate Limiting ........................................................................................................... 261
Screen 14-3: Storm-Control ....................................................................................................................... 262
Screen 14-4: Shape Template Configurations .......................................................................................... 264
Screen 14-5: Queue Configurations .......................................................................................................... 264
Screen 14-10: QueueTemplate Configurations ......................................................................................... 266
Screen 14-11: Queue Configurations ........................................................................................................ 266
Screen 14-12: Queue Map Configurations ................................................................................................ 267
Screen 14-6: Scheduler Configurations..................................................................................................... 268
Screen 15-1: OSPF VRF Creation ............................................................................................................ 279
Screen 15-3: OSPF Interface Configuration .............................................................................................. 283
Screen 15-4: OSPF Area Configuration .................................................................................................... 299
Screen 15-5: OSPF Area Aggregation ...................................................................................................... 309
Screen 15-6: OSPF RRD Route Configuration ......................................................................................... 329
Screen 15-7: OSPF Virtual Interface Configuration .................................................................................. 331
Screen 16-1: DHCP Relay Configuration .................................................................................................. 358
Screen 16-2: DHCP Relay Interface Configuration ................................................................................... 361
Configuration User Manual 19
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Tables
Table 1-1- Acronyms used in the Document ............................................................................................... 21
Table 1-2: Document Conventions .............................................................................................................. 23
Table 1-3: General Configurations .............................................................................................................. 24
Table 7-1: Default Configurations ................................................................................................................ 60
Table 16-1: Default Configurations ............................................................................................................ 121
Table 20-1: IPv4 Addresses of Interfaces and Hosts ................................................................................ 189
Table 20-1: IPv4 Addresses of Interfaces and Hosts ................................................................................ 209
Table 21-1: Wi-Fi Topology Description .................................................................................................... 231
Table 22-2: Default Configurations ............................................................................................................ 250
Table 23-1: QOS Topology Description..................................................................................................... 257
Table 23-2: Default Configurations ............................................................................................................ 258
Table 24-1: Default Configurations ............................................................................................................ 276
Table 24-2 IPv4 Addresses of Interfaces in the Routers Topology OSPF Testing ................................ 341
Table 24-3: IPv4 Addresses of Interfaces in the Routers Redistribution Topology ................................ 345
Table 24-4: IPv4 Addresses of Interfaces in the Routers OSPF Inbound Filtering ................................ 349
Table 29-1: Default Configurations ............................................................................................................ 356
Configuration User Manual 21
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
1
Introduction
1.1 Purpose and Scope
FDN40 is a Multi Service Business Gateway solution for providing scalable,
converged voice and data connectivity to SMB customers.
FDN40 is an integrated data infrastructure solution providing:
Converged Data, Switching, Security & Robust Routing Platform
Integrated advanced routing, security applications & WLAN access point
with application-aware QoS into an single box solution
Simplicity via integration and expandability
This document is applicable for the below FDN40 Variants
1. FDN40-4
2. FDN40-6
3. FDN40-6P
1.2 Acronyms
Table 1-1- Acronyms used in the Document
Acronym
Explanation
ACL
Access Control List
AH
Authentication Header
ALG
Application Layer Gateway
BOOTP
Bootstrap Protocol
CHAPTER 1: INTRODUCTION
Configuration User Manual 22
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Acronym
Explanation
BPDU
Bridge Protocol Data Unit
CBS
Committed Burst Size
CIR
Committed Information Rate
CLI
Command Line Interface
DHCP
Dynamic Host Configuration Protocol
DOS
Denial of Service
DSCP
Differentiated Services Code Point
DES
Data Encryption Standard
DH
Diffie-Hellman
DPI
Deep Packet Inspection
DUT
Device Under Test
EIR
Excess Information Rate
EBS
Excess Burst Size
ESP
Encapsulating Security Protocol
EXEC
EXECutable mode
FID
Filtering Identifier
IP
Internet Protocol
IDS
Intrusion Detection System
IKE
Internet Key Exchange
IPS
Intrusion Prevention System
IPSec
Internet Protocol for Security
IETF
Internet Engineering Task Force
HTTP
Hyper Text Transfer Protocol
ICMP
Internet Control Message Protocol
IP
Internet Protocol
Independent VLAN Learning
Local Area Network
Media Access Control
Management Information Base
Maximum Transfer Unit
Network Address Translation
Network Address Port Translation
Network Time Protocol
Non-Volatile Random Access Memory
Port Based Network Authentication Protocol
Port VLAN ID
Quality-of-Service
Remote Authentication Dial-In User Service
Remote Access Virtual Private Network
CHAPTER 1: INTRODUCTION
Configuration User Manual 23
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Acronym
Explanation
Rivest Shamir Adleman Algorithm
Routing Information Protocol
Route Redistribution
Routing Table Manager
Request For Comments
Remote Monitoring
Security Association
Security Association Database
Security Gateway
Secure Hash Algorithm 1
Security Policy Database
Security Parameter Index
Simple Network Management Protocol
Transmission Control Protocol
User Datagram Protocol
Virtual Private Network
Virtual Access Point
View based Access Control Model
VLAN Identifier
Virtual Local Area Network
Wide Area Network
1.3 References
FDN40 CLI Configuration Guide
1.4 Document Conventions
Table 1-2: Document Conventions
Convention
Usage
Bold
CLI commands
Italics
User inputs for CLI commands
Courier New 10 Regular
CLI command outputs
Notes / Guidelines / Pre-requisites are keyed using this style.
Output areas specific to the configuration
CHAPTER 1: INTRODUCTION
Configuration User Manual 24
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
1.5 General Configurations
1.5.1 CLI Modes
The following table provides the access and exit methods to various general
configuration modes.
Table 1-3: General Configurations
Command Mode
Access Method
Prompt
Exit method
User EXEC
This is the initial mode to
start a session.
UltOs>
The logout method is
used.
Privileged EXEC
The User EXEC mode
command enable, is used to
enter the Privileged EXEC
mode.
UltOs#
To return from the
Privileged EXEC mode to
User EXEC mode the
disable command is
used.
Global Configuration
The Privileged EXEC mode
command configure
terminal, is used to enter
the Global Configuration
mode
UltOs(config)#
To exit to the Global
Configuration mode the
exit command is used and
to exit to the Privileged
EXEC mode the end
command is used.
Interface
Configuration
The Global Configuration
mode command interface
<interface-
type><interface-id> is used
to enter the Interface
Configuration mode.
UltOs(config-if)#
To exit to the Global
Configuration mode the
exit command is used and
to exit to the Privileged
EXEC mode the end
command is used.
VLAN Configuration
The Global Configuration
Mode command VLAN
<VLANid>, is used to enter
the VLAN configuration
mode
UltOs(config-vlan)#
To exit to the Global
Configuration Mode, the
exit command is used and
to exit to the Privileged
EXEC mode, the end
command is used
NTP Configuration
The Global Configuration
mode command ntp is used
to enter the NTP
configuration mode.
UltOs(config-ntp)#
To exit to the Global
Configuration mode the
exit command is used and
to exit to the Privileged
EXEC mode the end
command is used.
1.5.2 SNMP Configurations
SNMP configurations can be done in two ways:
1. Using NETSNMP commands
2. Using Scotty manager
We have done the configurations using Scotty manager version 2.1.10. To
start the configurations, follow the steps given below.
CHAPTER 1: INTRODUCTION
Configuration User Manual 25
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
3. Execute Scotty.
root@localhost mibs# scotty2.1.10
%
4. Load the mib files. This is to register the mib files with the SNMP
manager.
% mib load fsrmon.mib
% mib load stdrmon.mib
5. Create a session.
% snmp session -address 12.0.0.1 -community "NETMAN" -retries 0 -
version SNMPv2C -timeout 30
snmp0
To configure a particular object, use the set command as given below.
% snmp0 set {{ rmonEnableStatus.0 enable}}
Where rmonEnableStatus is the object name, 0 is the index and enable
is the object value to be set.
To obtain a configured value, use the get command. For example,
% snmp0 get rmonEnableStatus.0
Where rmonEnableStatus is the object name, 0 is the index.
If the object is the tabular object, use the interface ID to which the object is
configured as the index.
Configuration User Manual 27
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
2
System Features
2.1 Topologies
Figure 2-1: Configuration for Basic System Features
Figure 2-2: Configuration for Advanced System Features
Packet
capturi
ng
device
P
1
1
2.
0.
0.
1
12
.0.
0.
10
0
F
D
N
4
0-
1
H
o
s
t
1
P
2
P
1
FDN4
0-1
12.0.
0.1
SM
ART
BIT
S
P
2
P
1
P
1
P
2
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 28
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2.2 System Features / Configurations
2.2.1 Configuring the Default IP Address
Configuring the Default IP Address will result in the IP address to be written
to the NVRAM and this will be used as the IP address of the default interface
when the switch is restarted. This will update the IP address of the Inband
Management VLAN.
2.2.1.1 CLI Configuration
1. Execute the following commands to configure the Default IP Address.
Enter the Global Configuration mode.
UltOs# configure terminal
Configure the default IP address and subnet mask as 10.10.10.1 and
255.255.0.0, respectively.
UltOs(config)# default ip 10.10.10.1 subnet-mask 255.255.0.0
Exit from the Global Configuration mode.
UltOs(config)#end
2. View the default IP address and subnet mask by executing the following
command.
UltOs# show nvram
Default IP Address : 10.10.10.1
Default Subnet Mask : 255.255.255.0
OOB IP Address : 172.30.19.108
OOB Subnet Mask : 255.255.255.0
Default IP Address Config Mode : Manual
Default IP Address Allocation Protocol : DHCP
Switch Base MAC Address : 54:df:00:00:08:01
Default Interface Name : wan0/1
Default RM Interface Name : NONE
Config Restore Option : Restore
Config Save Option : Startup save
Auto Save : Disable
Incremental Save : Disable
Roll Back : Enable
Config Save IP Address : 0.0.0.0
Config Save Filename : zeus.conf
Config Restore Filename : zeus.conf
PIM Mode : Sparse Mode
IGS Forwarding Mode : MAC based
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 29
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Cli Serial Console : Yes
SNMP EngineID : 80.00.08.1c.03.54
SNMP Engine Boots : 351
Default VLAN Identifier : 1
Stack PortCount : 0
ColdStandby : Disable
Store Default Value : Disable
Vrf Unique Mac : Disable
Hitless Restart Flag : Disable
Hardware Version : 2.0
Firmware Version : v1.2.29
Hardware Part Number : 1511MMC001
Software Serial Number : 1-0-0
Software Version : R1.1.3
Switch Name : FDN40-4
RM Heart Beat Mode : Internal
RM Redundancy Type : Hot
RM Data Plane Type : Shared
RM Type : OOB
NPAPI mode : Synchronous
TimeStamp Method : TransHardware
Restore Flag : Disabled
Dynamic Port Count : 56
FIPS operation mode : Disabled
Restore Option : Enabled
BRIDGE_MODE_WAN1 :Customer Bridge
BRIDGE_MODE_WAN2 :Customer Bridge
Debugging Log File Location :/media/iss-db/
Management Port : Enabled
Automatic Port Create Flag : Enabled
IMG_DUMP_PATH :
Manufacturing Date : 04202016
VLAN 1 (default VLAN) will have this IP address and subnet mask after the switch
restart only if the allocation method is manual.
2.2.1.2 WEB Configuration
Default IP Address can be configured through WEB interface using the
Factory Default Settings screen (Navigation - System > NVRAM Settings)
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 30
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 2-1: Factory Default Settings
2.2.2 Configuring IP address for an Interface
Configuring IP address for an Interface configures the IP address which will
be used for sending and receiving the packets.
2.2.2.1 CLI Configuration
1. Execute the following commands to configure an IP address for a VLAN
interface.
Enter the Global Configuration mode.
UltOs# configure terminal
Enter the VLAN Configuration Mode (for VLAN 1).
UltOs(config)# VLAN 1
Add member ports for VLAN.
UltOs(config-vlan)# ports lan 0/1-4 untagged lan 0/1-4
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 31
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Enter the Interface Configuration mode.
UltOs(config)# interface vlan 1
Shut down the VLAN interface.
UltOs(config-if)# shutdown
Configure the IP address and subnet mask.
UltOs(config-if)# ip address 10.0.0.100 255.0.0.0
Bring up the VLAN interface.
UltOs(config-if)#no shutdown
Exit from the Interface Configuration mode.
UltOs(config)#end
Configuring the IP address for an Interface requires the interface to be shutdown
prior to the configuration.
2. View the configured interface IP address by executing the following show
command.
UltOs# show ip interface
Vlan1 is up, line protocol is up
Internet Address is 10.0.0.100/8
Broadcast Address 10.255.255.255
2.2.2.2 WEB Configuration
IP Address for an interface can be configured through WEB interface using
the IPv4 Interface Settings screen (Navigation - Layer3 Management > IP
> IPv4 Addr Conf)
Screen 2-2: IPv4 Interface Setings
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 32
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2.2.3 Configuring the Base MAC Address
Configuring the Base MAC Address will result in the Switch Base MAC
address to be written to the NVRAM. This will be used as the Base MAC
address of the when the switch is restarted.
2.2.3.1 CLI Configuration
1. Execute the following commands to change the base MAC address of
the switch.
Enter the Global Configuration mode.
UltOs# configure terminal
Configure the base MAC address for the switch.
UltOs(config)# base-mac 00:01:02:03:0A:0B
Exit from the Global Configuration mode.
UltOs(config)#end
2. View the base MAC address by executing the following show command.
UltOs# show nvram
Default IP Address : 12.0.0.1
Default Subnet Mask : 255.0.0.0
Default IP Address Config Mode : Manual
Default IP Address Allocation Protocol : DHCP
Switch Base MAC Address :
00:01:02:03:0a:0b
Default Interface Name : wan0/1
Config Restore Option : No restore
Config Save Option : No save
Auto Save : Enable
Incremental Save : Disable
Roll Back : Enable
Config Save IP Address : 0.0.0.0
Config Save Filename : FDN40.conf
Config Restore Filename : FDN40.conf
PIM Mode : Sparse Mode
IGS Forwarding Mode : MAC based
Cli Serial Console : Yes
SNMP EngineID :
80.00.08.1c.04.46.53
The configuration takes effect only on switch restart.
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 33
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2.2.3.2 WEB Configuration
Base MAC can be configured through WEB interface using the Factory
Default Settings screen. For screenshot, refer section 2.2.1.2
2.2.4 Configuring the Login Authentication Method
Configuring the Login Authentication Method sets the authentication method
for user logins.
2.2.4.1 CLI Configuration
1. Execute the following commands to change the authentication method
for switch login.
Enter the Global Configuration mode.
UltOs# configure terminal
Configure the login authentication method as RADIUS.
UltOs(config)# login authentication radius
Exit from configuration mode.
UltOs(config)#end
2. View the current authentication method by executing the following show
command.
UltOs# show system information
Hardware Version : 5.2.3
Firmware Version : 4.0.0.0
Switch Name : FDN40-4
System Contact :
info@ulteriustech.com
System Location : Ulterius
Logging Option : Console Logging
Login Authentication Mode : Remote
Config Save Status : Not Initiated
Remote Save Status : Not Initiated
Config Restore Status : Not Initiated
2.2.4.2 Web Configuration
Login Authentication can be set through WEB interface using the System
Information screen (Navigation - System > System Information)
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 34
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 2-3: System Information- Login Authentication
2.2.5 Configuring the Restoration File Name
Configuring the restoration file name will result in the restoration file name to
be written to the NVRAM. This will be used as the configuration restoration
file.
2.2.5.1 CLI Configuration
1. Execute the following commands to configure the restoration file name.
Enter the Global Configuration mode.
UltOs# configure terminal
Configure the configuration restoration file name for the Switch.
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 35
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# default restore-file switch.conf
Exit from the Global Configuration mode.
UltOs(config)#end
2. View the default restoration file name by executing the following show
command.
UltOs# show nvram
Default IP Address : 12.0.0.1
Default Subnet Mask : 255.0.0.0
Default IP Address Config Mode : Manual
Default IP Address Allocation Protocol : DHCP
Switch Base MAC Address :
00:01:02:03:0a:0b
Default Interface Name : wan0/1
Config Restore Option : No restore
Config Save Option : No save
Config Save IP Address : 0.0.0.0
Auto Save : Enable
Incremental Save : Disable
Roll Back : Enable
Config Save Filename : zeus.conf
Config Restore Filename : switch.conf
PIM Mode : Sparse Mode
IGS Forwarding Mode : MAC based
Cli Serial Console : Yes
SNMP EngineID :
80.00.08.1c.04.46.53
2.2.5.2 Web Configuration
Restore file name can be set through WEB interface using the Restore
Configuration screen (Navigation - System > Save and Restore >
Restore)
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 36
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 2-4: Restore Configuration
2.2.6 Saving the Current Configurations for Restoration
Saving the current configurations for restoration writes the running-config to a
flash file, a startup-configuration file or to a remote site.
1. Execute the following command to save the current running configuration
into a file.
UltOs# write startup-config
2. View the restoration status by executing the following show command.
UltOs# show nvram
Default IP Address : 12.0.0.1
Default Subnet Mask : 255.0.0.0
Default IP Address Config Mode : Manual
Default IP Address Allocation Protocol : DHCP
Switch Base MAC Address :
00:01:02:03:04:01
Default Interface Name : wan0/1
Config Restore Option : Restore
Config Save Option : Startup save
Auto Save : Enable
Incremental Save : Disable
Roll Back : Enable
Config Save IP Address : 0.0.0.0
Config Save Filename : switch.conf
Config Restore Filename : switch.conf
PIM Mode : Sparse Mode
IGS Forwarding Mode : MAC based
Cli Serial Console : Yes
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 37
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
SNMP EngineID : 80.00.08.1c.04.46.53
3. View the restoration status by executing the following show command.
UltOs# show system information
Hardware Version : 5.2.3
Firmware Version : 4.0.0.0
Switch Name : FDN40-4
System Contact : info@.com
System Location : Ulterius
Logging Option : Console Logging
Login Authentication Mode : Local
Config Save Status : Successful
Remote Save Status : Not Initiated
Config Restore Status : Not Initiated
4. View the restoration status after rebooting the switch by executing the
following show command.
UltOs# show system information
Hardware Version : 5.2.3
Firmware Version : 4.0.0.0
Switch Name : FDN40-4
System Contact :
info@ulteriustech.com
System Location : Ulterius
Logging Option : Console Logging
Login Authentication Mode : Local
Config Save Status : Not Initiated
Remote Save Status : Not Initiated
Config Restore Status : Successful
Notes:
The current configurations will be saved into a file specified by default
restore-file command.
Default name for the restoration file is zeus.conf.
The switch will start with the saved configuration on reboot.
2.2.7 Erasing a Saved Configuration File
Erasing a saved configuration file clears the contents of the startup
configuration or sets the parameters in NVRAM to their default values.
1. Execute the following command to erase the saved configuration file.
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 38
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# erase startup-config
2. View the erase status by executing the following show command.
UltOs# show nvram
Default IP Address : 12.0.0.1
Default Subnet Mask : 255.0.0.0
Default IP Address Config Mode : Manual
Default IP Address Allocation Protocol : DHCP
Switch Base MAC Address :
00:01:02:03:04:01
Default Interface Name : wan0/1
Config Restore Option : No restore
Config Save Option : No save
Auto Save : Enable
Incremental Save : Disable
Roll Back : Enable
Config Save IP Address : 0.0.0.0
Config Save Filename : switch.conf
Config Restore Filename : switch.conf
PIM Mode : Sparse Mode
IGS Forwarding Mode : MAC based
Cli Serial Console : Yes
SNMP EngineID :
80.00.08.1c.04.46.53
The switch will start with the default configurations on reboot.
2.2.8 Copying System Logs into Remote Location
Copying System Logs into Remote Location upload the log file to a remote
location.
Execute the following command to upload the log file to remote location
12.0.0.100.
UltOs# copy logs tftp://12.0.0.100/logfile
2.2.8.1 Web Configuration
Log transfer can be set through WEB interface using the Log Transfer
Settings screen (Navigation - System > Log Transfer)
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 39
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 2-5: Log Transfer
2.2.9 Copying a File from Remote Site/Flash to Remote Site/Flash
Copying a configuration file from remote location to flash copies a file from a
source remote site /flash to a destination remote site/flash.
Execute the following command to copy the file sctipt.txt from remote location
12.0.0.100 to flash.
UltOs# copy tftp://12.0.0.100/script.txt flash:script.txt
2.2.9.1 Web Configuration
File Transfer can be set through WEB interface using the File Upload screen
(Navigation - System > File Transfer > File Upload)
Screen 2-6: Log Transfer
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 40
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2.2.10 Configuring the Default VLAN Identifier
Configuring the default VLAN identifier results in the VLAN ID to be written to
the NVRAM and this will be used as the default VLAN ID when the switch is
restarted.
2.2.10.1 CLI Configuration
1. Execute the following commands to configure the default VLAN identifier.
Enter the Global Configuration mode.
UltOs# configure terminal
Configure the default VLAN ID as 10.
UltOs(config)# default vlan id 10
Exit from the Global Configuration mode.
UltOs(config)# end
2. View the default VLAN ID by executing the following command.
UltOs# show nvram
Default IP Address : 10.0.0.100
Default Subnet Mask : 255.255.0.0
Default IP Address Config Mode : Manual
Default IP Address Allocation Protocol : DHCP
Switch Base MAC Address :
00:01:02:03:04:01
Default Interface Name : wan0/1
Default RM Interface Name : eth0
Config Restore Option : No restore
Config Save Option : No save
Auto Save : Enable
Incremental Save : Disable
Roll Back : Enable
Config Save IP Address : 0.0.0.0
Config Save Filename : FDN40.conf
Config Restore Filename : FDN40.conf
PIM Mode : Sparse Mode
IGS Forwarding Mode : MAC based
Cli Serial Console : Yes
SNMP EngineID :
80.00.08.1c.04.46.53
SNMP Engine Boots : 0
Default VLAN Identifier : 10
Notes:
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 41
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
It is not advisable to change the default VLAN ID when some
configurations are already saved.
Once the default VLAN ID is configured, switch has to be restarted
before saving any configuration.
2.2.10.2 WEB Configuration
Default VLAN Identifier can be configured through WEB interface using the
Factory Default Settings screen. For screenshot, refer section 2.2.1.2
2.2.11 Configuring Switch Clock
2.2.11.1 CLI Configuration
Configuring the Clock sets the Switch clock time.
1. Execute the following commands to adjust the switch clock.
UltOs# clock set 16:00:00 1 jan 2007
2. View the configured clock by executing the following show command.
UltOs# show clock
Mon Jan 01 16:00:01 2007
2.2.11.2 Web Configuration
Switch Clock can be set through WEB interface using the System
Information screen. For screenshot, refer 2.2.4.2.
2.2.12 Enabling/Disabling Console CLI through Serial Port
2.2.12.1 CLI Configuration
1. Execute the following command to enable console CLI through serial
port.
UltOs# cli console
2. View the console CLI status using the following show command.
UltOs# show nvram
Default IP Address : 12.0.0.1
Default Subnet Mask : 255.0.0.0
Default IP Address Config Mode : Manual
Default IP Address Allocation Protocol : DHCP
Switch Base MAC Address :
00:01:02:03:04:01
Default Interface Name : wan0/1
Config Restore Option : No restore
Config Save Option : No save
Auto Save : Enable
Incremental Save : Disable
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 42
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Roll Back : Enable
Config Save IP Address : 0.0.0.0
Config Save Filename : FDN40.conf
Config Restore Filename : FDN40.conf
PIM Mode : Sparse Mode
IGS Forwarding Mode : MAC based
Cli Serial Console : Yes
SNMP EngineID :
80.00.08.1c.04.46.53
2.2.12.2 WEB Configuration
CLI Console can be configured through WEB interface using the Factory
Default Settings screen. For screenshot, refer section 2.2.1.2
2.2.13 Enabling/Disabling HTTP
Enabling/Disabling HTTP enables/disables HTTP server in the switch.
1. Execute the following commands to enable HTTP server on the switch.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable HTTP server in the switch.
UltOs(config)# set ip http enable
Exit from the Global Configuration mode.
UltOs(config)# end
2. View the http server status using the following show command.
UltOs# show http server status
HTTP server status : Enabled
HTTP port is : 80
2.2.14 Configuring HTTP Port Number
2.2.14.1 CLI Configuration
Configuring the HTTP port number sets the HTTP port number to be used for
HTTP packets.
1. Execute the following commands to configure the HTTP Port Number in
the switch.
Enter the Global Configuration mode.
UltOs# configure terminal
Configure the port number for the HTTP server as 6080.
UltOs(config)# ip http port 6080
Exit from the Global Configuration mode.
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 43
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# end
2. View the HTTP port number by executing the following show command.
UltOs# show http server status
HTTP server status : Enabled
HTTP port is : 6080
2.2.14.2 Web Configuration
HTTP Port can be configured through WEB interface using the System
Information screen. For screenshot, refer 2.2.4.2.
2.2.15 Configuring HTTP Authentication scheme
HTTP Authentication scheme is designed using two parameters namely,
Operational Authentication scheme and the Configurable Authentication
scheme.
The Configurable HTTP Authentication scheme can be modified at run time.
For the modified Authentication scheme to be effective the value has to be
saved in configuration file and the system has to be restarted. The
Configurable HTTP Authentication scheme can be set to default or basic or
digest.
The Operational HTTP Authentication scheme is initialized on start up and
cannot be modified at run-time. The Operational Authentication scheme is
used to authenticate all the HTTP sessions. During startup, the Operational
Authentication scheme is set to the Configurable Authentication scheme.
2.2.15.1 CLI Configuration
1. Execute the following commands to configure the HTTP Authentication
scheme as DEFAULT in the switch.
Enter the Global Configuration mode.
UltOs# configure terminal
Configure the authentication scheme for the HTTP server as default.
UltOs(config)# set http authentication-scheme default
Exit from the Global Configuration mode.
UltOs(config)# end
View the HTTP authentication scheme by executing the following
show command.
UltOs# show http authentication-scheme
The Operational HTTP authentication scheme is Digest
The Configured HTTP authentication scheme is Default
Save the configuration.
UltOs# write startup-config
Restart the exe.
Ensure the MSR restoration is complete.
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 44
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
View the HTTP authentication scheme by executing the following
show command.
UltOs# show http authentication-scheme
The Operational HTTP authentication scheme is Default
The Configured HTTP authentication scheme is Default
Restart the web browser and clear the saved session information and
cache from the browser.
2. Execute the following commands to configure the HTTP Authentication
scheme as BASIC in the switch.
Enter the Global Configuration mode.
UltOs# configure terminal
Configure the authentication scheme for the HTTP server as basic.
UltOs(config)# set http authentication-scheme basic
Exit from the Global Configuration mode.
UltOs(config)# end
View the HTTP authentication scheme by executing the following
show command.
UltOs# show http authentication-scheme
The Operational HTTP authentication scheme is Digest
The Configured HTTP authentication scheme is Basic
Save the configuration.
UltOs# write startup-config
Restart the exe.
Ensure the MSR restoration is complete.
View the HTTP authentication scheme by executing the following
show command.
UltOs# show http authentication-scheme
The Operational HTTP authentication scheme is Basic
The Configured HTTP authentication scheme is Basic
Restart the web browser and clear the saved session information and
cache from the browser.
3. Execute the following commands to configure the HTTP Authentication
scheme as DIGEST in the switch.
Enter the Global Configuration mode.
UltOs# configure terminal
Configure the authentication scheme for the HTTP server as digest.
UltOs(config)# set http authentication-scheme digest
Exit from the Global Configuration mode.
UltOs(config)# end
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 45
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
View the HTTP authentication scheme by executing the following
show command.
UltOs# show http authentication-scheme
The Operational HTTP authentication scheme is Basic
The Configured HTTP authentication scheme is Digest
Save the configuration.
UltOs# write startup-config
Restart the exe.
Ensure the MSR restoration is complete.
View the HTTP authentication scheme by executing the following
show command.
UltOs# show http authentication-scheme
The Operational HTTP authentication scheme is Digest
The Configured HTTP authentication scheme is Digest
Restart the web browser and clear the saved session information and
cache from the browser.
2.2.15.2 WEB Configuration
HTTP Authentication Scheme can be configured through WEB interface
using the HTTP Configuration screen (Navigation - System > HTTP>HTTP
Scalars)
Screen 2-7: HTTP Configuration
2.2.16 Enabling/Disabling Trap Generation on an Interface
Enabling/Disabling trap generation on an interface enables/disables trap
generation either on the physical interface or on the port-channel interface.
2.2.16.1 CLI Configuration
1. Execute the following commands to disable SNMP trap on the interface
lan 0/1.
Enter the Global Configuration mode.
UltOs# configure terminal
Enter the Interface Configuration mode for lan 0/1.
UltOs(config)# interface lan 0/1
Disable trap on the interface.
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 46
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-if)# no snmp trap link-status
Exit from configuration mode.
UltOs(config-if)# end
2. View the trap state for the interface lan 0/1 by executing the following
show command.
UltOs# show interface lan 0/1
Lan0/1 up, line protocol is up (connected)
Hardware Address is 00:08:02:03:04:01
MTU 1500 bytes, Full duplex, 100 Mbps, Auto-
Negotiation
HOL Block Prevention enabled.
Input flow-control is on, output flow-control is on
Link Up/Down Trap is disabled
Reception Counters
Octets : 0
Unicast Packets : 0
Discarded Packets : 0
Error Packets : 0
Unknown Protocol : 0
Transmission Counters
Octets : 0
Unicast Packets : 0
Discarded Packets : 0
Error Packets : 0
If trap is enabled, then the Switch sends trap messages to the SNMP Manager on
specific events such as link up, link down, etc.
2.2.16.2 WEB Configuration
Traps can be enabled or disabled on an interface through WEB interface
using the Port Basic Settings screen (Navigation - Layer2 Management >
Port Manager > Basic Settings)
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 47
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 2-8: Port Basic Settings
2.2.17 Configuring an Interface as Switch Port/ Router Port
Configuring an interface as Router Port configures the port as a Layer 3
interface.
2.2.17.1 CLI Configuration
1. Execute the following commands to configure a port as a switch port.
Enter the Global Configuration mode.
UltOs# configure terminal
Enter the Interface Configuration mode for lan 0/1.
UltOs(config)# interface lan 0/1
Shutdown the interface.
UltOs(config-if)# shutdown
Configure the interface as switch port.
UltOs(config-if)# switchport
Bring up the interface.
UltOs(config-if)# no shutdown
Exit from configuration mode.
UltOs(config-if)# end
The specified interface must be shutdown prior to the configuration. "no switchport"
configuration is applicable only in WAN ports.
2.2.17.2 Web Configuration
Switch Port/ Router Port can be configured through WEB interface using the
Port Basic Settings screen. For screenshot, refer 2.2.16.2.
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 48
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2.2.18 Configuring Debug Logging
Configuring Debug Logging configures where the debug logs are to be
displayed, that is, either on the console or on a file or on the flash memory.
2.2.18.1 CLI Configuration
1. Execute the following commands to modify the logging option of debug
traces.
Enter the Global Configuration mode.
UltOs# configure terminal
Configure to log the debug traces in to a file.
UltOs(config)# debug-logging file
Exit from the Global Configuration mode.
UltOs(config)# end
2. View the logging option by executing the following show command.
UltOs# show system information
Hardware Version : 5.2.3
Firmware Version : 4.0.0.0
Switch Name : FDN40-4
System Contact :
info@ulteriustech.com
System Location : Ulterius
Logging Option : File Logging
Login Authentication Mode : Local
Config Save Status : Not Initiated
Remote Save Status : Not Initiated
Config Restore Status : Not Initiated
3. Execute the following commands to view the debug traces logged in the
file.
Enable debug trace for any of the module, for example PNAC
module.
UltOs# debug dot1x all
View debug logs in the file using the following command.
UltOs# show debug-logging
PNAC: SNMPPROP: Trace Option is set with value: 347
2.2.18.2 Web Configuration
Debug logging can be configured through WEB interface using the System
Information screen. For screenshot, refer 2.2.4.2.
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 49
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2.2.19 Configuring ACL Filters
ACL filters are used to filter packets at the hardware, based on certain
filtering criteria configured/programmed in the switch. The switch examines
each packet to determine whether it is to be blocked or to be forwarded
based on the access lists configured.
2.2.19.1 CLI Configuration
The following example shows how to block the ICMP traffic from a host with IP address 12.0.0.100.
Refer
Figure 2-1 for set up. Port 1 of the switch is connected to the host. Execute
the following commands in FDN40-1. IP address of Host 1 is assumed as
12.0.0.100.
1. Configure the IP address of the switch as 12.0.0.1.
UltOs# configure terminal
UltOs(config)# interface vlan 1
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 12.0.0.1 255.0.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# end
2. View the ping between Host 1 and FDN40-1 by executing the following
command in FDN40-1.
UltOs# ping 12.0.0.100
Reply Received From: 12.0.0.100, TimeTaken: 30 msecs
Reply Received From: 12.0.0.100, TimeTaken: 30 msecs
Reply Received From: 12.0.0.100, TimeTaken: 30 msecs
--- 12.0.0.100 Ping Statistics ---
3 Packets Transmitted, 3 Packets Received, 0% Packets
Loss
3. Enter the Global Configuration mode.
UltOs# configure terminal
4. Create a filter with ID 1001.
UltOs(config)# ip access-list standard 1000
Filter type can be standard. Standard filters are used to filter the traffic based on the
source IP address and destination IP address.. IP Access List is supported only on
WAN side and not on LAN side. In this example, ICMP packets from 12.0.0.100 need
to be filtered.
5. Deny the ICMP traffic from host 12.0.0.100 to any network/host.
UltOs(config-ext-nacl)# deny host 12.0.0.100 any priority 2
6. Exit from Global Configuration mode.
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 50
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-ext-nacl)# exit
7. Apply the filter 1000 to port1.
UltOs(config)# interface wan 0/1
UltOs(config-if)# ip access-group 1000 in
8. Exit from the Interface Configuration mode.
UltOs(config-if)# end
9. View the configuration details by executing the following command.
UltOs# sh access-lists
IP ACCESS LISTS
-----------------
Standard IP Access List 1000
----------------------------
Filter Priority : 2
IP address Type : IPV4
Source IP address : 12.0.0.100
Source IP address mask : 255.255.255.255
Source IP Prefix Length : 32
Destination IP address : 0.0.0.0
Destination IP address mask : 0.0.0.0
Destination IP Prefix Length : 0
Flow Identifier : 0
In Port List : wan0/1
Out Port List : NIL
Filter Action : Deny
Filter Creation Mode : External
Redirect Port List : NIL
TrafficDistField : Unknown
Sub Action : NONE
Sub Action Id : 0
Status : Active
MAC ACCESS LISTS
-----------------
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 51
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
No MAC Access Lists have been configured
USER DEFINED LISTS
----------------------
No User Defined Lists have been configured
10. View that the ICMP packet from Host 1 is blocked.
UltOs# ping 12.0.0.100
Reply Not Received From : 12.0.0.100, Timeout : 5 secs
Reply Not Received From : 12.0.0.100, Timeout : 5 secs
Reply Not Received From : 12.0.0.100, Timeout : 5 secs
--- 12.0.0.100 Ping Statistics ---
3 Packets Transmitted, 0 Packets Received, 100%
Packets Loss
2.2.19.2 WEB Configuration
2.2.19.2.1 IP Standard Access List
IP Standard ACLs can be configured through WEB interface using the IP
Standard ACL Configuration screen (Navigation - System > ACL > IP
Standard ACL)
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 52
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 2-9: IP Standard ACL Configuration
2.2.19.2.2 MAC Access List
MAC ACLs can be configured through WEB interface using the MAC ACL
Configuration screen (Navigation - System > ACL > MAC ACL)
Screen 2-10: MAC ACL Configuration
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 53
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2.2.20 Software image upgradation
2.2.20.1 Software image upgrade through CLI
2.2.20.1.1 Upgrade from R1_1_2 image to R1_1_3
The R1_1_3 is the first fully integrated software image that takes care of
automatic upgrade of uboot, IPMC, FPGA, SW application images by the
trigger of a single integrated image upgrade procedure.
1. Start fdn404_r1_1_2.img as usual and arrive at FDN40 prompt.
2. Upgrade Image through CLI
UltOs# firmware upgrade tftp tftp://<server IP>/fdn404_r1_1_3.img
flash:normal
UltOs# firmware upgrade tftp tftp://<server IP>/fdn404_r1_1_3.img
flash:fallback
UltOs# reload
3. Image is now upgraded to r1_1_3.img. Since this is first time that an
integrated image is applied on filesystem, this process needs to be
repeated again once more to ensure permanent marking on the file
system. Please note that this is only needed for first time upgrade that we
execute below step again.
UltOs# firmware upgrade tftp tftp://<server IP>/fdn404_r1_1_3.img
flash:normal
UltOs# firmware upgrade tftp tftp://<server IP>/fdn404_r1_1_3.img
flash:fallback
UltOs# reload
4. Now system is ready and upgraded fully to new integrated image and all
internal parts like FPGA, IPMC,Uboot and SW application. Please verify
if below output is seen to confirm upgrade is successful.
5. fdn404/fdn406 is the suffix used to differentiate between FDN40-4 and
FDN40-6 board. Error will be thrown when wrong image is uploaded.
Sample:
UltOs# show system information
Hardware Version : 2.0
Firmware Version : v1.2.29
Hardware Part Number : 1444FDN00007
FPGA Version : 2.1
IPMC Version : 2.2
UBOOT Version : 1.5
Software Serial Number : 1-0-0
Software Version : R1.1.3
Switch Name : FDN40-4
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 54
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
System UpTime : 0 Days 0 Hrs, 50
Mins, 11 Secs
System Contact : info@ulteriustech.com
System Location : Ulterius Technologies,Kansas, USA
Logging Option : Console Logging
Login Authentication Mode : Local
Config Save Status : Not Initiated
Remote Save Status : Not Initiated
Config Restore Status : Not Initiated
Traffic Separation Control : none
LCD Brightness : 30
“show hardware” command is applicable only for FDN40-6 as there
is no POE compatible FDN404 device.
UltOs# show hardware
Line Card Config table
----------------------
SlotId Status Card Name Serial number MFG id MFG
date Product Name RevisionNo Mac Address
Required power MMCVersion
------ ------ --------- ------------- ------ ----
---- ------------ ---------- ---------------- ----
------ -------------
2 UP POE 1446FDN00074 BEI
11/25/2014 IOM-POE 2.0 54:DF:00:00:04:58
8 1.4
3 UP POE 1446FDN00041 BEI
11/24/2014 IOM-POE 2.0 54:DF:00:00:04:40
8 1.4
4 UP NONPOE 1446FDN00078 BEI
11/24/2014 IOM-ETH 2.0 54:DF:00:00:00:F0
8 1.4
5 UP NONPOE 1446FDN00077 BEI
11/24/2014 IOM-ETH 2.0 54:DF:00:00:00:E0
8 1.4
6 UP NONPOE 1446FDN00130 BEI
11/24/2014 IOM-ETH 2.0 54:DF:00:00:00:E8
8 1.4
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 55
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2.2.20.1.2 Upgrade from R1_1_3 image to > R1_1_3
The R1_1_3 is the first fully integrated software image that takes care of
automatic upgrade of uboot, IPMC,FPGA, SW application images by the
trigger of a single integrated image upgrade procedure.
1. Start fdn404_r1_1_3.img as usual and arrive at UltOs prompt.
2. Insert all needed IOM cards in all slots in order to ensure IPMC of IOM
cards are also upgraded as part of integrated image upgrade.
3. Upgrade Image through CLI
UltOs# firmware upgrade tftp tftp://<server IP>/fdn404_r1_1_4.img
flash:normal
UltOs# firmware upgrade tftp tftp://<server IP>/fdn404_r1_1_4.img
flash:fallback
UltOs# reload
4. Now system is ready and upgraded fully to new integrated image and all
internal parts like FPGA, IPMC, Uboot and SW application.
2.2.20.2 Software image upgrade through WEB
1. Start existing fdn404_rxxxx.img on board as usual and arrive at FDN40
prompt.
2. Upgrade active image through GUI on active partition
Choose option Home->System->Image Download option.
Choose upgrade type as TFTP, address type as IPv4 and configure
tftp Server IP Address, image File Name and upgrade mode as
Normal for flashing image to normal partition and click apply. Once
image is downloaded, we should see the notification as “Image
Download Successful”
Connect to the CLI prompt to restart system for new image to boot
up
UltOs#reload
New image should now be loaded from active partition.
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 56
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 2-11: Image Upgradation using normal
3 Now software is ready for use.
4 Upgrade standby image through GUI on standby partition
Choose option Home->System->Image Download option.
Choose upgrade type as TFTP, address type as IPv4 and configure
tftp Server IP Address, image File Name and upgrade mode as Fall
Back for flashing image to standby partition and click apply. Once
image is downloaded, we should see the notification as “Image
Download Successful”
Connect to the CLI prompt and type below command to restart system
for new image to get flashed to standby partition. This image would
normally boot up only when active image fails to get loaded
successfully.
UltOs# reload
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 57
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 2-12: Image Upgradation using FallBack
5 Now software is ready for use.
2.2.21 Setting default OOB IP for system (first time in a new board)
2.2.21.1 CLI Configuration
The R1_1_3 is the first fully integrated software image that boots with default
OOB IP as 10.10.10.1. This can be changed later to user defined OOB IP
using below steps.
1. Assign IP to OOB Interface
UltOs# conf t
UltOs(config)# int oob
UltOs(config)# ip address <new IP> <Netmask>
UltOs(config)# no shut
UltOs(config)# exit
UltOs# write startup-config
Above step saves new IP in NVRAM and for further reboots, configured IP
is reflected from NVRAM.
2. Reset OOB IP to factory default
UltOs# erase startup-config
UltOs# erase nvram:
UltOs# reload
Above step restores OOB IP to factory default 10.10.10.1 after reload is
successful. If user wants to change OOB IP, step 1 has to be executed.
CHAPTER 2: SYSTEM FEATURES
Configuration User Manual 58
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2.2.21.2 WEB Configuration
Default OOB IP for the system can be configured through WEB interface
using the Factory Default Settings screen.(Navigation System > NVRAM
Settings)
For screenshot, refer section 2.2.1.2.
Erase startup-config and Erase nvram can be done using the Erase
Configuration Screen.(Navigation System > QoS > Save and Restore)
Screen 2-13: IP Erase configuration
Configuration User Manual 59
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
3
DHCP Server
3.1 Protocol Description
DHCP server maintains a configured set of IP address pools from which IP
addresses are allocated to the DHCP clients, whenever they request the
Server dynamically. Once the IP address is allocated, the Server will keep
this IP as reserved until the lease time for that IP expires. If the client does
not renew the IP before the lease time expiry, this will be returned into the
free pool and will be offered to new clients.
3.2 Topology
Figure 3-1: DHCP - Topology 1
3.3 Configuration Guidelines
Refer to the CLI Configuration Guide for the complete set of commands and
the various options available for configuring DHCP.
The following are the configuration guidelines:
DHCP Client
12.0.0.1
FDN40-1 (DHCP SERVER)
DHCP CLIENT
1
1
CHAPTER 3: DHCP SERVER
Configuration User Manual 60
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
If the router interface was not assigned an IP address by the DHCP
server, the renew DHCP command fails and displays the following error
message:
Interface does not have a DHCP originated address
DHCP Server
DHCP Relay must be disabled before enabling the DHCP server.
The DHCP server assumes that all pool addresses may be assigned to
clients.
3.4 Default Configurations
Table 3-1: Default Configurations
Feature
Default Setting
DHCP server status
Disabled
ICMP echo
Disabled
Offer reuse time out
5 seconds
DHCP next server address
0.0.0.0 (none)
Boot file name
None
DHCP server pool lease time
3600 seconds
DHCP server pool utilization threshold
75%
DHCP server debug level
None
DHCP relay status
Disabled
DHCP relay server address
0.0.0.0 (none)
RAI option
Disabled
DHCP relay debug level
None
DHCP client debug level
None
3.5 DHCP Configurations
3.5.1 Enabling DHCP server
Refer Figure 3-1 for Topology Setup. DHCP server is disabled by default.
3.5.1.1 CLI Configuration
1. Execute the following commands in FDN40-1.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable DHCP server.
UltOs(config)# service dhcp-server
Exit from the Global configuration mode.
UltOs(config)# end
CHAPTER 3: DHCP SERVER
Configuration User Manual 61
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2. View the DHCP server status using the following command.
UltOs# show ip dhcp server information
The output in FDN40-1 is
DHCP server status : Enable
Send Ping Packets : Disable
Debug level : None
Server Address Reuse Timeout : 5 secs
Next Server Address : 0.0.0.0
Boot file name : None
3.5.1.2 WEB Configuration
DHCP Server can be enabled / disabled through WEB interface using the
DHCP Basic Settings screen (Navigation - Layer3Management > DHCP
Server > Basic Settings)
Screen 3-1: DHCP Basic Settings
3.5.2 Configuring Offer Reuse Time Out
Refer Figure 3-1 for setup. Offer Reuse Timeout is the maximum time frame
after which an offered IP can be returned to the free address pool. This can
be configured in the range of 1-120 seconds.
3.5.2.1 CLI Configuration
1. Execute the following commands in FDN40-1.
Enter the Global Configuration mode.
UltOs# configure terminal
Configure offer reuse time out as 10 seconds
UltOs(config)# ip dhcp server offer-reuse 10
Exit from the Global configuration mode
UltOs(config)# end
2. View the offer reuse time out configured in FDN40-1.
CHAPTER 3: DHCP SERVER
Configuration User Manual 62
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# show ip dhcp server information
DHCP server status : Enable
Send Ping Packets : Enable
Debug level : None
Server Address Reuse Timeout : 10 secs
Next Server Address : 0.0.0.0
Boot file name : None
3.5.2.2 WEB Configuration
Offer Re-use Timeout can be configured through WEB interface using the
DHCP Basic Settings screen. Refer section 3.5.1.2
3.5.3 Configuring DHCP Address Pools
Refer Figure 3-1 for Topology Setup. Address pools are used by the servers
to allocate the IP addresses to the client. This command specifies the IP
addresses that are available in the server to configure the clients.
3.5.3.1 Creating a DHCP Address Pool
1. Execute the following commands in FDN40-1.
Enter the Global Configuration mode.
UltOs# configure terminal
Create pool 1 and enter the DHCP pool configuration mode.
UltOs(config)# ip dhcp pool 1
Configure the network as 12.0.0.0 and mask as 255.0.0.0.
UltOs(dhcp-config)# network 12.0.0.0 255.0.0.0
Exit from the DHCP Pool configuration mode.
UltOs(dhcp-config)# end
2. View the DHCP server pools available using the following command.
UltOs# show ip dhcp server pools
The output in FDN40-1 is
Pool Id : 1
-------------------------------------------
Subnet : 12.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 3600 secs
Utilization threshold : 75%
Start Ip : 12.0.0.1
End Ip : 12.255.255.255
CHAPTER 3: DHCP SERVER
Configuration User Manual 63
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
3.5.3.2 Configuring End IP for the Pool
Refer Figure 3-1 for Topology Setup. End IP is used to specify the upper limit
for IP addresses in an address pool.
1. Execute the following command in FDN40-1.
Enter the Global Configuration mode.
UltOs# configure terminal
Create pool 1 and enter into DHCP Pool configuration mode.
UltOs(config)# ip dhcp pool 1
Configure the network as 12.0.0.0, mask 255.0.0.0 and end IP
12.0.0.100.
UltOs(dhcp-config)# network 12.0.0.0 255.0.0.0 12.0.0.100
Exit from the DHCP Pool configuration mode.
UltOs(dhcp-config)# end
2. View the end IP for the pools using the following command.
UltOs# show ip dhcp server pools
The output in FDN40-1 is
Pool Id : 1
-------------------------------------
Subnet : 12.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 3600 secs
Utilization threshold : 75%
Start Ip : 12.0.0.1
End Ip : 12.0.0.100
3.5.3.3 Configuring Lease Time
Refer Figure 3-1 for Topology Setup. Lease time specifies the amount of time
that the client can use the IP address assigned by the server. This parameter
is specific to each IP address pool. Hence, every IP address allocated from a
pool will be returned to the pool, if the client does not renew it.
1. Execute the following commands in FDN40-1.
Enter the Global Configuration mode.
UltOs# configure terminal
Create pool 1 and enter into DHCP Pool configuration mode.
UltOs(config)# ip dhcp pool 1
Configure the lease time as 1 day 2 hours and 30 minutes.
UltOs(dhcp-config)# lease 1 2 30
Exit from the DHCP Pool configuration mode.
UltOs(dhcp-config)# end
2. View the lease time of pools using the following command.
CHAPTER 3: DHCP SERVER
Configuration User Manual 64
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# show ip dhcp server pools
The output in FDN40-1 is
Pool Id : 1
-------------------------------------------
Subnet : 12.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 95400 secs
Utilization threshold : 75%
Start Ip : 12.0.0.1
End Ip : 12.0.0.100
DHCP server will return the allocated IP address to the free address pool, if the client
does not renew the IP before the lease time expiry interval.
3.5.3.4 Configuring Utilization Threshold
Refer Figure 3-1 for Topology setup. This specifies the upper limit (in
percentage) for the address pool utilization, after which a notification will be
sent to SNMP manager and an event will be logged into SYSLOG to indicate
the possible exhaust of the pool. Range of possible values is 0-100
percentage.
1. Execute the following commands in FDN40-1 to configure Utilization
threshold.
Enter the Global Configuration mode.
UltOs# configure terminal
Create pool 1 and enter into DHCP pool configuration mode.
UltOs(config)# ip dhcp pool 1
Configure the utilization threshold as 50%.
UltOs(dhcp-config)# utilization threshold 50
Exit from the DHCP Pool configuration mode.
UltOs(dhcp-config)# end
2. View the utilization threshold of the pools using the following command.
UltOs# show ip dhcp server pools
The output in FDN40-1 is
Pool Id : 1
-------------------------------------------
Subnet : 12.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 95400 secs
Utilization threshold : 50%
Start Ip : 12.0.0.1
End Ip : 12.0.0.100
CHAPTER 3: DHCP SERVER
Configuration User Manual 65
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
If the number of IP addresses allocated from the pool is above the utilization
threshold percentage, the server will log an event in SYSLOG and will send a SNMP
trap message to the SNMP manager.
Refer SNMPv3 configuration user manual to configure SNMP manager for the
Switch, so that the trap message will be sent appropriately.
3.5.3.5 WEB Configuration for DHCP Address Pool
DHCP Address Pool can be configured through WEB interface using the
DHCP Pool Settings screen (Navigation - Layer3Management > DHCP
Server > Pool Settings)
Screen 3-2: DHCP Pool Settings
3.5.4 Creating an Excluded Address in the Pool
Refer Figure 3-1 for Topology Setup. Excluded address pool specifies a
range of IP addresses that cannot be allocated for the client.
3.5.4.1 CLI Configuration
1. Execute the following commands in FDN40-1.
Enter the Global Configuration mode.
UltOs# configure terminal
Create pool 1 and enter into DHCP pool configuration mode.
UltOs(config)# ip dhcp pool 1
Configure the excluded address pool from 12.0.0.6 to 12.0.0.8
UltOs(dhcp-config)# excluded-address 12.0.0.6 12.0.0.8
Exit from the DHCP Pool configuration mode.
UltOs(dhcp-config)# end
2. View the excluded address pools using the following command.
UltOs# show ip dhcp server pools
The output in FDN40-1 is
CHAPTER 3: DHCP SERVER
Configuration User Manual 66
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Pool Id : 1
-------------------------------------------
Subnet : 12.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 95400 secs
Utilization threshold : 50%
Start Ip : 12.0.0.1
End Ip : 12.0.0.100
Exclude Address Start IP : 12.0.0.6
Exclude Address End IP : 12.0.0.8
3.5.4.2 WEB Configuration
Excluded Address can be configured through WEB interface using the DHCP
Server IP Exclude Settings screen (Navigation - Layer3 Management >
DHCP Server > Exclude List)
Screen 3-3: DHCP Server IP Exclude Setings
3.5.5 Configuring DHCP Pool Options
3.5.5.1 Configuring a Domain Name Option
Refer Figure 3-1 for Topology Setup. This is a pool specific option and will be
offered to the clients in the pool as a configuration parameter.
1. Execute the following commands in FDN40-1 to configure a domain
name option.
Enter the Global Configuration mode.
UltOs# configure terminal
Create pool 1 and enter into the DHCP Pool Configuration mode.
UltOs(config)# ip dhcp pool 1
Configure the domain name for this network as “future”.
CHAPTER 3: DHCP SERVER
Configuration User Manual 67
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(dhcp-config)# domain-name future
Exit from the DHCP Pool configuration mode.
UltOs(dhcp-config)# end
2. View the domain name option configured using the following command.
UltOs# show ip dhcp server pools
The output in FDN40-1 is
Pool Id : 1
---------------------------------------------------
Subnet : 12.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 95400 secs
Utilization threshold : 50%
Start Ip : 12.0.0.1
End Ip : 12.0.0.100
Exclude Address Start IP : 12.0.0.1
Exclude Address End IP : 12.0.0.10
Subnet Options
--------------
Code : 15, Value : future
This option will be offered to the DHCP clients only when there is no Host specific
option for the client.
If this option is not configured and there is no Host option too, then the global option
will be preferred.
3.5.5.2 Configuring DNS Option with Single IP Address
Refer Figure 3-1 for Topology Setup. This is a pool specific option and will be
offered to the DHCP client as a configuration parameter.
1. Execute the following commands in FDN40-1 to configure DNS option.
Enter the Global Configuration mode.
UltOs# configure terminal
Create pool 1 and enter to DHCP pool configuration mode.
UltOs(config)# ip dhcp pool 1
Configure the DNS IP address as 12.0.0.6.
UltOs(dhcp-config)# dns-server 12.0.0.6
Exit from the DHCP Pool configuration mode.
UltOs(dhcp-config)# end
2. View the domain name option configured using the following command.
UltOs# show ip dhcp server pools
The output in FDN40-1 is
Pool Id : 1
CHAPTER 3: DHCP SERVER
Configuration User Manual 68
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
-----------------------------------
Subnet : 12.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 95400 secs
Utilization threshold : 50%
Start Ip : 12.0.0.1
End Ip : 12.0.0.100
Exclude Address Start IP : 12.0.0.1
Exclude Address End IP : 12.0.0.10
Subnet Options
--------------
Code : 6, Value : 12.0.0.6
Code : 15, Value : future
Notes:
This option will be offered to the DHCP client only when there is no Host
specific option for the client.
If this option is not configured and there is no Host option too, then the
global option will be preferred.
3.5.5.3 Configuring NTP Option with Two IP Addresses
Refer Figure 3-1 for Topology Setup. This is a pool specific option and will be
offered to the DHCP client as a configuration parameter.
1. Execute the following commands in FDN40-1 to configure NTP option.
Enter the Global Configuration mode.
UltOs# configure terminal
Create pool 1 and enter DHCP pool configuration mode.
UltOs(config)# ip dhcp pool 1
Configure the two NTP IP addresses as 12.0.0.6 and 15.0.0.5.
UltOs(dhcp-config)# ntp-server 12.0.0.6 15.0.0.5.
Exit from the DHCP Pool configuration mode.
UltOs(dhcp-config)# end
2. View the configured ntp server option using the following command.
UltOs# show ip dhcp server pools
The output in FDN40-1 is
Pool Id : 1
-----------------------------------
Subnet : 12.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 95400 secs
CHAPTER 3: DHCP SERVER
Configuration User Manual 69
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Utilization threshold : 50%
Start Ip : 12.0.0.1
End Ip : 12.0.0.100
Exclude Address Start IP : 12.0.0.1
Exclude Address End IP : 12.0.0.10
Subnet Options
--------------
Code : 42, Value : 12.0.0.6 15.0.0.5
Notes:
This option will be offered to the DHCP client only when there is no Host
specific option for the client.
If this option is not configured and there is no Host option too, then the
global option will be preferred.
3.5.5.4 Configuring Default Router
Refer Figure 3-1 for Topology Setup. This is a pool specific option and will be
offered to the clients as a configuration parameter.
1. Execute the following commands in FDN40-1.
Enter the Global Configuration mode.
UltOs# configure terminal
Create pool 1 and enter into DHCP pool configuration mode.
UltOs(config)# ip dhcp pool 1
Configure the default router for this pool as 12.0.0.3.
UltOs(dhcp-config)# default-router 12.0.0.3
Exit from the DHCP Pool configuration mode.
UltOs(dhcp-config)# end
2. View the default router configured using the following command.
UltOs# show ip dhcp server pools
The output in FDN40-1 is
Pool Id : 1
--------------------------------------
Subnet : 12.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 95400 secs
Utilization threshold : 50%
Start Ip : 12.0.0.1
End Ip : 12.0.0.100
Exclude Address Start IP : 12.0.0.1
Exclude Address End IP : 12.0.0.10
CHAPTER 3: DHCP SERVER
Configuration User Manual 70
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Subnet Options
--------------
Code : 3, Value : 12.0.0.3
Code : 6, Value : 12.0.0.6
Code : 15, Value : future
Code : 46, Value : 1
This option will be offered to the DHCP clients only when there is no Host specific
option for the client.
If this option is not configured and there is no Host option too, then the global option
will be preferred.
3.5.5.5 Configuring Options Specific to Address Pools
Refer Figure 3-1 for Topology Setup. Apart from the options in the previous
sections, options can be specified using the option codes specified in RFC
2132. These options will be offered to the clients as a configuration
parameter.
1. Execute the following commands in FDN40-1.
Enter the Global Configuration mode.
UltOs# configure terminal
Create pool 1 and enter into DHCP pool configuration mode.
UltOs(config)# ip dhcp pool 1
Configure the option 1 (Subnet mask option) as 255.255.0.0.
UltOs(dhcp-config)# option 1 ip 255.255.0.0
Exit from the DHCP Pool configuration mode.
UltOs(dhcp-config)# end
2. View the options configured in the Switch using the following commands.
UltOs# show ip dhcp server pools
The output in FDN40-1 is
Pool Id : 1
----------------------------------
Subnet : 12.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 95400 secs
Utilization threshold : 50%
Start Ip : 12.0.0.1
End Ip : 12.0.0.100
Exclude Address Start IP : 12.0.0.1
Exclude Address End IP : 12.0.0.10
Subnet Options
--------------
CHAPTER 3: DHCP SERVER
Configuration User Manual 71
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Code : 1, Value : 255.255.0.0
Code : 3, Value : 12.0.0.3
Code : 6, Value : 12.0.0.6
Code : 15, Value : future
Code : 46, Value : 1
This option will be offered to the DHCP clients only when there is no Host specific
option for the client.
If this option is not configured and there is no Host option too, then the global option
will be preferred.
Refer RFC 2132 to get the complete list of DHCP options and their corresponding
codes.
3.5.5.6 WEB Configuration for DHCP Pool Options
DHCP Pool options can be configured through WEB interface using the
DHCP Pool Options Settings screen (Navigation - Layer3 Management
>DHCP Server > Pool Options)
Screen 3-4: DHCP Pool Options Settings
3.5.6 Configuring Host Specific Options
Refer Figure 3-1 for Topology Setup. Apart from the global options and
subnet options, options can be specified for Hosts. This configuration will be
used for the specific hosts as a configuration parameter.
3.5.6.1 CLI Configuration
1. Execute the following commands in FDN40-1.
Enter the Global Configuration mode.
CHAPTER 3: DHCP SERVER
Configuration User Manual 72
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# configure terminal
Create pool 1 and enter into the DHCP pool configuration mode.
UltOs(config)# ip dhcp pool 1
Configure the option 1 (subnet mask) as 255.255.255.0 for the client
with MAC address 00:11:22:33:44:55.
UltOs(dhcp-config)# host hardware-type 1 client-identifier
00:11:22:33:44:55 option 1 ip 255.255.255.0
Exit from the DHCP Pool configuration mode.
UltOs(dhcp-config)# end
2. View the options configured in the switch using the following command.
UltOs# show ip dhcp server pools
The output in FDN40-1 is
Pool Id : 1
-------------------------------------------
Subnet : 12.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 3600 secs
Utilization threshold : 75%
Start Ip : 12.0.0.1
End Ip : 12.255.255.255
Host Options
------------
Hardware type : 1
Client Identifier : 00:11:22:33:44:55
Code : 1, Value : 255.255.255.0
This option will be offered to the DHCP clients with hardware address
00:11:22:33:44:55 even if there is pool specific option or global option with this option
code.
Refer RFC 2132 to get the complete list of DHCP options and their corresponding
codes.
Configuration User Manual 73
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
4
RIP
4.1 Protocol Description
RIP (Routing Information Protocol) is a widely-used protocol for managing
router information within a self-contained network such as a corporate local
area network or an interconnected group of such LANs. RIP is classified by
the Internet Engineering Task Force (IETF) as one of several internal
gateway protocols (Interior Gateway Protocol).
RIP sends routing-update messages at regular intervals and when the
network topology changes. When a Router receives a routing update that
includes changes to an entry, it updates its routing table to reflect the new
route. The metric value for the path is increased by 1, and the sender is
indicated as the next hop. RIP routers maintain only the best route (the route
with the lowest metric value) to a destination. After updating its routing table,
the router immediately begins transmitting routing updates to inform other
network routers of the change. These updates are sent independently of the
regularly scheduled updates that RIP routers send. RIP uses a hop count as
a way to determine network distance.
The RIP basic and advanced configuration tasks are described in the
following section(s)
CHAPTER 4: RIP
Configuration User Manual 74
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
4.2 Topology
Figure 4-1: RIP Topology 1
Figure 4-2: RIP Topology 2
4.3 Configuration Guidelines
The following configuration needs to be done in all the switches, FDN40-1
and FDN40-2.
This is a prerequisite for configuring the RIP.
4.3.1 Configuration in FDN40-1
Refer Figure 4-1 for Setup.
Prerequisite: Configuration of VLAN Interfaces (vlan1 and vlan2)
UltOs# configure terminal
UltOs(config)# interface vlan 1
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.0.0.1 255.255.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 1
UltOs(config-vlan)# ports lan 0/1 untagged lan 0/1
FDN40-1
FDN40-2
FDN40-2
FDN40-1
FDN40-3
CHAPTER 4: RIP
Configuration User Manual 75
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 2
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 20.0.0.1 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 2
UltOs(config-vlan)# ports lan 0/2 untagged lan 0/2
UltOs(config-vlan)# exit
UltOs(config)# interface lan 0/2
UltOs(config-if)# switchport pvid 2
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
4.3.2 Configuration in FDN40-2
Refer Figure 4-1 for Setup.
Prerequisite: Configuration of VLAN Interfaces (vlan1 and vlan3 )
UltOs# configure terminal
UltOs(config)# interface vlan 1
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.0.0.2 255.255.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 1
UltOs(config-vlan)# ports lan 0/1 untagged lan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 3
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 30.2.2.2 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 3
UltOs(config-vlan)# ports lan 0/3 untagged lan 0/3
UltOs(config-vlan)# exit
UltOs(config)# interface lan 0/3
UltOs(config-if)# switchport pvid 3
UltOs(config-if)# no shutdown
CHAPTER 4: RIP
Configuration User Manual 76
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-if)# exit
4.3.3 Configuration in FDN40-3
Refer Figure 4-2 for Setup.
Prerequisite: Configuration of VLAN Interfaces (vlan1 and vlan4)
UltOs# configure terminal
UltOs(config)# interface vlan 1
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.0.0.3 255.255.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 1
UltOs(config-vlan)# ports lan 0/1 untagged lan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 4
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 40.2.2.2 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 4
UltOs(config-vlan)# ports lan 0/4 untagged lan 0/4
UltOs(config-vlan)# exit
UltOs(config)# interface lan 0/4
UltOs(config-if)# switchport pvid 4
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
4.4 Default Configurations
None
4.5 RIP Configurations
4.5.1 Enabling and Disabling RIP
4.5.1.1 Enabling RIP
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40- 2) before configuring RIP. RIP is disabled by default.
CHAPTER 4: RIP
Configuration User Manual 77
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
1. Execute the following commands in the Switch FDN40-1 to enable RIP.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Exit from the router configuration mode.
UltOs(config-router)# exit
4.5.1.2 Disabling RIP
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
1. Execute the following commands in the switch FDN40-1 to disable RIP.
Enter the Global Configuration mode.
UltOs# configure terminal
Disable RIP globally in the switch FDN40-1.
UltOs(config)# no router rip
Exit from the Global configuration mode.
UltOs(config)# exit
4.5.1.3 WEB Configuration
RIP can be enabled/ disabled through WEB interface using the RIP VRF
Creation screen (Navigation - Layer3 Management > RIP>RIP VRF
Creation)
Screen 4-1: RIP VRF Creation
4.5.2 Enabling RIP on an IP Network
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
CHAPTER 4: RIP
Configuration User Manual 78
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
4.5.2.1 CLI Configuration
1. Execute the following commands in the switch FDN40-1.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Exit from the router configuration mode.
UltOs(config-router)# exit
2. View the RIP interface using the following command.
UltOs# show ip rip statistics
RIP Global Statistics:
----------------------
Total number of route changes is 0
Total number of queries responded is 0
Total number of periodic updates sent is 11
Total number of dropped packets is 0
RIP Interface Statistics:
-------------------------
Interface Periodic BadRoutes Triggered
BadPackets Admin
IP Address Updates Sent Received Updates Sent
Received Status
----------- ------------ --------- ------------ -
--------- ------
10.0.0.1 11 0 0
0 Enabled
3. View the RIP route
UltOs# show ip rip database
10.0.0.0/8[1] summary route
10.0.0.0/16 directly connected, vlan1
RIP can be enabled on Pseudo wire interface similar to RIP on router port.
4.5.2.2 WEB Configuration
RIP can be enabled/ disabled on an IP network through WEB interface using
the RIP Interface screen (Navigation - Layer3 Management > RIP >
Interface Configuration)
CHAPTER 4: RIP
Configuration User Manual 79
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 4-2: RIP Interface
4.5.3 Configuring RIP Security
Refer the section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
For enabling authentication, refer section 4.5.13.2.
4.5.3.1 CLI Configuration
Execute the following commands in the switch FDN40-1 to enable RIP
security.
1. Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Enable RIP security.
UltOs(config-router)# ip rip security minimum
Exit from the router configuration mode.
UltOs(config-router)# exit
2. Execute the following commands in the switch FDN40-1 to disable RIP
security.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Disable RIP security.
UltOs(config-router)# no ip rip security
Exit from the router configuration mode.
UltOs(config-router)# exit
CHAPTER 4: RIP
Configuration User Manual 80
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
4.5.3.2 WEB Configuration
RIP security can be set to maximum or minimum through WEB interface
using the RIP Basic Settings screen (Navigation - Layer3 Management >
RIP > Basic Settings)
Screen 4-3: RIP Basic Settings
4.5.4 Configuring RIP Packets Retransmission Interval and Retries
Count
Refer the section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
4.5.4.1 CLI Configuration
1. Execute the following commands in the switch FDN40-1 to configure the
RIP packets retransmission interval and retries count.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Configure the retransmission interval.
UltOs(config-router)# ip rip retransmission interval 10
Configure the retransmission retry count.
UltOs(config-router)# ip rip retransmission retries 20
2. View the configured retransmission interval and the number of retries
count using the following command.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 10 seconds
Number of retransmission retries is 20
CHAPTER 4: RIP
Configuration User Manual 81
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Default metric is 3
Auto-Summarisation of routes is enabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is none
Split Horizon with poissoned reverse is enabled
Restricts default route installation
Restricts default route origination
Configure the default retransmission interval.
UltOs(config-router)# no ip rip retransmission interval
Configure the default retransmission retry count.
UltOs(config-router)# no ip rip retransmission retries
Exit from the router configuration mode.
UltOs(config-router)# exit
3. View the default retransmission interval and number of retries count
using the following command.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is enabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specifi Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
CHAPTER 4: RIP
Configuration User Manual 82
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is none
Split Horizon with poissoned reverse is enabled
Restrcts default route installation
Restricts default route origination
4.5.4.2 WEB Configuration
RIP retransmission interval and maximum retries count can be configured
through WEB interface using the RIP Basic Settings screen. For
screenshot, refer section 4.5.3.2.
4.5.5 Configuring RIP Neighbor
Refer the Section 4.3 for configuration guidelines and Figure 4-2 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1, FDN40-2 and FDN40-3 ) before configuring RIP.
4.5.5.1 CLI Configuration
Execute the following commands in the switch FDN40-1 to configure the RIP
neighbor.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16)
UltOs(config-router)# network 10.0.0.1
Configure the RIP trusted neighbor.
UltOs(config-router)# neighbor 10.0.0.2
In FDN40-1, you can view only the routes that are sent as RIP
updates from the neighbor router FDN40-2 (10.0.0.2) .
Delete the configured RIP neighbor.
UltOs(config-router)# no neighbor 10.0.0.2
In FDN40-1, you can view the routes that are sent as RIP updates
from both the neighbor routers FDN40-2 (10.0.0.2) and FDN40-
3.(10.0.0.3).
Exit from the router configuration mode.
UltOs(config-router)# exit
CHAPTER 4: RIP
Configuration User Manual 83
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
4.5.5.2 WEB Configuration
RIP Neighbor can be set to configured through WEB interface using the RIP
Neighbour List screen (Navigation - Layer3 Management > RIP >
Neighbors List)
Screen 4-4: RIP Neighbour List
4.5.6 Configuring RIP Passive Interface
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
4.5.6.1 CLI Configuration
1. Execute the following commands in the switch FDN40-1 to configure RIP
passive interface.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16)
UltOs(config-router)# network 10.0.0.1
Configure the passive interface.
UltOs(config-router)# passive-interface vlan 1
Exit from the router configuration mode.
UltOs(config-router)# exit
2. View the passive interface configuration information using the following
command.
UltOs# show ip rip statistics
RIP Global Statistics:
----------------------
CHAPTER 4: RIP
Configuration User Manual 84
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Total number of route changes is 0
Total number of queries responded is 0
Total number of periodic updates sent is 0
Total number of dropped packets is 0
RIP Interface Statistics:
-------------------------
Interface Periodic BadRoutes Triggered
BadPackets Admin
IP Address Updates Sent Received Updates Sent
Received Status
----------- ------------ --------- ------------ -
--------- ------
10.0.0.1 0 0 0
0 Passive
View that no routing updates are sent over the passive interface
vlan1
3. Execute the following commands in the switch FDN40-1 to disable RIP
passive interface status.
Enter Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Disable the passive interface status.
UltOs(config-router)# no passive-interface vlan 1
Exit from the router configuration mode.
UltOs(config-router)# exit
4. View the RIP interface for the periodic updates sent over it using the
following command.
UltOs# show ip rip statistics
RIP Global Statistics:
----------------------
Total number of route changes is 0
Total number of queries responded is 0
Total number of periodic updates sent is 1
Total number of dropped packets is 0
RIP Interface Statistics:
-------------------------
Interface Periodic BadRoutes Triggered
BadPackets Admin
CHAPTER 4: RIP
Configuration User Manual 85
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
IP Address Updates Sent Received Updates Sent
Received Status
----------- ------------ --------- ------------ -
--------- ------
10.0.0.1 1 0 0
0 Enabled
4.5.6.2 WEB Configuration
RIP Interface can be configured as passive using the Status field in the RIP
Interface screen (Navigation - Layer3 Management > RIP > Interface
Configuration)
Screen 4-5: RIP Interface - Passive
4.5.7 Configuring Output-delay
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
4.5.7.1 CLI Configuration
1. Execute the following commands in the switch FDN40-1 to enable the
interpacket delay.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Enable the interpacket delay for RIP updates
UltOs(config-router)# output-delay
Exit from the router configuration mode.
UltOs(config-router)# end
2. View the enabled Output-delay using the following command.
UltOs# show ip protocols
Routing Protocol is rip
CHAPTER 4: RIP
Configuration User Manual 86
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
RIP2 security level is Maximum
Redistributing : rip
Output Delay is Enabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is enabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is none
Split Horizon with poissoned reverse is enabled
Restricts default route installation
Restricts default route origination
3. Execute the following commands in the switch FDN40-1 to disable the
interpacket delay.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Disable interpacket delay for RIP updates.
UltOs(config-router)# no output-delay
Exit from the router configuration mode.
UltOs(config-router)# end
4. View the disabled Output-delay using the following command.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
CHAPTER 4: RIP
Configuration User Manual 87
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is enabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is none
Split Horizon with poissoned reverse is enabled
Restricts default route installation
Restricts default route origination
4.5.7.2 WEB Configuration
Output Delay can be configured through WEB interface using the RIP Basic
Settings screen. For screenshot, refer section 4.5.3.2
4.5.8 Configuring Redistribution
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
4.5.8.1 CLI Configuration
Execute the following commands in the switch FDN40-1 to configure
redistribution.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Configure the redistribution of static routes into RIP domain.
UltOs(config-router)# redistribute static
Exit from the router configuration mode.
UltOs(config-router)# end
CHAPTER 4: RIP
Configuration User Manual 88
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
4.5.8.2 WEB Configuration
RIP Redistribution can be configured through WEB interface using the RRD
RIP Configuration screen (Navigation - Layer3 Management > RRD > RIP)
Screen 4-6: RRD RIP Configuration
4.5.8.3 Sample Configuration to Test Redistribution
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
1. Execute the following commands in the switch FDN40-1 to test
redistribution.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16)
UltOs(config-router)# network 10.0.0.1
Configure redistribution of static routes in the RIP domain
UltOs(config-router)# redistribute static
UltOs(config-router)# exit
Add static routes
UltOs(config)# ip route 50.0.0.0 255.0.0.0 vlan 2
CHAPTER 4: RIP
Configuration User Manual 89
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# ip route 60.0.0.0 255.0.0.0 vlan 2
UltOs(config)# ip route 70.0.0.0 255.0.0.0 vlan 2
UltOs(config)# ip route 80.0.0.0 255.0.0.0 vlan 2
UltOs(config)# end
2. Execute the following commands in the switch FDN40-2 to test
redistribution.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-2.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.2/16)
UltOs(config-router)# network 10.0.0.2
UltOs# config terminal
UltOs(config)# router rip
UltOs(config-router)# network 10.0.0.2
UltOs(config-router)# end
3. View the redistribution of static routes enabled using the following
command.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip, static
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is enabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is none
Split Horizon with poissoned reverse is enabled
CHAPTER 4: RIP
Configuration User Manual 90
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Restricts default route installation
Restricts default route origination
4. View the RIP route entries for the static routes added in FDN40-1. (Static
routes added in FDN40-1 with metric as 3 are redistributed into the RIP
domain. In FDN40-2, view the redistributed static routes with metric as
4.) using the following command.
UltOs# show ip rip database
10.0.0.0/8 [1] auto-summary
10.0.0.0/16 [1] directly connected, vlan1
50.0.0.0/8 [4] auto-summary
50.0.0.0/8 [4] via 10.0.0.1, vlan1
60.0.0.0/8 [4] auto-summary
60.0.0.0/8 [4] via 10.0.0.1, vlan1
70.0.0.0/8 [4] auto-summary
70.0.0.0/8 [4] via 10.0.0.1, vlan1
80.0.0.0/8 [4] auto-summary
80.0.0.0/8 [4] via 10.0.0.1, vlan1
UltOs# show ip route
C 10.0.0.0/16 is directly connected, vlan1
C 30.2.2.0/24 is directly connected, vlan3
R 50.0.0.0/8 [4] via 10.0.0.1
R 60.0.0.0/8 [4] via 10.0.0.1
R 70.0.0.0/8 [4] via 10.0.0.1
R 80.0.0.0/8 [4] via 10.0.0.1
5. Execute the following commands in the switch FDN40-1 to disable
redistribution.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Disable the redistribution of static routes into RIP domain
UltOs(config-router)# no redistribute static
UltOs(config-router)# end.
6. View in FDN40-2, the RIP route entries for the static routes added in
FDN40-1, which are made as unreachable with metric as infinity (16)
(Static routes added in FDN40-1 are redistributed into the RIP domain.)
using the following command.
UltOs# show ip rip database
CHAPTER 4: RIP
Configuration User Manual 91
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
10.0.0.0/8 [1] auto-summary
10.0.0.0/16 [1] directly connected, vlan1
50.0.0.0/8 [16] via 10.0.0.1, vlan1
60.0.0.0/8 [16] via 10.0.0.1, vlan1
70.0.0.0/8 [16] via 10.0.0.1, vlan1
80.0.0.0/8 [16] via 10.0.0.1, vlan1
7. View the RIP route entries for the redistributed static routes are deleted
from the IP routing table.
UltOs# show ip route
C 10.0.0.0/16 is directly connected, vlan1
C 30.2.2.0/24 is directly connected, vlan3
4.5.9 Configuring Default-metric
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
4.5.9.1 CLI Configuration
1. Execute the following commands in the switch FDN40-1 to configure the
default-metric.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Configure default-metric for redistributed routes in the RIP domain.
UltOs(config-router)# default-metric 10
Configure redistribution of static routes into RIP domain.
UltOs(config-router)# redistribute static
Exit from the router configuration mode.
UltOs(config-router)# end
4.5.9.2 WEB Configuration
RIP default metric can be configured through WEB interface using the RRD
RIP Configuration screen. For screenshot, refer section 4.5.8.2.
4.5.9.3 Sample Configuration to Test Default-metric
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
CHAPTER 4: RIP
Configuration User Manual 92
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2. Execute the following commands in the switch FDN40-1 to test default-
metric.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Configure default-metric as 10 for redistributing routes into RIP
domain.
UltOs(config-router)# default-metric 10
Configure redistribution of static routes into RIP domain.
UltOs(config-router)# redistribute static
UltOs(config-router)# exit
Add static routes.
UltOs(config)# ip route 50.0.0.0 255.0.0.0 vlan 2
UltOs(config)# ip route 60.0.0.0 255.0.0.0 vlan 2
UltOs(config)# ip route 70.0.0.0 255.0.0.0 vlan 2
UltOs(config)# ip route 80.0.0.0 255.0.0.0 vlan 2
UltOs(config)# end
3. Execute the following commands in the switch FDN40-2 to test default-
metric.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.2/16).
UltOs(config-router)# network 10.0.0.2
4. View the metric for redistributed RIP route entries as 10 in FDN40-1
using the following command.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 10
Auto-Summarisation of routes is enabled
CHAPTER 4: RIP
Configuration User Manual 93
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is none
Split Horizon with poissoned reverse is enabled
Restricts default route installation
Restricts default route origination
UltOs# show ip rip database
10.0.0.0/8 [1] auto-summary
10.0.0.0/16 [1] directly connected, vlan1
50.0.0.0/8 [10] auto-summary
50.0.0.0/8 [10] redistributed via 0.0.0.0
60.0.0.0/8 [10] auto-summary
60.0.0.0/8 [10] redistributed via 0.0.0.0
70.0.0.0/8 [10] auto-summary
70.0.0.0/8 [10] redistributed via 0.0.0.0
80.0.0.0/8 [10] auto-summary
80.0.0.0/8 [10] redistributed via 0.0.0.0
5. Execute the following commands in the switch FDN40-1 to disable
redistribution.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Disable route redistribution.
UltOs(config-router)# no redistribute static
UltOs(config-router)# end.
Configure default metric for redistributed routes.
UltOs(config-router)# no default-metric
Enable static route redistribution.
UltOs(config-router)# redistribute static
CHAPTER 4: RIP
Configuration User Manual 94
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-router)# end.
6. View in FDN40-1, the metric for redistributed RIP route entries as 3 using
the following command.
UltOs# show ip rip database
10.0.0.0/8[1] summary route
10.0.0.0/16 directly connected, vlan1
50.0.0.0/8[3] summary route
50.0.0.0/8 [3] redistributed via vlan2
60.0.0.0/8[3] summary route
60.0.0.0/8 [3] redistributed via vlan2
70.0.0.0/8[3] summary route
70.0.0.0/8 [3] redistributed via vlan2
80.0.0.0/8[3] summary route
80.0.0.0/8 [3] redistributed via vlan2
4.5.10 Configuring Auto-summary
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
4.5.10.1 CLI Configuration
1. Execute the following commands in the switch FDN40-1 to configure
auto-summary.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Disable auto-summary of RIP routes.
UltOs(config-router)# auto-summary disable
2. View the disabled auto summarization using the following command.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
CHAPTER 4: RIP
Configuration User Manual 95
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Default metric is 3
Auto-Summarisation of routes is disabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is none
Split Horizon with poissoned reverse is enabled
Restricts default route installation
Restricts default route origination
3. Execute the following commands in the switch FDN40-1 to enable auto-
summary.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable auto-summary of RIP routes.
UltOs(config-router)# auto-summary Enable
Exit from the router configuration mode.
UltOs(config-router)# end
4. View the enabled auto summarization using the following command.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is Enabled
Routing for Networks :
10.0.0.0
CHAPTER 4: RIP
Configuration User Manual 96
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is none
Split Horizon with poissoned reverse is enabled
Restricts default route installation
Restricts default route origination
4.5.10.2 WEB Configuration
Auto Summary status can be configured through WEB interface using the
RIP Basic Settings screen. For screenshot, refer section 4.5.3.2
4.5.11 Configuring Interface Specific RIP Parameters
The following configurations are done in the interface mode.
1. Execute the following commands in the switch to configure interface
specific RIP parameters.
Enter the Global Configuration mode.
UltOs# configure terminal
Enter the interface configuration mode.
UltOs(config)# interface vlan 1
UltOs(config-if)#
Exit from the interface configuration mode
UltOs(config-if)#exit
4.5.11.1 Configuring RIP Default Route Propagation
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
1. Execute the following commands in the switch FDN40-1 to configure RIP
default route propagation.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
CHAPTER 4: RIP
Configuration User Manual 97
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-router)# network 10.0.0.1
Exit router configuration mode.
UltOs(config-router)# exit
Enter interface configuration mode.
UltOs(config)# interface vlan 1
Configure RIP default route origination.
UltOs(config-if)# ip rip default route originate 10
Disable rip default route origination.
UltOs(config-if)# no ip rip default route originate
Refer Section 4.5.11.2.1 for sample configuration to test Default Route Origination
and Default Route Installation..
4.5.11.2 Configuring to Install Default Route
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
Execute the following commands in the switch FDN40-1 to install the default
route.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Exit router configuration mode.
UltOs(config-router)# exit
Enter interface configuration mode.
UltOs(config)# interface vlan 1
Enable installation of default route.
UltOs(config-if)# ip rip default route install
Disable installation of default route.
UltOs(config-if)# no ip rip default route install
4.5.11.2.1 Sample Configuration to test Default Route Origination and Installation
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
1. Execute the following commands in both the switches.
Configure the following in FDN40-1 to test Default Route Origination
and Default Route Installation:
UltOs# configure terminal
CHAPTER 4: RIP
Configuration User Manual 98
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# router rip
UltOs(config-router)# network 10.0.0.1
UltOs(config-router)# exit
UltOs(config)# interface vlan 1
Enable installation of default route.
UltOs(config-if)# ip rip default route install
UltOs(config-if)# end
UltOs#
Configure the following in FDN40-2 to test Default Route Origination
and Default Route Installation.
UltOs# configure terminal
UltOs(config)# router rip
UltOs(config-router)# network 10.0.0.2
UltOs(config-router)# exit
UltOs(config)# interface vlan 1
Enable default route origination.
UltOs(config-if)# ip rip default route originate 11
UltOs(config-if)# end
2. View in FDN40-2, the RIP response packet sent out through the interface
vlan 1 in the switch FDN40-2. The RIP response packets will have a
default route. .
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is Enabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
CHAPTER 4: RIP
Configuration User Manual 99
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Send version is 1 2, receive version is 1 2
Authentication type is none
Split Horizon with poissoned reverse is enabled
Restricts default route installation
Originate default route
3. View in FDN40-1, the default route with next hop as 10.0.0.2 (FDN40-2
interface vlan 1 IP address) and metric as 12 (11+1) using the following
command.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is Enabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is none
Split Horizon with poissoned reverse is enabled
Installs default route received
Restricts default route origination
UltOs# show ip rip database
0.0.0.0/0 [12] via 10.0.0.2, vlan1
10.0.0.0/8 [1] auto-summary
10.0.0.0/16 [1] directly connected, vlan1
UltOs# show ip route
R 0.0.0.0/0 [12] via 10.0.0.2
CHAPTER 4: RIP
Configuration User Manual 100
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
C 10.0.0.0/16 is directly connected, vlan1
C 20.0.0.0/24 is directly connected, vlan2
4.5.11.3 Configuring Version for Receiving RIP Advertisement
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
1. Execute the following commands in the switch FDN40-1 for configuring
version for receiving RIP advertisements.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Exit router configuration mode.
UltOs(config-router)# exit
Enter interface configuration mode.
UltOs(config)# interface vlan 1
Configure version of RIP packets to be received over the interface
vlan 1.
UltOs(config-if)# ip rip receive version 1
2. View how FDN40-1 will receive only RIP version 1 packets over the
interface vlan1 using the following command.
View the RIP receive version in interface vlan 1 is 1.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is Enabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
CHAPTER 4: RIP
Configuration User Manual 101
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1
Authentication type is none
Split Horizon with poissoned reverse is enabled
Restricts default route installation
Restricts default route origination
4.5.11.4 Configuring Version for Transmitting RIP Advertisement
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
1. Execute the following commands to configure version for transmitting RIP
advertisement.
Enter Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Exit router configuration mode.
UltOs(config-router)# exit
Enter interface configuration mode.
UltOs(config)# interface vlan 1
Configure version of RIP packets to be sent over the interface vlan 1.
UltOs(config-if)# ip rip send version 1
2. View how FDN40-1 will send (transmit) only RIP version 1 packets over
the interface vlan1 using the following command.
View the RIP send version in interface vlan 1 is 1.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is Enabled
Routing for Networks :
CHAPTER 4: RIP
Configuration User Manual 102
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1, receive version is 1 2
Authentication type is none
Split Horizon with poissoned reverse is enabled
Restricts default route installation
Restricts default route origination
Configure the default RIP packets send version
UltOs(config-if)# no ip rip send version
4.5.11.5 Configuring Timer Basic
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
1. Execute the following commands in the switch FDN40-1 to configure
Timer Basic.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Exit router configuration mode.
UltOs(config-router)# exit
Enter interface configuration mode.
UltOs(config)# interface vlan 1
Configure basic timers.
UltOs(config-if)# timers basic 60 120 120
UltOs(config-if)# end
2. View the RIP update packets that are sent after 60 seconds and the
configured timer values using the following command.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
CHAPTER 4: RIP
Configuration User Manual 103
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is Enabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 60 seconds
Invalid after 120 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is none
Split Horizon with poissoned reverse is enabled
Restricts default route installation
Restricts default route origination
4.5.11.6 Configuring RIP Split Horizon
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
By default, split horizon with poisson reverse will be enabled on all the RIP
interfaces.
1. Execute the following commands in the switch FDN40-1 to configure RIP
Split Horizon.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Exit router configuration mode.
UltOs(config-router)# exit
Enter interface configuration mode.
UltOs(config)# interface vlan 1
CHAPTER 4: RIP
Configuration User Manual 104
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Enable split horizon.
UltOs(config-if)# ip split-horizon
2. View the split horizon enabled in FDN40-1 using the following command.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is Enabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is none
Split Horizon is enabled
Restricts default route installation
Restricts default route origination
Disable split horizon.
UltOs(config-if)# no ip split-horizon
Enable split horizon with poison reverse.
UltOs(config-if)# ip split-horizon poisson
UltOs(config-if)# end
4.5.11.7 WEB Configuration for RIP Interface Paramters
RIP interface parameters can be configured through WEB interface using the
RIP Interface screen (Navigation - Layer3 Management > RIP > Interface
Configuration)
CHAPTER 4: RIP
Configuration User Manual 105
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 4-7: RIP Interface - Parameters
4.5.12 Configuring RIP Summary-address
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
4.5.12.1 CLI Configuration
Execute the following commands in the switch FDN40-1 to configure RIP
summary-address.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Disable auto-summary feature.
UltOs(config-router)# auto-summary disable
Exit router configuration mode.
UltOs(config-router)# exit
Enter the interface configuration mode.
UltOs(config)# interface vlan 1
Configure the version of RIP packets to be sent over the interface
vlan 1.
UltOs(config-if)# ip rip summary-address 40.0.0.0 255.0.0.0
UltOs(config-if)# end
4.5.12.2 WEB Configuration
RIP Summary Address can be configured through WEB interface using the
RIP Interface Specific Address Summarization screen (Navigation -
Layer3 Management > RIP > Interface Configuration)
CHAPTER 4: RIP
Configuration User Manual 106
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 4-8: RIP Interface Specific Address Summarization
4.5.12.3 Sample Configuration to configure RIP summary-address
Refer the Section 4.3 and Figure 4-1 for the Setup. The prerequisite
configuration needs to be done in the switches (FDN40-1 and FDN40-2)
before configuring RIP.
1. Execute the following configuration commands in FDN40-1 to configure
RIP summary-address.
UltOs# configure terminal
UltOs(config)# router rip
UltOs(config-router)# network 10.0.0.1
UltOs(config-router)# redistribute all
Disable auto-summary feature.
UltOs(config-router)# auto-summary disable
UltOs(config-router)# exit
Configure Static routes:
UltOs(config-router)# ip route 40.1.0.0 255.255.0.0 vlan 2
UltOs(config-router)# ip route 40.2.0.0 255.255.0.0 vlan 2
UltOs(config-router)# ip route 40.3.0.0 255.255.0.0 vlan 2
UltOs(config-router)# ip route 40.4.0.0 255.255.0.0 vlan 2
Configure Summary address for 20.0.0.0/8:
UltOs(config)# interface vlan 1
UltOs(config-if)# ip rip summary-address 40.0.0.0 255.0.0.0
UltOs(config-if)#end
UltOs#
CHAPTER 4: RIP
Configuration User Manual 107
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2. Execute the following configuration commands in FDN40-2.
UltOs# config terminal
UltOs(config)# router rip
UltOs(config-router)# network 10.0.0.2
UltOs(config-router)# end
4.5.13 Configuring Interface Specific Authentication
Refer the section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
4.5.13.1 CLI Configuration
1. Execute the following commands in the switch FDN40-1 to enable
interface specific authentication.
Enter the Global Configuration mode.
UltOs# configure terminal
Enable RIP globally in the switch FDN40-1.
UltOs(config)# router rip
Enable RIP over the interface vlan 1 (IP address 10.0.0.1/16).
UltOs(config-router)# network 10.0.0.1
Exit router configuration mode.
UltOs(config-router)# exit
Enter interface configuration mode.
UltOs(config)# interface vlan 1
Enable md5 authentication.
UltOs(config-if)# ip rip authentication mode md5 key-chain
12345
Enable sha-1 Crypto authentication
UltOs(config-if)# ip rip auth-type sha-1
Enable sha-1 Crypto authentication
UltOs(config-if)# ip rip auth-type sha-256
Enable sha-1 Crypto authentication
UltOs(config-if)# ip rip auth-type sha-384
Enable sha-1 Crypto authentication
UltOs(config-if)# ip rip auth-type sha-512Create crypto
authentication key-id
UltOs(config-if)# ip rip authentication key-id 1 key FSS
Configure the start-generate time for crypto authentication key-id
UltOs(config-if)# ip rip key-id 1 start-generate 2013-05-
12,21:40:20
CHAPTER 4: RIP
Configuration User Manual 108
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Configure the stop-generate time for crypto authentication key-id
UltOs(config-if)# ip rip key-id 1 stop-generate 2013-05-
12,22:40:20
Configure the start-accept time for crypto authentication key-id
UltOs(config-if)# ip rip key-id 1 start-accept 2013-05-12,21:40:20
Configure the stop-accept time for crypto authentication key-id
UltOs(config-if)# ip rip key-id 1 stop-accept 2013-05-12,22:40:20
Delete the configured crypto authentication key-id
UltOs(config-if)# no ip rip authentication key-id 1
Disable authentication.
UltOs(config-if)# no ip rip authentication
2. Execute the following commands in FDN40-1 to enable authentication
last-key lifetime status.
Enter the Global Configuration mode.
UltOs# configure terminal
Configure the lifetime status for authentication key-id.
UltOs(config)# rip authentication last-key infinite lifetime true
4.5.13.2 WEB Configuration
RIP Authentication can be configured through WEB interface using the RIP
Security Settings screen (Navigation - Layer3 Management > RIP >
Security Settings)
Screen 4-9: RIP Security Settings
4.5.13.3 Sample Configuration for Enabling Authentication
Refer the section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
1. Execute the following commands in both the switches for enabling
authentication.
Configure the following in FDN40-1:
CHAPTER 4: RIP
Configuration User Manual 109
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# config terminal
UltOs(config)# router rip
UltOs(config-router)# network 10.0.0.1
UltOs(config-router)# redistribute all
UltOs(config-router)# exit
Enable md5 authentication
UltOs(config)# interface vlan 1
UltOs(config-if)# ip rip authentication mode md5 key-chain
12345
UltOs(config-if)#end
UltOs#
Configurations in FDN40-2:
UltOs# config terminal
UltOs(config)# router rip
UltOs(config-router)# network 10.0.0.2
UltOs(config-router)# exit
Enable md5 authentication
UltOs(config)# interface vlan 1
UltOs(config-if)# ip rip authentication mode md5 key-chain
12345
UltOs(config-if)#end
UltOs#
2. View in FDN40-1, the authentication type using the following command.
View in FDN40-1 all the RIP packets have authentication information.
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is Enabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
CHAPTER 4: RIP
Configuration User Manual 110
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is md5
Split Horizon with poissoned reverse is enabled
Restricts default route installation
Restricts default route origination
View in FDN40-2, all the RIP packets have authentication
information.
4.5.13.4 Sample Configuration for Enabling Crypto Authentication
Refer the section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
1. Execute the following commands in both the switches for enabling
authentication.
Configure the following in FDN40-1:
UltOs# config terminal
UltOs(config)# router rip
UltOs(config-router)# network 10.0.0.1
UltOs(config-router)# redistribute all
UltOs(config-router)# exit
Enable any one of the crypto authentication UltOs(config)#
interface vlan 1
UltOs(config-if)# ip rip auth-type sha-1
UltOs(config-if)# ip rip authentication key-id 1 key FSS
UltOs(config-if)# ip rip key-id 1 start-generate 2013-05-
12,21:40:20
UltOs(config-if)# ip rip key-id 1 stop-generate 2013-05-
12,22:40:20
UltOs(config-if)# ip rip key-id 1 start-accept 2013-05-12,21:40:20
UltOs(config-if)# ip rip key-id 1 stop-accept 2013-05-12,22:40:20
UltOs(config-if)#end
UltOs#
Multiple keys can be configured over an interface, If the start time for
generate, accept & stop time for generate, accept are not configured
default values will be taken.
UltOs# config terminal
UltOs(config)# interface vlan 1
CHAPTER 4: RIP
Configuration User Manual 111
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-if)# ip rip auth-type sha-1
UltOs(config-if)# ip rip authentication key-id 2 key FSS2
UltOs(config-if)#end
UltOs#
Configure the following in FDN40-2:
UltOs# config terminal
UltOs(config)# router rip
UltOs(config-router)# network 10.0.0.2
UltOs(config-router)# redistribute all
UltOs(config-router)# exit
Enable any one of the crypto authentication
UltOs(config)# interface vlan 1
UltOs(config-if)# ip rip auth-type sha-1
UltOs(config-if)# ip rip authentication key-id 1 key FSS
UltOs(config-if)# ip rip key-id 1 start-generate 2013-05-
12,21:40:20
UltOs(config-if)# ip rip key-id 1 stop-generate 2013-05-
12,22:40:20
UltOs(config-if)# ip rip key-id 1 start-accept 2013-05-12,21:40:20
UltOs(config-if)# ip rip key-id 1 stop-accept 2013-05-12,22:40:20
UltOs(config-if)#end
UltOs#
Multiple keys can be configured over an interface, If the start time for
generate, accept & stop time for generate, accept are not configured
default values will be taken.
UltOs# config terminal
UltOs(config)# interface vlan 1
UltOs(config-if)# ip rip auth-type sha-1
UltOs(config-if)# ip rip authentication key-id 2 key FSS2
UltOs(config-if)#end
UltOs#
2. View the configured authentication information and the active key-id in
use during packet transmission in FDN40-1 & FDN40-2 using the
following show commands,
UltOs# show ip rip authentication
RIP Interface Authentication Statistics:
Vrf default
Interface Name vlan1
Authentication Type sha-1
CHAPTER 4: RIP
Configuration User Manual 112
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Authentication KeyId in use: 1
Authentication Last key status: true
RIP Authentication Key Info:
Authentication KeyId 1
Start Accept Time 2013-05-12,21:40:20
Start Generate Time 2013-05-12,21:40:20
Stop Generate Time 2013-05-12,22:40:20
Stop Accept Time 2013-05-12,22:40:20
Authentication KeyId 2
Start Accept Time 2013-05-11,13:13:37
Start Generate Time 2013-05-11,13:13:37
Stop Generate Time 2136-02-06,06:28:15
Stop Accept Time 2136-02-06,06:28:15
UltOs# show ip protocols
Routing Protocol is rip
RIP2 security level is Maximum
Redistributing : rip
Output Delay is disabled
Retransmission timeout interval is 5 seconds
Number of retransmission retries is 36
Default metric is 3
Auto-Summarisation of routes is Enabled
Routing for Networks :
10.0.0.0
Routing Information Sources :
Interface Specific Address Summarisation :
Interface vlan1
Sending updates every 30 seconds
Invalid after 180 seconds
Flushed after 120 seconds
Send version is 1 2, receive version is 1 2
Authentication type is sha-1
Split Horizon with poissoned reverse is enabled
Restricts default route installation
Restricts default route origination
CHAPTER 4: RIP
Configuration User Manual 113
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
4.5.14 Configuring Debug Level for RIP
Refer the Section 4.3 for configuration guidelines and Figure 4-1 for the
Setup. The prerequisite configuration needs to be done in the switches
(FDN40-1 and FDN40-2) before configuring RIP.
Execute the following commands in the switch FDN40-1 to configure the
debug level for RIP.
UltOs# config terminal
UltOs(config)# router rip
UltOs(config-router)# network 10.0.0.1
UltOs(config-router)# end
Configure the debug level for RIP module.
UltOs# debug ip rip all
RIP: Sending regular Update over this interface 0
RIP: Authentication not needed for this interface,
So 25 routes can be composed
RIP: If Agg Rt added to update with metric : 3
RIP: Sending RIP update through Port 0
RIP: Sending regular Update over this interface 0
RIP: Authentication not needed for this interface,
So 25 routes can be composed
RIP: If Agg Rt added to update with metric : 3
RIP: Sending RIP update through Port 0
RIP: Sending regular Update over this interface 0
RIP: Authentication not needed for this interface,
So 25 routes can be composed
RIP: If Agg Rt added to update with metric : 3
Disable the debug level for RIP module.
UltOs# no debug ip rip all
4.5.15 Configuring Route Map RIP
URM (Unified Route Map) is a portable implementation of the route map
capability for IPv4 and IPv6 unicast routing software. The URM provides a
single interface for the administrator to set up and manage route maps. It
also provides a common unified method for routing protocols and static route
management software to use route maps for different purposes. The
independent nature of the implementation helps to avoid the duplication of
the route maps in the different routing modules in a router.
CHAPTER 4: RIP
Configuration User Manual 114
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
4.5.15.1 Configuring Route Map
4.5.15.1.1 CLI Configuration
This section lists the CLI configuration steps to define a route map with a
specified name and the related parameters such as permission and
sequence number.
1. Enter the Global configuration mode.
UltOs# configure terminal
2. Configure the route map name, permission and sequence number.
UltOs(config)# route-map aa permit 1
3. View the configured route map
UltOs# show route-map
Route-map aa, Permit, Sequence 1
Match Clauses:
--------------
Set Clauses:
--------------
4. Execute the no form of the command to delete the route map.
UltOs(config)# no route-map aa 1
4.5.15.1.2 WEB Configuration
Route Map can be created through WEB interface using the RouteMap
Creation screen (Navigation - Layer3 Management > Route Map > Route
Map Creation)
Screen 4-10: RouteMap Creation
4.5.15.2 Configuring Route Map Match Criteria
4.5.15.2.1 CLI Configuration
This section lists the CLI configuration steps to define the filtering criteria for
the route map and its related parameters.
CHAPTER 4: RIP
Configuration User Manual 115
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
1. Enter the Global configuration mode.
UltOs# configure terminal
2. Configure the route map name, permission and sequence number.
UltOs(config)# route-map aa permit 1
3. Configure the route map match source IP address and the subnet mask.
UltOs(config-rmap-aa)# match source ip 34.0.0.3 255.0.0.0
4. Configure the route map match source IPv6 address and the prefix
length.
UltOs(config-rmap-aa)# match source ipv6 2120::3 64
5. Configure the route map match destination IP address and the subnet
mask.
UltOs(config-rmap-aa)# match destination ip 91.0.0.1 255.0.0.0
6. Configure the route map match destination IPv6 address and the prefix
length.
UltOs(config-rmap-aa)# match destination ipv6 2150::2 64
7. Configure the route map match route-type as remote. (Route-type can be
configured either as local or remote.)
UltOs(config-rmap-aa)# match route-type remote
8. Configure the route map match metric-type as inter-area. (Metric type
can be inter-area / intra-area / type-1-external / type-2-external.)
UltOs(config-rmap-aa)# match metric-type inter-area
9. Configure the route map match metric value.
UltOs(config-rmap-aa)# match metric 44
10. Configure the route map match next-hop IP address.
UltOs(config-rmap-aa)# match next-hop ip 91.0.0.1
11. Configure the route map match next-hop IPv6 address.
UltOs(config-rmap-aa)# match next-hop ipv6 3000::3
12. Configure the route map match tag.
UltOs(config-rmap-aa)# match tag 10
13. View the configured parameters.
UltOs# show running-config route-map
Building configuration...
route-map aa permit 1
match destination ip 91.0.0.1 255.0.0.0
match destination ipv6 2150::2 64
match source ip 34.0.0.3 255.0.0.0
match source ipv6 2120::3 64
match next-hop ip 91.0.0.1
match next-hop ipv6 3000::3
match metric 44
match tag 10
CHAPTER 4: RIP
Configuration User Manual 116
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
match metric-type inter-area
match route-type remote
end
14. Execute the no form of the commands to delete the corresponding
configurations.
4.5.15.2.2 WEB Configuration
Route Map Match criteria can be configured through WEB interface using the
RouteMap Creation screen (Navigation - Layer3Management > Route Map
> Route Map Match)
Screen 4-11: RouteMap Match
4.5.15.3 Configuring RIP Distance
4.5.15.3.1 CLI Configuration
This section lists the CLI configuration steps to set the administrative
distance for the RIP router.
1. Enter the Global configuration mode.
UltOs# configure terminal
2. Enter the RIP router configuration mode.
UltOs(config)# router rip
3. Configure the distance for the RIP routes.
UltOs(config-router)# distance 100
CHAPTER 4: RIP
Configuration User Manual 117
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
4. View the configured distance.
UltOs# show running-config rip
Building configuration...
router rip
distance 100
!
end
UltOs#
5. Execute the no form of the command to re-configure the distance to its
default value.
UltOs(config-router)# no distance
6. View the configured distance.
UltOs# sh running-config rip
Building configuration...
router rip
!
end
UltOs#
4.5.15.3.2 WEB Configuration
RIP Diatance can be configured through WEB interface using the RIP Basic
Settings screen. For screenshot, refer section 4.5.3.2
4.5.15.4 Configuring Redistribution with Route Map
4.5.15.4.1 CLI Configuration
This section lists the CLI configuration steps to configure the protocol from
which the routes have to be redistributed into RIP, by applying the route-map.
1. Enter the Global configuration mode.
UltOs# configure terminal
2. Enable the RIP router configuration mode.
UltOs(config)# router rip
3. Configure the network.
UltOs(config-router)# network 12.0.0.1
4. Configure the redistribution of all routes with route-map aa.
UltOs(config-router)# redistribute all route-map aa
5. View the configured parameters.
UltOs# show running-config rip
Building configuration...
router rip
redistribute all route-map aa
CHAPTER 4: RIP
Configuration User Manual 118
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
network 12.0.0.1
!
interface vlan 1
!
end
UltOs#
6. Execute the no form of the command to disable the redistribution of all
routes with route-map.
UltOs(config-router)# no redistribute all route-map aa
7. View the configured parameters after disabling the redistribution of all the
routes with route map.
UltOs# sh running-config rip
Building configuration...
router rip
network 12.0.0.1
!
interface vlan 1
!
end
UltOs#
4.5.15.5 WEB Configuration
RIP redistribution can be configured through WEB interface using the RRD
RIP Configuration screen. For screenshot, refer section 4.5.8.2.
Configuration User Manual 119
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
5
VLAN
5.1 Protocol Description
Virtual LAN (VLAN) technology, defined under the IEEE 802.1q
specifications, allows enterprises to extend the reach of their corporate
networks across WAN. VLANs enable partitioning of a LAN based on
functional requirements, while maintaining connectivity across all devices on
the network. VLAN groups network devices and enable them to behave as if,
they are in one single network. Data security is ensured by keeping the data
exchanged between the devices of a particular VLAN within the same
network.
VLAN offers a number of advantages over traditional LAN. They are:
Performance
In networks with traffic consisting of a high percentage of broadcasts and
multicasts, VLAN minimizes the possibility of sending the broadcast and
multicast traffic to unnecessary destinations.
Formation of Virtual Workgroups
VLAN helps in forming virtual workgroups. During this period,
communication between the members of the workgroup will be high.
Broadcasts and multicasts can be restricted within the workgroup.
Simplified Administration
Most of the network costs are a result of adds, moves, and changes of
users in the network. Every time a user is moved in a LAN, recabling,
new station addressing, and reconfiguration of hubs and routers
becomes necessary. Some of these tasks can be simplified with the use
of VLANs.
Reduced Cost
VLANs can be used to create broadcast domains, which eliminate the
need for expensive routers.
CHAPTER 5: VLAN
Configuration User Manual 120
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Security
Sensitive data may be periodically broadcast on a network. Placing only
those users, who are allowed to access to such sensitive data on a VLAN
can reduce the chances of an outsider gaining access to the data. VLAN
can also be used to control broadcast domains, set up firewalls, restrict
access, and inform the network manager of an intrusion.
VLAN logically segments the shared media LAN, forming virtual workgroups.
It redefines and optimizes the basic Transparent Bridging functionalities such
as learning, forwarding, filtering and flooding.
5.2 Topology
Figure 5-1: Topology for VLAN Configuration
5.3 Configuration Guidelines
VLAN is enabled in the switch by default. GVRP and GMRP must be
disabled prior to disabling VLAN.
The default interface - VLAN 1- cannot be deleted in the switch.
If port GVRP state is disabled, but global GVRP status is enabled, then
GVRP is disabled on current port. GVRP packets received on that port
will be discarded and GVRP registrations from other ports will not be
propagated on this port.
GARP cannot be started, if VLAN is shutdown, and GARP cannot be
shutdown, if GVRP and/or GMRP are enabled.
Mapping of forwarding database identifier (FID) to VLANs is successful
only when, VLAN learning mode is hybrid.
To configure a static unicast/multicast MAC address in the forwarding
database, VLAN must have been configured and member ports must
have been configured for the specified VLAN.
Bridge-mode status cannot be set to provider mode, if the protocol/MAC
based VLAN is enabled.
It is not possible to configure a port as trunk, if the port is an untagged
member of a VLAN.
To enable Dot1q-tunneling status, Bridge Mode must be set to 'provider'..
It is not possible to set the Dot1q-tunnel status on the port, if the port
mode is not 'access' type.
To enable Dot1q tunneling on a port 802.1X (PNAC), port control must
be force-authorized.
P2
P1
P1
Host A
A
B
CHAPTER 5: VLAN
Configuration User Manual 121
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
BPDU tunneling on the port cannot be set; if Dot1q tunnel status is
disabled.
Leave Timer must be two times greater than Join Timer, and Leaveall
Timer must be greater than Leave Timer.
5.4 Default Configurations
Table 5-1: Default Configurations
Feature
Default Setting
VLAN Module status
Enable
Default VLAN Id configured in the switch
1
Mac based VLAN Classification
Disabled
Protocol-VLAN based classification
Enabled
System and port level GVRP and GMRP
Module status
Enabled
Mac address table aging time
300 seconds
Acceptable frame types
All (Accepts untagged frames or priority-tagged frames
or tagged frames received on the port)
Ingress filtering
Disabled
Switch port priority
0
Switch port mode
Hybrid
GARP Timers
Join: 20 seconds
Leave: 60 seconds
Leave all: 1000 seconds
Max traffic classes
Maximum number of traffic classes supported on a port
is 8
Tunneling
Disabled
In case of Provider Bridges, the default configurations and configuration guidelines
are provided in the relevant subsection itself.
5.5 VLAN Configurations
5.5.1 Configuring Static VLAN
Static VLAN entries can be configured with the required number of member
ports, untagged ports and forbidden ports. The following configuration deals
with the creation of member ports.
5.5.1.1 CLI Configuration
1. Execute the following commands to configure Static VLAN entry in the
switch.
Enter the Global Configuration Mode.
UltOs# configure terminal
Enter the VLAN Configuration Mode (for VLAN 2).
CHAPTER 5: VLAN
Configuration User Manual 122
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# VLAN 2
Add member ports for VLAN.
UltOs(config-vlan)# ports lan 0/2-5 untagged lan 0/3
Member ports represent the set of ports permanently assigned to the
VLAN egress list. Frames belonging to the specified VLAN are
forwarded to the ports in the egress list.
If the port type is not explicitly specified as untagged, then all the
ports are configured to be of tagged port type allowing transmission
of frames with the specified VLAN tag. The untagged setting allows
the port to transmit the frames without a VLAN tag. This setting is
used to configure a port connected to an end user device.
In the above example, the packets for the interface lan 0/3 are
transmitted without the tag. On all the other ports, the packets are
transmitted with the tag.
Configure port 1 as forbidden port.
UltOs(config-vlan)# ports lan 0/2-5 forbidden lan 0/1
Alternatively, the forbidden setting prevents the port from
participating in the specified VLAN activity and ensures that, any
dynamic requests for the port to join the VLAN will be ignored.
Exit from the configuration mode.
UltOs(config)# end
2. View the VLAN information by executing the following command.
UltOs# show VLAN summary
Number of VLANs: 2
The output displays the number of VLANs in a switch.
3. View the configuration details of all the VLANs by executing the following
show command.
UltOs# show VLAN
VLAN database
-------------
VLAN ID : 1
Member Ports : Lan0/1, Lan0/2, Lan0/3, Lan0/4,
Gi0/5, Gi0/6
Gi0/7, Gi0/8, Gi0/9, Lan0/10,
Lan0/11, Lan0/12
Lan0/13, Lan0/14, Lan0/15,
Lan0/16, Lan0/17, Lan0/18
Lan0/19, Lan0/20, Lan0/21,
Lan0/22, Lan0/23, Lan0/24
Untagged Ports : Lan0/1, Lan0/2, Lan0/3, Lan0/4,
Gi0/5, Gi0/6
Gi0/7, Gi0/8, Gi0/9, Lan0/10,
Lan0/11, Lan0/12
CHAPTER 5: VLAN
Configuration User Manual 123
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Lan0/13, Lan0/14, Lan0/15,
Lan0/16, Lan0/17, Lan0/18
Lan0/19, Lan0/20, Lan0/21,
Lan0/22, Lan0/23, Lan0/24
Forbidden Ports : None
Name :
Status : Permanent
----------------------------------------------------
VLAN ID : 2
Member Ports : Lan0/2, Lan0/3, Lan0/4, Gi0/5
Untagged Ports : None
Forbidden Ports : Lan0/1
Name :
Status : Permanent
----------------------------------------------------
4. View the configuration details of a particular VLAN by executing the
following command.
UltOs# show VLAN id 2
VLAN database
-------------
VLAN ID : 2
Member Ports : Lan0/2, Lan0/3, Lan0/4, Gi0/5
Untagged Ports : None
Forbidden Ports : Lan0/1
Name :
Status : Permanent
-------------------------------------------------
5.5.1.2 WEB Configuration
Static VLAN can be configured through WEB interface using the Static
VLAN Configuration screen (Navigation - Layer2 Management > VLAN >
StaticVLANs)
CHAPTER 5: VLAN
Configuration User Manual 124
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 5-1: Static VLAN Configuration
5.5.2 Deleting a VLAN
5.5.2.1 CLI Configuration
It is possible to delete a VLAN from the VLAN list using the no vlan <vlan-
id(1-4094)> Global Configuration Mode command.
UltOs(config)# no vlan 4
The default VLAN - VLAN 1 - cannot be deleted.
5.5.2.2 Web Configuration
VLAN can be deleted through WEB interface using the Static VLAN
Configuration screen. For screenshot, refer section 5.5.1.2
5.5.3 Enabling VLANs
A VLAN can be made active by adding a member port to a VLAN (refer
section Configuring Static )
5.5.4 Classifying Frames to a VLAN
As per the IEEE standards, rules are defined for classifying the frames in a
VLAN. VLAN classification is accomplished by associating a VLAN ID with
each port on the switch. Optionally, frames can be classified according to the
protocol identifier contained within the frame. Frame classification priority
begins with VLAN Tag; followed by MAC based, protocol match, and finally
the PVID.
5.5.4.1 Port Based Classification
In port-based classification, the VLAN ID associated with an untagged or
priority-tagged frame is determined, based on the port on which the frame
CHAPTER 5: VLAN
Configuration User Manual 125
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
arrives. Port-based classification requires the association of a specific VLAN
ID, the port VLAN identifier (PVID) with each port.
A port can be a member of only one port-based VLAN.
If PVID value has not been explicitly configured for a port, then PVID assumes a
default value of 1.
1. Execute the following commands to configure the PVID that is assigned
to untagged/priority-tagged frames.
Enter the Global Configuration Mode.
UltOs# configure terminal
Enter the Interface Configuration Mode for port gigabitethernet 0/1.
UltOs(config)# interface lan 0/1
Configure the PVID that is to be assigned to untagged/priority-tagged
frames.
UltOs(config-if)# switchport pvid
2. View the configuration details by executing the following show command.
UltOs# show VLAN port config port lan 0/1
VLAN Port configuration table
-------------------------------
Port lan0/1
Port VLAN ID : 4
Port Acceptable Frame Type : Admit All
Port Ingress Filtering : Disabled
Port Mode : Hybrid
Port Gvrp Status : Enabled
Port Gmrp Status : Enabled
Port Gvrp Failed Registrations : 0
Gvrp last pdu origin :
00:00:00:00:00:00
Port Restricted VLAN Registration : Disabled
Port Restricted Group Registration : Disabled
Mac Based Support : Disabled
Port-and-Protocol Based Support : Enabled
Default Priority : 0
--------------------------------------------------
5.5.4.2 WEB Configuration
VLAN Frame Classification can be configured through WEB interface using
VLAN Port Settings screen (Navigation - Layer2 Management > VLAN >
PortSettings)
CHAPTER 5: VLAN
Configuration User Manual 126
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 5-2: VLAN Port Settings
5.5.5 Configuring Port Filtering
5.5.5.1 Configuring Acceptable Frametype
It is possible to configure the acceptable frame type for the port as one of the
following:
All frames
Tagged frames
Untagged and priority tagged frames.
1. Execute the following commands to configure the acceptable frame type
for the port.
Enter the Global Configuration Mode.
UltOs# configure terminal
Enter the Interface Configuration Mode and configure the frame type
of the port as “tagged” for that interface.
UltOs(config)# interface lan 0/2
CHAPTER 5: VLAN
Configuration User Manual 127
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-if)# switchport acceptable-frame-type tagged
2. View the configuration information by executing the following show
command.
UltOs# show VLAN port config port lan 0/2
VLAN Port configuration table
-------------------------------
Port Lan0/2
Port VLAN ID : 1
Port Acceptable Frame Type : Admit Only VLAN
Tagged
Port Ingress Filtering : Disabled
Port Mode : Hybrid
Port Gvrp Status : Enabled
Port Gmrp Status : Enabled
Port Gvrp Failed Registrations : 0
Gvrp last pdu origin :
00:00:00:00:00:00
Port Restricted VLAN Registration : Disabled
Port Restricted Group Registration : Disabled
Mac Based Support : Disabled
Port-and-Protocol Based Support : Enabled
Default Priority : 0
----------------------------------------------------
When set to “tagged”, the device will discard untagged and priority tagged frames
received on the port and will process only the VLAN tagged frames.
Configuration User Manual 129
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
6
NAT
6.1 Topology
Figure 6-1 - NAT Topology
Interface Index/Name
Interface IPv4 Address
lan0/1
10.0.0.1
wan0/1
80.0.0.1
H1
10.0.0.10
H2
80.0.0.10
H1
FDN40-1
H2
LAN Network
WAN Network
CHAPTER 6: NAT
Configuration User Manual 130
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
6.2 Configuration Guidelines
NAT and NAPT is enabled or disabled on an interface.
6.3 Default Configurations
Parameter
Default Configuration
NAT
Enabled
NAPT
Enabled
6.4 NAT Configurations
6.4.1 Enabling and Disabling NAT on an Interface
This section describes the steps involved in enabling and disabling the NAT
module on an interface. By default, nat module is enabled.
6.4.1.1 CLI Configuration
1. To enable nat on an interface:
Enter the Global Configuration mode.
UltOs# configure terminal
Enter the Interface Configuration mode.
UltOs(config)# interface wan 0/1
Enable nat
UltOs(config-if)# interface nat enable
Exit from the Interface Configuration mode.
UltOs(config-if)# end
2. To view nat status:
View the nat interface status
UltOs# show ip nat interface
NAT Configuration on the WAN Interface
--------------------------------------
Interface NAT NAPT
--------- ------ -------
wan0/1 Enabled Enabled
View the nat settings
UltOs# show nat config
NAT Configuration
-----------------
CHAPTER 6: NAT
Configuration User Manual 131
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
NAT Status : Enabled
Maximum Translation Entries : 9000
Start Free Port : 6001
Idle Timeout : 10 seconds
TCP Timeout : 3600 seconds
UDP Timeout : 100 seconds
ICMP Timeout : 30 seconds
Max Threshold for Dropped Packets : 100
To modify NAT setting, nat has to be disabled on all interfaces.
3. To disable nat on an interface:
Enter the Global Configuration mode.
UltOs# configure terminal
Enter the Interface Configuration mode.
UltOs(config)# interface wan 0/1
Disable nat
UltOs(config-if)# interface nat disable
Exit from the Interface Configuration Mode.
UltOs(config-if)# end
4. To view the nat status
UltOs# show ip nat interface
NAT Configuration on the WAN Interface
--------------------------------------
Interface NAT NAPT
--------- ------ -------
wan0/1 Disabled Disabled
6.4.1.2 WEB Configuration
NAT can be enabled / disabled on an interface through WEB interface using
the Interface NAT Settings screen (Navigation - Layer3 Management >
NAT > Interface Settings)
CHAPTER 6: NAT
Configuration User Manual 132
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 6-1: Interface NAT Settings screen - NAT Status
6.4.2 Enabling and Disabling NAPT
The Network Address Port Translation (NAPT) feature helps in conserving
the IP address further. Different local addresses can be mapped to the same
global address and the source port number present in the UDP and TCP
connections will be translated to provide the necessary uniqueness. A new
port number is picked out from the free port list maintained by the module.
This section describes the steps involved in enabling and disabling the NAPT
in the particular interface. NAPT translates the port number present in the
packet to configured value.
6.4.2.1 CLI Configuration
1. To enable napt:
Enter the Global Configuration mode.
UltOs# configure terminal
Enable Interface Configuration Mode.
UltOs(config)# interface wan 0/1
Enable napt in the interface.
UltOs(config-if)# ip nat napt enable
Exit from the Interface Configuration mode.
UltOs(config-if)# end
2. To view napt status:
View the napt status.
UltOs# show ip nat interface
NAT Configuration on the WAN Interface
CHAPTER 6: NAT
Configuration User Manual 133
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
--------------------------------------
Interface NAT NAPT
--------- ------ -------
wan0/1 Enabled Enabled
3. To disable napt:
Enter the Global Configuration mode.
UltOs# configure terminal
Enable Interface Configuration Mode.
UltOs(config)# interface wan 0/1
Disable napt in the interface.
UltOs(config-if)# ip nat napt disable
Exit from the Interface Configuration mode.
UltOs(config-if)# end
4. To view napt status:
View the napt status.
UltOs# show ip nat interface
NAT Configuration on the WAN Interface
--------------------------------------
Interface NAT NAPT
--------- ------ -------
wan0/1 Enabled Disabled
6.4.2.2 WEB Configuration
NAPT can be enabled / disabled through WEB interface using the Interface
NAT Settings screen (Navigation - Layer3 Management > NAT > Interface
Settings)
CHAPTER 6: NAT
Configuration User Manual 134
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 6-2: Interface NAT Settings screen - NAPT Status
6.4.3 Configuring Static NAT and NAPT
Valid addresses are needed to allow internal users access the Internet NAT
allows certain devices on the inside to originate communication with devices
on the outside by translating their invalid address to a valid address or pool of
addresses.
This section details the static NAT configuration in FDN40 when host H1 tries
to communicate with host H2. The steps involved in translating the IP
address of host H1 (10.0.0.10) to global IP address 80.0.0.1 for Statis NAT
and with port numbers 30 to 40 for Static NAPT is given below. NAT must be
enabled in interface wan0/1 to perform network address translation.
6.4.3.1 CLI Configuration
1. To configure static nat:
Enter the Global Configuration mode.
UltOs# configure terminal
Enter the Interface Configuration mode.
UltOs(config)# interface wan 0/1
Enable nat on the wan interface
UltOs(config-if)# interface nat enable
Configure static nat for H1.
UltOs(config-if)# static nat 10.0.0.10 80.0.0.1
Configure static napt for H1.
UltOs(config-if)# static nat 10.0.0.10 30 80.0.0.1 40
CHAPTER 6: NAT
Configuration User Manual 135
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Exit from the Interface Configuration mode.
UltOs(config)# end
2. To view nat interface status:
View the nat settings in interfaces.
UltOs# show ip nat interface
NAT Configuration on the WAN Interface
--------------------------------------
Interface NAT NAPT
--------- ------ -------
Wan 0/1 Enabled Enabled
3. To view static nat configuration:
View the nat settings in interfaces.
UltOs# show ip nat static
Static Address Mapping
----------------------
Interface Local IP Translated Local IP
--------- --------- -------------------
wan 0/1 10.0.0.10 80.0.0.1
4. To view static nat configuration:
View the nat settings in interfaces.
UltOs# show ip nat static napt
Static NAPT entries
-----------------------------
Interface : wan0/1
Local IP : 10.0.0.10 Local Port : 30
Protocol : ANY
Global IP : 80.0.0.1 Global Port : 40
App Type : OTHER
Description :
Status : Enabled
---------------------------------------------------
---
6.4.3.2 WEB Configuration
Static NAT can be configured through WEB interface using the Static NAT
screen (Navigation - Layer3 Management > NAT > Static NAT)
CHAPTER 6: NAT
Configuration User Manual 136
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 6-3: Static NAT and NAPT
6.4.4 Configuring Dynamic NAT
This section details the dynamic NAT configuration when host H1
communicates with host H2. Global address pool is configured in the
interface which allows packets from H1 to retrieve IP address from the
configured ip pool while translation.
CHAPTER 6: NAT
Configuration User Manual 137
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
6.4.4.1 CLI Configuration
1. To configure dynamic nat:
Enter the Global Configuration mode.
UltOs# configure terminal
Enter the Interface Configuration mode.
UltOs(config)# interface wan 0/1
Enable nat on the wan interface
UltOs(config-if)# interface nat enable
Add global address pool.
UltOs(config-if)# ip nat pool 80.0.0.5 255.255.255.0
Exit from the Interface Configuration mode.
UltOs(config)# end
2. To view nat interface status:
View the nat settings in interfaces.
UltOs# show ip nat interface
NAT Configuration on the WAN Interface
--------------------------------------
Interface NAT NAPT
--------- ------ -------
Wan 0/1 Enabled Enabled
3. To view dynamic NAT configuration:
View the NAT settings for interfaces.
UltOs# show ip nat translations
Translated Addresses
---------------------
Interface Local Translated LocalTranslated
Destination Dest
IP LocalIP Port Port IP
Port
-------- -------- --------- ------ --------- ----
-------- ----
Wan 0/1 10.0.0.10 80.0.0.5 9806 3000
203.199.255.1 2048
View the dynamic NAT pool settings
UltOs# show ip nat global
Global Addresses Configured
---------------------------
Interface Translated Local IP Translated IP
Address Range
CHAPTER 6: NAT
Configuration User Manual 138
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
--------- ------------------- -------------------
----
Wan 0/1 80.0.0.5 255.255.255.0
6.4.4.2 WEB Configuration
Dynamic NAT can be configured through WEB interface using the Address
Pool screen (Navigation - Layer3 Management > NAT > Dynamic NAT)
Screen 6-4: Address Pool screen
6.4.5 Configuring Virtual Server
Virtual Server is required to allow external world to avail services in corporate
world. This section describes the steps to configure telnet virtual server VS in
the LAN network so that the telnet request for H1 given by H2 is received and
handled by VS so that the IP address of host H1 remains hidden to outside
world.
6.4.5.1 CLI Configuration
1. To create a telnet virtual server:
Enter the global configuration mode.
UltOs# configure terminal
Enter Interface Configuration mode
UltOs(config)# interface wan 0/1
Create a virtual server for telnet.
UltOs(config-if)# virtual server 10.0.0.2 TELNET-server
Exit from the Interface Configuration mode.
UltOs(config-if)# end
2. To view the configured virtual servers
CHAPTER 6: NAT
Configuration User Manual 139
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# show virtual servers
Virtual Servers Configuration
-----------------------------
Interface : Wan0/1
Local IP : 10.0.0.2 Local Port : 23
Global IP : 20.10.10.10 Global Port : 23
App Type : TELNET
Description : Server
Status : Enabled
------------------------------------------------------
3. To delete the configured virtual server:
Enter the Global Configuration mode.
UltOs# configure terminal
Enter Interface Configuration mode
UltOs(config)# interface wan 0/1
Create a virtual server for telnet.
UltOs(config-if)# no virtual server 10.0.0.2 23
Exit from the Interface Configuration mode.
UltOs(config-if)# end
6.4.5.2 WEB Configuration
NAT Virtual Server can be configured through WEB interface using the
Virtual Server Configuration screen (Navigation - Layer3 Management >
NAT > NAT Virtual Server)
Screen 6-5: Virtual Server Configuration
Configuration User Manual 141
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
7
IPSec
7.1 Protocol Description
IPSec provides security services at the IP layer. The security services include
access control, connectionless integrity, data origin authentication, rejection
of replayed packets, confidentiality and limited traffic flow confidentiality.
Since these services are provided at the IP layer, any higher layer protocol
above IP (for example, TCP (Transmission Control Protocol), UDP (User
Datagram Protocol) and the like) can make use of the offered security
services.
The protection offered is based on the requirements defined by a SPD
(Security Policy Database). The packets are selected on the IP layer header
information that is matched against entries in the selectors database. Each
incoming and outgoing packet is secured, discarded or bypassed based on
the policy identified by the selectors. IPSec performs a SAD (Security
Association Database) lookup for both inbound and outbound datagram.
A SAD contains parameters that identify the SA to be used for a particular
destination. SA identifies the statement of agreement between two peers. SA
defines the mode of operation (Tunnel), security protocol and its associated
transforms for a particular peer. The type of the traffic to be protected or
filtered is identified by the selectors, which have protocol and interface
specific information. The decision to apply or bypass security is based on the
configured policy for a particular set of traffic.
IPSec provides the above mentioned security services with the help of the
following infrastructure protocol.
The ESP: Provides confidentiality, integrity, data origin authentication and
anti-replay service.
Security services are applied to traffic through ESP. Traffic is secured
between two hosts or between a host and a security gateway or between two
security gateways using two modes namely Tunnel mode or Transport mode.
CHAPTER 7: IPSEC
Configuration User Manual 142
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
The Tunnel mode is used to protect traffic between a SG and a host or
between two security gateways. The Transport mode is used to protect traffic
between a pair of hosts or security gateways.
7.2 Topology
Figure 7-1: IPSec Topology
Node
Interface Index/Name
Interface IP Address
DUT1
WAN
35.0.0.1
DUT2
WAN
35.0.0.2
DUT1
LAN
192.168.1.1
DUT2
LAN
192.168.2.1
H1
E0
192.168.1.10
R1
E0
192.168.2.10
7.3 IPSec Configurations
7.3.1 Enabling VPN Module
The VPN (Virtual Private Network) module is enabled for encryption and
decryption of the traffic flows. This section describes the steps involved in
enabling the VPN module globally and configuring a VPN policy. This section
also describes the verifying of the configuration using corresponding show
command.
7.3.1.1 CLI Configuration
To enable VPN globally
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Enable the VPN module.
DUT2 / Ravpn Client /
Ravpn Server
DUT1
FDN40
R1
FDN40
H1
WAN
WAN
LAN
LAN
E0
E0
CHAPTER 7: IPSEC
Configuration User Manual 143
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# set vpn enable
3. Exit from the Global Configuration mode.
UltOs(config)# end
To view the VPN global status
4. View the global VPN settings.
UltOs# show vpn config
VPN Global Configuration
------------------------
IPSecurity Status : Enabled
Maximum Number of Tunnels : 100
Number of Tunnels configured : 1
Number of Tunnels Established: 1
7.3.1.2 WEB Configuration
VPN can be enabled / disabled using the VPN Policy screen (Navigation -
Security Management > VPN > VPN Settings > VPN Policy)
Screen 7-1: VPN Policy - VPN Module Status
7.3.2 Configuring VPN IPSec Policy
7.3.2.1 Creating VPN Policy
Crypto map is created to define a VPN policy that is negotiated for SA
creation. Crypto map interacts with and applies various configuration
components, security protocols and algorithms to support IPSec security
services. This section describes the steps involved in creating a VPN policy.
To create a crypto policy
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Create a new VPN policy with default configuration
UltOs(config)# crypto map crypto_map_name
3. Exit from the Crypto Map Configuration mode.
UltOs(config-crypto-map)# end
To view the VPN policy parameters
4. View the parameters of the VPN policy.
UltOs# show crypto map
CHAPTER 7: IPSEC
Configuration User Manual 144
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Inactive
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : None <== ==> None
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
Anti Replay : Disable
IKE suite Info [PHASE I] :
Encryption Algo : 3DES
Hash Algorithm : HMAC SHA1
Diffie-Hellman Group : DH Group 2
IKE Exchange Mode : Main
Life Time : 2400 Secs
Identity Information :
Local Identity Type : Default
Local Identity value :
Peer Identity Type : Default
Peer Identity value :
IPSEC suite Info [Phase II] :
Protocol : ESP
Encryption Algo : Not Confgiured
Perfect Forward Secrecy : Not Confgiured
Life Time : 800 Secs
Crypto Session Status : Inactive
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 0
No.of VPN policies configured = 1
7.3.2.2 Configuring VPN Policy Type
The VPN policy type defines the policy to be imposed for the authentication
of the users. The different policy types available are IPSec manual,
CHAPTER 7: IPSEC
Configuration User Manual 145
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
preshared key, extended authentication, certificate and RA VPN preshared
key. This section describes the steps involved in configuring VPN policy type.
To configure VPN policy type
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Enter the Crypto Map Configuration mode for an existing policy.
UltOs(config)# crypto map crypto_map_name
3. Set the key mode as manual mode.
UltOs(config-crypto-map)# crypto key mode ipsec-manual
4. Exit from the Crypto Map Configuration mode.
UltOs(config-crypto-map)# end
To view the VPN policy parameters
5. View the parameters of the VPN policy.
UltOs# show crypto map
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Inactive
Policy Type : IPSec Manual
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : None <== ==> None
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 0 / 0
Security Protocol : ESP
Encryption Algo : Not Configured
Anti Replay : Disable
Crypto Session Status : Inactive
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 0
No.of VPN policies configured = 1
7.3.2.3 Configuring IPSec mode
The mode of the IPSec is configured based on the set up for securing the
traffic. The mode can be either Tunnel or Transport.
CHAPTER 7: IPSEC
Configuration User Manual 146
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
The Tunnel mode is used to protect traffic between a SG and a host or
between two security gateways. The Transport mode is used to protect traffic
between a pair of hosts or security gateways.
Only the payload of the IP packet is encrypted and/or authenticated, when in
transport mode. The entire IP packet is encrypted and/or authenticated, when
in tunnel mode.
This section describes the steps involved in configuring the IPSec mode.
To configure the VPN policy mode
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Enter the Crypto Map Configuration mode for an existing policy.
UltOs(config)# crypto map crypto_map_name
3. Set the IPSec mode.
UltOs(config-crypto-map)# crypto ipsec mode tunnel
4. Exit from the Crypto Map Configuration mode.
UltOs(config-crypto-map)# end
To view the VPN policy parameters
5. View the parameters of the VPN policy.
UltOs# sh crypto map
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Inactive
Policy Type : IPSec Manual
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : None <== ==> None
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 0 / 0
Security Protocol : ESP
Encryption Algo : Not Configured
Anti Replay : Disable
Crypto Session Status : Inactive
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 0
CHAPTER 7: IPSEC
Configuration User Manual 147
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
No.of VPN policies configured = 1
7.3.2.4 Configuring Peer Identity
Peer identity refers to the destination address set in the packet during
authentication and encryption of outbound datagram. This peer identity is
used for IPSec SA negotiations. This section describes the steps involved in
configuring the peer identity.
To configure the peer identity
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Enter the Crypto Map Configuration mode for an existing policy.
UltOs(config)# crypto map crypto_map_name
3. Set the peer identity.
UltOs(config-crypto-map)# set peer 35.0.0.1
4. Exit from the Crypto Map Configuration mode.
UltOs(config-crypto-map)# end
To view the VPN policy parameters
5. View the parameters of the VPN policy.
UltOs# show crypto map
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Inactive
Policy Type : IPSec Manual
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.1
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 0 / 0
Security Protocol : ESP
Encryption Algo : Not Configured
Anti Replay : Disable
Crypto Session Status : Inactive
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 0
CHAPTER 7: IPSEC
Configuration User Manual 148
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
No.of VPN policies configured = 1
7.3.2.5 Configuring IPSec Session Keys
The IPSec session keys are configured for a VPN policy to set the security
protocol, the authentication and encryption algorithms to be applied, and the
inbound and outbound security parameter index that is used to uniquely
identify a SA. This section describes the steps involved in configuring the
IPSec session keys.
To configure the IPSec session keys
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Enter the Crypto Map Configuration mode for an existing policy.
UltOs(config)# crypto map crypto_map_name
3. Configure the IPSec session key.
UltOs(config-crypto-map)# set session-key authenticator esp hmac-
sha1 abcdef7812345678123456781234567812345678 esp des cipher
abcdef7812345678 outbound 257 inbound 256
4. Exit from the Crypto Map Configuration mode.
UltOs(config-crypto-map)# end
To view the VPN policy parameters
5. View the parameters of the VPN policy.
UltOs# sh crypto map
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Inactive
Policy Type : IPSec Manual
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.1
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 256 / 257
Security Protocol : ESP
Authentication Algorithm : HMAC-SHA1
Encryption Algo : DES
Anti Replay : Disable
Crypto Session Status : Inactive
CHAPTER 7: IPSEC
Configuration User Manual 149
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 0
No.of VPN policies configured = 1
7.3.2.6 Configuring Access List
The access list is configured to specify the traffic type, action to be taken,
and source and destination IP address to which the policy is applied. This
section describes the steps involved in configuring the access list. Multiple
access list can be configured with different indexes.
To configure the access list
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Enter the Crypto Map Configuration mode for an existing policy.
UltOs(config)# crypto map crypto_map_name
3. Configure the access list.
UltOs(config-crypto-map)# access-list 1 apply any source
192.168.1.0 255.255.255.0 destination 192.168.2.0 255.255.255.0
4. Exit from the Crypto Map Configuration mode
UltOs(config-crypto-map)# end
To view the VPN policy parameters
5. View the parameters of the VPN policy.
UltOs# sh crypto map
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Inactive
Policy Type : IPSec Manual
Ike Version : v1
AclIndex : 1
Local & Remote Protected N/W's : 192.168.1.0/24 <--
--> 192.168.2.0/24
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.1
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 256 / 257
CHAPTER 7: IPSEC
Configuration User Manual 150
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Security Protocol : ESP
Authentication Algorithm : HMAC-SHA1
Encryption Algo : DES
Anti Replay : Disable
Crypto Session Status : Inactive
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 0
No.of VPN policies configured = 1
7.3.2.7 Binding of Policy
The configured VPN policy is bound to particular WAN (Wide Area Network)
interface for configuring the interface details and local tunnel termination
address in the policy and for activating the VPN policy. This section
describes the steps involved in binding the policy to the WAN interface
To bind a policy to a particular WAN Interface
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Enter the Interface Configuration mode.
UltOs(config)# interface wan 0/1
3. Apply the existing policy to the interface.
UltOs(config-if)# crypto map crypto_map_name
4. Exit from the Interface Configuration mode.
UltOs(config-if)# end
To view the VPN policy parameters
5. View the parameters of the VPN policy.
UltOs# show crypto map
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Active
Policy Type : IPSec Manual
Ike Version : v1
AclIndex : 1
Local & Remote Protected N/W's : 192.168.1.0/24 <--
--> 192.168.2.0/24
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 35.0.0.2 <== ==>
35.0.0.1
CHAPTER 7: IPSEC
Configuration User Manual 151
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Interface Name : wan0/1
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 256 / 257
Security Protocol : ESP
Authentication Algorithm : HMAC-SHA1
Encryption Algo : DES
Anti Replay : Disable
Crypto Session Status : Active
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 1
No.of VPN policies configured = 1
7.3.2.8 Removing Policy from Interface
The policy assigned to the WAN interface is removed for inactivating the
policy. The policy should be inactivated before deleting. Policies assigned to
the WAN interface and activated cannot be deleted.
To make the policy inactive
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Enter the Interface Configuration mode.
UltOs(config)#interface wan 0/1
3. Make the policy inactive.
UltOs(config-if)# no crypto map crypto_map_name
4. Exit from the Interface Configuration mode.
UltOs(config-if)# end
To view the VPN policy parameters
5. View the parameters of the VPN policy.
UltOs# show crypto map crypto_map_name
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : InActive
Policy Type : IKE Pre-shared
Ike Version : v1
AclIndex : 1
Local & Remote Protected N/W's : 192.168.1.0/24 <--
--> 192.168.2.0/24
CHAPTER 7: IPSEC
Configuration User Manual 152
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Local & Remote Port Range : 0-65535 <-- --> 0-
65535
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 35.0.0.1 <== ==>
35.0.0.2
7.3.2.9 Deleting Policy
This section describes the steps involved in deleting the policy. The policy
should be made as inactive (Refer section 7.3.2.8 for the steps) before
deleting.
To delete the configured policy
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Delete the configured policy.
UltOs(config)# no crypto map crypto_map_name
3. Exit from the Global Configuration mode.
UltOs(config)# end
To check the deletion of the policy
4. View the parameters of the VPN policy.
UltOs# show crypto map crypto_map_name
No output is displayed for the specified crypto name, as the VPN policy is deleted.
This confirms the deletion of the VPN policy.
7.3.2.10 WEB Configuration for IPSec VPN Policy Parameters
VPN IPsec Policy can be configured through the WEB interface using the
VPN IPSec screen (Navigation - Security Management > VPN > VPN
Settings > IPSec)
CHAPTER 7: IPSEC
Configuration User Manual 153
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 7-2: VPN IPSec
CHAPTER 7: IPSEC
Configuration User Manual 154
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
7.3.3 Sample Configuration
This section describes the sample configuration steps to be performed for
configuring the IPSec module in a switch.
Figure 7-2: Topology Diagram for Sample IPSec Configuration
Node Name
E0 V4 ADDR
E1 V4 ADDR
Host 1(H1)
50.0.0.2
NA
Host 2(H2)
40.0.0.2
NA
FDN40-1(R1)
80.0.0.2
50.0.0.1
FDN40-2(R2)
80.0.0.1
40.0.0.1
IPSec is installed in the Router 1 and the below mentioned commands are
executed to configure the IPSec policy.
1. Assigning an IP to wan 0/1.
UltOs# configure terminal
UltOs(config)# interface wan 0/1
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 80.0.0.2 255.0.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# end
UltOs#
2. Enabling the VPN module.
UltOs# configure terminal
UltOs(config)# set vpn enable
UltOs(config)#exit
UltOs#
3. Creating an IPSec crypto map policy with name as sa.
UltOs# configure terminal
R1 and R2 with IPSec
E
0
IKEv2 Negotiation
R2
R1
H2
H1
E
1
E
1
E
0
CHAPTER 7: IPSEC
Configuration User Manual 155
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# crypto map sa
UltOs(config-crypto-map)#
4. Configuring IPSec crypto key mode for the policy sa.
UltOs(config-crypto-map)# crypto key mode ipsec-manual
5. Configuring IPSec crypto ipsec mode for the policy sa.
UltOs(config-crypto-map)# crypto ipsec mode tunnel
6. Configuring IPSec crypto peer address for the policy sa.
UltOs(config-crypto-map)# set peer 80.0.0.1
7. Configuring IPSec crypto session key for the policy sa.
UltOs(config-crypto-map)# set session-key authenticator esp hmac-
md5 12345678123456781234567812345678 esp des cipher
1234567812345678 outbound 256 inbound 257 anti-replay
8. Configuring IPSec crypto access list for the policy sa
UltOs(config-crypto-map)# access-list 1 apply any source 50.0.0.0
255.255.255.0 destination 40.0.0.0 255.255.255.0
9. Mapping IPSec crypto map policy sa to E1 in the switch
UltOs(config-crypto-map)# end; configure terminal
UltOs(config)# interface wan 0/1
UltOs(config-if)# crypto map sa
IPSec is installed in the Router 2 and the below mentioned commands are
executed to configure the IPSec policy.
10. Assigning an IP to wan 0/1.
UltOs# configure terminal
UltOs(config)# interface wan 0/1
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 80.0.0.1 255.0.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# end
UltOs#
11. Enabling the VPN module.
UltOs# configure terminal
UltOs(config)# set vpn enable
UltOs(config)#exit
UltOs#
12. Creating an IPSec crypto map policy with name as sa.
UltOs# configure terminal
UltOs(config)# crypto map sa
UltOs(config-crypto-map)#
13. Configuring IPSec crypto key mode for the policy sa.
UltOs(config-crypto-map)# crypto key mode ipsec-manual
CHAPTER 7: IPSEC
Configuration User Manual 156
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
14. Configuring IPSec crypto ipsec mode for the policy sa.
UltOs(config-crypto-map)# crypto ipsec mode tunnel
15. Configuring IPSec crypto peer address for the policy sa.
UltOs(config-crypto-map)# set peer 80.0.0.2
16. Configuring IPSec crypto session key for the policy sa.
UltOs(config-crypto-map)# set session-key authenticator esp hmac-
md5 12345678123456781234567812345678 esp des cipher
1234567812345678 outbound 258 inbound 259 anti-replay
17. Configuring IPSec crypto access list for the policy sa
UltOs(config-crypto-map)# access-list 1 apply any source 40.0.0.0
255.255.255.0 destination 50.0.0.0 255.255.255.0
18. Mapping IPSec crypto map policy sa to E1 in the switch
UltOs(config-crypto-map)# end; configure terminal
UltOs(config)# interface wan 0/1
UltOs(config-if)# crypto map sa
Configuration User Manual 157
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
8
IKE
8.1 Protocol Description
IKE is used to set up a security association in the IPSec protocol suite. IKE
protocol uses UDP (User Datagram Protocol) on port number 500 for
negotiating the SAs (Security Associations) with the peers. Therefore, port
500 must be permitted on any IP interface involved in exchanging IKE
packets. The negotiated key materials will be given to IPSec stack.
IKE exists in two versions, IKEv1 and IKEv2.
8.1.1 IKEv1
For IKEv1, the peers establish an IKE SA (phase 1 negotiation) using either
an MM (Main Mode) exchange or an AM (Aggressive Mode) exchange.
After the IKE SA is established, the IKE peers use the IKE SA for phase 2
negotiation with a QM (Quick Mode) exchange that establishes an IPsec SA
pair.
8.1.1.1 Phase 1 Main/Aggressive
8.1.1.1.1 Main Mode
In an MM exchange, the IKE entities use the following six messages to
establish the IKE SA:
Message 1: Initiator sends IKE SA proposals.
Message 2: Responder sends accepted IKE SA proposal.
Message 3: Initiator sends its Diffie-Hellman public value.
Message 4: Responder sends its Diffie-Hellman public value.
Message 5: Initiator sends IKE ID and authentication data.
CHAPTER 8: IKE
Configuration User Manual 158
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Message 6: Responder sends IKE ID and authentication data.
8.1.1.1.2 Aggressive Mode
In an AM exchange, the IKE entities use the following three messages to
establish the IKE SA:
Message 1: Initiator sends IKE SA proposals, Diffie-Hellman public value,
IKE ID and authentication data.
Message 2: Responder sends accepted IKE SA proposal, Diffie-Hellman
public value, IKE ID, and authentication data.
Message 3: Initiator sends Diffie-Hellman secured message.
8.1.1.2 Phase 2 - Quick Mode
After an IKEv1 SA is established, the two systems have a secure channel for
negotiating IPsec SAs. The IPsec SAs determine IPSec transformation(s)
used (ESP (Encapsulation Security Payload) and/or AH (Authentication
Header)), the encryption keys for ESP/ESP and other parameters. IPsec SAs
are negotiated in pairs: an outbound SA for packets from the local network to
the remote network and an inbound SA for packets from the remote network
to the local network.
In a QM exchange, the following three messages are required to establish an
IPsec SA pair:
Message 1: Initiator sends IPsec SA proposals, SPI (Security Parameter
Index) and traffic IDs.
Message 2: Responder sends accepted IPsec SA proposal, SPI, and
traffic IDs.
Message 3: Initiator sends hash message to prove liveness.
8.1.2 IKEv2
IKEv2 uses the following four messages to establish an IKE SA and an initial
IPsec SA pair.
Initial request/response of an IKE session (IKE_SA_INIT) negotiates
security parameters for the IKE_SA, sends nonces, and sends Diffie-
Hellman values.
Next request/response (IKE_AUTH) transmits identities, proves
knowledge of the secrets corresponding to the two identities, and sets up
an SA for the first (and often only) AH and/or ESP CHILD_SA.
Child Exchange (IKE_CHILD) request/response messages are used to
refresh the already existing IKE/IPSec SAs or create new IPSec SAs.
Informational Exchange (IKE_INFO) request/response messages are
used to send control messages to the peer.
CHAPTER 8: IKE
Configuration User Manual 159
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
8.2 IKE Configurations
8.2.1 Importing and Deleting RSA Key
8.2.1.1 Importing a RSA Key
This feature is supported only in CLI mode. The section lists the CLI
configuration steps to import a RSA key pair from the specified file, into the
database. This configuration is used to import an RSA key pair, if the user
already has a RSA key pair and corresponding certificate.
Enter the Global configuration mode.
UltOs# configure terminal
Import the RSA key pair.
UltOs(config)# vpn import rsa key rsakey1 file rsakeyfilename
Exit the Global configuration mode.
UltOs(config)#exit
View the RSA key information.
UltOs# show vpn rsa keys
KeyID rsakey1 RsaKey : ********
8.2.1.2 Deleting a RSA Key Pair
This feature is supported only in CLI mode. The section lists the CLI
configuration steps to delete an imported or generated RSA key pair.
Enter the Global configuration mode.
UltOs# configure terminal
Delete the imported RSA key pair.
UltOs(config)# no vpn rsa key index rsakey1
Exit the Global configuration mode.
UltOs(config)#exit
View the RSA key information.
UltOs# show vpn rsa keys
No information is displayed, as the RSA key pair is deleted.
8.2.2 Configuring Certificates
8.2.2.1 Importing a Certificate
This feature is supported only in CLI mode. The section lists the CLI
configuration steps to import a certificate from the specified file into the
database.
Enter the Global configuration mode.
UltOs# configure terminal
Import the certificate.
CHAPTER 8: IKE
Configuration User Manual 160
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# vpn import cert certid file RightGty.crt encode-type
PEM key rsakey1
Exit the Global Configuration mode.
UltOs(config)#exit
View the certificate information.
UltOs# show vpn certs index certid
Cert ID: raskey1
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=IN, ST=AP, L=Hyd, O=AA, OU=Products,
CN=SSCA/Email=
Validity
Not Before: Aug 16 23:27:18 2009 GMT
Not After : Aug 16 23:27:18 2010 GMT
Subject: C=CH, O=Linux strongSwan, CN=IssGty
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:d4:aa:32:e8:ab:70:94:5c:8e:cf:38:f8:e9:b1:
b7:1a:b9:4d:72:28:71:b1:33:bb:0b:8a:6b:1e:d9:
30:a9:81:71:e5:aa:47:78:32:47:d7:89:7f:7b:2e:
81:0d:4e:e8:75:65:28:c4:49:b9:9b:96:56:91:f3:
30:c6:ba:d0:f4:bf:db:b2:ba:c7:ab:84:7e:c4:02:
20:c8:69:e3:50:82:3b:d9:c8:fd:a5:75:92:58:a2:
40:1b:af:3f:56:51:d8:d0:9a:95:8f:e0:ba:a7:cd:
2a:fb:9f:69:ce:00:45:34:08:14:c1:1f:ea:44:0d:
8d:c2:a3:2b:3d:30:af:1d:d9
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage:
Digital Signature, Key Encipherment, Key Agreement
X509v3 Subject Key Identifier:
CHAPTER 8: IKE
Configuration User Manual 161
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
91:FA:E1:FF:C5:3D:6D:E1:A5:93:B0:F3:1D:E7:08:B1:EA:E8:
D0:30
X509v3 Subject Alternative Name:
IP Address:35.0.0.2
Signature Algorithm: md5WithRSAEncryption
6e:8b:d7:03:3a:8d:fb:e2:fa:21:bd:6e:16:45:16:56:15:3a:
b3:9e:48:96:0f:79:2a:c1:81:a1:22:02:f1:a0:f2:74:d6:2f:
85:52:b3:9c:25:b7:74:db:a6:82:7c:62:19:8c:b7:0d:3e:d7:
80:5e:24:d3:aa:82:26:d8:c9:66:9a:fa:72:10:4f:cc:d2:3d:
83:26:d8:e0:ec:78:87:66:05:dd:60:4e:62:92:f1:c5:1b:85:
ea:65:44:df:52:6b:50:1c:ba:f7:94:95:b0:af:02:8d:fb:56:
91:ea:56:17:18:29:3e:ec:f7:9d:cd:f7:3a:9b:a8:74:44:77:
b3:e9:fa:cb:9a:11:84:04:23:cd:2a:c2:7e:c8:6a:0a:1d:2d:
6a:0d:96:10:6d:ad:cd:3f:36:95:80:6e:65:f2:18:0a:80:43:
52:f9:a0:fa:b2:53:18:00:5e:e8:fd:f2:c0:8c:60:d8:e1:2d:
07:45:b3:0b:c1:5e:12:bd:01:ed:62:e5:af:51:2f:96:bb:29:
39:ae:41:21:d0:16:e5:5b:36:ce:db:c7:5e:6c:86:72:20:63:
bc:2b:b3:d5:b1:a3:f7:86:94:43:9e:21:ca:39:6a:92:8d:4a:
55:cd:44:6a:b2:68:40:f7:99:13:36:9d:5b:52:40:af:48:0f:
86:b8:68:34
8.2.2.2 Deleting a Certificate
This feature is supported only in CLI mode. The section lists the CLI
configuration steps to delete a certificate from the database.
Enter the Global configuration mode.
UltOs# configure terminal
Delete the imported certificate.
UltOs(config)# no vpn cert index certid
Exit the Global configuration mode.
UltOs(config)#exit
View the certificate information.
UltOs# show vpn certs index certid
No information is displayed, as the imported cerificate is deleted.
8.2.2.3 Importing a CA Certificate
This feature is supported only in CLI mode. The section lists the CLI
configuration steps to import a CA (Certificate Authority) certificate from the
specified file into the database.
Enter the Global configuration mode.
UltOs# configure terminal
CHAPTER 8: IKE
Configuration User Manual 162
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Import the CA certificate.
UltOs(config)# vpn import ca-cert cacert file cacertfilename encode-
type PEM
View the CA peer certificate information.
UltOs# show vpn ca-certs index cacertid
Cert ID: cacert
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
91:13:7b:31:9f:20:9c:94
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=IN, ST=AP, L=Hyd, O=, OU=Products,
CN=SSCA/Email=help@.com
Validity
Not Before: Mar 5 12:45:08 2009 GMT
Not After : Mar 5 12:45:08 2010 GMT
Subject: C=IN, ST=AP, L=Hyd, O=, OU=Products,
CN=SSCA/Email=help@.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:de:cd:6c:38:90:dd:14:6a:ac:9d:20:78:17:85:
37:02:67:cf:47:25:b8:47:4b:28:01:ea:4e:81:ba:
54:5b:c3:0f:c0:5f:2b:bb:b5:bd:a1:60:01:f0:2f:
03:e6:16:5c:a4:c3:7b:ef:bb:b3:70:6b:9f:6e:94:
0a:1a:7c:bc:3b:f0:e1:b3:10:68:15:19:b4:c1:98:
21:36:ba:15:d5:ce:97:d0:19:db:92:dc:03:a6:f4:
8a:03:7e:47:74:d9:59:92:eb:bb:a5:c4:2e:5c:47:
7a:35:18:ed:de:08:25:3f:c7:81:0c:ac:4f:37:72:
23:1f:a3:6a:57:b7:5b:b2:05:42:a6:cb:ec:92:3e:
88:9c:97:76:9d:2a:fb:7d:53:59:6e:4b:ff:f5:ee:
43:2a:76:4d:95:e7:14:61:d7:7e:8e:e2:45:8e:5a:
1e:2a:b8:90:0d:81:8f:e7:0e:05:7d:e2:88:93:e2:
2a:ad:2c:34:6c:a6:1d:b4:32:04:ab:35:e1:ac:89:
df:a1:f0:7a:2f:41:c9:b7:57:df:ac:3f:f6:22:e1:
94:29:c8:44:7e:f2:40:6c:f0:81:59:29:03:c5:e4:
CHAPTER 8: IKE
Configuration User Manual 163
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2d:86:2d:47:2c:14:13:4e:a2:fa:67:a9:b0:5a:7d:
a9:f2:3a:42:d8:0a:30:ba:15:76:99:c2:93:09:af:
eb:f1
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
7F:B4:2F:66:3B:47:67:C4:3E:EE:DC:4A:76:62:B7:D3:7B:EF:
1C:A3
X509v3 Authority Key Identifier:
keyid:7F:B4:2F:66:3B:47:67:C4:3E:EE:DC:4A:76:62:B7:D3:
7B:EF:1C:A3
DirName:/C=IN/ST=AP/L=Hyd/O=
/OU=Products/CN=SSCA/Email=help@.com
serial:91:13:7B:31:9F:20:9C:94
X509v3 Basic Constraints:
CA:TRUE
Signature Algorithm: sha1WithRSAEncryption
d1:16:98:cd:4a:01:99:f1:70:4f:7c:db:99:76:93:e4:42:40:
08:9e:e7:ee:16:41:3e:f5:22:04:b7:97:60:35:cb:09:af:6b:
a0:32:7d:88:9e:5f:86:3b:d9:13:54:f1:c6:4a:2d:78:a2:ab:
03:03:c1:6a:0a:99:6a:be:c5:b8:3b:47:69:07:f4:e6:89:8c:
3f:04:99:d0:8b:80:94:a4:cc:5d:25:c9:53:38:e9:64:14:dd:
7d:8e:01:52:3d:77:44:ac:b6:af:a8:f5:02:b2:f2:3b:bc:18:
6c:8c:67:b3:e1:b0:e9:f9:9c:b1:f1:f5:70:d6:18:4c:0d:8d:
69:6e:fd:ed:89:5d:a0:35:dc:19:13:61:b2:8c:e2:93:ae:c8:
66:40:72:67:c7:c9:2e:70:49:15:09:4e:74:f7:59:7e:52:a2:
1e:bc:c9:41:96:a2:94:9f:70:70:95:4f:e9:80:a0:8f:a6:46:
0f:31:d3:9d:fa:e0:f2:ea:d8:3b:32:79:50:2b:19:1b:8c:e0:
97:76:c7:99:e4:f5:49:ec:16:52:2b:0c:a6:ba:f1:45:d4:80:
c2:63:c3:90:9f:e1:7f:be:1d:73:75:e4:12:d1:6c:c7:59:1b:
92:25:d3:cd:10:95:b7:c0:09:e2:48:f2:14:22:91:5d:1e:08:
3e:b6:6c:fd
8.2.2.4 Deleting a CA Certificate
This feature is supported only in CLI mode. The section lists the CLI
configuration steps to delete a CA certificate from the database.
Enter the Global configuration mode.
UltOs# configure terminal
Delete the CA certificate.
CHAPTER 8: IKE
Configuration User Manual 164
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# no vpn ca-cert index cacert
View the certificate information.
UltOs# show vpn ca-certs index cacertid
No information is displayed, as the CA cerificate is deleted.
8.2.2.5 Importing a Peer Certificate
This feature is supported only in CLI mode. The section lists the CLI
configuration steps to import a peer’s certificate from the specified file into the
database.
Enter the Global configuration mode.
UltOs# configure terminal
Import the peer certificate.
UltOs(config)# vpn import peer-cert peercertid1 file peercertfilename
encode-type PEM trusted
View the certificate information.
UltOs# show vpn peer-certs index peercertid1
Trusted peer certificates
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=IN, ST=AP, L=Hyd, O=, OU=Products,
CN=SSCA/Email=help@.com
Validity
Not Before: Aug 16 23:27:18 2009 GMT
Not After : Aug 16 23:27:18 2010 GMT
Subject: C=CH, O=Linux strongSwan, CN=IssGty
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:d4:aa:32:e8:ab:70:94:5c:8e:cf:38:f8:e9:b1:
b7:1a:b9:4d:72:28:71:b1:33:bb:0b:8a:6b:1e:d9:
30:a9:81:71:e5:aa:47:78:32:47:d7:89:7f:7b:2e:
81:0d:4e:e8:75:65:28:c4:49:b9:9b:96:56:91:f3:
30:c6:ba:d0:f4:bf:db:b2:ba:c7:ab:84:7e:c4:02:
20:c8:69:e3:50:82:3b:d9:c8:fd:a5:75:92:58:a2:
40:1b:af:3f:56:51:d8:d0:9a:95:8f:e0:ba:a7:cd:
2a:fb:9f:69:ce:00:45:34:08:14:c1:1f:ea:44:0d:
CHAPTER 8: IKE
Configuration User Manual 165
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
8d:c2:a3:2b:3d:30:af:1d:d9
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage:
Digital Signature, Key Encipherment, Key Agreement
X509v3 Subject Key Identifier:
91:FA:E1:FF:C5:3D:6D:E1:A5:93:B0:F3:1D:E7:08:B1:EA:E8:
D0:30
X509v3 Subject Alternative Name:
IP Address:35.0.0.2
Signature Algorithm: md5WithRSAEncryption
6e:8b:d7:03:3a:8d:fb:e2:fa:21:bd:6e:16:45:16:56:15:3a:
b3:9e:48:96:0f:79:2a:c1:81:a1:22:02:f1:a0:f2:74:d6:2f:
85:52:b3:9c:25:b7:74:db:a6:82:7c:62:19:8c:b7:0d:3e:d7:
80:5e:24:d3:aa:82:26:d8:c9:66:9a:fa:72:10:4f:cc:d2:3d:
83:26:d8:e0:ec:78:87:66:05:dd:60:4e:62:92:f1:c5:1b:85:
ea:65:44:df:52:6b:50:1c:ba:f7:94:95:b0:af:02:8d:fb:56:
91:ea:56:17:18:29:3e:ec:f7:9d:cd:f7:3a:9b:a8:74:44:77:
b3:e9:fa:cb:9a:11:84:04:23:cd:2a:c2:7e:c8:6a:0a:1d:2d:
6a:0d:96:10:6d:ad:cd:3f:36:95:80:6e:65:f2:18:0a:80:43:
52:f9:a0:fa:b2:53:18:00:5e:e8:fd:f2:c0:8c:60:d8:e1:2d:
07:45:b3:0b:c1:5e:12:bd:01:ed:62:e5:af:51:2f:96:bb:29:
39:ae:41:21:d0:16:e5:5b:36:ce:db:c7:5e:6c:86:72:20:63:
bc:2b:b3:d5:b1:a3:f7:86:94:43:9e:21:ca:39:6a:92:8d:4a:
55:cd:44:6a:b2:68:40:f7:99:13:36:9d:5b:52:40:af:48:0f:
86:b8:68:34
8.2.2.6 Deleting Peer Certificate
This feature is supported only in CLI mode. The section lists the CLI
configuration steps to import a peer’s certificate from database.
Enter the Global configuration mode.
UltOs# configure terminal
Delete the peer certificate.
UltOs(config)# no vpn import peer-cert index peercertid1
View the peer certificate information.
UltOs# show vpn peer-certs index peercertid1
No information is displayed, as the peer certificate is deleted.
CHAPTER 8: IKE
Configuration User Manual 166
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
8.2.3 Configuring Remote Identity and Authentication Method
This section lists the CLI configuration steps to configure the the peer or
remote identity and authentication method.
8.2.3.1 Authentication Method Preshered-Key
This section lists the CLI configuration steps to configure a remote identity
with authentication method as preshared-key.
Enter the Global configuration mode.
UltOs# configure terminal
Configure the pre-shared key for the peer.
UltOs(config)# vpn remote identity ipv4 35.0.0.2 psk mypresharedkey
Exit the Global configuration mode.
UltOs(config)#exit
View the configured remote identity.
UltOs# show vpn remote-ids
Remote identity information table:
Identity type Identity Value
------------- --------------
IPv4 35.0.0.2
No.of remote-id's displayed: 1
8.2.3.2 Authentication Method RSA Certificate
This section lists the CLI configuration steps to configure authentication
method as RSA certificate.
Enter the Global configuration mode.
UltOs# configure terminal
Map the certificate to the peer.
UltOs(config)# vpn remote identity ipv4 35.0.0.2 cert rsakey1
Exit the Global configuration mode.
UltOs(config)#exit
View the configured remote identity.
UltOs# show vpn remote-ids
Remote identity information table:
Identity type Identity Value
------------- --------------
IPv4 35.0.0.2
No.of remote-id's displayed: 1
View the certificate mapped to the peer.
UltOs# show vpn map-cert
CHAPTER 8: IKE
Configuration User Manual 167
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
KeyID rsakey1 PeerID type: (ipv4) PeerID:
35.0.0.2
8.2.3.3 Deleting a Configured Remote Identity
This section lists the CLI configuration steps to delete a configured remote
identity.
Enter the Global configuration mode.
UltOs# configure terminal
Delete the configured remote identity.
UltOs(config)# no vpn remote identity ipv4 35.0.0.2
Exit the Global configuration mode.
UltOs(config)#exit
View the configured remote identities.
UltOs# show vpn remote-ids
Remote identity information table:
Identity type Identity Value
------------- --------------
No.of remote-id's displayed: 0
No information is displayed, as the remote identity is deleted.
8.2.3.4 WEB Configuration
VPN remote identity and authentication can be configured through WEB
interface using the VPN Global Settings screen (Navigation - Security
Management > VPN > VPN Settings)
Screen 8-1: VPN Global Setings
CHAPTER 8: IKE
Configuration User Manual 168
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
8.2.4 Creating VPN Policy
This section lists the CLI configuration steps to create a VPN policy which will
define the VPN policy to be negotiated for SA creation.
8.2.4.1 CLI Configuration
Enter the Global configuration mode.
UltOs# configure terminal
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Exit the policy configuration mode.
UltOs(config)#end
View the policy created. A policy will be created with the default values.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
Policy Name : sa
Policy Status : Inactive
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : None <== ==> None
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
Anti Replay : Disable
IKE suite Info [PHASE I] :
Encryption Algo : 3DES
Hash Algorithm : HMAC SHA1
Diffie-Hellman Group : DH Group 2
IKE Exchange Mode : Main
Life Time : 2400 Secs
Identity Information :
Local Identity Type : Default
Local Identity value :
Peer Identity Type : Default
Peer Identity value :
IPSEC suite Info [Phase II] :
CHAPTER 8: IKE
Configuration User Manual 169
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Protocol : ESP
Encryption Algo : Not Confgiured
Perfect Forward Secrecy : Not Confgiured
Life Time : 800 Secs
No.of ACTIVE VPN policies = 0
No.of VPN policies configured = 1
8.2.4.2 WEB Configuration
VPN Policies can be created through WEB interface using the VPN
IPSec screen (Navigation - Security Management > Firewall > Access
List) or VPN IKE screen (Navigation - Security Management > VPN >
VPN Settings > IKE Pre-shared Secret)
The Policy details can be viewed through WEB interface using the VPN
Policy screen (Navigation - Security Management > VPN > VPN
Settings > VPN Policy)
Screen 8-2: VPN Policy
CHAPTER 8: IKE
Configuration User Manual 170
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
8.2.5 Configuring VPN IKE Policy Parameters
8.2.5.1 Configuring IKE Version
This section lists the CLI configuration steps to configure the IKE version.
Enter the Global configuration mode.
UltOs# configure terminal
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Set the IKE version (v1 or v2).
UltOs(config-crypto-map)# set ike version v1
Exit the policy configuration mode.
UltOs(config-crypto-map)#end
View the configured IKE version.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
Policy Name : sa
Policy Status : Inactive
Policy Type : IKE x509 Certificate
Ike Version : v1
8.2.5.2 Configuring Key Mode
This section lists the CLI configuration steps to configure the certificate mode
and the preshared key mode.
8.2.5.2.1 Certificate Mode
This section lists the CLI configuration steps to configure key mode as
certificate.
Enter the Global configuration mode.
UltOs# configure terminal
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Set the authentication method.
UltOs(config-crypto-map)# crypto key mode cert
Exit the policy configuration mode.
UltOs(config-crypto-map)#end
View the configured certificate key mode.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
CHAPTER 8: IKE
Configuration User Manual 171
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Policy Name : sa
Policy Status : Inactive
Policy Type : IKE x509 Certificate
Ike Version : v1
8.2.5.2.2 Preshared Key Mode
This section lists the CLI configuration steps to configure key mode as
preshared key.
Enter the Global configuration mode.
UltOs# configure terminal
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Set the authentication method.
UltOs(config-crypto-map)# crypto key mode preshared
Exit the policy configuration mode.
UltOs(config-crypto-map)#end
View the configured preshared key mode.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
Policy Name : sa
Policy Status : Inactive
Policy Type : IKE Pre-shared
Ike Version : v1
8.2.5.3 Configuring Peer IP
This section lists the CLI configuration steps to configure the remote or peer
IP.
Enter the Global configuration mode.
UltOs# configure terminal
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Set the peer IP.
UltOs(config-crypto-map)# set peer 35.0.0.2
Exit the policy configuration mode.
UltOs(config-crypto-map)#end
View the configured peer IP.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
CHAPTER 8: IKE
Configuration User Manual 172
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Policy Name : sa
Policy Status : Inactive
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.2
8.2.5.4 Configuring IPSec Mode
This section lists the CLI configuration steps to configure the IPSec mode.
8.2.5.4.1 Tunnel Mode
This section lists the CLI configuration steps to configure the IPSec mode as
tunnel.
Enter the Global configuration mode.
UltOs# configure terminal
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Set the IPSec mode as tunnel.
UltOs(config-crypto-map)# crypto ipsec mode tunnel
Exit the policy configuration mode.
UltOs(config-crypto-map)#end
View the configured IPSec mode.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
Policy Name : sa
Policy Status : Inactive
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.2
8.2.5.5 Configuring Remote Identity
This section lists the CLI configuration steps to configure the remote identity
of type IPv4.
Enter the Global configuration mode.
UltOs# configure terminal
CHAPTER 8: IKE
Configuration User Manual 173
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Configure the remote identity.
UltOs(config-crypto-map)# )# isakmp peer identity ipv4 35.0.0.2
Exit the policy configuration mode.
UltOs(config-crypto-map)#end
View the configured remote identity.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
Policy Name : sa
Policy Status : Inactive
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.2
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
Anti Replay : Disable
IKE suite Info [PHASE I] :
Encryption Algo : 3DES
Hash Algorithm : HMAC SHA1
Diffie-Hellman Group : DH Group 2
IKE Exchange Mode : Main
Life Time : 2400 Secs
Identity Information :
Local Identity Type : Default
Local Identity value :
Peer Identity Type : IPv4
Peer Identity value : 35.0.0.2
8.2.5.6 Configuring Local Identity
This section lists the CLI configuration steps to configure the local identity of
type IPv4.
Enter the Global configuration mode.
UltOs# configure terminal
CHAPTER 8: IKE
Configuration User Manual 174
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Configure the local identity.
UltOs(config-crypto-map)# )# isakmp local identity ipv4 35.0.0.1
Exit the policy configuration mode.
UltOs(config-crypto-map)#end
View the configured local identity.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
Policy Name : sa
Policy Status : Inactive
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.2
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
Anti Replay : Disable
IKE suite Info [PHASE I] :
Encryption Algo : 3DES
Hash Algorithm : HMAC SHA1
Diffie-Hellman Group : DH Group 2
IKE Exchange Mode : Main
Life Time : 2400 Secs
Identity Information :
Local Identity Type : IPv4
Local Identity value : 35.0.0.1
Peer Identity Type : IPv4
Peer Identity value : 35.0.0.2
8.2.5.7 Configuring Phase 1 Parameters
This section provides the configuration details of phase 1 parameters for
IKEv1 and IKEv2.
CHAPTER 8: IKE
Configuration User Manual 175
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
8.2.5.7.1 For IKEv1
This section lists the CLI configuration steps to configure phase 1 parameters
for the main mode.
Enter the Global configuration mode.
UltOs# configure terminal
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Set the phase 1 parameters.
UltOs(config-crypto-map)# )# isakmp policy encryption des hash
md5 dh group2 exch main lifetime secs 1500
Exit the policy configuration mode.
UltOs(config-crypto-map)#end
View the configured phase 1 parameters.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
Policy Name : sa
Policy Status : Inactive
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Local & Remote Port Range : 0-65535 <-- --> 0-
65535
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.2
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
Anti Replay : Enable
IKE suite Info [PHASE I] :
Encryption Algo : DES
Hash Algorithm : HMAC MD5
Diffie-Hellman Group : DH Group 2
IKE Exchange Mode : Main
Life Time : 1500 Secs
Identity Information :
Local Identity Type : IPv4
CHAPTER 8: IKE
Configuration User Manual 176
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
8.2.5.7.2 For IKEv2
This section lists the CLI configuration steps to configure phase 1 parameters
for IKEv2.
Enter the Global configuration mode.
UltOs# configure terminal
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Set the phase 1 parameters.
UltOs(config-crypto-map)# )# isakmp policy encryption des hash
md5 dh group2 lifetime secs 1500
Exit the policy configuration mode.
UltOs(config-crypto-map)#end
View the configured phase 1 parameters.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
Policy Name : sa
Policy Status : Inactive
Policy Type : IKE Pre-shared
Ike Version : v2
Local & Remote Protected N/W's : None <-- --> None
Local & Remote Port Range : 0-65535 <-- --> 0-
65535
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.2
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
Anti Replay : Enable
IKE suite Info [PHASE I] :
Encryption Algo : DES
Hash Algorithm : HMAC MD5
Diffie-Hellman Group : DH Group 2
Life Time : 1500 Secs
Identity Information :
Local Identity Type : IPv4
CHAPTER 8: IKE
Configuration User Manual 177
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
8.2.5.8 Configuring Phase 2 Parameters
This section provides the configuration details of phase 2 parameters for ESP
protocol.
8.2.5.8.1 ESP Protocol with Integrity
This section lists the CLI configuration steps to configure phase-2 parameters
for ESP protocol.
Enter the Global configuration mode.
UltOs# configure terminal
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Set the phase 2 parameters for ESP.
UltOs(config-crypto-map)# )# crypto map ipsec encryption esp des
authentication esp sha1 pfs group2 lifetime secs 300
Exit the policy configuration mode.
UltOs(config-crypto-map)#end
View the configured phase 2 parameters.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
Policy Name : sa
Policy Status : Inactive
Policy Type : IKE Pre-shared
Ike Version : v2
Local & Remote Protected N/W's : None <-- --> None
Local & Remote Port Range : 0-65535 <-- --> 0-
65535
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.2
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
Anti Replay : Enable
IKE suite Info [PHASE I] :
Encryption Algo : DES
Hash Algorithm : HMAC MD5
Diffie-Hellman Group : DH Group 2
Life Time : 1500 Secs
Identity Information :
CHAPTER 8: IKE
Configuration User Manual 178
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Local Identity Type : IPv4
Local Identity value : 35.0.0.1
Peer Identity Type : IPv4
Peer Identity value : 35.0.0.2
IPSEC suite Info [Phase II] :
Protocol : ESP
Encryption Algo : DES
Authenticator : HMAC-SHA1
Perfect Forward Secrecy : DH Group 2
Life Time : 300 Secs
8.2.5.9 Configuring Access-list
This section provides the configuration details of access-list for tunnel policy
and transport policy.
8.2.5.9.1 Access-list for Tunnel Policy
This section lists the CLI configuration steps to configure access-list for
tunnel policy.
Enter the Global configuration mode.
UltOs# configure terminal
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Set the access-list for the tunnel mode.
UltOs(config-crypto-map)#access-list apply any source 192.168.1.0
255.255.255.0 destination 192.168.2.0 255.255.255.0
Exit the policy configuration mode.
UltOs(config-crypto-map)#end
View the configured access-list.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
Policy Name : sa
Policy Status : Inactive
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : 192.168.1.0/24 <--
--> 192.168.2.0/24
Local & Remote Port Range : 0-65535 <-- --> 0-
65535
CHAPTER 8: IKE
Configuration User Manual 179
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Security Mode : Tunnel
8.2.5.10 Attaching the Policy to the Interface
This section lists the CLI configuration steps to make the policy active.
Enter the Global configuration mode.
UltOs# configure terminal
Make the policy active and bind to the WAN port.
UltOs(config)#interface wan 0/1
UltOs(config-if)# crypto map sa
Exit from the interface configuration mode.
UltOs(config-if)# end
View the policy active status.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
Policy Name : sa
Policy Status : Active
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : 192.168.1.0/24 <--
--> 192.168.2.0/24
Local & Remote Port Range : 0-65535 <-- --> 0-
65535
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 35.0.0.1 <== ==>
35.0.0.2
Interface Name : lan 0/1
8.2.5.11 Removing the Policy from the Interface
This section lists the CLI configuration steps to make the policy inactive.
Enter the Global configuration mode.
UltOs# configure terminal
Make the policy inactive.
UltOs(config)#interface wan 0/1
UltOs(config-if)# no crypto map sa
Exit from the interface configuration mode.
UltOs(config-if)# end
View the policy inactive status.
UltOs# show crypto map sa
VPN Policy Parameters
CHAPTER 8: IKE
Configuration User Manual 180
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
-------------------------
Policy Name : sa
Policy Status : InActive
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : 192.168.1.0/24 <--
--> 192.168.2.0/24
Local & Remote Port Range : 0-65535 <-- --> 0-
65535
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 35.0.0.1 <== ==>
35.0.0.2
8.2.5.12 Deleting the Policy
This section lists the CLI configuration steps to delete the configured policy.
Enter the Global configuration mode.
UltOs# configure terminal
Delete the configured policy.
UltOs(config)# no crypto map sa
Exit from the global configuration mode.
UltOs(config)# end
View the configuration to check the policy being deleted.
UltOs# show crypto map sa
No information is displayed, as the configured crypto map is deleted.
8.2.5.13 Web Configuration for VPN IKE Policy
VPN IKE Policy can be configured using the VPN IKE screen (Navigation -
Security Management > VPN > VPN Settings > IKE Pre-shared Secret)
CHAPTER 8: IKE
Configuration User Manual 181
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 8-3: VPN IKE
CHAPTER 8: IKE
Configuration User Manual 182
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
8.2.6 Displaying the VPN Statistics
8.2.6.1 CLI Configuration
This section lists the CLI command to view the VPN global statistics.
UltOs# show vpn global statistics
VPN Global Statistics:
--------------------------------
Packets In : 41
Packets Out : 18
Packets Secured : 0
Packets Dropped : 7
8.2.6.2 WEB Configuration
VPN statistics can be viewed through WEB interface using the VPN
Statistics screen (Navigation - Statistics > VPN)
Screen 8-4: VPN Statistics
CHAPTER 8: IKE
Configuration User Manual 183
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
8.3 IKE Examples
This chapter provides the sample topology setup and various sample
configurations of IKEthrough CLI.
Figure 8-1: IKE Topology
Node
Interface Index/Name
Interface IP Address
DUT1
WAN
35.0.0.1
DUT2
WAN
35.0.0.2
DUT1
LAN
192.168.1.1
DUT2
LAN
192.168.2.1
H1
E0
192.168.1.10
R1
E0
192.168.2.10
8.3.1 General Configuration
To configure a WAN port, execute the following CLI commands:
UltOs#configure terminal
UltOs(config)# interface wan 0/1
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 35.0.0.1 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# end
8.3.2 Configuring IKEv1 - Tunnel Mode - Preshared key
Tunnel mode is most commonly used between gateways, or at an end-
station to a gateway. The gateway acts as a proxy for the hosts behind it.
In IKE Topology , tunnel mode is used to setup an IPSec tunnel between H1
and R1.
FDN40
DUT2 / Ravpn Client /
Ravpn Server)
R1
DUT1
FDN40
H1
WAN
WAN
LAN
LAN
E0
E0
CHAPTER 8: IKE
Configuration User Manual 184
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
This section describes the procedure to configure the IKEv1 site-to-site
tunnel mode policy with the authentication method as preshared key.
8.3.2.1 DUT1 Configuration
Execute the following steps in DUT1:
Enter the Global configuration mode.
UltOs# configure terminal
Configure the pre-shared key for the peer.
UltOs(config)# vpn remote identity ipv4 35.0.0.2 psk mypresharedkey
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Set the IKE version.
UltOs(config-crypto-map)# set ike version v1
Set the authentication method.
UltOs(config-crypto-map)# crypto key mode preshared
Set the IPSec mode as tunnel.
UltOs(config-crypto-map)# crypto ipsec mode tunnel
Set the peer IP (DUT2 WAN IP).
UltOs(config-crypto-map)# set peer 35.0.0.2
Set the peer identity.
UltOs(config-crypto-map)# isakmp peer identity ipv4 35.0.0.2
Set the local identity.
UltOs(config-crypto-map)# isakmp local identity ipv4 35.0.0.1
Set the phase 1 parameters.
UltOs(config-crypto-map)# isakmp policy encryption des hash md5
dh group2 exch main lifetime secs 1500
Set the phase 2 parameters.
UltOs(config-crypto-map)# crypto map ipsec encryption esp des
authentication esp sha1 pfs group2 lifetime secs 300
Set the access-list parameters.
UltOs(config-crypto-map)#access-list apply any source 192.168.1.0
255.255.255.0 destination 192.168.2.0 255.255.255.0
Exit from the policy configuration mode.
UltOs(config-crypto-map)#exit
Make the policy active and bind to the WAN port.
UltOs(config)#interface wan 0/1
UltOs(config-if)# crypto map sa
Exit from the interface configuration mode.
UltOs(config-if)# end
View the configured VPN policy.
UltOs# show crypto map sa
CHAPTER 8: IKE
Configuration User Manual 185
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
VPN Policy Parameters
-------------------------
Policy Name : sa
Policy Status : Active
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : 192.168.1.0/24 <--
--> 192.168.2.0/24
Local & Remote Port Range : 0-65535 <-- --> 0-
65535
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 35.0.0.1 <== ==>
35.0.0.2
Interface Name : wan 0/1
Policy Protocol : any
Policy Action : Apply
Anti Replay : Enable
IKE suite Info [PHASE I] :
Encryption Algo : DES
Hash Algorithm : HMAC MD5
Diffie-Hellman Group : DH Group 2
IKE Exchange Mode : Main
Life Time : 1500 Secs
Identity Information :
Local Identity Type : IPv4
Local Identity value : 35.0.0.1
Peer Identity Type : IPv4
Peer Identity value : 35.0.0.2
IPSEC suite Info [Phase II] :
Protocol : ESP
Encryption Algo : DES
Authenticator : HMAC-SHA1
Perfect Forward Secrecy : DH Group 2
Life Time : 300 Secs
Crypto Session Status : Inactive
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
CHAPTER 8: IKE
Configuration User Manual 186
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
8.3.2.2 DUT2 Configuration
Execute the following steps in DUT2:
Enter the Global configuration mode.
UltOs# configure terminal
Configure the pre-shared key for the peer.
UltOs(config)# vpn remote identity ipv4 35.0.0.1 psk mypresharedkey
Enter the policy configuration mode.
UltOs(config)# crypto map sa
Set the IKE version.
UltOs(config-crypto-map)# set ike version v1
Set the authentication method.
UltOs(config-crypto-map)# crypto key mode preshared
Set the IPSec mode as tunnel.
UltOs(config-crypto-map)# crypto ipsec mode tunnel
Set the peer IP (DUT1 WAN IP).
UltOs(config-crypto-map)# set peer 35.0.0.1
Set the peer identity.
UltOs(config-crypto-map)# isakmp peer identity ipv4 35.0.0.1
Set the local identity.
UltOs(config-crypto-map)# isakmp local identity ipv4 35.0.0.2
Set the phase 1 parameters.
UltOs(config-crypto-map)# isakmp policy encryption des hash md5
dh group2 exch main lifetime secs 1500
Set the phase 2 parameters.
UltOs(config-crypto-map)# crypto map ipsec encryption esp des
authentication esp sha1 pfs group2 lifetime secs 300
Set the access-list parameters.
UltOs(config-crypto-map)#access-list apply any source 192.168.2.0
255.255.255.0 destination 192.168.1.0 255.255.255.0
Exit from the policy configuration mode.
UltOs(config-crypto-map)#exit
Make the policy active and bind to the WAN port.
UltOs(config)#interface wan 0/1
UltOs(config-if)# crypto map sa
Exit from the interface configuration mode.
UltOs(config-if)# end
View the configured VPN policy.
UltOs# show crypto map sa
VPN Policy Parameters
-------------------------
CHAPTER 8: IKE
Configuration User Manual 187
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Policy Name : sa
Policy Status : Active
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : 192.168.2.0/24 <--
--> 192.168.1.0/24
Local & Remote Port Range : 0-65535 <-- --> 0-
65535
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 35.0.0.2 <== ==>
35.0.0.1
Interface Name : wan 0/1
Policy Protocol : any
Policy Action : Apply
Anti Replay : Enable
IKE suite Info [PHASE I] :
Encryption Algo : DES
Hash Algorithm : HMAC MD5
Diffie-Hellman Group : DH Group 2
IKE Exchange Mode : Main
Life Time : 1500 Secs
Identity Information :
Local Identity Type : IPv4
Local Identity value : 35.0.0.2
Peer Identity Type : IPv4
Peer Identity value : 35.0.0.1
IPSEC suite Info [Phase II] :
Protocol : ESP
Encryption Algo : DES
Authenticator : HMAC-SHA1
Perfect Forward Secrecy : DH Group 2
Life Time : 300 Secs
Crypto Session Status : Inactive
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
Configuration User Manual 189
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
9
Firewall
9.1 Topology
Figure 9-1: Firewall Topology
Table 9-1: IPv4 Addresses of Interfaces and Hosts
Interface Index/Name
Interface IPv4 Address
LAN0/1
10.0.0.1
WAN0/1
80.0.0.1
H1
10.0.0.10
H2
80.0.0.10
9.2 Default Configurations
When system comes up, FIREWALL is operationally disabled.
Firewall Configurations
Wan0/1
Lan0/1
FDN40-1
H2
H1
Host in WAN Network
Host in LAN Network
CHAPTER 9: FIREWALL
Configuration User Manual 190
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
9.2.1 Enabling and Disabling Firewall Module
This section describes the steps involved in enabling and disabling the
Firewall module globally. By default, firewall module is enabled.
9.2.1.1 CLI Configuration
To enable firewall:
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Enable the Firewall module.
UltOs(config)# firewall
UltOs(config-firewall)# enable
3. Exit from the Global Configuration mode.
UltOs(config-firewall)# end
To disable firewall:
4. Enter the Global Configuration mode.
UltOs# configure terminal
5. Disable the Firewall module.
UltOs(config)# firewall
UltOs(config-firewall)# disable
6. Exit from the Global Configuration mode.
UltOs(config-firewall)# end
To view the firewall status
7. View the firewall settings.
UltOs# show firewall config
Firewall Configuration
----------------------
Firewall Status : Enabled
Trap Status : Disabled
Max Filters : 10000
Max Access-Lists : 10000
Trap Threshold Configured : 50
IP Inspect Option : src-route
9.2.1.2 WEB Configuration
To enable /disable firewall, Configure Firewall Status field from the Firewall
Basic Settings screen (Navigation - Security Management > Firewall >
Basic Settings)
CHAPTER 9: FIREWALL
Configuration User Manual 191
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 9-1: Firewall Basic Settings
9.2.2 Configuring Firewall Filters for IPv4
Traffic from the private network to the Internet is regulated using Outbound
Rules. These rules determine the services to which the users in the private
network have access. Traffic from the Internet is regulated using Inbound
Rules. These rules determine the access for the outsiders to use the private
resources.
Firewall rules are used to permit or deny specific traffic. The type of traffic is
defined by a firewall filter, and the decision to permit or deny is defined by a
firewall access list. A rule is an access list policy which uses a firewall filter to
process any packet.
Firewall, by default, allows outbound traffic from the computers in the private
network to the Internet only for the following services:
FTP (Port 21)
HTTP (80) and HTTPS (Port 443)
SSH(22)
SNMP(161)
SNMPTRAP(162)
ISAKMP(500)
IPSEC NAT TRAVERSAL(4500)
All other outbound traffic is blocked by Firewall.
This section describes the steps involved in creation and deletion of firewall
filters.
9.2.2.1 CLI Configuration
To create a firewall filter:
1. Go to Global configuration mode.
UltOs# configure terminal
2. Enter the firewall mode.
UltOs(config)# firewall
CHAPTER 9: FIREWALL
Configuration User Manual 192
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
3. Create a new firewall filter to to match the source IP address matches
with LAN hostH1, destination IP address matches with H2, any protocol,
any source port and destination port.
UltOs(config-firewall)# filter add filter1 10.0.0.10/32 80.0.0.10/32 any
To view firewall filters
UltOs# show firewall filters
Firewall Filters
----------------
Filter Proto Source
Destination Src port/ Dest port/ TCP
Address
Address Icmp type Icmp code Flags
------ ----- ------- -----
-- -------- -------- -----
filter1 any 10.0.0.10/32
80.0.0.10/32 >1 >1 NA
Def_AH_Filter 51 0.0.0.0/0
192.168.1.1/24 >1 >1 NA
Def_ESP_Filter 50 0.0.0.0/0
192.168.1.1/24 >1 >1 NA
Def_FTP_Filter tcp 0.0.0.0/0
192.168.1.1/24 >1 =21 any
Def_SSH_Filter tcp 0.0.0.0/0
192.168.1.1/24 >1 =22 any
Def_HTTP_Filter tcp 0.0.0.0/0
192.168.1.1/24 >1 =80 any
Def_ICMP_Filter icmp 0.0.0.0/0
0.0.0.0/0 any any NA
Def_SNMP_Filter udp 0.0.0.0/0
192.168.1.1/24 >1 =161 NA
Def_HTTPS_Filter tcp 0.0.0.0/0
192.168.1.1/24 >1 =443 any
Def_TELNET_Filter tcp 0.0.0.0/0
192.168.1.1/24 >1 =6023 any
Def_IKE_UDP_Filter udp 0.0.0.0/0
192.168.1.1/24 >1 =500 NA
Def_SNTP_UDP_Filter udp 0.0.0.0/0
0.0.0.0/0 >1 =123 NA
Def_SNMP_Trap_Filter udp 0.0.0.0/0
192.168.1.1/24 >1 =162 NA
Def_IKE_NAT_UDP_Filter udp 0.0.0.0/0
192.168.1.1/24 >1 =4500 NA
Def_IKE_UDP_Loc_Filter udp 0.0.0.0/0
0.0.0.0/0 >1 =500 NA
CHAPTER 9: FIREWALL
Configuration User Manual 193
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
This below section describes the steps involved in deleting the ipv4 firewall
filter.
To delete the configured ipv4 firewall filter
4. Enter the Global Configuration mode.
UltOs# configure terminal
5. Enter into firewall mode
UltOs(config)# firewall
6. Delete the ipv4 firewall filter
UltOs(config-firewall)# no filter filter1
The below section describes the steps needed to create filters to filter
packets from WAN Host to LAN host.
To create a firewall filter:
7. Go to Global configuration mode.
UltOs# configure terminal
8. Enter the firewall mode.
UltOs(config)# firewall
9. Create a new firewall filter to to match the source IP address as WAN
host IP, destination IP address as LAN host IP, tcp protocol, any source
port and destination port.
UltOs(config-firewall)# filter add filter2 80.0.0.10/32 10.0.0.10/32 tcp
To view firewall filters
UltOs# show firewall filters
Firewall Filters
----------------
Filter Proto Source
Destination Src port/ Dest port/ TCP
Address
Address Icmp type Icmp code Flags
------ ----- ------- -----
-- -------- -------- -----
filter1 any 10.0.0.10/32
80.0.0.10/32 >1 >1 NA
filter2 tcp 80.0.0.10/32
10.0.0.10/32 >1 >1 any
Def_AH_Filter 51 0.0.0.0/0
192.168.1.1/24 >1 >1 NA
Def_ESP_Filter 50 0.0.0.0/0
192.168.1.1/24 >1 >1 NA
Def_FTP_Filter tcp 0.0.0.0/0
192.168.1.1/24 >1 =21 any
Def_SSH_Filter tcp 0.0.0.0/0
192.168.1.1/24 >1 =22 any
CHAPTER 9: FIREWALL
Configuration User Manual 194
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Def_HTTP_Filter tcp 0.0.0.0/0
192.168.1.1/24 >1 =80 any
Def_ICMP_Filter icmp 0.0.0.0/0
0.0.0.0/0 any any NA
Def_SNMP_Filter udp 0.0.0.0/0
192.168.1.1/24 >1 =161 NA
Def_HTTPS_Filter tcp 0.0.0.0/0
192.168.1.1/24 >1 =443 any
Def_TELNET_Filter tcp 0.0.0.0/0
192.168.1.1/24 >1 =6023 any
Def_IKE_UDP_Filter udp 0.0.0.0/0
192.168.1.1/24 >1 =500 NA
Def_SNTP_UDP_Filter udp 0.0.0.0/0
0.0.0.0/0 >1 =123 NA
Def_SNMP_Trap_Filter udp 0.0.0.0/0
192.168.1.1/24 >1 =162 NA
Def_IKE_NAT_UDP_Filter udp 0.0.0.0/0
192.168.1.1/24 >1 =4500 NA
Def_IKE_UDP_Loc_Filter udp 0.0.0.0/0
0.0.0.0/0 >1 =500 NA
This below section describes the steps involved in deleting the ipv4 firewall
filter.
To delete the configured ipv4 firewall filter
10. Enter the Global Configuration mode.
UltOs# configure terminal
11. Enter into firewall mode
UltOs(config)# firewall
12. Delete the ipv4 firewall filter
UltOs(config-firewall)# no filter filter2
9.2.2.2 WEB Configuration
Firewall filters can be configured through WEB interface using the Firewall
Filter Configuration screen (Navigation - Security Management > Firewall
> Filters)
CHAPTER 9: FIREWALL
Configuration User Manual 195
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 9-2: Firewall Filter Configuration
CHAPTER 9: FIREWALL
Configuration User Manual 196
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
9.2.3 Configuring Firewall Access List
Firewall Access List is a policy which is based on the direction of the traffic,
the firewall filter and the order of precedence to allow or deny the traffic. This
section describes the steps involved in configuring firewall access-list.
9.2.3.1 CLI Configuration
To create an access-list:
1. Enter the global configuration mode.
UltOs# configure terminal
2. Enter firewall mode
UltOs(config)# firewall
3. Create an access list policy to allow traffic from H1 to H2.
UltOs(config-firewall)# access-list acl1 lan wan filter1 permit 8
To view the configured firewall access list
UltOs# show firewall access-lists
Firewall Access Lists
ACL Name From To Filter
Combination Action Prio- Fragmented
Zone Zone
rity Packet
-------------------- ------ ------ --------------
------- ------ ----- ----------
acl1 LAN WAN filter1
permit 8 permit
Def_HTTPS_ACL_LAN_Local LAN Local
Def_HTTPS_Filter permit 9987 permit
Def_HTTP_ACL_LAN_Local LAN Local
Def_HTTP_Filter permit 9984 permit
Def_SNMP_ACL_LAN_Local LAN Local
Def_SNMP_Filter permit 9980 permit
Def_SNMP_Trap_ACL_LAN_LocalLAN Local
Def_SNMP_Trap_Filter permit 9976 permit
Def_SSH_ACL_LAN_Local LAN Local Def_SSH_Filter
permit 9991 permit
Def_TELNET_ACL_LAN_Local LAN Local
Def_TELNET_Filter permit 9995 permit
Def_AH_ACL_WAN_Local WAN Local Def_AH_Filter
permit 9967 permit
Def_ESP_ACL_WAN_Local WAN Local Def_ESP_Filter
permit 9969 permit
Def_HTTPS_ACL_WAN_Local WAN Local
Def_HTTPS_Filter permit 9989 permit
CHAPTER 9: FIREWALL
Configuration User Manual 197
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Def_IKE_ACL_WAN_Local WAN Local
Def_IKE_UDP_Filter permit 9965 permit
Def_IKE_NAT_ACL_WAN_LocalWAN Local
Def_IKE_NAT_UDP_Filter permit 9963 permit
Def_SNMP_ACL_WAN_Local WAN Local
Def_SNMP_Filter permit 9982 permit
Def_SNMP_Trap_ACL_WAN_LocalWAN Local
Def_SNMP_Trap_Filter permit 9978 permit
Def_SSH_ACL_WAN_Local WAN Local Def_SSH_Filter
permit 9993 permit
Def_HTTPS_ACL_DMZ_Local DMZ Local
Def_HTTPS_Filter permit 9986 permit
Def_HTTP_ACL_DMZ_Local DMZ Local
Def_HTTP_Filter permit 9983 permit
Def_SNMP_ACL_DMZ_Local DMZ Local
Def_SNMP_Filter permit 9979 permit
Def_SNMP_Trap_ACL_DMZ_LocalDMZ Local
Def_SNMP_Trap_Filter permit 9975 permit
Def_SSH_ACL_DMZ_Local DMZ Local Def_SSH_Filter
permit 9990 permit
Def_TELNET_ACL_DMZ_Local DMZ Local
Def_TELNET_Filter permit 9994 permit
Def_HTTPS_ACL_VPN_Local VPN Local
Def_HTTPS_Filter permit 9988 permit
Def_HTTP_ACL_VPN_Local VPN Local
Def_HTTP_Filter permit 9985 permit
Def_SNMP_ACL_VPN_Local VPN Local
Def_SNMP_Filter permit 9981 permit
Def_SNMP_Trap_ACL_VPN_LocalVPN Local
Def_SNMP_Trap_Filter permit 9977 permit
Def_SSH_ACL_VPN_Local VPN Local Def_SSH_Filter
permit 9992 permit
Def_TELNET_ACL_VPN_Local VPN Local
Def_TELNET_Filter permit 9996 permit
Def_ACL_ICMP_Local_LAN Local LAN
Def_ICMP_Filter permit 9961 permit
Def_FTP_ACL_Local_LAN Local LAN Def_FTP_Filter
permit 9999 permit
Def_SNTP_ACL_Local_LAN Local LAN
Def_SNTP_UDP_Filter permit 9972 permit
Def_ACL_ICMP_Local_WAN Local WAN
Def_ICMP_Filter permit 9962 permit
Def_AH_ACL_Local_WAN Local WAN Def_AH_Filter
permit 9968 permit
CHAPTER 9: FIREWALL
Configuration User Manual 198
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Def_ESP_ACL_Local_WAN Local WAN Def_ESP_Filter
permit 9970 permit
Def_FTP_ACL_Local_WAN Local WAN Def_FTP_Filter
permit 10000 permit
Def_IKENAT_ACL_Local_WAN Local WAN
Def_IKE_NAT_UDP_Filter permit 9964 permit
Def_IKE_ACL_Local_WAN Local WAN
Def_IKE_UDP_Loc_Filter permit 9966 permit
Def_SNTP_ACL_Local_WAN Local WAN
Def_SNTP_UDP_Filter permit 9974 permit
Def_ACL_ICMP_Local_DMZ Local DMZ
Def_ICMP_Filter permit 9960 permit
Def_FTP_ACL_Local_DMZ Local DMZ Def_FTP_Filter
permit 9998 permit
Def_SNTP_ACL_Local_DMZ Local DMZ
Def_SNTP_UDP_Filter permit 9971 permit
Def_ACL_ICMP_Local_VPN Local VPN
Def_ICMP_Filter permit 9959 permit
Def_FTP_ACL_Local_VPN Local VPN Def_FTP_Filter
permit 9997 permit
Def_SNTP_ACL_Local_VPN Local VPN
Def_SNTP_UDP_Filter permit 9973 permit
To delete the configured firewall access list:
4. Enter the Global Configuration mode.
UltOs# configure terminal
5. Enter into firewall mode
UltOs(config)# firewall
6. Delete the configured access-list
UltOs(config-firewall)# no access-list acl1 lan wan
The below section describes the steps needed to allow traffic from WAN host
H2 to LAN host H1 when nat configuration is disabled. The filter filter2
created in section 3.2 is used to create an inbound access-list which permits
traffic from H2 to H1.
To create an access-list:
7. Enter the global configuration mode.
UltOs# configure terminal
8. Enter firewall mode
UltOs(config)# firewall
9. Create an access list policy to allow traffic from H2 to H1.
UltOs(config-firewall)# access-list acl2 wan lan filter2 permit 8
To view the configured firewall access list
UltOs# show firewall access-lists
CHAPTER 9: FIREWALL
Configuration User Manual 199
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Firewall Access Lists
ACL Name From To Filter
Combination Action Prio- Fragmented
Zone Zone
rity Packet
-------------------- ------ ------ --------------
------- ------ ----- ----------
Def_HTTPS_ACL_LAN_Local LAN Local
Def_HTTPS_Filter permit 9987 permit
Def_HTTP_ACL_LAN_Local LAN Local
Def_HTTP_Filter permit 9984 permit
Def_SNMP_ACL_LAN_Local LAN Local
Def_SNMP_Filter permit 9980 permit
Def_SNMP_Trap_ACL_LAN_LocalLAN Local
Def_SNMP_Trap_Filter permit 9976 permit
Def_SSH_ACL_LAN_Local LAN Local Def_SSH_Filter
permit 9991 permit
Def_TELNET_ACL_LAN_Local LAN Local
Def_TELNET_Filter permit 9995 permit
acl2 WAN LAN filter2
permit 8 permit
Def_AH_ACL_WAN_Local WAN Local Def_AH_Filter
permit 9967 permit
Def_ESP_ACL_WAN_Local WAN Local Def_ESP_Filter
permit 9969 permit
Def_HTTPS_ACL_WAN_Local WAN Local
Def_HTTPS_Filter permit 9989 permit
Def_IKE_ACL_WAN_Local WAN Local
Def_IKE_UDP_Filter permit 9965 permit
Def_IKE_NAT_ACL_WAN_LocalWAN Local
Def_IKE_NAT_UDP_Filter permit 9963 permit
Def_SNMP_ACL_WAN_Local WAN Local
Def_SNMP_Filter permit 9982 permit
Def_SNMP_Trap_ACL_WAN_LocalWAN Local
Def_SNMP_Trap_Filter permit 9978 permit
Def_SSH_ACL_WAN_Local WAN Local Def_SSH_Filter
permit 9993 permit
Def_HTTPS_ACL_DMZ_Local DMZ Local
Def_HTTPS_Filter permit 9986 permit
Def_HTTP_ACL_DMZ_Local DMZ Local
Def_HTTP_Filter permit 9983 permit
Def_SNMP_ACL_DMZ_Local DMZ Local
Def_SNMP_Filter permit 9979 permit
CHAPTER 9: FIREWALL
Configuration User Manual 200
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Def_SNMP_Trap_ACL_DMZ_LocalDMZ Local
Def_SNMP_Trap_Filter permit 9975 permit
Def_SSH_ACL_DMZ_Local DMZ Local Def_SSH_Filter
permit 9990 permit
Def_TELNET_ACL_DMZ_Local DMZ Local
Def_TELNET_Filter permit 9994 permit
Def_HTTPS_ACL_VPN_Local VPN Local
Def_HTTPS_Filter permit 9988 permit
Def_HTTP_ACL_VPN_Local VPN Local
Def_HTTP_Filter permit 9985 permit
Def_SNMP_ACL_VPN_Local VPN Local
Def_SNMP_Filter permit 9981 permit
Def_SNMP_Trap_ACL_VPN_LocalVPN Local
Def_SNMP_Trap_Filter permit 9977 permit
Def_SSH_ACL_VPN_Local VPN Local Def_SSH_Filter
permit 9992 permit
Def_TELNET_ACL_VPN_Local VPN Local
Def_TELNET_Filter permit 9996 permit
Def_ACL_ICMP_Local_LAN Local LAN
Def_ICMP_Filter permit 9961 permit
Def_FTP_ACL_Local_LAN Local LAN Def_FTP_Filter
permit 9999 permit
Def_SNTP_ACL_Local_LAN Local LAN
Def_SNTP_UDP_Filter permit 9972 permit
Def_ACL_ICMP_Local_WAN Local WAN
Def_ICMP_Filter permit 9962 permit
Def_AH_ACL_Local_WAN Local WAN Def_AH_Filter
permit 9968 permit
Def_ESP_ACL_Local_WAN Local WAN Def_ESP_Filter
permit 9970 permit
Def_FTP_ACL_Local_WAN Local WAN Def_FTP_Filter
permit 10000 permit
Def_IKENAT_ACL_Local_WAN Local WAN
Def_IKE_NAT_UDP_Filter permit 9964 permit
Def_IKE_ACL_Local_WAN Local WAN
Def_IKE_UDP_Loc_Filter permit 9966 permit
Def_SNTP_ACL_Local_WAN Local WAN
Def_SNTP_UDP_Filter permit 9974 permit
Def_ACL_ICMP_Local_DMZ Local DMZ
Def_ICMP_Filter permit 9960 permit
Def_FTP_ACL_Local_DMZ Local DMZ Def_FTP_Filter
permit 9998 permit
Def_SNTP_ACL_Local_DMZ Local DMZ
Def_SNTP_UDP_Filter permit 9971 permit
CHAPTER 9: FIREWALL
Configuration User Manual 201
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Def_ACL_ICMP_Local_VPN Local VPN
Def_ICMP_Filter permit 9959 permit
Def_FTP_ACL_Local_VPN Local VPN Def_FTP_Filter
permit 9997 permit
Def_SNTP_ACL_Local_VPN Local VPN
Def_SNTP_UDP_Filter permit 9973 permit
To delete the configured firewall access list:
10. Enter the Global Configuration mode.
UltOs# configure terminal
11. Enter into firewall mode
UltOs(config)# firewall
12. Delete the configured access-list
UltOs(config-firewall)# no access-list acl2 wan lan
The below section describes the steps needed to create an inbound access-
list as above, when nat configuration is enabled. To create an access-list, a
virtual server needs to be created in the wan interface of FDN40-4 to allow
the traffic from WAN network to LAN network. The filter filter2 created in
section 3.2 is used to create the access-list.
To create a virtual server:
13. Enter the global configuration mode.
UltOs# configure terminal
14. Enter interface configuration mode
UltOs(config)# interface wan 0/1
15. Create a virtual server in the wan interface of FDN40-4 (eth1). The
following virtual server allows ftp traffic from H2 to H1.
UltOs(config-if)# virtual server 10.0.0.10 ftp FTP-server
To create an access-list:
16. Enter the global configuration mode.
UltOs# configure terminal
17. Enter firewall mode
UltOs(config)# firewall
18. Create an access list policy to allow traffic from WAN host H2 to LAN
host H1.
UltOs(config-firewall)# access-list natacl wan lan filter2 permit 10
To view the configured firewall access list
UltOs# show firewall access-lists
Firewall Access Lists
ACL Name From To Filter
Combination Action Prio- Fragmented
CHAPTER 9: FIREWALL
Configuration User Manual 202
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Zone Zone
rity Packet
-------------------- ------ ------ --------------
------- ------ ----- ----------
Def_HTTPS_ACL_LAN_Local LAN Local
Def_HTTPS_Filter permit 9987 permit
Def_HTTP_ACL_LAN_Local LAN Local
Def_HTTP_Filter permit 9984 permit
Def_SNMP_ACL_LAN_Local LAN Local
Def_SNMP_Filter permit 9980 permit
Def_SNMP_Trap_ACL_LAN_LocalLAN Local
Def_SNMP_Trap_Filter permit 9976 permit
Def_SSH_ACL_LAN_Local LAN Local Def_SSH_Filter
permit 9991 permit
Def_TELNET_ACL_LAN_Local LAN Local
Def_TELNET_Filter permit 9995 permit
natacl WAN LAN filter2
permit 10 permit
Def_AH_ACL_WAN_Local WAN Local Def_AH_Filter
permit 9967 permit
Def_ESP_ACL_WAN_Local WAN Local Def_ESP_Filter
permit 9969 permit
Def_HTTPS_ACL_WAN_Local WAN Local
Def_HTTPS_Filter permit 9989 permit
Def_IKE_ACL_WAN_Local WAN Local
Def_IKE_UDP_Filter permit 9965 permit
Def_IKE_NAT_ACL_WAN_LocalWAN Local
Def_IKE_NAT_UDP_Filter permit 9963 permit
Def_SNMP_ACL_WAN_Local WAN Local
Def_SNMP_Filter permit 9982 permit
Def_SNMP_Trap_ACL_WAN_LocalWAN Local
Def_SNMP_Trap_Filter permit 9978 permit
Def_SSH_ACL_WAN_Local WAN Local Def_SSH_Filter
permit 9993 permit
Def_HTTPS_ACL_DMZ_Local DMZ Local
Def_HTTPS_Filter permit 9986 permit
Def_HTTP_ACL_DMZ_Local DMZ Local
Def_HTTP_Filter permit 9983 permit
Def_SNMP_ACL_DMZ_Local DMZ Local
Def_SNMP_Filter permit 9979 permit
Def_SNMP_Trap_ACL_DMZ_LocalDMZ Local
Def_SNMP_Trap_Filter permit 9975 permit
Def_SSH_ACL_DMZ_Local DMZ Local Def_SSH_Filter
permit 9990 permit
CHAPTER 9: FIREWALL
Configuration User Manual 203
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Def_TELNET_ACL_DMZ_Local DMZ Local
Def_TELNET_Filter permit 9994 permit
Def_HTTPS_ACL_VPN_Local VPN Local
Def_HTTPS_Filter permit 9988 permit
Def_HTTP_ACL_VPN_Local VPN Local
Def_HTTP_Filter permit 9985 permit
Def_SNMP_ACL_VPN_Local VPN Local
Def_SNMP_Filter permit 9981 permit
Def_SNMP_Trap_ACL_VPN_LocalVPN Local
Def_SNMP_Trap_Filter permit 9977 permit
Def_SSH_ACL_VPN_Local VPN Local Def_SSH_Filter
permit 9992 permit
Def_TELNET_ACL_VPN_Local VPN Local
Def_TELNET_Filter permit 9996 permit
Def_ACL_ICMP_Local_LAN Local LAN
Def_ICMP_Filter permit 9961 permit
Def_FTP_ACL_Local_LAN Local LAN Def_FTP_Filter
permit 9999 permit
Def_SNTP_ACL_Local_LAN Local LAN
Def_SNTP_UDP_Filter permit 9972 permit
Def_ACL_ICMP_Local_WAN Local WAN
Def_ICMP_Filter permit 9962 permit
Def_AH_ACL_Local_WAN Local WAN Def_AH_Filter
permit 9968 permit
Def_ESP_ACL_Local_WAN Local WAN Def_ESP_Filter
permit 9970 permit
Def_FTP_ACL_Local_WAN Local WAN Def_FTP_Filter
permit 10000 permit
Def_IKENAT_ACL_Local_WAN Local WAN
Def_IKE_NAT_UDP_Filter permit 9964 permit
Def_IKE_ACL_Local_WAN Local WAN
Def_IKE_UDP_Loc_Filter permit 9966 permit
Def_SNTP_ACL_Local_WAN Local WAN
Def_SNTP_UDP_Filter permit 9974 permit
Def_ACL_ICMP_Local_DMZ Local DMZ
Def_ICMP_Filter permit 9960 permit
Def_FTP_ACL_Local_DMZ Local DMZ Def_FTP_Filter
permit 9998 permit
Def_SNTP_ACL_Local_DMZ Local DMZ
Def_SNTP_UDP_Filter permit 9971 permit
Def_ACL_ICMP_Local_VPN Local VPN
Def_ICMP_Filter permit 9959 permit
Def_FTP_ACL_Local_VPN Local VPN Def_FTP_Filter
permit 9997 permit
CHAPTER 9: FIREWALL
Configuration User Manual 204
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Def_SNTP_ACL_Local_VPN Local VPN
Def_SNTP_UDP_Filter permit 9973 permit
To view the configured virtual server:
UltOs# show virtual servers
Virtual Servers Configuration
-----------------------------
Interface : wan0/1
Local IP : 10.0.0.10 Local Port : 21
Protocol : ANY
Global IP : 100.0.0.1 Global Port : 21
App Type : FTP
Description : FTP-server
Status : Disabled
------------------------------------------------------To
delete the configured firewall access list:
19. Enter the Global Configuration mode.
UltOs# configure terminal
20. Enter into firewall mode
UltOs(config)# firewall
21. Delete the configured access-list
UltOs(config-firewall)# no access-list natacl wan lan
9.2.3.2 WEB Configuration
Firewall Access Lists can be configured through WEB interface using the
ACL Configuration screen (Navigation - Security Management > Firewall
> Access List)
CHAPTER 9: FIREWALL
Configuration User Manual 205
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 9-3: Firewall - ACL Configuration
CHAPTER 9: FIREWALL
Configuration User Manual 206
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
9.2.4 Configuring Zones
Firewall configuration works on zone basis. User needs to specify ingress
and egress zones while configuring Firewall Access List. Zones are
classified as follows,
1. Local
2. LAN
3. WAN
4. DMZ
5. VPN
Local zone will be taken by default when IP interface is created.
LAN, WAN and DMZ zones can be configured by the user.
DMZ or De Militarized Zone is a physical or logical subnetwork that contains
and exposes an organization's external services to a larger untrusted
network, usually the Internet. The host/hosts in this zone, called DMZ host,
will have unrestricted access from the public/external network (Internet). This
section describes the steps involved in setting and resetting a host in the
Local Area Network as DMZ host.
VPN zone comes into effect when IPSec tunnel is established.
9.2.4.1 CLI Configuration
To configure a IPv4 DMZ host
UltOs# c t
UltOs(config)# interface wan 0/1
UltOs(config-if)# switchport
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 10
UltOs(config-vlan)# ports add wan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 10
UltOs(config-if)# ip address 10.10.10.2 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# zone wan
UltOs(config-if)# exit
UltOs(config)# interface lan 0/1
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 11
CHAPTER 9: FIREWALL
Configuration User Manual 207
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-vlan)# ports add lan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 11
UltOs(config-if)# no shutdown
UltOs(config-if)# ip address 11.11.11.2 255.255.255.0
UltOs(config-if)# zone lan
UltOs(config-if)# exit
UltOs(config)# vlan 13
UltOs(config-vlan)# ports add lan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 13
UltOs(config-if)# ip address 13.0.0.1 255.255.255.0
UltOs(config-if)# zone dmz
UltOs(config-if)# no shutdown
UltOs(config-if)# end
UltOs# show firewall interface config
Firewall Zones
----------------
Interface Zone
--------------- -----------
wan0/2 WAN
vlan1 Local
vlan10 WAN
vlan11 LAN
vlan13 DMZ
9.2.4.2 WEB Configuration
IPv4 DMZ zone can be configured through WEB interface using the Firewall
Interface Configuration screen (Navigation - Layer3 Management > IP >
Zone)
CHAPTER 9: FIREWALL
Configuration User Manual 208
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 9-4: Firewall Interface Configuration
Configuration User Manual 209
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
10
IPS-IDS
10.1 Topology
Figure 10-5: IPS Topology
Table 10-1: IPv4 Addresses of Interfaces and Hosts
Interface Index/Name
Interface IPv4 Address
LAN0/1
10.0.0.1
WAN0/1
80.0.0.1
H1
10.0.0.10
H2
80.0.0.10
10.2 Default Configurations
When system comes up, IPS-IDS is operationally disabled.
Wan0/
1
Lan0/
1
FDN40
H2
H1
Host in WAN Network
Host in LAN Network
CHAPTER 10: IPS-IDS
Configuration User Manual 210
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
10.3 IPS-IDS Configurations
10.3.1 Enabling and Disabling IPS-IDS Module
This section describes the steps involved in enabling and disabling the IPS-
IDS status globally. By default, IPS-IDS status is disabled.
10.3.1.1 CLI Configuration
To enable IPS-IDS:
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Enable the Firewall module.
UltOs(config)# firewall
UltOs(config-firewall)# enable
3. Enable IPS-IDS status
UltOs(config-firewall)# ips-ids enable
4. Exit from the Global Configuration mode.
UltOs(config-firewall)# end
To disable IPS-IDS:
5. Enter the Global Configuration mode.
UltOs# configure terminal
6. Enter firewall configuration mode.
UltOs(config)# firewall
7. Disable IPS-IDS status.
UltOs(config-firewall)# ips-ids disable
8. Exit from the Global Configuration mode.
UltOs(config-firewall)# end
To view the IPS status:
9. UltOs# show ips config
IPS Configuration
----------------------
IPS/IDS Status : Enabled
IDS Logging Status : Enabled
IPS Log file Size : 1048576
IPS Log file Size Threshold : 70
10.3.1.2 WEB Configuration
IPS-IDS global status is configured through WEB interface using IPS Basic
Settings screen (Home->Security Management->IPS)
CHAPTER 10: IPS-IDS
Configuration User Manual 211
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 10-1: IPS Basic Settings - Enabling IPS-IDS global status
Screen 10-2: IPS Basic Settings - Disabling IPS-IDS global status
10.3.2 Enabling and Disabling IDS Logging
This section describes the steps involved in enabling and disabling the IDS
slogging status. By default, IDS logging status is disabled.
10.3.2.1 CLI Configuration
To enable IDS Logging:
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Enable the Firewall module.
UltOs(config)# firewall
UltOs(config-firewall)# enable
3. Enable IPS-IDS status
UltOs(config-firewall)# ids logging
4. Exit from the Global Configuration mode.
CHAPTER 10: IPS-IDS
Configuration User Manual 212
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-firewall)# end
To disable IDS Logging:
5. Enter the Global Configuration mode.
UltOs# configure terminal
6. Enter firewall configuration mode.
UltOs(config)# firewall
7. Disable IPS-IDS status.
UltOs(config-firewall)# no ids logging
8. Exit from the Global Configuration mode.
UltOs(config-firewall)# end
To view the IDS logging status:
9. UltOs# show ips config
IPS Configuration
----------------------
IPS/IDS Status : Enabled
IDS Logging Status : Enabled
IPS Log file Size : 1048576
IPS Log file Size Threshold : 70
10.3.2.2 WEB Configuration
IPS-IDS global status is configured through WEB interface using IPS Basic
Settings screen (Home->Security Management->IPS)
Enabling IDS logging status through web interface
Screen 10-3: IPS Basic Settings - Enabling IDS logging status
Disabling IDS logging status through web interface
CHAPTER 10: IPS-IDS
Configuration User Manual 213
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 10-4: IPS Basic Settings - Disabling IDS logging status
10.3.3 Configuring IDS Logging Size and Log Size Threshold
This section describes the steps involved in configuring the IDS logging file
size and logging size threshold. By default, the IDS logging file size is
1048576Kb and logging file size threshold is 70%.
10.3.3.1 CLI Configuration
To configure IDS logging file size and threshold:
1. Enter the Global Configuration mode.
UltOs# configure terminal
2. Enable the Firewall module.
UltOs(config)# firewall
3. Configure IDS log file size
UltOs(config-firewall)# ids logging filesize 1045600
4. Configure IDS logging threshold
UltOs(config-firewall)# ids logging logsize-threshold 80
5. Exit from the Global Configuration mode.
UltOs(config-firewall)# end
To view the IDS logging file size and threshold:
6. UltOs# show ips config
IPS Configuration
----------------------
IPS/IDS Status : Enabled
IDS Logging Status : Enabled
IPS Log file Size : 1045600
IPS Log file Size Threshold : 80
CHAPTER 10: IPS-IDS
Configuration User Manual 214
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
10.3.3.2 WEB Configuration
IPS-IDS Logging file size and threshold is configured through WEB interface
using IPS Basic Settings screen (Home->Security Management->IPS)
Configure IDS logging file size as 1045600 through web interface
Screen 10-5: IPS Basic Settings - Configure IDS logging file size
Configure IDS logging threshold as 80% through web interface
Screen 10-6: IPS Basic Settings - Disabling IDS logging status
10.3.4 Configuring IPS status in firewall access-list
This section describes the steps involved in enabling and disabling the IPS
status in the firewall access-list to lookup DPI engine per flow. For creating
firewall access-list refer section 15.3.1.5. By default, the IPS status in the
firewall access-list is disabled. Refer section 15.3 for interface configuration
with packet processing.
10.3.4.1 CLI Configuration
To configure IPS status per firewall access-list:
1. To enable IPS status in access-list:
CHAPTER 10: IPS-IDS
Configuration User Manual 215
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2. Enter the Global Configuration mode.
UltOs# configure terminal
3. Enable the Firewall module.
UltOs(config)# firewall
4. Enable Global IPS status
UltOs(config-firewall)#ips-ids enable
5. Enable IPS status in firewall access-list
UltOs(config-firewall)# access-list acl1 lan wan filter1 permit 8 ips
enable
6. Exit from the Global Configuration mode.
UltOs(config-firewall)# end
7. Disable IPS status in firewall access-list
8. Enter the Global Configuration mode.
UltOs# configure terminal
9. Enable the Firewall module.
UltOs(config)# firewall
10. Enable Global IPS status
UltOs(config-firewall)#ips-ids enable
11. Enable IPS status in firewall access-list
UltOs(config-firewall)# access-list acl1 lan wan filter1 permit 8 ips
disable
12. Exit from the Global Configuration mode.
UltOs(config-firewall)# end
To view the IPS status per firewall access-list:
13. UltOs# show firewall access-lists
Firewall Access Lists
ACL Name From To Filter
Combination Action Prio- Fragmented
IPS
Zone Zone
rity Packet Status
-------------------- ------ ------ --------
------------- ------ ----- ---------- ---
-------
acl1 LAN WAN filter1
permit 8 permit Enable
Def_HTTPS_ACL_LAN_Local LAN Local
Def_HTTPS_Filter permit 9987 permit
Disable
Def_HTTP_ACL_LAN_Local LAN Local
Def_HTTP_Filter permit 9984 permit
Disable
CHAPTER 10: IPS-IDS
Configuration User Manual 216
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Def_SNMP_ACL_LAN_Local LAN Local
Def_SNMP_Filter permit 9980 permit
Disable
Def_SNMP_Trap_ACL_LAN_LocalLAN Local
Def_SNMP_Trap_Filter permit 9976 permit
Disable
Def_SSH_ACL_LAN_Local LAN Local
Def_SSH_Filter permit 9991 permit
Disable
Def_TELNET_ACL_LAN_Local LAN Local
Def_TELNET_Filter permit 9995 permit
Disable
Def_AH_ACL_WAN_Local WAN Local
Def_AH_Filter permit 9967 permit
Disable
Def_ESP_ACL_WAN_Local WAN Local
Def_ESP_Filter permit 9969 permit
Disable
Def_HTTPS_ACL_WAN_Local WAN Local
Def_HTTPS_Filter permit 9989 permit
Disable
Def_IKE_ACL_WAN_Local WAN Local
Def_IKE_UDP_Filter permit 9965 permit
Disable
Def_IKE_NAT_ACL_WAN_LocalWAN Local
Def_IKE_NAT_UDP_Filter permit 9963 permit
Disable
Def_SNMP_ACL_WAN_Local WAN Local
Def_SNMP_Filter permit 9982 permit
Disable
Def_SNMP_Trap_ACL_WAN_LocalWAN Local
Def_SNMP_Trap_Filter permit 9978 permit
Disable
Def_SSH_ACL_WAN_Local WAN Local
Def_SSH_Filter permit 9993 permit
Disable
Def_HTTPS_ACL_DMZ_Local DMZ Local
Def_HTTPS_Filter permit 9986 permit
Disable
Def_HTTP_ACL_DMZ_Local DMZ Local
Def_HTTP_Filter permit 9983 permit
Disable
Def_SNMP_ACL_DMZ_Local DMZ Local
Def_SNMP_Filter permit 9979 permit
Disable
Def_SNMP_Trap_ACL_DMZ_LocalDMZ Local
Def_SNMP_Trap_Filter permit 9975 permit
Disable
CHAPTER 10: IPS-IDS
Configuration User Manual 217
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Def_SSH_ACL_DMZ_Local DMZ Local
Def_SSH_Filter permit 9990 permit
Disable
Def_TELNET_ACL_DMZ_Local DMZ Local
Def_TELNET_Filter permit 9994 permit
Disable
Def_HTTPS_ACL_VPN_Local VPN Local
Def_HTTPS_Filter permit 9988 permit
Disable
Def_HTTP_ACL_VPN_Local VPN Local
Def_HTTP_Filter permit 9985 permit
Disable
Def_SNMP_ACL_VPN_Local VPN Local
Def_SNMP_Filter permit 9981 permit
Disable
Def_SNMP_Trap_ACL_VPN_LocalVPN Local
Def_SNMP_Trap_Filter permit 9977 permit
Disable
Def_SSH_ACL_VPN_Local VPN Local
Def_SSH_Filter permit 9992 permit
Disable
Def_TELNET_ACL_VPN_Local VPN Local
Def_TELNET_Filter permit 9996 permit
Disable
Def_ACL_ICMP_Local_LAN Local LAN
Def_ICMP_Filter permit 9961 permit
Disable
Def_FTP_ACL_Local_LAN Local LAN
Def_FTP_Filter permit 9999 permit
Disable
Def_SNTP_ACL_Local_LAN Local LAN
Def_SNTP_UDP_Filter permit 9972 permit
Disable
Def_ACL_ICMP_Local_WAN Local WAN
Def_ICMP_Filter permit 9962 permit
Disable
Def_AH_ACL_Local_WAN Local WAN
Def_AH_Filter permit 9968 permit
Disable
Def_ESP_ACL_Local_WAN Local WAN
Def_ESP_Filter permit 9970 permit
Disable
Def_FTP_ACL_Local_WAN Local WAN
Def_FTP_Filter permit 10000 permit
Disable
Def_IKENAT_ACL_Local_WAN Local WAN
Def_IKE_NAT_UDP_Loc_Filterpermit 9964 permit
Disable
CHAPTER 10: IPS-IDS
Configuration User Manual 218
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Def_IKE_ACL_Local_WAN Local WAN
Def_IKE_UDP_Loc_Filter permit 9966 permit
Disable
Def_SNTP_ACL_Local_WAN Local WAN
Def_SNTP_UDP_Filter permit 9974 permit
Disable
Def_ACL_ICMP_Local_DMZ Local DMZ
Def_ICMP_Filter permit 9960 permit
Disable
Def_FTP_ACL_Local_DMZ Local DMZ
Def_FTP_Filter permit 9998 permit
Disable
Def_SNTP_ACL_Local_DMZ Local DMZ
Def_SNTP_UDP_Filter permit 9971 permit
Disable
Def_ACL_ICMP_Local_VPN Local VPN
Def_ICMP_Filter permit 9959 permit
Disable
Def_FTP_ACL_Local_VPN Local VPN
Def_FTP_Filter permit 9997 permit
Disable
Def_SNTP_ACL_Local_VPN Local VPN
Def_SNTP_UDP_Filter permit 9973 permit
Disable
10.3.4.2 WEB Configuration
IPS status in firewall access-list is configured through WEB interface using
IPS Basic Settings screen (Home->Security Management->Firewall-
>Access List)
Configuring IPS status as enabled in firewall access-list
CHAPTER 10: IPS-IDS
Configuration User Manual 219
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 10-7: Firewall Access List - Configure IPS status as enabled
Configure IPS status per access-list as disabled through web interface
Screen 10-8: Firewall Access List - Configure IPS status as disabled
To view IPS status in the firewall access-list
CHAPTER 10: IPS-IDS
Configuration User Manual 220
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 10-9: Firewall Access List View IPS status
10.3.5 Displaying IPS Categories and IPS Rules
This section describes the steps involved in displaying IPS signature
categories and IPS Rules per category. IPS signature files are loaded in the
FLASH to view the categories and rules
10.3.5.1 CLI Configuration
To display IPS signature categories:
1. UltOs# show ips categories
IPS Categories
==============
not-suspicious
unknown
bad-unknown
attempted-recon
successful-recon-limited
successful-recon-largescale
attempted-dos
successful-dos
attempted-user
unsuccessful-user
successful-user
attempted-admin
successful-admin
rpc-portmap-decode
shellcode-detect
string-detect
suspicious-filename-detect
suspicious-login
system-call-detect
tcp-connection
trojan-activity
CHAPTER 10: IPS-IDS
Configuration User Manual 221
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
unusual-client-port-connection
network-scan
denial-of-service
non-standard-protocol
protocol-command-decode
web-application-activity
web-application-attack
misc-activity
misc-attack
icmp-event
inappropriate-content
policy-violation
default-login-attempt
sdf
file-format
malware-cnc
client-side-exploit
To display signatures per category:
2. UltOs# show ips rules not-suspicious
IPS Categories Rule List - not-suspicious
===============================================
SID Description
======
===================================================
==================
8704 SERVER-MAIL Yahoo YPOPS Banner
539 DELETED NETBIOS Samba clientaccess
716 DELETED INFO TELNET access
3446 DELETED SQL DNS query with 4 requests
3451 DELETED SQL DNS query with 9 requests
3447 DELETED SQL DNS query with 5 requests
3444 DELETED SQL DNS query with 2 requests
3443 DELETED SQL DNS query with 1 requests
3452 DELETED SQL DNS query with 10 requests
3448 DELETED SQL DNS query with 6 requests
CHAPTER 10: IPS-IDS
Configuration User Manual 222
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
3445 DELETED SQL DNS query with 3 requests
3450 DELETED SQL DNS query with 8 requests
3449 DELETED SQL DNS query with 7 requests
10.3.5.2 WEB Configuration
IPS Signature Categories and rules are displayed through WEB interface
using IPS Basic Settings screen (Home->Security Management->IPS->IPS
Signature)
To Display Signatures per category
Screen 100-10: IPS Signature Display signatures for not-suspicious category
Configuration User Manual 223
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
11
POE
11.1 Protocol Description
Power over Ethernet technology is a system that transmits electrical power,
along with data, to remote devices over standard twisted-pair cable in an
Ethernet network. The advantage of this technology is that the installers need
to run only a single Ethernet cable that carries both power and data to each
device. IP telephones, wireless LAN access points, webcams, Ethernet hubs,
computers, and other appliances use this technology. Access Points and
network devices can be easily located, decreasing installation costs in many
cases.
Power over Ethernet is standardized in IEEE 802.3af. This technology offers
new options to system designers by providing economical and flexible
deployment of networked devices.
POE is supported only in the 6 port Variant of FDN406
11.2 Topology
This network topology explains IP phone and Wireless access point
connection to FDN406P. When POE is enabled on these ports, power will be
delivered to IP phone and Access point.
CHAPTER 11: POE
Configuration User Manual 224
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Figure 11-1
11.3 POE Configurations
11.3.1 Enabling POE Module
This section describes steps involved in enabling POE module.
11.3.1.1 CLI Configuration
To enable POE globally
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable the POE module.
UltOs(config)# set poe enable
- Exit from the Global Configuration mode.
UltOs(config)# end
To view the POE global status
UltOs# show power detail
PSE Status
----------
PoE Global Admin State : Enabled
PSE Oper Status : On
Max Power Supply : 1
Total Power in (watts) : 30
Total Power Consumed : 0
Pse Usage Threshold : 99
FDN406P
CHAPTER 11: POE
Configuration User Manual 225
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
11.3.1.2 WEB Configuration
POE can be enabled / disabled using the POE Basic Settings screen
(Navigation POE> POE Basic Settings)
Screen 111-1: POE Basic Settings
11.3.2 Enabling POE on port
11.3.2.1 CLI Configuration
To Enable POE on port
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enter the Interface Configuration mode
UltOs(config)# interface lan 0/6
- Enable POE on the interface
3. UltOs(config-if)# power inline enable
- Exit from the Interface Configuration mode.
UltOs(config-if)# end
To View power applied on port
UltOs# show power inline lan 0/6
PoE Port Info
-------------
Port Number : 10(lan 0/6)
PoeAdminStatus : Up
PoeDetectionState : Disabled
class : 0
Priority : low
Port Power Mode : Never
Port Power : 0
CHAPTER 11: POE
Configuration User Manual 226
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Actual Pwr Consumed: 0
To view power applied on all the ports
UltOs# show power inline
PoE Port Info
-------------
Port-Index PoeAdminState DetectionSts pwrClass priority Mode
PwrConfigured ActualPwrConsumed
---------- ------------- ------------ -------- -------- ---- ------------- ----------------
-
5(lan 0/1) down Disabled class 0 low Never 0 Watts
0 Watts
6(lan 0/2) down Disabled class 0 low Never 0 Watts
0 Watts
7(lan 0/3) down Disabled class 0 low Never 0 Watts
0 Watts
8(lan 0/4) down Disabled class 0 low Never 0 Watts
0 Watts
9(lan 0/5) down Disabled class 0 low Never 0 Watts
0 Watts
10(lan 0/6) up Disabled class 0 low Never 0 Watts
0 Watts
11.3.2.2 WEB Configuration
POE functionality on interface can be enabled on PSE Port Configuration
page
(Navigation POE> Port Settings)
CHAPTER 11: POE
Configuration User Manual 227
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 111-2: POE Port Configuration
11.3.3 To apply power to a POE device
11.3.3.1 CLI Configuration
To apply power to a POE device
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enter the Interface Configuration mode
UltOs(config)# interface lan 0/6
- Apply power on the interface
4. UltOs(config-if)# power inline static 6000
- Exit from the Interface Configuration mode.
UltOs(config-if)# end
To view the device power status
UltOs# show power inline lan 0/6
PoE Port Info
-------------
Port Number : 10(lan 0/6)
PoeAdminStatus : Up
PoeDetectionState : Delivering Power
class : 0
CHAPTER 11: POE
Configuration User Manual 228
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Priority : low
Port Power Mode : Static
Port Power : 6
Actual Pwr Consumed: 6000
11.3.3.2 WEB Configuration
Power can be applied to a device on PSE Port Configuration page
(Navigation POE> Port Settings)
Screen 111-3: POE Port Configuration
11.3.4 To view the PSE status
11.3.4.1 CLI Configuration
To view the PSE status
UltOs# show power detail
PSE Status
----------
PoE Global Admin State : Enabled
PSE Oper Status : On
Max Power Supply : 1
Total Power in (watts) : 30
Total Power Consumed : 6
CHAPTER 11: POE
Configuration User Manual 229
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Pse Usage Threshold : 99
11.3.4.2 WEB Configuration
PSE status can be viewed on PSE configuration page
(Navigation POE> PSE Settings)
Screen 111-4: PSE Configuration
Configuration User Manual 231
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
12
Wi-Fi
12.1 Topology
Figure 12-1: Wi-Fi Topology
Table 12-1: Wi-Fi Topology Description
Switch / Host
Interface of FDN40 Switches
WiFi Host 1
FDN40-1(Supports 16 VAPs)
VLAN associated with each
VAP
PC/Linux/Mobile with wireless
adapter
CHAPTER 12: WI-FI
Configuration User Manual 232
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
12.2 Configuration Guidelines
The FDN40 CLI user manual can be referred for the complete set of
commands and the various options available for configuring Wi-Fi.
12.3 Wi-Fi Configurations
12.3.1 Enabling WiFi interfaces
12.3.1.1 CLI Configuration
1. Execute the following commands to enable Radio interfaces on the
target.
Enabling the radio0 interface programs the hardware and starts protocol
operation.
Enter the Global Configuration Mode.
UltOs# configure terminal
Specify the radio interface.
UltOs(config)# apradio radio0
Enable the radio0 interface.
UltOs(config-apradio0) # no shutdown
Exit the radio0 interface Mode
UltOs(config-apradio0)#end
2. View the Wi-Fi interface status.
UltOs# show interfaces description
Interface Status Protocol Description
--------- ------ -------- -----------
wan0/1 down down
ApRadio2 up up
ApRadio3 down down
lan0/1 down down
lan0/2 down down
lan0/3 down down
lan0/4 down down
vlan1 up down
vlan100 up up
Use the following command to enable the radio1 interface.
Enter the Global Configuration Mode.
UltOs# configure terminal
Specify the radio interface.
CHAPTER 12: WI-FI
Configuration User Manual 233
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# apradio radio1
Enable the radio1 interface.
UltOs(config-apradio1) # no shutdown
Exit the radio1 interface Mode
UltOs(config-apradio1)#end
3. View the Wi-Fi interface status.
UltOs# show interfaces description
Interface Status Protocol Description
--------- ------ -------- -----------
wan0/1 down down
ApRadio2 down down
ApRadio3 up up
lan0/1 down down
lan0/2 down down
lan0/3 down down
lan0/4 down down
vlan1 up down
vlan100 up up
12.3.1.2 WEB Configuration
Radio Interfaces can be enabled through WEB interface using the AP Radio
Setings screen (Navigation - Home-> Access Point-> Radio Settings).
Select the radio Interface Radio0/Radio1 fromRadioType” tab and set the
status to “On” in “Staus” tab.
Screen 12-1: AP RadioSettings - Enabling Radio Interfaces
12.3.2 Disabling Wi-Fi interface
12.3.2.1 CLI Configuration
1. Execute the following commands to enable Wi-Fi on the target.
CHAPTER 12: WI-FI
Configuration User Manual 234
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Disabling the AP module, stops the protocol operation by deleting the
hardware configuration.
Enter the Global Configuration Mode.
UltOs# configure terminal
Specify the radio interface.
UltOs(config)# apradio radio0
To configure radio1 interface, use the following command
UltOs(config)# apradio radio1
Disable the Wi-Fi interface.
UltOs(config-apradio) # no shutdown
Exit the WiFi interface Mode
UltOs(config-apradio)#exit
Exit the global configuration Mode.
UltOs(config)# exit
2. View the Wi-Fi interface status.
UltOs# show int desc
Interface Status Protocol Description
--------- ------ -------- -----------
wan0/1 down down
ApRadio2 down down
ApRadio3 down down
lan0/1 down down
lan0/2 down down
lan0/3 down down
lan0/4 down down
vlan1 up down
vlan100 up up
12.3.2.2 WEB Configuration
Radio Interface can be disabled through WEB interface using the AP Radio
Setings screen (Navigation - Home-> Access Point-> Radio Settings).
Select the Radio Interface and set the status to Off.
Screen 12-2: AP RadioSettings - Disabling Wi-Fi Interface
CHAPTER 12: WI-FI
Configuration User Manual 235
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
12.3.3 VAP creation and VLAN association
12.3.3.1 CLI Configuration
1. Execute the following commands to configure a virtual access point
(VAP) on the target.
This configuration would create a VAP interface to support virtual
access point functionality.
Enter the Global Configuration Mode.
UltOs# configure terminal
Specify the Radio interface.
UltOs(config)# apradio radio0
Use the following command for configuring radio1 interfaces
UltOs(config)# apradio radio1
Enable the Wi-Fi interface.
UltOs(config-apradio) # no shutdown
Configure a VAP (maximum 31 characters length name)
UltOs(config-apradio)# ssid FDN40_ssid
Associate a VLAN with the VAP interface
UltOs(config-ssid)# vlan 100
Exit the VAP configuration Mode.
UltOs(config-ssid)# exit
Exit the WiFi interface Mode
UltOs(config-apradio)#exit
Exit the global configuration Mode.
UltOs(config)# exit
2. View the Default configurations for the created VAP in the
VAP summary table
UltOs# show apradio radio0 ssid summary
SSID : FDN40_ssid
BeaconPeriod :100
DTIM Period :1
Regulatory Domain:Yes
Rate :216700000
RTS threshold :2347
Fragmentation Threshold :2346
Vlan :100
Country :US
Radiomode :802.11an
CHAPTER 12: WI-FI
Configuration User Manual 236
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Channel :36
Channel Width :Default
Short Guard :Yes
TxPower :17
Security Mode :Open
WMM UAPSD :Enabled
12.3.3.2 WEB Configuration
There is an operation mode in which the signals in the 3 chains are not
correlated, i.e. the equipment will always have spatial multiplexing across 3
physically independent RF paths.
12.3.3.2.1 VAP (SSID) Creation
VAP can be created through WEB interface using the AP Radio Setings
screen (Navigation - Home-> Access Point-> Radio Settings). To
configure ssid in radio1 interface, Select AP_Radio_1 in “RadioType tab.
Screen 12-3: AP RadioSettings - Creating VAP (SSID)
CHAPTER 12: WI-FI
Configuration User Manual 237
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
12.3.3.2.2 VLAN Association with VAP
VLAN can be associated with VAP through WEB interface using the VAP
screen (Navigation - Home-> Access Point-> VAP>Security). Selec the
Radio Type and the corresponding SSIDs are displayed in SSID tab.
Screen 12-4: VAP
12.3.3.2.3 SSID Summary
VAP configurations can be viewed through web interface using the SSID
Summary screen (Navigation - Home-> Access Point-> Radio Settings-
>SSID Summary)
Screen 12-5: SSID Summary
12.3.4 VAP deletion
12.3.4.1 CLI Configuration
1. Execute the following commands to delete a virtual access point (VAP)
on the target.
Enter the Global Configuration Mode.
UltOs# configure terminal
Specify the radio interface.
UltOs(config)# apradio radio0
Disable the radio interface before removing a VAP .
UltOs(config-apradio0)# shutdown
Delete the VAP .
UltOs(config-apradio0)# no ssid FDN40_ssid
Exit the WiFi configuration Mode. .
UltOs(config-apradio0)# exit
Exit the global configuration Mode .
UltOs(config)# exit
View in the below command to ensure the VAP is deleted..
CHAPTER 12: WI-FI
Configuration User Manual 238
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# show apradio radio0 ssid summary
12.3.4.2 WEB Configuration
VAP can be deleted through WEB interface using the AP Radio Setings
screen (Navigation - Home-> Access Point-> Radio Settings)
Screen 12-6: AP RadioSettings - Deleting VAP (SSID)
12.3.5 Rate-limit Configurations
12.3.5.1 CLI Configurations
1. Execute the following commands to configure Rate-limiting
configurations on the target.
Enter the Global Configuration Mode.
UltOs# configure terminal
Specify the radio interface.
UltOs(config)# apradio radio1
Rate-limit configurations can be applied for interface or for the
desired Station.Rate-limit for the interface can be done as :
UltOs(config-apradio1)# rate-limit interface Cir 1 Cbs 1 Eir 5000
Ebs 8000000 Coupling-Flag enable
Exit the configuration Mode.
UltOs(config-apradio1)# end
2. View the Rate-limit configurations for the interface.
UltOs# show apradio radio1 interfacerate-limit
CIR EIR CBS EBS
C-Flag RowStatus
--- --- --- ---
------ ---------
1 5000 1 8000000
Enabled Active
3. Rate-limit configurations can be disabled in the WiFi configuration mode.
UltOs(config-apradio1)# no rate-limit interface
4. Execute the show command to ensure if the Rate-limit configurations are
deleted.
CHAPTER 12: WI-FI
Configuration User Manual 239
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# show apradio radio1 interface rate-limit
5. Rate-limit configurations can be applied for a desired Station .
UltOs(config-apradio1)# rate-limit station 00:00:00:00:00:01 Cir 1
Cbs 1 eir 5000 ebs 90000 Coupling-Flag Enable
Exit the WiFi configuration Mode
UltOs(config-apradio)# end
6. View the Rate-limit configurations for the station.
UltOs# show apradio rate-limit
Station-Mac CIR EIR CBS
EBS C-Flag RowStatus
----------- --- --- ---
--- ------ ---------
00:00:00:00:00:01 1 5000 1
90000 Enabled Active
7. Rate-limit configuration for the station can be removed.
UltOs(config-apradio1)# no rate-limit station 00:00:00:00:00:01
Exit the Wi-Fi configuration Mode.
UltOs(config-apradio1)# end
8. View the Rate-limit configurations for the station.
UltOs# show apradio rate-limit
12.3.5.2 WEB Configuration
Rate Limit can be configured through WEB interface using the Rate Limit
screen (Navigation - Home-> Access Point-> VAP>Rate Limit)
Screen 12-7: Rate Limit
CHAPTER 12: WI-FI
Configuration User Manual 240
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
12.3.6 Configuring Mac-Filtering for VAP
12.3.6.1 CLI Configuration
Execute the following commands to configure Mac-based Filtering in the AP.
1. Enter the VAP configuration Mode for the desired VAP for which the Mac
based filtering of stations need to be done.
UltOs(config-apradio0)# ssid FDN40_ssid
2. Enable Mac based Filtering Mode.
UltOs(config-ssid)# mac-auth enable
3. Configure the MAC addresses that needs to be allowed in this
VAP.Maximum of 32 Mac address can be added beyond which Error will
be thrown.
UltOs(config-ssid)# mac-address 00:00:00:00:00:01
UltOs(config-ssid)# mac-address 00:00:00:00:00:02
UltOs(config-ssid)# mac-address 00:00:00:00:00:03
UltOs(config-ssid)# mac-address 00:00:00:00:00:04
4. Exit the WiFi configuration Mode
UltOs(config-ssid)# end
5. View the configurations for the "ALLOWED" stations for the VAP using
the following command.
UltOs# show apradio radio0 stations mac-restricted
SSID Status Station-Mac
---- ------ -----------
FDN40_ssid Enabled 00:00:00:00:00:01
FDN40_ssid Enabled 00:00:00:00:00:02
FDN40_ssid Enabled 00:00:00:00:00:03
FDN40_ssid Enabled 00:00:00:00:00:04
Mac -addresses can also be removed from the "LIST" for the VAP.
6. Enter the Wi-Fi Configuration Mode and the desired VAP mode.
UltOs(config-apradio0)# ssid FDN40_ssid
7. Mac-address can be removed from the MAC-filtering list for the VAP.
UltOs(config-ssid)# no mac-address 00:00:00:00:00:02
8. Exit the WiFi configuration Mode
UltOs(config-ssid)# end
9. View the configurations for the "ALLOWED" stations for the VAP using
the following command.
UltOs# show apradio radio0 stations mac-restricted
SSID Status Station-Mac
---- ------ -----------
FDN40_ssid Enabled 00:00:00:00:00:01
FDN40_ssid Enabled 00:00:00:00:00:03
CHAPTER 12: WI-FI
Configuration User Manual 241
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
FDN40_ssid Enabled 00:00:00:00:00:04
10. The Mac- based Filtering Mode can be disabled that would eventually
remove the LIST configured for the VAP.
UltOs(config-ssid)# mac-auth disable
UltOs(config-ssid)# end
11. -Exit the global configuration Mode and View the Mac-filtered List for the
AP.
UltOs# show apradio radio0 stations mac-restricted
SSID Status Station-Mac
12.3.6.2 WEB Configuration
Mac filtering can be configured through WEB interface using the VAP screen
(Navigation - Home-> Access Point-> VAP>Security)
Screen 12-8: VAP - MAC Filtering
12.3.7 Configuring Authentication Algorithms for VAP
12.3.7.1 CLI Configuration
12.3.7.1.1 Open Authentication
By default , VAP is configured in the "OPEN" Authentication mode.
UltOs# show apradio radio1 ssid summary
SSID : FDN40_ssid
BeaconPeriod :100
DTIM Period :1
CHAPTER 12: WI-FI
Configuration User Manual 242
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Regulatory Domain:Yes
Rate :216700000
RTS threshold :2347
Fragmentation Threshold :2346
Vlan :100
Country :US
Radiomode :802.11ng
Channel :36
Channel Width :Default
Short Guard :Yes
TxPower :17
Security Mode :Open
When other algorithms are configured, "OPEN" can be configured using the
following command.
UltOs(config-ssid)# security auth open
12.3.7.1.2 WEP Authentication
WEP configurations can be done with the Key size as 40 or 104 bits and the
Key index can be one of the four index. :
UltOs(config-ssid)# security static-wep-key encryption key40 ascii hello
1
UltOs(config-ssid)# end
WEP configuration for the VAP is displayed in the display command.
UltOs# show apradio radio1 ssid summary
SSID : FDN40_ssid
BeaconPeriod :100
DTIM Period :1
Regulatory Domain:Yes
Rate :0
RTS threshold :2347
Fragmentation Threshold :2346
Vlan :100
Country :US
Radiomode :802.11ng
Channel :36
Channel Width :Default
Short Guard :Yes
TxPower :17
Security Mode :WEP
CHAPTER 12: WI-FI
Configuration User Manual 243
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
12.3.7.1.3 WPA2 PSK AUTHENTICATION
WPA2 PSK Key size must be 8 to 63 characters length The command is
UltOs(config-ssid)# security wpa2-psk-key encryption 8 password 1
WPA2 PSK Configurations for the VAP interface is displayed as below:
UltOs# show apradio radio1 ssid summary
SSID : FDN40_ssid
BeaconPeriod :100
DTIM Period :1
Regulatory Domain:Yes
Rate :216700000
RTS threshold :2347
Fragmentation Threshold :2346
Vlan :100
Country :US
Radiomode :802.11ng
Channel :36
Channel Width :Default
Short Guard :Yes
TxPower :17
Security Mode :WPA2-PSK
12.3.7.2 WEB Configuration
Authentication Algorithms can be configured through WEB interface using the
VAP screen (Navigation - Home-> Access Point-> VAP>Security)
CHAPTER 12: WI-FI
Configuration User Manual 244
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 12-9: VAP Authentication with WEP
12.4 Displaying the Configurations
1. . View the Default configurations for the created VAP in the VAP
summary table
UltOs# show apradio {radio0 | radio1} ssid summary
SSID : FDN40_ssid
BeaconPeriod :100
DTIM Period :1
Regulatory Domain:Yes
Rate :216700000
RTS threshold :2347
Fragmentation Threshold :2346
Vlan :100
Country :US
Radiomode :802.11an
Channel :36
Channel Width :Default
Short Guard :Yes
TxPower :17
Security Mode :Open
2. . View the QOS EDCA Parameters for the AP
UltOs# show apradio {radio0 | radio1}edca params
SSID Queue-Index CWmin CWmax AIFS
CHAPTER 12: WI-FI
Configuration User Manual 245
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
-------- ----------- ----- ----- ----
: FDN40_ssid 0 4 6
3
: FDN40_ssid 1 4 10 7
: FDN40_ssid 2 3 4 1
: FDN40_ssid 3 2 3 1
3. The "ALLOWED" stations for the VAP are displayed using the following
command.
UltOs# show apradio {radio0 | radio1} stations mac-restricted
SSID Status Station-Mac
---- ------ -----------
FDN40_ssid Enabled 00:00:00:00:00:01
FDN40_ssid Enabled 00:00:00:00:00:03
FDN40_ssid Enabled 00:00:00:00:00:04
4. Rate -limit Show commands for Interface configuration:
UltOs# show apradio {radio0 | radio1} interface rate-limit
CIR EIR CBS EBS
C-Flag RowStatus
--- --- --- ---
------ ---------
1 5000 1 8000000
Enabled Active
5. Rate-limit station configurations are displayed in the below command:
UltOs# show apradio {radio0 | radio1} rate-limit
Station-Mac CIR EIR CBS
EBS C-Flag RowStatus
----------- --- --- ---
--- ------ ---------
00:00:00:00:00:01 1 5000 1
90000 Enabled Active
6. Display for the connected stations to the Access Point
UltOs# show apradio {radio0 | radio1} connected-stations
statistics
SSID :FDN40_ssid :: Clients connected : 1
BSSID Mac :04:f0:21:09:04:b1
Assoc UpTime (seconds) :12
Tx Packets :0
Drop -AuthFail :0
Drop- Assoc Fail :0
Rx Packets :0
Station Mac :c0:4a:00:14:44:aa
CHAPTER 12: WI-FI
Configuration User Manual 246
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Ip Address: 100.0.0.30
Total number of Clients connected :1
12.5 Wi-Fi Client Association
12.5.1 CLI Configuration
For a successful association of AP to a Wireless Client, following
configurations need to be done in the AP
1. Create a radio1 interface and associate with a VLAN(For radio0
configure with radio0):
UltOs(config)# apradio radio1
UltOs(config-apradio1)# no shutdown
UltOs(config-apradio1)#
UltOs(config-apradio1)# ssid ZEUS_ssid
UltOs(config-ssid1)#
UltOs(config-ssid1)#
UltOs(config-ssid1)# end
UltOs#
UltOs# c t
UltOs(config)# apradio radio1
UltOs(config-apradio1)# ssid ZEUS_ssid
UltOs(config-ssid)# vlan 100
UltOs(config-ssid)# end
UltOs# c t
2. Configure a dhcp pool to enable IP address allocation for the Wireless
Client
UltOs(config)# service dhcp-server
UltOs(config)# ip dhcp pool 1
UltOs(dhcp-config)# network 100.0.0.30 255.255.255.0 100.0.0.50
UltOs(dhcp-config)# exit
UltOs(config)# exit
UltOs# c t
3. IVR configurations are done to observe switching and routing behavior
UltOs(config)# int vlan 100
UltOs(config-if)# ip address 100.0.0.1 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# end
UltOs#
4. - Disable Firewall configurations
CHAPTER 12: WI-FI
Configuration User Manual 247
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# c t ; firewall ; disable ; exit ; exit ;
5. - Now, the wireless clients can connect to the AP
12.5.2 WEB Configuration
Connection Statistics can be viewed through WEB interface using the AP
Radio Statistics screen (Navigation - Home-> Statistics-> ApRadio).
Select the RadioType and provide the SSID Name.
Screen 12-10: AP Radio Statistics
Configuration User Manual 249
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
13
NTP
13.1 Protocol Description
Network Time Protocol (NTP) message to one or more servers and
processes the replies as received. The server interchanges addresses and
ports, fills in or overwrites certain fields in the message, recalculates the
checksum and returns it immediately. Information included in the NTP
message allows each client/server peer to determine the timekeeping
characteristics of its other peers, including the expected accuracies of their
clocks. Using this information each peer is able to select the best time from
possibly several other clocks, update the local clock and estimate its
accuracy.
In FDN40, system time is synchronized using NTP daemon (ntpd). ntpd is
an operating system daemon which sets and maintains the system time of
day in synchronism with Internet standard time servers. It is a complete
implementation of the Network Time Protocol. FDN40 will use open source
NTP code for NTP functionality. There will be a separate process running for
controlling the ntpd daemon.
This process will be responsible for managing the ntpd daemon and sending
trap messages to process if NTP server is not reachable.
That way, if the daemon is stopped and restarted, it can reinitialize itself to
the previous estimate without spending time re computing the frequency
estimate.
ntpd can operate in any of several modes, including symmetric
active/passive, client/server broadcast/multicast and manycast.
FDN40 release 1.0 supports only NTP client configuration with maximum of 2
NTP servers for time synchronization. No modification or customization will
be done on open source NTP.
CHAPTER 13: NTP
Configuration User Manual 250
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
13.2 Topology
Figure 13-1: NTP Topology
13.3 Configuration Guidelines
The FDN40 CLI user manual can be referred for the complete set of
commands and the various options available for configuring NTP.
13.4 Default Configurations
Table 13-2: Default Configurations
Parameter
Default Setting
System Control
Start
NTP mode
Disable
NTP Client mode
Disabled
Default Server IP
0.0.0.0
Default Min Polltime
6
CHAPTER 13: NTP
Configuration User Manual 251
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
13.5 NTP Configurations
13.5.1 Configuring NTP system
13.5.1.1 Enabling the NTP system
1. Execute the following commands to enable NTP on the target.
Enabling the NTP module is a two step configuration
First enable NTP mode and then enabling client mode and further user
configuration of server and polltime
Enter the Global Configuration Mode.
UltOs# configure terminal
Enter NTP config mode.
UltOs(config)# ntp
Enable NTP mode
UltOs(config-ntp)# set ntp enable
Enable NTP client mode unicast
set ntp client mode {unicast | multicast | disabled}
UltOs(config-ntp)# set ntp client mode unicast
User can now configure IP and polltime in unicast mode
UltOs(config-ntp)# exit
2. View the NTP related global information.
UltOs# show ntp mode
NTP SERVICE ENABLE CONFIGURATION:
NTP SERVICE ENABLE : ENABLED
UltOs# show ntp client mode
NTP SERVCIE CONFIGURATION INFORMATION:
NTP CLIENT MODE : UNICAST
UltOs# show ntp server
NTP SERVER INFO :
Server Address: 172.30.19.172
Polltime: 6
NTP SERVER INFO :
Server Address: 172.30.19.123
Polltime: 6
13.5.1.2 Disabling the NTP system
1. Execute the following commands to disable NTP on the target.
Enter the Global Configuration Mode.
UltOs# configure terminal
CHAPTER 13: NTP
Configuration User Manual 252
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Enter the NTP config mode
UltOs(config)# ntp
Disable the NTP client mode
UltOs(config-ntp)# set ntp client mode disable
Disable the NTP mode
UltOs(config-ntp)# set ntp disable
2. View the NTP related global information.
UltOs# show ntp mode
NTP SERVICE ENABLE CONFIGURATION:
NTP SERVICE ENABLE : DISABLED
UltOs# show ntp client mode
NTP SERVCIE CONFIGURATION INFORMATION:
NTP CLIENT MODE : DISABLED
13.5.1.3 Configuring the NTP Client Mode
1. Execute the following commands to configure NTP client mode on the
target.
Enter the Global Configuration Mode.
UltOs# configure terminal
Enter NTP config mode.
UltOs(config)# ntp
Enable NTP mode
UltOs(config-ntp)# set ntp {enable | disable}
Enable NTP client mode unicast
UltOs(config-ntp)# set ntp client mode unicast
2. View the NTP client mode related global information
UNICAST MODE
UltOs# show ntp client mode
NTP SERVCIE CONFIGURATION INFORMATION:
NTP CLIENT MODE : UNICAST
13.5.1.4 2.WEB Configuration
13.5.1.4.1 Enabling/ Disabling NTP
NTP can be enabled/disabled can be viewed through WEB interface using
the Basic Settings screen (Navigation - Home-> NTP-> Basic Settings)
CHAPTER 13: NTP
Configuration User Manual 253
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 13-1: NTP Basic Settings
13.5.1.4.2 Configuring NTP Client Mode
NTP Client Mode can be configured through WEB interface using the NTP
Settings screen (Navigation - Home-> NTP-> NTP Settings)
Screen 13-2: NTP Client Mode
13.5.2 Configuring NTP Server
13.5.2.1 CLI Configuration
To Configure NTP Server IP and Polltime the below steps to be followed:
1. Configure NTP Server with Server IP and Polltime (UNICAST MODE)
UltOs# configure terminal
UltOs(config)# ntp
UltOs(config-if)# set ntp enable
UltOs(config-if)# set ntp client mode unicast
UltOs(config-if)# set ntp server 1 172.30.19.152 10
UltOs(config-if)# exit
2. Configure NTP Server IP for any one index (UNICAST MODE)
UltOs# configure terminal
UltOs(config)# ntp
UltOs(config-if)# set ntp enable
UltOs(config-if)# set ntp client mode unicast
CHAPTER 13: NTP
Configuration User Manual 254
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-if)# set ntp server ip 1 172.30.19.152
UltOs(config-if)# exit
3. Configure both the NTP Server IPs. (UNICAST MODE)
UltOs# configure terminal
UltOs(config)# ntp
UltOs(config-if)# set ntp enable
UltOs(config-if)# set ntp client mode unicast
UltOs(config-if)# set ntp server ips 172.30.19.152 172.30.19.153
UltOs(config-if)# exit
4. Configure both the NTP Server Polltime for any one index(UNICAST
MODE)
UltOs# configure terminal
UltOs(config)# ntp
UltOs(config-if)# set ntp enable
UltOs(config-if)# set ntp client mode unicast
UltOs(config-if)# set ntp server polling 1 10
UltOs(config-if)# exit
5. View the configuration by executing the show command as mentioned
below.
UltOs# show ntp server
NTP SERVER INFO :
Server Address: 172.30.19.152
Polltime: 10
NTP SERVER INFO :
Server Address: 172.30.19.153
Polltime: 6
13.5.2.2 Web Configuration
NTP server can be configured through WEB interface using the NTP
Settings screen (Navigation - Home-> NTP-> NTP Settings)
CHAPTER 13: NTP
Configuration User Manual 255
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 13-3: NTP Server Configurations
Configuration User Manual 257
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
14
QOS
14.1 Protocol Description
QoS (Quality of Service) defines the ability to provide different priorities to
different applications, users or data flows or the ability to guarantee a certain
level of performance to a data flow. QoS at layer 2 involves 802.1p support.
QoS also includes support for DiffServ (Differentiated services). This includes
the flow based on specific rate limits, scheduling and shaping.
QoS supports 802.1p for mapping VLAN priority to traffic class/queues. It
also supports DiffServ features which include scheduling and shaping based
on the features supported by the switching silicon used. The realization of
QoS is done using the QoSx module on the platforms based on AXM.
14.2 Topology
Figure 14-1: QOS Topology
Table 14-1: QOS Topology Description
Switch / Host
Interface of FDN40 Switches
IPv4 Address / Mask
FDN40-1
VLAN 1
12.0.0.1/255.0.0.0
FDN40
Configuration User Manual 258
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
14.3 Configuration Guidelines
The FDN40 CLI user manual can be referred for the complete set of
commands and the various options available for configuring QoS.
14.4 Default Configurations
Table 14-2: Default Configurations
Parameter
Default Setting
System Control
Start
System Control
Enable
Rate Unit
kbps
Rate Granularity
64
Trace Flag
0
14.5 QoS Configurations
14.5.1 Configuring QoS Subsystem
14.5.1.1 Enabling the QoS Subsystem
1. Execute the following commands to enable QoS on the target.
Enabling the QoS module programs the hardware and starts protocol
operation.
Enter the Global Configuration Mode.
UltOs# configure terminal
Enable the QoS.
UltOs(config)# qos enable
Exit theGlobal Configuration Mode.
UltOs(config)# exit
2 View the QoS related global information.
UltOs# show qos global info
QoS Global Information
----------------------
System Control : Start
System Control : Enable
Rate Unit : kbps
Rate Granularity : 64
Trace Flag : 0
FDN40
Configuration User Manual 259
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
14.5.1.2 Disabling the QoS Subsystem
1. Execute the following commands to disable QoS on the target.
Disabling the QoS module stops the protocol operation by deleting the
hardware configuration.
Enter the Global Configuration Mode.
UltOs# configure terminal
Disable the QoS.
UltOs(config)# qos disable
UltOs(config)# exit
2. View the QoS related global information.
UltOs# show qos global info
QoS Global Information
----------------------
System Control : Start
System Control : Disable
Rate Unit : kbps
Rate Granularity : 64
Trace Flag : 0
14.5.1.3 Making the QoS Subsystem Up
1. Execute the following commands to make the QoS subsystem up.
When QoS subsystem is set as start, resources required by the QoS
module are allocated and QoS module starts running.
Enter the global configuration mode.
UltOs# configure terminal
Make the QoS subsystem up.
UltOs(config)# no shutdown qos
UltOs(config)# exit
2 View the QoS related global information.
UltOs# show qos global info
QoS Global Information
----------------------
System Control : Start
System Control : Disable
Rate Unit : kbps
Rate Granularity : 64
Trace Flag : 0
FDN40
Configuration User Manual 260
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
14.5.1.4 WEB Configuration
QoS can be enabled/ disabled through WEB interface using the QoS Basic
Settings screen (Navigation - System-> QoS-> QoSInGress-> Basic
Settings)
Screen 14-1: QoS Basic Settings
14.5.2 Configuring Rate-Limiting at Port level (Ingress port-rate
limiting)
14.5.2.1 CLI Configuration
1. Ingress rate-limiting feature helps to rate limit the traffic ingressing on a
port.
UltOs# configure terminal
UltOs(config)# interface lan 0/1
UltOs(config-if)# rate-limit cir 100 cbs 50
UltOs# show rate-limit
Vlan CIR CBS
Mode
--------- ----------- ---
--- ----------
--
lan0/1 0 100
50 ColorBlind
14.5.2.2 WEB Configuration
Rate limiting can be configured through WEB interface using the Rate Limit
screen (Navigation System > Qos > QosIngress> Rate Limiting)
FDN40
Configuration User Manual 261
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 14-2: Ingress Rate Limiting
Supporting on LAN and WAN ports.
14.5.3 Configuring Storm-Control at Port level (Ingress port-storm
control)
14.5.3.1 CLI Configuration
1. Ingress storm control feature helps to control the traffics (DLF, Muliticast
and Broadcast) ingressing on a port.
UltOs# configure terminal
Storm-Control on WAN ports.
UltOs(config)# interface wan 0/1
UltOs(config-if)# storm-control bc_dlf_mc cir 100 cbs 50
UltOs(config-if)#exit
2. UltOs# show storm-control
Interface CIR CBS
--------- --- ---
wan0/1 100 50
14.5.3.2 WEB Configuration
Rate limiting can be configured through WEB interface using the Storm
Control screen (Navigation - System> Qos> QosIngress> Storm Control)
FDN40
Configuration User Manual 262
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 14-3: Storm-Control
14.5.4 Configuring Per Queue Shaping (Egress per- port per- queue
shaping)
14.5.4.1 CLI Configuration
1. Shaping can be done per queue by configuring the shape-template
values and mapping it to the specific queue.
UltOs# configure terminal
UltOs(config)# shape-template 10 cir 100 cbs 50 eir 100 ebs 50
UltOs(config)# queue 1 interface wan 0/1 shaper 10
UltOs(config)# end
Here, the shaper template is created with the value cir = 1000 Kbps.
The shaper template is associated to the queue. Shaping of traffic on
each queue depends on the values of shaper configured for each queue.
2. View the shaping configurations of the queues of an egress interface
UltOs# show queue interface wan 0/1
QoS Queue Entries
-----------------
IfIndex Queue QTemplate Scheduler Weight Priority
QType ShapeIdx GlobalId
------- ----- --------- --------- ------ --------
----- -------- --------
wan0/1 1 1 0 1 0
UC 10 1
FDN40
Configuration User Manual 263
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
wan0/1 2 1 0 1 1
UC none 2
wan0/1 3 1 0 1 2
UC none 3
wan0/1 4 1 0 1 3
UC none 4
wan0/1 5 1 0 1 4
UC none 5
wan0/1 6 1 0 1 5
UC none 6
wan0/1 7 1 0 1 6
UC none 7
wan0/1 8 1 0 1 7
UC none 8
3. To disable shaping for a queue, the queue needs to be mapped to
shaper 0.
UltOs# configure terminal
UltOs(config)# queue 1 interface wan 0/1 shaper 0
UltOs(config)# end
14.5.4.2 WEB Configuration
14.5.4.2.1 Shape Template
Shape Template can be configured through WEB interface using the
Shape Template Settings screen (Navigation - System-> QoS->
QoSEgress-> Shape Template)
FDN40
Configuration User Manual 264
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 14-4: Shape Template Configurations
14.5.4.2.2 Queue Table
Queue Table can be configured through WEB interface using the
Queue Table Settings screen (Navigation - System-> QoS->
QoSEgress-> Queue Table)
Screen 14-5: Queue Configurations
14.5.5 Configuring Queue Template
14.5.5.1 CLI Configuration
1. Tail Drop can be done per queue by configuring the queue-template
values and mapping it to the specific queue.
UltOs# configure terminal
UltOs(config)# queue-type 2
FDN40
Configuration User Manual 265
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config -qtype)# set algo-type tailDrop queue-limit 1
UltOs(config)# end
UltOs(config)# queue 1 interface wan 0/1 qtype 2
UltOs(config)# end
The queue template is associated to the queue.
2. View the queue template configurations of the queues of an egress
interface
UltOs# show queue interface wan 0/1
Queue Template Entries
----------------------
Q Template Id : 1
Q Limit : 256
Drop Type : Tail Drop
Drop Algo Status : Enable
3. To disable queue-template for a queue.
UltOs# configure terminal
UltOs(config)# no queue 1 interface wan 0/1
UltOs(config)# end
UltOs(config)#no queue-type 2
14.5.5.2 WEB Configuration
14.5.5.2.1 QueueTemplate
QueueTemplate can be configured through WEB interface using the
QueueTemplate Settings screen (Navigation - System-> QoS->
QoSEgress-> QueueTemplate)
FDN40
Configuration User Manual 266
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 14-10: QueueTemplate Configurations
14.5.5.2.2 Queue Table
Queue Table can be configured through WEB interface using the
Queue Table Settings screen (Navigation - System-> QoS->
QoSEgress-> Queue Table)
Screen 14-11: Queue Configurations
14.5.6 Configuring Queue Map
14.5.6.1 CLI Configuration
1. Queue Map can be done per queue by configuring the qmap values and
mapping it to the specific queue.
UltOs# configure terminal
UltOs(config)# queue-map regn-priority vlanPri 0 interface lan 0/1
queue-id 1
UltOs(config)# end
The queue map is associated to the queue.
2. View the queue map configurations of the queues of an egress interface
UltOs# show queue interface lan 0/1
Q Template Id : 1
QoS Queue Map Entries
---------------------
IfIndex CLASS PriorityType Priority Value
Mapped Queue
---------- ---------- --------------- ---------------
---------------
lan0/1 none VlanPri 0
1
3. To disable queue-map for a queue.
UltOs# configure terminal
FDN40
Configuration User Manual 267
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# no queue-map regn-priority vlanPri 0 interface lan
0/1
UltOs(config)# end
14.5.6.2 WEB Configuration
14.5.6.2.1 QueueTemplate
Queue Map can be configured through WEB interface using the
Queue Map screen (Navigation - System-> QoS-> QoSEgress->
QMap)
Screen 14-12: Queue Map Configurations
14.5.7 Configuring Scheduler
14.5.7.1 CLI Configuration
The supported scheduling algorithms are:
Strict-Priority scheduling
1. Configure the scheduling algorithm
UltOs# configure terminal
UltOs(config)# scheduler interface wan 0/1 sched-algo strict-priority
UltOs# show scheduler
QoS Scheduler Entries
---------------------
IfIndex Scheduler Index Scheduler Algo Shape
Index Scheduler HL Global
FDN40
Configuration User Manual 268
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Id
---------- --------------- -------------------- ------
----- ------------ -------
-----
wan0/1 0 strictPriority 0
0 1
ApRadio2 0 strictPriority 0
0 2
ApRadio3 0 strictPriority 0
0 3
lan0/1 0 strictPriority 0
0 4
lan0/2 0 strictPriority 0
0 5
lan0/3 0 strictPriority 0
0 6
lan0/4 0 strictPriority 0
0 7
14.5.7.2 WEB Configuration
Scheduler Table can be configured through WEB interface using the
Scheduler Table Settings screen (Navigation - System-> QoS->
QoSEgress-> Scheduler Table)
Screen 14-6: Scheduler Configurations
Schedulers are Pre-Created at ports.
FDN40
`FDN40ConfigUM/20160505 269
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Chapter
15
OSPF
15.1 Protocol Description
OSPF (Open Shortest Path First) protocol, is an Interior Gateway Protocol
used to distribute routing information within a single Autonomous System.
Routers use link-state algorithms to send routing information to all nodes in
an inter-network by calculating the shortest path to each node based on the
topography of the Internet constructed by each node. Each router sends that
portion of the routing table (keeps track of routes to particular network
destinations), which describes the state of its own links. In addition, it also
sends the complete routing structure (topography).
The OSPF basic and advanced configuration tasks are described in the
following section(s)
FDN40
`FDN40ConfigUM/20160505 270
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.2 Topology
Figure 15-1: OSPF Topology
FDN40
`FDN40ConfigUM/20160505 271
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.3 Configuration Guidelines
The following sections describe the configuration of OSPF running as a part
of ULTERIUS FDN40 product.
This is a prerequisite for configuring the OSPF.
15.3.1 Configuration in FDN40-1
Prerequisite: Configuration of VLAN Interfaces (vlan11 and vlan10)
UltOs# configure terminal
UltOs(config)# vlan 11
UltOs(config-vlan)# ports wan 0/1 untagged wan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 11
UltOs(config-if)# shut
UltOs(config-if)# ip address 10.4.0.1 255.255.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 10
UltOs(config-vlan)# ports wan 0/2 untagged wan 0/2
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 10
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.10.2.1 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# interface wan0/2
UltOs(config-if)# switchport pvid 10
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
15.3.2 Configuration in FDN40-2
Prerequisite: Configuration of VLAN Interfaces
UltOs# configure terminal
UltOs(config)# vlan 11
UltOs(config-vlan)# ports wan 0/1 untagged wan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 11
FDN40
`FDN40ConfigUM/20160505 272
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.4.0.2 255.255.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 2
UltOs(config-vlan)# ports wan 0/2 untagged wan 0/2
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 2
UltOs(config-if)# ip address 10.2.2.2 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# interface wan 0/2
UltOs(config-if)# no shutdown
UltOs(config-if)# switchport pvid 2
UltOs(config-if)# exit
15.3.3 Configuration in FDN40-3
Prerequisite: Configuration of VLAN Interfaces
UltOs# configure terminal
UltOs(config)# vlan 11
UltOs(config-vlan)# ports wan 0/1 untagged wan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 11
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.4.0.3 255.255.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 2
UltOs(config-vlan)# ports wan 0/2 untagged wan 0/2
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 2
UltOs(config-if)# ip address 10.1.1.3 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# interface wan 0/2
UltOs(config-if)# no shutdown
FDN40
`FDN40ConfigUM/20160505 273
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-if)# switchport pvid 2
UltOs(config-if)# exit
15.3.4 Configuration in FDN40-4
Prerequisite: Configuration of VLAN Interfaces
UltOs# configure terminal
UltOs(config)# interface wan 0/1
UltOs(config-if)# no shutdown
UltOs(config)# exit
UltOs(config)# vlan 11
UltOs(config-vlan)# ports wan 0/1 untagged wan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 11
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.4.0.4 255.255.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 3
UltOs(config-vlan)# ports wan 0/2
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 3
UltOs(config-if)# ip address 10.5.6.4 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 4
UltOs(config-vlan)# ports add wan 0/2
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 4
UltOs(config-if)# ip address 10.5.5.4 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
15.3.5 Configuration in FDN40-5
Prerequisite: Configuration of VLAN Interfaces
UltOs# configure terminal
UltOs(config)# vlan 11
FDN40
`FDN40ConfigUM/20160505 274
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-vlan)# ports wan 0/1 untagged wan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 11
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.8.0.5 255.255.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 4
UltOs(config-vlan)# ports wan 0/2 untagged wan 0/2
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 4
UltOs(config-if)# ip address 10.5.5.5 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# interface wan 0/2
UltOs(config-if)# no shutdown
UltOs(config-if)# switchport pvid 4
UltOs(config-if)# exit
15.3.6 Configuration in FDN40-6
Prerequisite: Configuration of VLAN Interfaces
UltOs# configure terminal
UltOs(config)# vlan 11
UltOs(config-vlan)# ports wan 0/1 untagged wan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 11
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.7.0.6 255.255.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 3
UltOs(config-vlan)# ports wan 0/2 untagged wan 0/2
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 3
UltOs(config-if)# ip address 10.5.6.6 255.255.255.0
UltOs(config-if)# no shutdown
FDN40
`FDN40ConfigUM/20160505 275
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-if)# exit
UltOs(config)# interface wan 0/2
UltOs(config-if)# no shutdown
UltOs(config-if)# switchport pvid 3
UltOs(config-if)# exit
15.3.7 Configuration in FDN40-7
Prerequisite: Configuration of VLAN Interfaces
UltOs# configure terminal
UltOs(config)# vlan 11
UltOs(config-vlan)# ports wan 0/1 untagged wan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 11
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.8.0.7 255.255.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
15.3.8 Configuration in FDN40-6
Prerequisite: Configuration of VLAN Interfaces
UltOs# configure terminal
UltOs(config)# vlan 10
UltOs(config-vlan)# ports wan 0/2 untagged wan 0/2
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 10
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.10.2.8 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# interface wan 0/2
UltOs(config-if)# switchport pvid 10
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# vlan 11
UltOs(config-vlan)# ports wan 0/1 untagged wan 0/1
FDN40
`FDN40ConfigUM/20160505 276
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 11
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.10.1.8 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# interface wan 0/1
UltOs(config-if)# switchport pvid 11
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
15.3.9 Configuration in FDN40-9
Prerequisite: Configuration of VLAN Interfaces
UltOs# configure terminal
UltOs(config)# vlan 2
UltOs(config-vlan)# ports wan 0/2 untagged wan 0/2
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 2
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 10.2.2.9 255.255.255.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# interface wan 0/2
UltOs(config-if)# switchport pvid 2
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
15.4 Default Configurations
Table 15-1: Default Configurations
Parameter
Default
Configuration
Stability interval
40
translation-role
Candidate
compatible rfc1583
Enabled
abr-type
standard
neighbor priority
1
area default-cost
10
FDN40
`FDN40ConfigUM/20160505 277
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
area tos
0
area metric
10
area - metric-type
1
area - tos
0
default-information originate always metric
10
default-information originate always metric metric-type
2
Authentication
no authentication
hello-interval
10
retransmit-interval
5
transmit-delay
1
dead-interval
40
tag
2
summary-address
advertise
translation
disabled
redist-config metric-value
10
redist-config metric-type
asExttype2
redist-config tag
manual
nssa asbr-default-route translator
disable
FDN40ConfigUM/20160505 279
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
15.5 OSPF Configurations
15.5.1 Enabling and Disabling OSPF
Enabling OSPF takes the user to the Router Configuration Mode from
which the router related commands are executed. Disabling OSPF
terminates the OSPF process.
15.5.1.1 CLI Configuration
1. Execute the following commands to enable OSPF.
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable OSPF globally in the Switch FDN40-1.
UltOs(config)# router ospf
2. This command takes the user to the router configuration mode.
UltOs(config-router)#
To disable OSPF globally in the switch FDN40-1 by executing the following
command. UltOs(config)# no router ospf
15.5.1.2 WEB Configuration
OSPF can be enabled/ disabled through WEB interface using the OSPF VRF
Creation screen (Navigation - Layer3 Management > OSPF > OSPF VRF
Creation
Screen 15-1: OSPF VRF Creation
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 280
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.5.2 Configuring Router-id
The Router-id configured must be one of the IP addresses of the IP
interfaces configured in the switch.
15.5.2.1 CLI Configuration
1. Execute the following commands to configure the router-id.
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable OSPF globally in the Switch FDN40-1.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
It is possible to configure an arbitrary value for the IP address for
each router. However, each router ID must be unique. To ensure
uniqueness, the router-id must match with one of the IP interface
addresses of the router.
- Exit from the Router Configuration mode.
UltOs(config-router)# exit
2. View the configuration details by executing the following show command.
UltOs# show ip ospf
OSPF Router ID 10.10.2.1
Supports only single TOS(TOS0) route
ABR Type supported is Standard ABR
It is an Area Border Router
Number of Areas in this router is 2
Area is 0.0.0.6
Number of interfaces in this area is 1
SPF algorithm executed 6 times
Area is 0.0.0.0
Number of interfaces in this area is 1
SPF algorithm executed 6 times
15.5.2.2 WEB Configuration
Router id can be set to configured through WEB interface using the OSPF
Basic Settings screen (Navigation - Layer3 Management > OSPF > Basic
Settings)
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 281
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 15-2: OSPF Basic Settings
15.5.3 Configuring OSPF Interface
15.5.3.1 CLI Configuration
1. Execute the following commands to configure OSPF interface.
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable OSPF globally in the Switch FDN40-1.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
- Enable OSPF over the VLAN interface and associate the interface with
an OSPF area. VLAN Interfaces VLAN11 and VLAN10 are created as
part of the prerequisite configuration.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
- Enabling OSPF over the VLAN interfaces defines the
interfaces on which OSPF runs and the area ID for those interfaces.
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 282
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2. View the configuration details by executing the following show command.
UltOs# show ip ospf
OSPF Router ID 10.10.2.1
Supports only single TOS(TOS0) route
ABR Type supported is Standard ABR
It is an Area Border Router
Number of Areas in this router is 2
Area is 0.0.0.6
Number of interfaces in this area is 1
SPF algorithm executed 6 times
Area is 0.0.0.0
Number of interfaces in this area is 1
SPF algorithm executed 6 times
3. View the OSPF interfaces.
UltOs# show ip ospf interface
vlan11 is line protocol is up
Internet Address 10.4.0.1, Mask 255.255.0.0, Area
0.0.0.0
AS 1, Router ID 10.10.2.1, Network Type BROADCAST,
Cost 1
Transmit Delay is 1 sec, State 4, Priority 1
Designated RouterId 10.10.2.1, Interface address
10.4.0.1
Backup Designated RouterId 10.4.0.4, Interface
address 10.4.0.4
Timer intervals configured, Hello 10, Dead 40, Wait
40, Retransmit 5
Hello due in 8 sec
Neighbor Count is 3, Adjacent neighbor count is 3
Adjacent with the neighbor 10.4.0.4
Adjacent with the neighbor 10.4.0.3
Adjacent with the neighbor 10.4.0.2
vlan10 line protocol is up
Internet Address 10.10.2.1, Mask 255.255.255.0, Area
0.0.0.6
AS 1, Router ID 10.10.2.1, Network Type BROADCAST,
Cost 1
Transmit Delay is 1 sec, State 4, Priority 1
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 283
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Designated RouterId 10.10.2.1, Interface address
10.10.2.1
Backup Designated RouterId 10.10.1.8, Interface
address 10.10.2.8
Timer intervals configured, Hello 10, Dead 40, Wait
40, Retransmit 5
Hello due in 6 sec
Neighbor Count is 1, Adjacent neighbor count is 1
Adjacent with the neighbor 10.10.1.8 OSPF Router ID
10.10.2.1
Execute the no form of the command to disable OSPF routing for the
interfaces defined and to remove the area ID of the interface. UltOs(config-router)#
no network 10.4.0.1 area 0.0.0.0
PW interface can be configured as OSPF interface similar to router port. For
Creating and assigning the IP address to PW interface refer FDN40 configuration
user manual.
15.5.3.2 WEB Configuration
Interface can be set to configured through WEB interface using the OSPF
Basic Settings screen (Navigation - Layer3 Management > OSPF >
Interface
Screen 15-3: OSPF Interface Configuration
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 284
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.5.4 Configuring OSPF Interface Parameters
The interface parameters are configured in the Interface Configuration mode.
15.5.4.1 CLI Configuration
Execute the following commands prior to the configuration of OSPF Interface
Parameters.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Enable OSPF over the VLAN interface and associate the interface with an
OSPF area. VLAN Interfaces VLAN11 and VLAN10 are created as part of
the prerequisite configuration.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
UltOs(config-router)# exit
5. Enter the Interface Configuration mode.
UltOs(config)# interface vlan 11
UltOs(config-if)#
15.5.4.2 WEB Configuration
OSPF Interface Parameters can be configured through WEB interface using
the OSPF Interface screen. For screenshot, refer section 4.5.3.2
15.5.5 Configuring OSPF Interface Priority
Configuring OSPF Interface Priority sets the interface priority of the router,
which helps to determine the designated router for the link connected to the
interface.
15.5.5.1 CLI Configuration
1. Execute the following command to configure the VLAN 11 interface
priority as 10.
UltOs(config-if)#ip ospf priority 10
2. View the configuration details by executing the following show
command.
UltOs# show ip ospf interface vlan 11
vlan11 is line protocol is up
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 285
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Internet Address 10.4.0.1, Mask 255.255.0.0, Area
0.0.0.0
AS 1, Router ID 10.10.2.1, Network Type BROADCAST,
Cost 1
Transmit Delay is 1 sec, State 4, Priority 10
Designated RouterId 10.10.2.1, Interface address
10.4.0.1
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait
40, Retransmit 5
Hello due in 4 sec
Neighbor Count is 0, Adjacent neighbor count is 0
15.5.5.2 WEB Configuration
OSPF Interface Priority can be configured through WEB interface using the
OSPF Interface screen. For screenshot, refer section 4.5.3.2.
A priority value of 0 signifies that the router is not eligible to become the
designated router on a particular network.
The default interface priority value is 1. Restore the default value of the OSPF
Interface by executing the following command. UltOs(config-if)# no ip ospf priority
15.5.6 Configuring LSA Retransmission Level
Configuring LSA Retransmission Interval specifies the time interval between
the successive link-state advertisement (LSA) retransmissions
.
15.5.6.1 CLI Configuration
1. Execute the following command to configure the VLAN 11
retransmit-interval as 10 seconds.
UltOs(config-if)# ip ospf retransmit-interval 10
2. View the configuration details by executing the following show
command.
UltOs# show ip ospf interface vlan 11
vlan11 is line protocol is up
Internet Address 10.4.0.1, Mask 255.255.0.0, Area 0.0.0.0
AS 1, Router ID 10.10.2.1, Network Type BROADCAST, Cost 1
Transmit Delay is 1 sec, State 4, Priority 1
Designated RouterId 10.10.2.1, Interface address 10.4.0.1
No backup designated router on this network
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 286
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 10
Neighbor Count is 0, Adjacent neighbor count is 0
15.5.6.2 WEB Configuration
LSA Retransmission Level can be configured through WEB interface using
the OSPF Interface screen. For screenshot, refer section 4.5.3.2.
Restore the default value of retransmission interval by executing the following
command. UltOs(config-if)# no ip ospf retransmit-interval
15.5.7 Configuring Hello Interval
Configuring Hello Interval specifies the interval between the hello packets
sent on the interface.
15.5.7.1 CLI Configuration
1. Execute the following command to configure the VLAN 11 hello
interval as 40 seconds.
UltOs(config-if)# ip ospf hello-interval 40
2. View the configuration details by executing the following show
command.
UltOs# show ip ospf interface vlan 11
vlan11 is line protocol is up
Internet Address 10.4.0.1, Mask 255.255.0.0, Area 0.0.0.0
AS 1, Router ID 10.10.2.1, Network Type BROADCAST, Cost 1
Transmit Delay is 1 sec, State 4, Priority 1
Designated RouterId 10.10.2.1, Interface address10.4.0.1
No backup designated router on this network
Timer intervals configured, Hello 40, Dead 40, Wait 40, Retransmit 5
Hello due in 4 sec
Neighbor Count is 0, Adjacent neighbor count is 0
15.5.7.2 WEB Configuration
Hello Interval can be configured through WEB interface using the OSPF
Interface screen. For screenshot, refer section 4.5.3.2.
15.5.8 Configuring Dead Interval
Configuring Dead-Interval sets the interval at which hello packets must not be
seen before the neighbors declare the router down.
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 287
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.5.8.1 CLI Configuration
1. Execute the following command to configure the VLAN 11 dead-
interval as 120 seconds.
UltOs(config-if)# ip ospf dead-interval 120
2. View the configuration details by executing the following show
command.
UltOs# show ip ospf interface vlan 11
vlan11 is line protocol is up
Internet Address 10.4.0.1, Mask 255.255.0.0, Area 0.0.0.0
AS 1, Router ID 10.10.2.1, Network Type BROADCAST, Cost 1
Transmit Delay is 1 sec, State 4, Priority 1
Designated RouterId 10.10.2.1, Interface address 10.4.0.1
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 120, Wait 120, Retransmit 5
Hello due in 4 sec
Neighbor Count is 0, Adjacent neighbor count is 0
15.5.8.1 WEB Configuration
Dead Interval can be configured through WEB interface using the OSPF
Interface screen. For screenshot, refer section 4.5.3.2.
Restore the default value for dead-interval (40 seconds) by executing the
following command. UltOs(config-if)# no ip ospf dead-interval
15.5.9 Configuring Network Type
The OSPF network type can be broadcast only. The OSPF network type can
not be configured to a type other than the default for a given media.
15.5.10 Configuring Interface Cost
Configuring Interface Cost explicitly specifies the cost of sending a packet on
an interface.
15.5.10.1 CLI Configuration
1. Execute the following command to configure the VLAN 11 interface
cost as 20.
UltOs(config-if)# ip ospf cost 20
2. View the configuration details by executing the following show
command.
UltOs# show ip ospf interface vlan 11
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 288
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
vlan11 is line protocol is up
Internet Address 10.4.0.1, Mask 255.255.0.0, Area 0.0.0.0
AS 1, Router ID 10.10.2.1, Network Type BROADCAST, Cost 20
Transmit Delay is 1 sec, State 4, Priority 1
Designated RouterId 10.10.2.1, Interface address 10.4.0.1
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 120, Wait 120, Retransmit 5
Hello due in 4 sec
Neighbor Count is 0, Adjacent neighbor count is 0
15.5.10.2 WEB Configuration
OSPF Interface Cost can be configured through WEB interface using the
OSPF Interface screen. For screenshot, refer section 4.5.3.2.
Restore the default value for interface cost by executing the following
command. UltOs(config-if)# no ip ospf cost
15.5.11 Configuring OSPF Authentication
The authentication type for OSPF can be configured as “Simple Password
Authentication”, “Message-Digest Authentication” or “Null Authentication”.
The following sections describe the configuration of OSPF Authentication.
Authentication related configuration are done in the Interface Configuration
mode.
Execute the following commands prior to the configuration of OSPF
Authentication.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Enable OSPF over the VLAN interface (VLAN Interfaces vlan11 and
vlan10 already created as part of prerequisite configuration) and
associate the interface with an OSPF area.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
UltOs(config-router)# exit
5. Enter the Interface Configuration mode.
UltOs(config)# interface vlan 11
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 289
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-if)#
Sample Configuration for Testing Authentication
Figure 15-2: Topology for Testing Authentication
Some prerequisite configuration (refer Configuration Guidelines (Prerequisite))
must be done in the switches FDN40-2, FDN40-4 before configuring OSPF.
15.5.11.1 Configuring Simple Password Authentication
For the Simple Password Authentication, a password must be specified
which is to be used by the neighboring routers that are using the OSPF
simple password authentication.
15.5.11.1.1 CLI Configuration
1. Execute the following commands in FDN40-2 and FDN40-4.
Simple Password authentication
Configuration in FDN40-2:
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 290
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable OSPF globally in the switch FDN40-2.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.4.0.2
- Enable OSPF over the VLAN interface and associate the interface
with an OSPF area.
UltOs(config-router)# network 10.4.0.2 area 0.0.0.0
- Exit from the router configuration mode.
UltOs(config-router)# exit
- Enter the Interface Configuration mode.
UltOs(config)#interface vlan 11
- Configure the authentication key for simple password authentication.
UltOs(config-if)# ip ospf authentication-key 1234
- Enable simple password authentication.
UltOs(config-if)# ip ospf authentication
- Exit from the Interface Configuration mode.
UltOs(config-if)# exit
- Exit from the configuration mode.
UltOs(config)# exit
Configuration in FDN40-4:
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable OSPF globally in the switch FDN40-4.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.4.0.4
- Enable OSPF over the VLAN interface and associate the
interface with an OSPF area.
UltOs(config-router)# network 10.4.0.4 area 0.0.0.0
- Exit from the Router Configuration mode.
UltOs(config-router)# exit
- Enter the Interface Configuration mode.
UltOs(config)#interface vlan 11
- Configure the authentication key for simple password
authentication.
UltOs(config-if)# ip ospf authentication-key 1234
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 291
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
- Enable simple password authentication.
UltOs(config-if)# ip ospf authentication
- Exit from the Interface Configuration mode.
UltOs(config-if)# exit
- Exit from the configuration mode.
UltOs(config)# exit
UltOs#
2.View the authentication type configured by executing the following show
command.
UltOs# show ip ospf interface
vlan11 is line protocol is up
Internet Address 10.4.0.2, Mask 255.255.0.0, Area 0.0.0.0
AS 1, Router ID 10.4.0.2, Network Type BROADCAST, Cost 1
Transmit Delay is 1 sec, State 5, Priority 1
Designated RouterId 10.4.0.4, Interface address 10.4.0.4
Backup Designated RouterId 10.4.0.2, Interface address 10.4.0.2
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Hello due in 0 sec
Neighbor Count is 1, Adjacent neighbor count is 1
Adjacent with the neighbor 10.4.0.4
Simple password authentication enabled
3.View the adjacency formed between the neighbors (FDN40-2 and FDN40-4)
by executing the following command.
UltOs# show ip ospf neighbor detail
Neighbor 10.4.0.4, interface address 10.4.0.4
In the area 0.0.0.0 via interface vlan11
Neighbor priority is 1, State is FULL/BACKUP, 5 state changes
DR is 10.4.0.4 BDR is 10.4.0.2
Options is 0x2
A previously assigned OSPF password can be removed by executing the
following command. UltOs(config-if)# no ip ospf authentication-key
15.5.11.1.2 WEB Configuration
OSPF Simple Password Authentication can be configured through WEB
interface using the OSPF Interface screen. For screenshot, refer section
4.5.3.2.
A previously assigned OSPF password can be removed by executing the
following command. UltOs(config-if)# no ip ospf authentication-key
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 292
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.5.11.2 Configuring Message-Digest Authentication
Message-Digest authentication is a cryptographic authentication. A key
(password) and key-id are configured on each router. The router uses an
algorithm based on the OSPF packet, the key, and the key-id to generate a
“message-digest” that appends to the packet.
15.5.11.2.1 CLI Configuration
1. Execute the following commands to configure the message-digest
authentication.
Configuration in FDN40-2:
˗ Enter the Global Configuration mode.
UltOs# configure terminal
˗ Enter the Interface Configuration mode.
UltOs(config)#interface vlan 11
˗ Delete the authentication key for simple password
authentication.
UltOs(config-if)# no ip ospf authentication-key
˗ Configure the authentication key for the message-digest
authentication.
UltOs(config-if)# ip ospf message-digest-key 0 md5 asdf
˗ Enable message-digest authentication.
UltOs(config-if)# ip ospf authentication message-digest
˗ Exit from the Interface Configuration mode.
UltOs(config-if)# exit
˗ Exit from the configuration mode.
UltOs(config)# exit
Configuration in FDN40-4:
˗ Enter the Global Configuration mode.
UltOs# configure terminal
˗ Enter the Interface Configuration mode.
UltOs(config)#interface vlan 11
˗ Delete the authentication key for simple password
authentication.
UltOs(config-if)# no ip ospf authentication-key
˗ Configure the authentication key for message-digest
authentication.
UltOs(config-if)# ip ospf message-digest-key 0 md5 asdf
˗ Enable message-digest authentication.
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 293
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-if)# ip ospf authentication message-digest
˗ Exit from the Interface Configuration mode.
UltOs(config-if)# exit
˗ Exit from the configuration mode.
UltOs(config)# exit
2. View the configuration details by executing the following show commands.
In FDN40-2:
View the type of authentication configured.
UltOs# show ip ospf interface
0
vlan11 is line protocol is up
Internet Address 10.4.0.2, Mask 255.255.0.0, Area 0.0.0.0
AS 1, Router ID 10.4.0.2, Network Type BROADCAST, Cost 1
Transmit Delay is 1 sec, State 5, Priority 1
Designated RouterId 10.4.0.4, Interface address 10.4.0.4
Backup Designated RouterId 10.4.0.2, Interface address 10.4.0.2
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Hello due in 0 sec
Neighbor Count is 1, Adjacent neighbor count is 1
Adjacent with the neighbor 10.4.0.4
Message digest authentication enabled
Youngest key id is 0
View the adjacency formation between the neighbors.
UltOs# show ip ospf neighbor detail
Neighbor 10.4.0.4, interface address 10.4.0.4
In the area 0.0.0.0 via interface vlan11
Neighbor priority is 1, State is FULL/BACKUP, 5 state changes
DR is 10.4.0.4 BDR is 10.4.0.2
Options is 0x2
15.5.11.2.2 WEB Configuration
OSPF Message Digest Authentication can be configured through WEB
interface using the OSPF Interface screen. For screenshot, refer section
4.5.3.2.
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 294
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.5.11.3 Configuring Message-Digest with key constants
15.5.11.3.1 CLI Configuration
1. Execute the following commands to configure the message-digest
authentication with key constants.
Configuration in FDN40-2:
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enter the Interface Configuration mode.
UltOs(config)#interface vlan 11
- Delete the authentication key for simple password
authentication.
UltOs(config-if)# no ip ospf authentication-key
- Configure the authentication key for the message-digest
authentication.
UltOs(config-if)# ip ospf message-digest-key 1 md5 asdf
- Enable message-digest authentication.
UltOs(config-if)# ip ospf authentication message-digest
Configuration in FDN40-4:
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enter the Interface Configuration mode.
UltOs(config)#interface vlan 11
- Delete the authentication key for simple password
authentication.
UltOs(config-if)# no ip ospf authentication-key
- Configure the authentication key for the message-digest
authentication.
UltOs(config-if)# ip ospf message-digest-key 1 md5 asdf
- Enable message-digest authentication.
UltOs(config-if)# ip ospf authentication message-digest
2. View the configuration details by executing the following show commands.
In FDN40-2:
View the type of authentication configured.
UltOs# show ip ospf interface
vlan11 is line protocol is up
Internet Address 12.0.0.1, Mask 255.0.0.0, Area 0.0.0.0
AS 1, Router ID 12.0.0.1, Network Type BROADCAST, Cost 1
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 295
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Transmit Delay is 1 sec, State 5, Priority 1
Designated RouterId 12.0.0.2, Interface address 12.0.0.2
Backup Designated RouterId 12.0.0.1, Interface address 12.0.0.1
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Hello due in 7 sec
Neighbor Count is 1, Adjacent neighbor count is 1
Adjacent with the neighbor 12.0.0.2
Message digest authentication enabled
Youngest key id is 1
Key Start Accept Time is 30 Jan 2012 09:21
Key Start Generate Time is 30 Jan 2012 09:21
Key Stop Generate Time is 30 Jan 2012 09:31
Key Stop Generate Time is 30 Jan 2012 09:31
Connected to VRF default
15.5.11.3.2 WEB Configuration
OSPF Message Digest Authentication can be configured through WEB
interface using the OSPF Interface screen. For screenshot, refer section
4.5.3.2.
15.5.11.4 Configuring NULL Authentication
15.5.11.4.1 CLI Configuration
1. Execute the following commands to configure the OSPF authentication type
as Null Authentication.
Configuration in FDN40-2:
˗ Enter the Global Configuration mode.
UltOs# configure terminal
˗ Enter the Interface Configuration mode.
UltOs(config)#interface vlan 11
˗ Delete the authentication key for message digest
authentication.
UltOs(config-if)# no ip ospf message-digest-key 0
˗ Enable Null digest authentication.
UltOs(config-if)# ip ospf authentication null
˗ Exit from the Interface Configuration mode.
UltOs(config-if)# exit
˗ Exit from the configuration mode.
UltOs(config)# exit
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 296
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs#
Configuration in FDN40-4:
˗ Enter the Global Configuration mode.
UltOs# configure terminal
˗ Enter the Interface Configuration mode.
UltOs(config)#interface vlan 11
˗ Delete the authentication key for message digest
authentication.
UltOs(config-if)# no ip ospf message-digest-key 0
˗ Enable Null digest authentication.
UltOs(config-if)# ip ospf authentication null
˗ Exit from the Interface Configuration mode.
UltOs(config-if)# exit
˗ Exit from the configuration mode.
UltOs(config)# exit
2. View the adjacency formation between the neighbors by executing the
following show command.
UltOs# show ip ospf neighbor detail
Neighbor 10.4.0.4, interface address 10.4.0.4
In the area 0.0.0.0 via interface vlan11
Neighbor priority is 1, State is FULL/BACKUP, 5 state changes
DR is 10.4.0.4 BDR is 10.4.0.2
Options is 0x23
15.5.11.4.2 WEB Configuration
OSPF Message Digest Authentication can be configured through WEB
interface using the OSPF Interface screen. For screenshot, refer
section 4.5.3.2
15.5.12 Configuring Passive Interface
Configuring Passive Interface suppresses routing updates on all interfaces.
15.5.12.1 CLI Configuration
1. Execute the following commands to suppress routing updates on all the
interfaces.
- Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 297
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
- Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
- Suppress routing updates by executing the following
command.
UltOs(config-if)# passive-interface default
All the OSPF interfaces created after the execution of this command
will be passive. This is useful in Internet service provider (ISP) and
large enterprise networks where many of the distribution routers
have more than 200 interfaces.
- Enable OSPF over the VLAN interface.
UltOs(config-if)# network 10.4.0.1 area 0.0.0.0
2. View the configuration details using the following command.
UltOs# show ip ospf interface vlan 11
vlan11 is line protocol is up
Internet Address 10.4.0.1, Mask 255.255.0.0, Area 0.0.0.0
AS 1, Router ID 10.10.2.1, Network Type BROADCAST, Cost 1
Transmit Delay is 1 sec, State 2, Priority 1
No designated router on this network
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait 40,
Retransmit 5
No Hellos (Passive interface)
Neighbor Count is 0, Adjacent neighbor count is 0
Restore routing updates on all interfaces by executing the following
commands.
UltOs(config-if)# no network 10.4.0.1 area 0.0.0.0
UltOs(config-if)# no passive-interface default
It is also possible to suppress routing updates on a specified interface.
1. Execute the following commands to suppress routing updates on a
specified interface.
- Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
- Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 298
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
- Exit from the router configuration mode.
UltOs(config-router)# exit
- Enter the Interface Configuration Mode for VLAN 11.
UltOs(config)# interface vlan 11
- Enable OSPF over the VLAN interface.
UltOs(config-if)# network 10.4.0.1 area 0.0.0.0
- Configure the VLAN 11 interface as passive interface.
UltOs(config-if)# passive-interface vlan 11
2. View the configuration details by executing the following show command.
UltOs# show ip ospf interface vlan 11.
vlan11 is line protocol is up
Internet Address 10.4.0.1, Mask 255.255.0.0, Area 0.0.0.0
AS 1, Router ID 10.10.2.1, Network Type BROADCAST, Cost 1
Transmit Delay is 1 sec, State 2, Priority 1
No designated router on this network
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit
5
No Hellos (Passive interface)
Neighbor Count is 0, Adjacent neighbor count is 0
15.5.12.2 WEB Configuration
OSPF Message Digest Authentication can be configured through WEB
interface using the OSPF Interface screen. For screenshot, refer
section 4.5.3.2
Restore routing updates on interface VLAN 11. UltOs(config-if)# no passive-
interface vlan 11
15.5.13 Configuring OSPF Area Parameters
Area parameters can be configured only after enabling the OSPF process.
Area parameters are configured in the Router Configuration mode.
15.5.13.1 Configuring Stub Area
Configuring Stub Area specifies an area as a stub area. It also configures
other parameters related to that area.
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 299
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.5.13.1.1 CLI Configuration
Execute the following commands to configure an area as a stub area.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Configure the OSPF interface.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
5. Configure the area 0.0.0.6 as a stub area.
UltOs(config-router)# area 0.0.0.6 stub
Execute the following command to re-Configure the area 0.0.0.6 as a normal
area. UltOs(config-router)# no area 0.0.0.6 stub
Refer Sample Configuration for Stub area, ASBR and route redistribution.
15.5.13.1.2 WEB Configuration
OSPF Stub Area can be set to configured through WEB interface using the
OSPF Area Configuration screen (Navigation - Layer3 Management >
OSPF > Area)
Screen 15-4: OSPF Area Configuration
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 300
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.5.13.2 Configuring ASBR Router
Routers that act as gateways (redistribution) between OSPF and other
routing protocols (IGRP, EIGRP, RIP, BGP, Static) or other instances of the
OSPF routing process are called autonomous system boundary router
(ASBR).
15.5.13.2.1 CLI Configuration
Execute the following commands to configure a router as an ASBR router.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Configure the ASBR router.
UltOs(config-router)# asbr router
Disable the ASBR router by executing the following command. UltOs(config-
router)# no asbr router
Refer Sample Configuration for Stub area, ASBR and route redistribution.
15.5.13.2.2 WEB Configuration
OSPF ASBR Router can be configured through WEB interface using
the OSPF Area screen. For screenshot, refer section 15.5.13.1.2
15.5.13.3 Configuring Redistribution
Configuring Redistribution configures the protocol from which the routes
have to be redistributed into OSPF.
15.5.13.3.1 CLI Configuration
Execute the following commands to configure redistribution.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Configure the router as ASBR router.
UltOs(config-router)# asbr router
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 301
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
5. Configure redistribution of all routes.
UltOs(config-router)# redistribute all
Disable redistribution of routes by executing the following command.
UltOs(config-router)# no redistribute all
Figure 15-3: Topology For Configuration of stub area, ASBR and route redistribution
Sample Configuration for Stub area, ASBR and route redistribution
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 302
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Some prerequisite configuration (refer Configuration Guidelines
(Prerequisite)) must be done in the switches FDN40-4, FDN40-5, and
FDN40-7 before configuring OSPF.
1. Execute the following commands in FDN40-4, FDN40-5 and FDN40-7.
Configuration in FDN40-4:
FDN40-4 is configured as an ASBR router for redistributing the external
routes into OSPF domain.
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# router-id 10.4.0.4
UltOs(config-router)# asbr router
UltOs(config-router)# redistribute all
UltOs(config-router)# network 10.5.5.4 area 0.0.0.0
UltOs(config-router)# exit
UltOs(config)# ip route 100.0.0.0 255.0.0.0 10.5.5.5
UltOs(config)# end
Configuration in FDN40-5:
In FDN40-5 area 0.0.0.4 is configured as a stub area.
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# router-id 10.8.0.5
UltOs(config-router)# network 10.8.0.5 area 0.0.0.4
UltOs(config-router)# network 10.5.5.5 area 0.0.0.0
UltOs(config-router)# area 0.0.0.4 stub
UltOs(config-router)# exit
Configuration in FDN40-7:
In FDN40-7 area 0.0.0.4 is configured as a stub area . External routes are
not redistributed into Stub area.
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# router-id 10.8.0.7
UltOs(config-router)# network 10.8.0.7 area 0.0.0.4
UltOs(config-router)# area 0.0.0.4 stub
UltOs(config-router)# exit
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 303
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2. View the configuration details by executing the following show commands.
In FDN40-4:
UltOs# show ip ospf route
OSPF Process Routing Table
Dest/Mask TOS NextHop/Interface Cost Rt.Type Area
--------- --- -------/--------- ---- ------- ----
10.5.5.0/255.255.255.0 0 0.0.0.0/vlan4 1 IntraArea 0.0.0.0
10.8.0.0/255.255.0.0 0 10.5.5.5/vlan4 2 InterArea 0.0.0.0
UltOs# show ip ospf 0.0.0.0 database external
OSPF Router with ID (10.4.0.4)
AS External Link States
-----------------------
LS age : 300
Options : (No ToS Capability, DC)
LS Type : AS External Link
Link State ID : 10.4.0.0
Advertising Router : 10.4.0.4
LS Seq Number : 0x80000001
Checksum : 0x2a6
Length : 36
Network Mask : 255.255.0.0
Metric Type : 0x80
Metric : 10
Forward Address : 0.0.0.0
Externel Route Tag: 0
AS External Link States
-----------------------
LS age : 300
Options : (No ToS Capability, DC)
LS Type : AS External Link
Link State ID : 10.5.5.0
Advertising Router : 10.4.0.4
LS Seq Number : 0x80000001
Checksum : 0xbee3
Length : 36
Network Mask : 255.255.255.0
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 304
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Metric Type : 0x80
Metric : 10
Forward Address : 0.0.0.0
Externel Route Tag: 0
AS External Link States
-----------------------
LS age : 300
Options : (No ToS Capability, DC)
LS Type : AS External Link
Link State ID : 10.5.6.0
Advertising Router : 10.4.0.4
LS Seq Number : 0x80000001
Checksum : 0xb3ed
Length : 36
Network Mask : 255.255.255.0
Metric Type : 0x80
Metric : 10
Forward Address : 0.0.0.0
Externel Route Tag: 0
AS External Link States
-----------------------
LS age : 300
Options : (No ToS Capability, DC)
LS Type : AS External Link
Link State ID : 100.0.0.0
Advertising Router : 10.4.0.4
LS Seq Number : 0x80000001
Checksum : 0xcd6b
Length : 36
Network Mask : 255.0.0.0
Metric Type : 0x80
Metric : 10
Forward Address : 10.5.5.5
Externel Route Tag: 0
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 305
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
In FDN405:
View the external routes are redistributed in this switch
UltOs# show ip ospf route
OSPF Process Routing Table
Dest/Mask TOS NextHop/Interface Cost Rt.Type Area
--------- --- -------/--------- ---- ------- ----
10.4.0.0/255.255.0.0 0 10.5.5.4/vlan4 10 Type2Ext 0.0.0.0
10.5.5.0/255.255.255.0 0 0.0.0.0/vlan4 1 IntraArea 0.0.0.0
10.5.6.0/255.255.255.0 0 10.5.5.4/vlan4 10 Type2Ext 0.0.0.0
10.8.0.0/255.255.0.0 0 0.0.0.0/vlan11 1 IntraArea 0.0.0.4
100.0.0.0/255.0.0.0 0 10.5.5.5/vlan4 10 Type2Ext 0.0.0.0
UltOs# show ip ospf 0.0.0.0 database external
OSPF Router with ID (10.8.0.5)
AS External Link States
-----------------------
LS age : 300
Options : (No ToS Capability, DC)
LS Type : AS External Link
Link State ID : 10.4.0.0
Advertising Router : 10.4.0.4
LS Seq Number : 0x80000001
Checksum : 0x2a6
Length : 36
Network Mask : 255.255.0.0
Metric Type : 0x80
Metric : 10
Forward Address : 0.0.0.0
Externel Route Tag: 0
AS External Link States
-----------------------
LS age : 300
Options : (No ToS Capability, DC)
LS Type : AS External Link
Link State ID : 10.5.5.0
Advertising Router : 10.4.0.4
LS Seq Number : 0x80000001
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 306
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Checksum : 0xbee3
Length : 36
Network Mask : 255.255.255.0
Metric Type : 0x80
Metric : 10
Forward Address : 0.0.0.0
Externel Route Tag: 0
AS External Link States
-----------------------
LS age : 300
Options : (No ToS Capability, DC)
LS Type : AS External Link
Link State ID : 10.5.6.0
Advertising Router : 10.4.0.4
LS Seq Number : 0x80000001
Checksum : 0xb3ed
Length : 36
Network Mask : 255.255.255.0
Metric Type : 0x80
Metric : 10
Forward Address : 0.0.0.0
Externel Route Tag: 0
In FDN40-7:
View the external routes are not redistributed into the stub area 0.0.0.4.
UltOs# show ip ospf route
OSPF Process Routing Table
Dest/Mask TOS NextHop/Interface Cost Rt.Type Area
--------- --- -------/--------- ---- ------- ----
0.0.0.0/0.0.0.0 0 10.8.0.5/vlan11 2 InterArea 0.0.0.4
10.5.5.0/255.255.255.0 0 10.8.0.5/vlan11 2 InterArea 0.0.0.4
10.8.0.0/255.255.0.0 0 0.0.0.0/vlan11 1 IntraArea 0.0.0.4
UltOs# show ip ospf 0.0.0.4 database external
OSPF Router with ID (10.8.0.7)
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 307
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.5.13.3.2 WEB Configuration
OSPF Redistribution can be configured through WEB interface using
the OSPF Area screen. For screenshot, refer section 15.5.13.1.2
15.5.13.4 Configuring NSSA Area
An NSSA area has the capability to import limited number of external routes.
15.5.13.4.1 CLI Configuration
Execute the following commands to configure an area as an NSSA area.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Configure the OSPF interface.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
5. Configure the area 0.0.0.6 as an nssa area.
UltOs(config-router)# area 0.0.0.6 nssa
Re-Configure the area 0.0.0.6 as a normal area by executing the following
command. UltOs(config-router)# no area 0.0.0.6 nssa
Refer Sample NSSA Configuration, summary address configuration and area-
default cost
15.5.13.4.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF Area screen. For screenshot, refer section 15.5.13.1.2
15.5.13.5 Configuring Summary Address
15.5.13.5.1 CLI Configuration
Execute the following commands to configure summary address.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 308
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
4. Configure the OSPF interface.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
5. Configure the area 0.0.0.6 as an NSSA area.
UltOs(config-router)# area 0.0.0.6 nssa
6. Configure the summary address for 90.0.0.0/8 in the NSSA area.
UltOs(config-router)# summary-address 90.0.0.0 255.0.0.0 0.0.0.6
Delete the summary address configuration for 90.0.0.0/8 in the NSSA area by
executing the following command. UltOs(config-router)# no summary-address
90.0.0.0 255.0.0.0 0.0.0.6
Refer Sample NSSA Configuration, summary address configuration and area-
default cost
15.5.13.5.2 WEB Configuration
OSPF Stub Area can be set to configured through WEB interface using the
OSPF Area Configuration screen (Navigation - Layer3 Management >
OSPF > Aggregation)
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 309
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 15-5: OSPF Area Aggregation
15.5.13.6 Configuring Area-default Cost
Configuring Area-default Cost specifies the cost for the default summary
route sent into a stub or NSSA.
15.5.13.6.1 CLI Configuration
Execute the following commands to configure the Area-default Cost.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Configure the OSPF interface.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
5. Configure the area 0.0.0.6 as an NSSA area.
UltOs(config-router)# area 0.0.0.6 nssa
6. Configure the cost for the default summary route sent into the NSSA area.
UltOs(config-router)# area 0.0.0.6 default-cost 50
Configure the default cost for the default summary route sent into NSSA area
by executing the following command.
UltOs(config-router)# no area 0.0.0.6 default-cost
Sample NSSA Configuration, summary address configuration and area-
default cost
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 310
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Figure 15-4: Topology For NSSA, summary address and area-default Cost Configuration
Some prerequisite configuration (refer Configuration Guidelines
(Prerequisite)) must be done in the switches FDN40-2, FDN40-4, FDN40-9
before configuring OSPF.
1. Execute the following commands in FDN40-2, FDN40-4 and FDN40-9.
Configuration in FDN40-2:
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 311
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# router-id 10.4.0.2
UltOs(config-router)# network 10.4.0.2 area 0.0.0.0
UltOs(config-router)# network 10.2.2.2 area 0.0.0.2
- Configure area 0.0.0.2 as an NSSA area.
UltOs(config-router)# area 0.0.0.2 nssa
UltOs(config-router)# exit
Configuration in FDN40-4:
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# router-id 10.4.0.4
UltOs(config-router)# network 10.4.0.4 area 0.0.0.0
UltOs(config-router)# end
Configuration in FDN40-9:
UltOs# configure terminal
UltOs(config)# router ospf
- Configure ASBR status and redistribute static routes into the
OSPF domain.
UltOs(config-router)# asbr router
UltOs(config-router)# redistribute static
UltOs(config-router)# router-id 10.2.2.9
UltOs(config-router)# network 10.2.2.9 area 0.0.0.2
Configure the area 0.0.0.2 as an NSSA area.
UltOs(config-router)# area 0.0.0.2 nssa
- Configure summary address for the range 90.0.0.0/8 in the area
0.0.0.2.
UltOs(config-router)# summary-address 90.0.0.0 255.0.0.0 0.0.0.2
UltOs(config-router)# exit
-Configure static routes.
UltOs(config)# ip route 90.1.0.0 255.255.0.0 10.2.2.2
UltOs(config)# ip route 90.2.0.0 255.255.0.0 10.2.2.2
UltOs(config)# ip route 90.3.0.0 255.255.0.0 10.2.2.2
UltOs(config)# ip route 90.4.0.0 255.255.0.0 10.2.2.2
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 312
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# ip route 90.5.0.0 255.255.0.0 10.2.2.2
UltOs(config)# end
2. View the configuration details by executing the following show commands.
In FDN40-2
View the two nssa-external LSAs one for 90.0.0.0/8 matching the summary
range configured and the other for the default external route in the NSSA
area.
Another external LSA is generated in the area 0.0.0.0 corresponding to the
nssa-external LSA 90.0.0.0/8.
UltOs# show ip ospf database nssa-external
OSPF Router with ID (10.4.0.2)
NSSA External Link States (Area 0.0.0.2)
----------------------------------------------
LS age : 300
Options : (No ToS Capability, DC)
LS Type : NSSA External Link
Link State ID : 90.0.0.0
Advertising Router : 10.2.2.9
LS Seq Number : 0x80000001
Checksum : 0xc84f
Length : 36
NSSA External Link States (Area 0.0.0.2)
----------------------------------------------
LS age : 300
Options : (No ToS Capability, DC)
LS Type : NSSA External Link
Link State ID : 0.0.0.0
Advertising Router : 10.4.0.2
LS Seq Number : 0x80000002
Checksum : 0x120
Length : 36
UltOs# show ip ospf database external
OSPF Router with ID (10.4.0.2)
AS External Link States
-----------------------
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 313
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
LS age : 0
Options : (No ToS Capability, DC)
LS Type : AS External Link
Link State ID : 90.0.0.0
Advertising Router : 10.4.0.2
LS Seq Number : 0x80000001
Checksum : 0x49fd
Length : 36
Network Mask : 255.0.0.0
Metric Type : 0x80
Metric : 10
Forward Address : 10.2.2.9
Externel Route Tag: 0
UltOs# show ip ospf route
OSPF Process Routing Table
Dest/Mask TOS NextHop/Interface Cost Rt.Type Area
--------- --- -------/--------- ---- ------- ----
10.2.2.0/255.255.255.0 0 0.0.0.0/vlan2 1 IntraArea 0.0.0.2
10.4.0.0/255.255.0.0 0 0.0.0.0/vlan11 1 IntraArea 0.0.0.0
90.0.0.0/255.0.0.0 0 10.2.2.9/vlan2 10 Type2Ext 0.0.0.2
In FDN40-4
UltOs# show ip ospf route
OSPF Process Routing Table
Dest/Mask TOS NextHop/Interface Cost Rt.Type Area
--------- --- -------/--------- ---- ------- ----
10.2.2.0/255.255.255.0 0 10.4.0.2/vlan11 2 InterArea 0.0.0.0
10.4.0.0/255.255.0.0 0 0.0.0.0/vlan11 1 IntraArea 0.0.0.0
90.0.0.0/255.0.0.0 0 10.4.0.2/vlan11 10 Type2Ext 0.0.0.0
In FDN40-9
UltOs# show ip ospf database nssa-external
OSPF Router with ID (10.2.2.9)
NSSA External Link States (Area 0.0.0.2)
----------------------------------------------
LS age : 300
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 314
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Options : (No ToS Capability, DC)
LS Type : NSSA External Link
Link State ID : 90.0.0.0
Advertising Router : 10.2.2.9
LS Seq Number : 0x80000001
Checksum : 0xc84f
Length : 36
NSSA External Link States (Area 0.0.0.2)
----------------------------------------------
LS age : 300
Options : (No ToS Capability, DC)
LS Type : NSSA External Link
Link State ID : 0.0.0.0
Advertising Router : 10.4.0.2
LS Seq Number : 0x80000002
Checksum : 0x120
Length : 36
UltOs# show ip ospf summary-address
Display of Summary addresses for Type5 and Type7 from redistributed
routes
OSPF External Summary Address Configuration Information
-----------------------------------------------------
Network Mask Area Effect TranslationState
------- ---- ---- ------ ---------------
90.0.0.0 255.0.0.0 0.0.0.2 advertiseMatching enabled
UltOs# show ip route
O 0.0.0.0/0 [2] via 10.2.2.2
C 10.2.2.0/24 is directly connected, vlan2
O 10.4.0.0/16 [2] via 10.2.2.2
C 12.0.0.0/8 is directly connected, vlan11
S 90.1.0.0/16 [1] via 10.2.2.2
S 90.2.0.0/16 [1] via 10.2.2.2
S 90.3.0.0/16 [1] via 10.2.2.2
S 90.4.0.0/16 [1] via 10.2.2.2
S 90.5.0.0/16 [1] via 10.2.2.2
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 315
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# show ip ospf route
OSPF Process Routing Table
Dest/Mask TOS NextHop/Interface Cost Rt.Type Area
--------- --- -------/--------- ---- ------- ----
0.0.0.0/0.0.0.0 0 10.2.2.2/vlan2 2 Type1Ext 0.0.0.2
10.2.2.0/255.255.255.0 0 0.0.0.0/vlan2 1 IntraArea 0.0.0.2
10.4.0.0/255.255.0.0 0 10.2.2.2/vlan2 2 InterArea 0.0.0.2
Configuration in FDN40-9:
1. To Test no summary command.
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# no summary-address 90.0.0.0 255.0.0.0 0.0.0.2
2. View the configuration detail in FDN40-9.
UltOs# show ip ospf summary-address
Display of Summary addresses for Type5 and Type7 from redistributed
routes
nssa-external LSA is generated for all the static routes.
UltOs# show ip ospf database
OSPF Router with ID (10.2.2.9)
Router Link States (Area 0.0.0.2)
---------------------------------------
Link ID ADV Router Age Seq# Checksum Link count
------- ---------- --- ---- -------- ----------
10.4.0.2 10.4.0.2 300 0x80000006 0x1dc6 1
10.2.2.9 10.2.2.9 300 0x80000007 0xec0 1
Network Link States (Area 0.0.0.2)
---------------------------------------
Link ID ADV Router Age Seq# Checksum
------- ---------- --- ---- --------
10.2.2.9 10.2.2.9 300 0x80000002 0x5290
Summary Link States (Area 0.0.0.2)
-------------------------------------
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 316
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Link ID ADV Router Age Seq# Checksum
------- ---------- --- ---- --------
10.4.0.0 10.4.0.2 300 0x80000003 0x56c5
NSSA External Link States (Area 0.0.0.2)
----------------------------------------
Link ID ADV Router Age Seq# Checksum
------- ---------- --- ---- --------
90.4.0.0 10.2.2.9 300 0x80000001 0x36e4
90.5.0.0 10.2.2.9 300 0x80000001 0x2aef
0.0.0.0 10.4.0.2 300 0x80000003 0xfe21
90.1.0.0 10.2.2.9 300 0x80000001 0x5ac3
90.2.0.0 10.2.2.9 300 0x80000001 0x4ece
90.3.0.0 10.2.2.9 300 0x80000001 0x42d9
In FDN40-2:
3. View the OSPF external routes corresponding to all the NSSA-external
LSAs.
UltOs# show ip ospf route
OSPF Process Routing Table
Dest/Mask TOS NextHop/Interface Cost Rt.Type Area
--------- --- -------/--------- ---- ------- ----
10.2.2.0/255.255.255.0 0 0.0.0.0/vlan2 1 IntraArea 0.0.0.2
10.4.0.0/255.255.0.0 0 0.0.0.0/vlan11 1 IntraArea 0.0.0.0
90.1.0.0/255.255.0.0 0 10.2.2.2/vlan2 10 Type2Ext 0.0.0.2
90.2.0.0/255.255.0.0 0 10.2.2.2/vlan2 10 Type2Ext 0.0.0.2
90.3.0.0/255.255.0.0 0 10.2.2.2/vlan2 10 Type2Ext 0.0.0.2
90.4.0.0/255.255.0.0 0 10.2.2.2/vlan2 10 Type2Ext 0.0.0.2
90.5.0.0/255.255.0.0 0 10.2.2.2/vlan2 10 Type2Ext 0.0.0.2
Configuration in FDN40-2:
1. To test the area default-cost command.
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# area 0.0.0.2 default-cost 50
In FDN40-9:
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 317
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
FDN40-2 sends a type 7 LSA for the default route with the updated metric as
50. Therefore, the metric for the default route should be 51 in FDN40-9.
2. View the configuration
UltOs# show ip ospf route
OSPF Process Routing Table
Dest/Mask TOS NextHop/Interface Cost Rt.Type Area
--------- --- -------/--------- ---- ------- ----
0.0.0.0/0.0.0.0 0 10.2.2.2/vlan2 51 Type1Ext 0.0.0.2
10.2.2.0/255.255.255.0 0 0.0.0.0/vlan2 1 IntraArea 0.0.0.2
10.4.0.0/255.255.0.0 0 10.2.2.2/vlan2 2 InterArea 0.0.0.2
Configuration in FDN40-2:
1. To Test no area default-cost command.
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# no area 0.0.0.2 default-cost
In FDN40-9:
FDN40-2 must have sent a type 7 LSA for the default route with the
updated default metric as 10. Therefore, the metric for the default route must
be 11 in FDN40-9.
2. View the configuration
UltOs# show ip ospf route
OSPF Process Routing Table
Dest/Mask TOS NextHop/Interface Cost Rt.Type Area
--------- --- -------/--------- ---- ------- ----
0.0.0.0/0.0.0.0 0 10.2.2.2/vlan2 11 Type1Ext 0.0.0.2
10.2.2.0/255.255.255.0 0 0.0.0.0/vlan2 1 IntraArea 0.0.0.2
10.4.0.0/255.255.0.0 0 10.2.2.2/vlan2 2 InterArea 0.0.0.2
15.5.13.6.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF Area screen. For screenshot, refer section 15.5.13.1.2
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 318
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.5.13.7 Configuring NSSA asbr-default-route translator
Configuring NSSA asbr-default-route translator enables/disables setting of P
bit in the default Type-7 LSA generated by NSSA internal ASBR.
15.5.13.7.1 CLI Configuration
Execute the following commands to configure the NSSA asbr-default-route
translator.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Configure the ASBR router status.
UltOs(config-router)#asbr router
5. Configure the OSPF interface.
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
6. Configure the area 0.0.0.6 as an nssa area.
UltOs(config-router)# area 0.0.0.6 nssa
7. Enable nssa asbr-default-route translator.
UltOs(config-router)# set nssa asbr-default-route translator enable
Disable nssa asbr-default-route translator by executing the following
command. UltOs(config-router)# set nssa asbr-default-route translator disable
15.5.13.7.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF Area screen. For screenshot, refer section 15.5.13.1.2
15.5.13.8 Configuring NSSA Area Translation Role
Configuring NSSA Area Translation Role configures the translation role for
the NSSA as always or candidate.
Execute the following commands to configure the NSSA Area Translation
Role.
15.5.13.8.1 CLI Configuration
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 319
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Configure the ASBR router status.
UltOs(config-router)#asbr router
5. Configure the OSPF interface.
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
6. Configure the area 0.0.0.6 as an nssa area.
UltOs(config-router)# area 0.0.0.6 nssa
7. Configure the translation role for the NSSA area 0.0.0.6.
UltOs(config-router)# area 0.0.0.6 translation-role always
Configure the default translation role for the NSSA area 0.0.0.6 by executing
the following command. UltOs(config-router)# no area 0.0.0.6 translation-role
The default translation role is candidate and is configured using the command
no area <area-id> translation-role.
15.5.13.8.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF Area screen. For screenshot, refer section 15.5.13.1.2
15.5.13.9 Configuring Stability Interval for NSSA
Configuring Stability Interval for the NSSA configures the number of seconds
after which an elected translator determines that its services are no longer
required, and that it must continue to perform its translation duties for NSSA.
15.5.13.9.1 CLI Configuration
Execute the following commands to configure the Stability Interval for NSSA.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Configure the ASBR router status.
UltOs(config-router)#asbr router
5. Configure the OSPF interface.
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 320
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
6. Configure the area 0.0.0.6 as an nssa area
UltOs(config-router)# area 0.0.0.6 nssa
7. Configure the Stability interval for the NSSA area 0.0.0.6 as 120 seconds.
UltOs(config-router)# area 0.0.0.6 stability-interval 120
Configure the default Stability interval for the NSSA area 0.0.0.6 by executing
the following command. UltOs(config-router)# no area 0.0.0.6 stability-interval
The default value for stability interval is 40 seconds and is configured using
the command no area <area-id> stability-interval.
15.5.13.9.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF Area screen. For screenshot, refer section 15.5.13.1.2
15.5.13.10 Configuring ABR-Type
Configuring abr-type sets the ABR-Type as either standard, or Cisco or IBM.
15.5.13.10.1 CLI Configuration
1. Execute the following commands to configure the abr-type.
- Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
- Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
- Enable OSPF over the VLAN interface and associate the
interface with an OSPF area.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
- Configure the ABR type as Cisco.
UltOs(config-router)# abr-type cisco
The default value ABR type is standard.
2. View the configuration details by executing the following show command.
UltOs# show ip ospf
OSPF Router ID 10.10.2.1
Supports only single TOS(TOS0) route
ABR Type supported is Cisco ABR
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 321
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
It is an Area Border Router
Number of Areas in this router is 2
Area is 0.0.0.6
Number of interfaces in this area is 1
SPF algorithm executed 3 times
Area is 0.0.0.0
Number of interfaces in this area is 1
SPF algorithm executed 3 times
15.5.13.10.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF Area For screenshot, refer section 15.5.13.1.2
15.5.13.11 Configuring RFC 1583 Compatibility
Configuring RFC 1583 Compatibility sets the OSPF compatibility list to be compatible
with the RFC 1583.
15.5.13.11.1 CLI Configuration
Execute the following commands to configure the RFC 1583 Compatibility.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Enable OSPF over the VLAN interface and associate the interface with an
OSPF area.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
5. Configure the rfc1583 compatibility.
UltOs(config-router)# compatible rfc1583
Disable RFC 1583 compatibility by executing the following command.
UltOs(config-router)# no compatible rfc1583
15.5.13.11.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF Basic settings screen. For screenshot, refer section 15.5.2.2
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 322
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.5.13.12 Configuring Default-information Originate Always
Configuring Default-information Originate Always enables generation of a
default external route into the OSPF routing domain and other parameters
related to that area.
15.5.13.12.1 CLI Configuration
Execute the following commands to configure Default-information Originate
Always.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Enable OSPF over the VLAN interface and associate the interface with an
OSPF area.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
5. Configure the ASBR router status.
UltOs(config-router)#asbr router
6. Configure the generation of a default external route.
UltOs(config-router)# default-information originate always metric 40
Disable generation of a default external route by executing the following
command. UltOs(config-router)# no default-information originate always
Refer Sample Configuration for testing default-information originate always
and redist-config.
15.5.13.12.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF Basic settings screen. For screenshot, refer section 15.5.2.2
15.5.13.13 Configuring Redist-Config
Configuring redist-config configures the information to be applied to routes
learnt from RTM.
15.5.13.13.1 CLI Configuration
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 323
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Configure the asbr router.
UltOs(config-router)# asbr router
5. Configure the redistribution of static routes.
UltOs(config-router)# redistribute static
6. Configure the redist-config.
UltOs(config-router)# redist-config 20.0.0.0 255.0.0.0 metric-value 100
metric-type asExttype1 tag 10
Delete the information applied to the routes learnt from RTM by executing the
following command. UltOs(config-router)# no redist-config 20.0.0.0 255.0.0.0
Figure 15-5: Topology For testing default-information originate always and redist-config
Sample Configuration for testing default-information originate always
and redist-config.
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 324
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Some prerequisite configuration (refer Configuration Guidelines (Prerequisite))
must be done in the switches FDN40-1, FDN40-2 before configuring OSPF.
Configuration in FDN40-1:
1. Execute the following commands in FDN40-1 to configure the generation of
a default external route.
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
- Enable OSPF over the VLAN interface and associate the interface
with an OSPF area.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
- Configure the asbr router.
UltOs(config-router)# asbr router
- Configure the generation of a default external route.
UltOs(config-router)# default-information originate always metric 40
- Exit from the router configuration mode.
UltOs(config-router)# end
UltOs#
Configuration in FDN40-2:
2. Execute the following commands in FDN40-2
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable OSPF globally in the switch FDN40-2.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.4.0.2
- Enable OSPF over the VLAN interface and associate the
interface with an OSPF area.
UltOs(config-router)# network 10.4.0.2 area 0.0.0.0
UltOs(config-router)# network 10.2.2.2 area 0.0.0.2
- Configure area 0.0.0.2 as an NSSA area.
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 325
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-router)# area 0.0.0.2 nssa
- Exit from the router configuration mode.
UltOs(config-router)# end
UltOs#
3. View the configuration details by executing the following show command in
FDN40-1.
Type 5 External LSA must be generated for the default route.
UltOs# show ip ospf database external
OSPF Router with ID (10.10.2.1)
AS External Link States
-----------------------
LS age : 0
Options : (No ToS Capability, DC)
LS Type : AS External Link
Link State ID : 0.0.0.0
Advertising Router : 10.10.2.1
LS Seq Number : 0x80000001
Checksum : 0xb5dd
Length : 36
Network Mask : 0.0.0.0
Metric Type : 0x80
Metric : 40
Forward Address : 0.0.0.0
Externel Route Tag: 0
4. View the configuration details by executing the following show command in
FDN40-2.
The route entry for the default route must exist.
UltOs# show ip ospf route
OSPF Process Routing Table
Dest/Mask TOS NextHop/Interface Cost Rt.Type Area
--------- --- -------/--------- ---- ------- ----
0.0.0.0/0.0.0.0 0 10.4.0.1/vlan11 40 Type2Ext 0.0.0.0
10.2.2.0/255.255.255. 0 0 0.0.0.0/vlan2 1 IntraArea 0.0.0.2
10.4.0.0/255.255.0.0 0 0.0.0.0/vlan11 1 IntraArea 0.0.0.0
10.10.0.0/255.255.0.0 0 10.4.0.1/vlan11 2 InterArea 0.0.0.0
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 326
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Configuration in FDN40-1:
1. Execute the following commands to disable generation of a default external
route.
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# no default-information originate always
UltOs(config-router)# end
UltOs#
2. View the configuration detail by executing the following show command.
Type 5 External LSA for the default route must be flushed.
UltOs# show ip ospf database external
OSPF Router with ID (10.10.2.1)
3. Execute the following show command in FDN40-2.
The route entry for the default route must be deleted.
UltOs# show ip ospf route
OSPF Process Routing Table
Dest/Mask TOS NextHop/Interface Cost Rt.Type Area
--------- --- -------/--------- ---- ------- ----
10.2.2.0/255.255.255.0 0 0.0.0.0/vlan2 1 IntraArea 0.0.0.2
10.4.0.0/255.255.0.0 0 0.0.0.0/vlan11 1 IntraArea 0.0.0.0
10.10.0.0/255.255.0.0 0 10.4.0.1/vlan11 2 InterArea 0.0.0.0
Configuration in FDN40-1:
1. Execute the following commands in FDN40-1 to test redist-config.
UltOs# configure terminal
UltOs(config)# router ospf
- Configure redistribution of static routes redist-config.
UltOs(config-router)# redistribute static
- Configure redist-config.
UltOs(config-router)# redist-config 20.0.0.0 255.0.0.0 metric-
value 100 metric-type asExttype1 tag 10
UltOs(config-router)# exit
- Add a static route for 20.0.0.0/8 network.
UltOs(config)# ip route 20.0.0.0 255.0.0.0 10.4.0.2
UltOs(config)# end
UltOs#
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 327
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2. View the configuration details by executing the following show command.
An external LSA is generated for 20.0.0.0 with metric as 100, metric type
as asExtType1 and tag as 10.
UltOs# show ip ospf database external
OSPF Router with ID (10.10.2.1)
AS External Link States
-----------------------
LS age : 600
Options : (No ToS Capability, DC)
LS Type : AS External Link
Link State ID : 20.0.0.0
Advertising Router : 10.10.2.1
LS Seq Number : 0x80000001
Checksum : 0xf6b2
Length : 36
Network Mask : 255.0.0.0
Metric Type : 0x0
Metric : 100
Forward Address : 10.4.0.2
Externel Route Tag: 10
In FDN40-2:
3. View the external route 20.0.0.0/8 with metric as 101.
UltOs# show ip ospf route
OSPF Process Routing Table
Dest/Mask TOS NextHop/Interface Cost Rt.Type Area
--------- --- -------/--------- ---- ------- ----
10.2.2.0/255.255.255.0 0 0.0.0.0/vlan2 1 IntraArea 0.0.0.2
10.4.0.0/255.255.0.0 0 0.0.0.0/vlan1 1 IntraArea 0.0.0.0
10.10.0.0/255.255.0.0 0 10.4.0.1/vlan1 2 InterArea 0.0.0.0
20.0.0.0/255.0.0.0 0 10.4.0.2/vlan1 101 Type1Ext 0.0.0.0
Configuration in FDN40-1:
1. Execute the following command in FDN40-1 to test no redist-config.
UltOs# configure terminal
UltOs(config)# router ospf
2. Configure no redist-config.
UltOs(config-router)# no redist-config 20.0.0.0 255.0.0.0
UltOs(config-router)# end
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 328
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs#
In FDN40-1:
3. View the configuration details by executing the following show command.
The external LSA generated for 20.0.0.0 with metric as 100, metric type as
asExtType1 and tag as 10 is flushed and a new external LSA is generated
with the default redistribution configuration.
UltOs# show ip ospf database external
OSPF Router with ID (10.10.2.1)
AS External Link States
-----------------------
LS age : 0
Options : (No ToS Capability, DC)
LS Type : AS External Link
Link State ID : 20.0.0.0
Advertising Router : 10.10.2.1
LS Seq Number : 0x80000002
Checksum : 0x3c50
Length : 36
Network Mask : 255.0.0.0
Metric Type : 0x80
Metric : 10
Forward Address : 10.4.0.2
Externel Route Tag: 0
15.5.13.13.2 WEB Configuration
OSPF Stub Area can be set to configured through WEB interface using the
OSPF RRD Route Configuration screen (Navigation - Layer3 Management
> OSPF > RRD Route)
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 329
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 15-6: OSPF RRD Route Configuration
15.5.13.14 Configuring Neighbor
Configuring Neighbor specifies an NBMA neighbor router and its priority.
15.5.13.14.1 CLI Configuration
Execute the following commands to configure neighbor.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Configure the OSPF interface.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
5. Exit from the Router Configuration mode.
UltOs(config-router)# exit
6. Enter the Interface Configuration mode.
UltOs(config)# interface vlan 11
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 330
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
7. Configure the network type as NBMA.
UltOs(config-if)# ip ospf network non-broadcast
8. Configure the neighbor with priority.
UltOs(config-if)# exit
UltOs(config)# router ospf
UltOs(config-router)# neighbor 10.4.0.2 priority 10
9. Configure the neighbor with default priority.
UltOs(config-router)# no neighbor 10.4.0.2 priority 10
Delete the configured neighbor by executing the following command.
UltOs(config-router)# no neighbor 10.4.0.2
15.5.13.14.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF Basic settings screen. For screenshot, refer section 15.5.2.2
15.5.13.15 Configuring Virtual link
Configuring Virtual Link defines an OSPF virtual link and its related
parameters.
15.5.13.15.1 CLI Configuration
Execute the following commands to configure the Virtual Link.
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Configure the OSPF interface.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.1
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
5. Configure the virtual link.
UltOs(config-router)# area 0.0.0.6 virtual-link 20.0.0.1 authentication
message-digest hello-interval 100 retransmit-interval 100 transmit-
delay 50 dead-interval 200 authentication-key asdf
Delete the virtual link by executing the following command. UltOs(config-
router)# no area 0.0.0.6 virtual-link 20.0.0.1
Refer Sample Configuration for testing virtual link and route summarization
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 331
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.5.13.15.2 WEB Configuration
OSPF Stub Area can be set to configured through WEB interface using the
OSPF Virtual Interface Configuration screen (Navigation - Layer3
Management > OSPF > Virtual Interface)
Screen 15-7: OSPF Virtual Interface Configuration
15.5.13.16 Configuring Area-range
The area-range is configured to consolidate and summarize routes at an
area boundary.
15.5.13.16.1 CLI Configuration
1. Enter the Global Configuration mode in FDN40-1.
UltOs# configure terminal
2. Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
3. Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
4. Configure the OSPF interface.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
5. Configure the route summarization at an area border router.
UltOs(config-router)# area 0.0.0.6 range 10.10.0.0 255.255.0.0
summary
6. Delete the route summarization information by executing the following
command.
UltOs(config-router)# no area 0.0.0.6 range 10.10.0.0 255.255.0.0
Sample Configuration for testing virtual link and route summarization
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 332
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Some prerequisite configuration (refer Configuration Guidelines
(Prerequisite)) must be done in the switches FDN40-1, FDN40-4, FDN40-5
and FDN40-6 before configuring OSPF.
Figure 15-6: Topology For testing virtual link and route summarization
1. Execute the following commands
Configurations in FDN40-1:
- Enter the Global Configuration mode.
UltOs# configure terminal
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 333
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
- Enable OSPF globally in the switch FDN40-1.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.2.1
- Enable OSPF over the VLAN interface and associate the
interface with an OSPF area.
UltOs(config-router)# network 10.4.0.1 area 0.0.0.0
UltOs(config-router)# network 10.10.2.1 area 0.0.0.6
- Configure the route summarization at an area border router.
UltOs(config-router)# area 0.0.0.6 range 10.10.0.0 255.255.0.0
summary
- Exit from the router configuration mode.
- UltOs(config-router)# end.
Configurations in FDN40-4:
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable OSPF globally in the switch FDN40-4.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.4.0.4
- Enable OSPF over the VLAN interface and associate the
interface with an OSPF area.
UltOs(config-router)# network 10.4.0.4 area 0.0.0.0
UltOs(config-router)# network 10.5.6.4 area 0.0.0.3
UltOs(config-router)# network 10.5.5.4 area 0.0.0.3
- Configure the virtual link for backbone connectivity.
UltOs(config-router)# area 0.0.0.3 virtual-link 10.7.0.6
UltOs(config-router)# area 0.0.0.3 virtual-link 10.8.0.5
- Exit from the router configuration mode.
UltOs(config-router)# end
Configurations in FDN40-5:
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable OSPF globally in the switch FDN40-5.
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 334
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.8.0.5
- Enable OSPF over the VLAN interface and associate the
interface with an OSPF area.
UltOs(config-router)# network 10.8.0.5 area 0.0.0.4
UltOs(config-router)# network 10.5.5.5 area 0.0.0.3
- Configure a virtual link for backbone connectivity.
UltOs(config-router)# area 0.0.0.3 virtual-link 10.4.0.4
- Exit from the router configuration mode.
UltOs(config-router)# end
Configurations in FDN40-6:
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable OSPF globally in the switch FDN40-6.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.7.0.6
- Enable OSPF over the VLAN interface and associate the
interface with an OSPF area.
UltOs(config-router)# network 10.7.0.6 area 0.0.0.4
UltOs(config-router)# network 10.5.6.6 area 0.0.0.3
- Configure the virtual link for backbone connectivity.
UltOs(config-router)# area 0.0.0.3 virtual-link 10.4.0.4
- Exit from the router configuration mode.
UltOs(config-router)# end
Configurations in FDN40-6:
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable OSPF globally in the switch FDN40-6.
UltOs(config)# router ospf
- Configure the OSPF router-id.
UltOs(config-router)# router-id 10.10.1.8
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 335
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
- Enable OSPF over the VLAN interface and associate the
interface with an OSPF area.
UltOs(config-router)# network 10.10.1.8 area 0.0.0.6
UltOs(config-router)# network 10.10.2.8 area 0.0.0.6
- Exit from the configuration mode.
UltOs(config-router)# end
2. View the route summarization information in FDN40-1.
In FDN40-1:
UltOs# show ip ospf area-range
Display of Summary addresses for Type3 and Translated Type5
OSPF Summary Address Configuration Information
----------------------------------------------
Network Mask LSAType Area Effect Tag
------- ---- ------- ---- ------ ---
10.10.0.0 255.255.0.0 Summary 0.0.0.6 Advertise 150746304
3. View the virtual link and the status of the link in FDN40-4.
UltOs# show ip ospf virtual-links
Virtual Link to router 10.7.0.6, Interface State is
POINT_TO_POINT
Transit Area 0.0.0.3
Transmit Delay is 1 sec, Neighbor State FULL
Timer intervals configured, Hello 10, Dead 60, Retransmit 5
Virtual Link to router 10.8.0.5, Interface State is
POINT_TO_POINT
Transit Area 0.0.0.3
Transmit Delay is 1 sec, Neighbor State FULL
Timer intervals configured, Hello 10, Dead 60, Retransmit 5
4. View the virtual link in FDN40-5.
UltOs# show ip ospf virtual-links
Virtual Link to router 10.4.0.4, Interface State is POINT_TO_POINT
Transit Area 0.0.0.3
Transmit Delay is 1 sec, Neighbor State FULL
Timer intervals configured, Hello 10, Dead 60, Retransmit 5
5. View the virtual link in FDN40-6.
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 336
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# show ip ospf virtual-links
Virtual Link to router 10.4.0.4, Interface State is POINT_TO_POINT
Transit Area 0.0.0.3
Transmit Delay is 1 sec, Neighbor State FULL
Timer intervals configured, Hello 10, Dead 60, Retransmit 5
6. View the route available to reach ABR FDN40-1.
UltOs# show ip ospf border-routers
OSPF Process Border Router Information
Destination TOS Type NextHop Cost Rt.Type Area
----------- --- ---- ------- ---- ------- ----
10.4.0.4 0 ABR 10.5.6.4 1 intraArea 0.0.0.3
10.8.0.5 0 ABR 10.5.6.4 2 intraArea 0.0.0.3
10.10.2.1 0 ABR 255.255.255.255 0 0.0.0.0
15.5.13.16.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF RRD Route screen. For screenshot, refer section 15.5.13.13.2
15.5.14 Configuring Route Map - OSPF
Ulterius URM (Unified Route Map) is a portable implementation of the route
map capability for IPv4 unicast routing software. The URM provides a single
interface for the administrator to set up and manage route maps. It also
provides a common unified method for routing protocols and static route
management software to use route maps for different purposes. The
independent nature of the implementation helps to avoid the duplication of the
route maps in the different routing modules in a router.
15.5.14.1 Configuring Route Map
This section lists the CLI configuration steps to define a route map with a
specified name and the related parameters such as permission and sequence
number.
15.5.14.1.1 CLI Configuration
1. Execute the following commands
- Enter the Global Configuration mode.
UltOs# configure terminal
- Configure the route map name, permission and sequence number.
UltOs(config)# route-map aa permit 1
2. View the configured route map
UltOs# show route-map
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 337
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Route-map aa, Permit, Sequence 1
Match Clauses:
--------------
Set Clauses:
--------------
Delete the route map configured.
UltOs(config)# no route-map aa 1
15.5.14.1.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF RRD Route screen. For screenshot, refer section 15.5.13.13.2
15.5.14.2 Configuring Route Map Match Criteria
15.5.14.2.1 CLI Configuration
This section lists the CLI configuration steps to define the filtering criteria for
the route map and its related parameters.
1. Execute the following commands
- Enter the Global Configuration mode.
UltOs# configure terminal
- Configure the route map name, permission and sequence number.
UltOs(config)# route-map aa permit 1
- Configure the route map match destination IP address and the subnet
mask.
UltOs(config-rmap-aa)# match destination ip 91.0.0.1 255.0.0.0
- Configure the route map match route-type as remote. (Route-type can
be configured either as local or remote.)
UltOs(config-rmap-aa)# match route-type remote
- Configure the route map match metric-type. (Metric type can be inter-
area / intra-area / type-1-external / type-2-external.)
UltOs(config-rmap-aa)# match metric-type inter-area
- Configure the route map match metric value.
UltOs(config-rmap-aa)# match metric 44
- Configure the route map match next-hop IP address.
UltOs(config-rmap-aa)# match next-hop ip 91.0.0.1
- Configure the route map match tag.
UltOs(config-rmap-aa)# match tag 10
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 338
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2. View the configured parameters.
UltOs# show running-config route-map
Building configuration...
route-map aa permit 1
match destination ip 91.0.0.1 255.0.0.0
match next-hop ip 91.0.0.1
match metric 44
match tag 10
match route-type remote
end
Execute the no form of the commands to delete the configurations.
15.5.14.2.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF RRD Route screen. For screenshot, refer section 15.5.13.13.2
15.5.14.3 Configuring OSPF Distance
15.5.14.3.1 CLI Configuration
This section lists the CLI configuration steps to set the administrative distance
for the OSPF router.
1. Execute the following commands
˗ Enter the Global Configuration mode.
UltOs# configure terminal
˗ Enter the OSPF router configuration mode.
UltOs(config)# router ospf
˗ Configure the distance for the OSPF routes.
UltOs(config-router)# distance 130
2. View the configured distance.
UltOs# show running-config ospf
Building configuration...
router ospf
distance 130
!
router ospf
!
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 339
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
end
Re-configure the distance to its default value. UltOs(config-router)# no
distance
15.5.14.3.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF Basic Settings screen. For screenshot, refer section 15.5.2.2
15.5.14.4 Configuring Redistribution with Route Map
15.5.14.4.1 CLI Configuration
This section lists the CLI configuration steps to configure the protocol from
which the routes have to be redistributed into OSPF, by applying the route-
map.
1. Execute the following commands
˗ Enter the Global Configuration mode.
UltOs# configure terminal
˗ Enable the OSPF router configuration mode.
UltOs(config)# router ospf
˗ Configure the OSPF router ID.
UltOs(config-router)# router-id 10.10.2.1
˗ Configure the router as ASBR (Autonomous System
Boundary Router).
UltOs(config-router)# ASBR Router
˗ Configure the redistribution of all routes with route-map aa.
UltOs(config-router)# redistribute all route-map aa
2. View the configured parameters.
UltOs# show running-config ospf
Building configuration...
router ospf
router-id 10.10.2.1
ASBR Router
redistribute static route-map aa
redistribute connected route-map aa
redistribute rip route-map aa
redistribute bgp route-map aa
distance 130
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 340
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
!
router ospf
!
end
Disable the redistribution of all routes with route-map. UltOs(config-router)#
no redistribute all route-map aa
15.5.14.4.2 WEB Configuration
OSPF NSSA can be configured through WEB interface using the
OSPF RRD Route screen. For screenshot, refer section 15.5.13.13.2
15.5.14.5 Topology Configuration for OSPF Testing
This section provides the sample configuration for testing Route map with
OSPF.
Figure 15-7: Topology Configuration for OSPF Testing
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 341
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Table 15-2 IPv4 Addresses of Interfaces in the Routers Topology OSPF Testing
R1 ASBR router
All OSPF routers have router-ID 0.0.0.N, where N - number of router.
All OSPF routers use area 0.0.0.0.
Some prerequisite configuration (refer Configuration Guidelines
(Prerequisite)) must be done in the switches R1, R2, R3 and R4 before
configuring OSPF.
1. To test the behavior of route selection, when distance command is
applied to the OSPF router, execute the following commands in R1, R2,
R3 and R4.
R1:
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# router-id 0.0.0.1
UltOs(config-router)# ASBR Router
UltOs(config-router)# network 13.0.0.1 area 0.0.0.0
UltOs(config-router)# end
UltOs#
UltOs# configure terminal
UltOs(config)# router rip
UltOs(config-router)# network 12.0.0.1
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 342
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-router)#end
UltOs#
R2:
UltOs# configure terminal
UltOs(config)# router rip
UltOs(config-router)# network 12.0.0.2
UltOs(config-router)# network 24.0.0.2
UltOs(config-router)#end
UltOs#
R3:
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# router-id 0.0.0.2
UltOs(config-router)# network 13.0.0.3 area 0.0.0.0
UltOs(config-router)# network 34.0.0.3 area 0.0.0.0
UltOs(config-router)# end
UltOs#
R4:
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# router-id 0.0.0.3
UltOs(config-router)# network 34.0.0.4 area 0.0.0.0
UltOs(config-router)# end
UltOs#
UltOs# configure terminal
UltOs(config)# router rip
UltOs(config-router)# network 24.0.0.4
UltOs(config-router)#end
2. Configure the route-map aa with a match criteria at R4.
UltOs# configure terminal
UltOs(config)# route-map aa permit 1
UltOs(config-rmap-aa)# match source ip 34.0.0.3 255.0.0.0
UltOs(config-rmap-aa)# exit
UltOs(config)# exit
3. Apply redistribute all to RIP and OSPF routers at R4.
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 343
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# router ospf
UltOs(config-router)# redistribute all
UltOs(config-router)#end
UltOs#
UltOs(config)# router rip
UltOs(config-router)# redistribute all
UltOs(config-router)#end
4. View the routes at R4.
UltOs# show ip route
Vrf Name: default
C 12.0.0.0/8 is directly connected, vlan1
O 13.0.0.0/8 [2] via 34.0.0.3
O 15.0.0.0/8 [10] via 34.0.0.3
C 24.0.0.0/8 is directly connected, vlan24
C 34.0.0.0/8 is directly connected, vlan34
O 70.0.0.0/8 [10] via 34.0.0.3
5. Set the administrative distance 130 to the OSPF router in R4.
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# distance 130 route-map aa
UltOs(config-router)# exit
6. Force routes updates in R1.
UltOs(config)# router ospf
UltOs(config-router)# no redistribute all
UltOs(config-router)# redistribute all
UltOs(config-router)# exit
UltOs(config)# router rip
UltOs(config-router)# no redistribute all
UltOs(config-router)# redistribute all
UltOs(config-router)# exit
7. View the routes at R4.
UltOs# show ip route
C 12.0.0.0/8 is directly connected, vlan1
O 13.0.0.0/8 [2] via 34.0.0.3
R 15.0.0.0/8 [2] via 24.0.0.2
C 24.0.0.0/8 is directly connected, vlan24
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 344
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
C 34.0.0.0/8 is directly connected, vlan34
R 70.0.0.0/8 [5] via 24.0.0.2
8. Reset the administrative distance to the OSPF router in R4.
UltOs# configure terminal
UltOs(config)# router ospf
UltOs(config-router)# no distance 130 route-map aa
UltOs(config-router)# exit
9. Force routes updates in R1.
UltOs(config)# router ospf
UltOs(config-router)# no redistribute all
UltOs(config-router)# redistribute all
UltOs(config-router)# exit
UltOs(config)# router rip
UltOs(config-router)# no redistribute all
UltOs(config-router)# redistribute all
UltOs(config-router)# exit
10. View the routes at R4.
UltOs# show ip route
C 12.0.0.0/8 is directly connected, vlan1
O 13.0.0.0/8 [2] via 34.0.0.3
O 15.0.0.0/8 [10] via 34.0.0.3
C 24.0.0.0/8 is directly connected, vlan24
C 34.0.0.0/8 is directly connected, vlan34
O 70.0.0.0/8 [10] via 34.0.0.3
15.5.14.6 Redistribution Topology
This section provides the sample configuration for testing redistribution of
routes into OSPF with route map.
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 345
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Figure 15-8: Redistribution Topology Configuration
15.5.14.6.1 Redistribution Interface Configuration
Table 15-3: IPv4 Addresses of Interfaces in the Routers Redistribution Topology
15.5.14.6.2 Redistribution Protocol Configuration
Configuration
Protocol Configuration:
Configure the protocols in the given interfaces in each of the routers
as follows:
At R1
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 346
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Interface Vlan 12
Enable RIPv2.
Enable RIPng.
At R2
Interface Vlan 12
Enable RIPv2.
Enable RIPng.
Interface Vlan 23
Enable OSPFv2 with Area 0. Configure this as the ASBR router.
Enable OSPFv3 with Area 0. Configure this as the ASBR router.
Interface Vlan 25
Enable BGP with peer Vlan 25 interface on R5 with remote AS 300.
At R3
Interface Vlan 23
Enable OSPFv2 with Area 0.
Enable OSPFv3 with Area 0.
At R5
Interface Vlan 25
Enable BGP with peer as VLAN 25 interface on R2 with remote AS 100.
1. To test the following behaviors, execute the following commands:
redistribution of static routes into OSPFv2 with the route map with <match
destination ip> clause.
redistribution of static routes into OSPFv2, when the route map is modified or
deleted.
redistribution of static routes into OSPFv2, when static routes for
redistribution are added or deleted.
Configurations at R1:
UltOs(config)# router rip
UltOs(config-router)# network 140.0.0.1
UltOs(config-router)# exit
Configurations at R2:
UltOs(config)# router rip
UltOs(config-router)# network 140.0.0.2
UltOs(config-router)# exit
UltOs(config)#
UltOs(config)# router ospf
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 347
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-router)# router-id 0.0.0.1
UltOs(config-router)# ASBR Router
UltOs(config-router)# network 20.0.0.2 area 0.0.0.0
UltOs(config-router)# exit
UltOs(config)# as-num 100
UltOs(config)# router-id 40.0.0.2
UltOs(config-router)# neighbor 40.0.0.5 remote-as 300
UltOs(config-router)# exit
Configurations at R3
UltOs(config)# router ospf
UltOs(config-router)# router-id 0.0.0.2
UltOs(config-router)# network 20.0.0.3 area 0.0.0.0
UltOs(config-router)# exit
Configurations at R5
UltOs(config)# as-num 300
UltOs(config)# router-id 40.0.0.5
UltOs(config-router)# neighbor 40.0.0.2 remote-as 100
UltOs(config-router)# exit
2. Do the following configurations in R2
In R2, create static routes and create a route-map aa.
UltOs(config)# ip route 91.0.0.0 255.0.0.0 vlan 24
UltOs(config)# ip route 92.0.0.0 255.0.0.0 vlan 24
UltOs(config)# route-map aa permit 1
UltOs(config-rmap-aa)# match destination ip 91.0.0.0 255.0.0.0
UltOs(config-rmap-aa)# end
UltOs#configure terminal
UltOs(config)# route-map aa deny 2
UltOs(config-rmap-aa)# match destination ip 93.0.0.0 255.0.0.0
UltOs(config-rmap-aa)#
3. Enable redistribution of static routes into OSPFv2 with route map aa.
UltOs(config)# router ospf
UltOs(config-router)# redistribute static route-map aa
4. Verify the route in R3, verify 91.0.0.0/8 is present in the general routing
table.
UltOs# show ip route
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 348
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Vrf Name: default
C 11.0.0.0/8 is directly connected, vlan130
C 12.0.0.0/8 is directly connected, vlan1
C 20.0.0.0/8 is directly connected, vlan23
O 91.0.0.0/8 [10] via 20.0.0.2
5. In R2, modify the route map aa.
UltOs# configure terminal
UltOs(config)# route-map aa permit 1
UltOs(config-rmap-aa)# no match destination ip 91.0.0.0 255.0.0.0
UltOs(config-rmap-aa)# match destination ip 92.0.0.0 255.0.0.0
UltOs(config-rmap-aa)# exit
6. In R3, verify 91.0.0.0/8 is removed from the general routing table and
92.0.0.0/8 is present in the general routing table.
UltOs# show ip route
Vrf Name: default
C 11.0.0.0/8 is directly connected, vlan130
C 12.0.0.0/8 is directly connected, vlan1
C 20.0.0.0/8 is directly connected, vlan23
O 92.0.0.0/8 [10] via 20.0.0.2
7. In R2, add/remove static routes.
UltOs# configure terminal
UltOs(config)# ip route 93.0.0.0 255.0.0.0 vlan 24
UltOs(config)# no ip route 92.0.0.0 255.0.0.0 vlan 24
UltOs(config)# end
8. In R3, verify 92.0.0.0/8 is removed from the general routing table and
verify 93.0.0.0/8 is present in the general routing table.
UltOs# show ip route
Vrf Name: default
C 11.0.0.0/8 is directly connected, vlan130
C 12.0.0.0/8 is directly connected, vlan1
C 20.0.0.0/8 is directly connected, vlan23
O 93.0.0.0/8 [10] via 20.0.0.2
9. Delete the route map aa.
UltOs# configure terminal
UltOs(config)# no route-map aa 1
UltOs(config)# no route-map aa 2
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 349
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# end
10. In R3, verify that all the connected routes and static routes are present in
the general routing table.
UltOs# show ip route
Vrf Name: default
C 11.0.0.0/8 is directly connected, vlan130
C 12.0.0.0/8 is directly connected, vlan1
C 20.0.0.0/8 is directly connected, vlan23
O 91.0.0.0/8 [10] via 20.0.0.2
O 93.0.0.0/8 [10] via 20.0.0.2
15.5.14.7 OSPF Inbound Filtering with Route Map
This section provides the sample configuration for testing OSPF inbound
filtering with route map.
Figure 15-9: Distribute-list In Topology Configurations
15.5.14.7.1 Interface Configuration
Table 15-4: IPv4 Addresses of Interfaces in the Routers OSPF Inbound Filtering
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 350
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
15.5.14.7.2 Protocol Configuration
Configure the protocol in the given interfaces in each of the routers as
follows:
At R1
Configure this as ASBR router.
Interface Vlan 12
Enable OSPFv2/OSPFv3 with Area 0.0.0.0.
Interface Vlan 100
Enable OSPFv2/OSPFv3 with Area 1.1.1.1.
Interface Vlan 110
Enable OSPFv2/OSPFv3 with Area 0.0.0.0.
At R2
Interface Vlan 12
Enable OSPFv2/OSPFv3 with Area 0.0.0.0.
Interface Vlan 23
Enable OSPFv2/OSPFv3 with Area 0.0.0.0.
Interface Vlan 120
Enable OSPFv2/OSPFv3 with Area 0.0.0.0.
At R3
Configure this as ASBR router.
Interface Vlan 23
Enable OSPFv2/OSPFv3 with Area 0.0.0.0.
Interface Vlan 130
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 351
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Enable OSPFv2/OSPFv3 with Area 0.0.0.0.
Interface Vlan 140
Enable OSPFv2/OSPFv3 with Area 0.0.0.0.
1. Do the following configurations in R1, R2 and R3.
Configurations at R1
Configure R1 as ASBR Router.
UltOs(config)# router ospf
UltOs(config-router)# router-id 0.0.0.1
UltOs(config-router)# network 10.0.0.1 area 0.0.0.0
UltOs(config-router)# network 130.0.0.1 area 0.0.0.0
UltOs(config-router)# network 20.0.0.1 area 1.1.1.1
UltOs(config-router)# exit
Configurations at R2
UltOs(config)# router ospf
UltOs(config-router)# router-id 0.0.0.2
UltOs(config-router)# network 10.0.0.2 area 0.0.0.0
UltOs(config-router)# network 30.0.0.2 area 0.0.0.0
UltOs(config-router)# network 100.0.0.2 area 0.0.0.0
UltOs(config-router)# exit
Configurations at R3
UltOs(config)# router ospf
UltOs(config-router)# router-id 0.0.0.3
UltOs(config-router)# network 30.0.0.3 area 0.0.0.0
UltOs(config-router)# network 120.0.0.3 area 0.0.0.0
UltOs(config-router)# network 150.0.0.3 area 1.1.1.1
UltOs(config-router)# exit
2. In R3, create static routes and enable redistribution of static routes.
UltOs# configure terminal
UltOs(config)# ip route 91.0.0.0 255.0.0.0 40.0.24.4
UltOs(config)#
UltOs(config)# router ospf
UltOs(config-router)# redistribute static
UltOs(config-router)# end
3. In R2, shutdown interfaces Vlan12 and Vlan23.
UltOs(config-router)# end
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 352
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs#configure terminal
UltOs(config)# interface vlan 12
UltOs(config-if)# shutdown
UltOs(config-if)# end
UltOs# configure terminal
UltOs(config)# interface vlan 23
UltOs(config-if)# shutdown
UltOs(config-if)#
4. In R2, create route map aa and enable incoming filtering of routes in
OSPFv2 with route map aa.
UltOs# configure terminal
UltOs(config)# route-map aa permit 10
UltOs(config-rmap-aa)# exit
UltOs(config)# route-map aa deny 1
UltOs(config-rmap-aa)# match destination ip 150.0.0.0 255.0.0.0
UltOs(config-rmap-aa)# match destination ip 91.0.0.0 255.0.0.0
UltOs(config-rmap-aa)# end
UltOs(config)# router ospf
UltOs(config-router)# distribute-list route-map aa in
UltOs(config-router)#
5. Start interfaces Vlan12 and Vlan23.
UltOs(config)# interface vlan 12
UltOs(config-if)# no shutdown
UltOs(config-if)# end
UltOs(config-if)# configure terminal
UltOs(config)# interface vlan 23
UltOs(config-if)# no shutdown
UltOs(config-if)#end
6. Wait for one minute for all the route updates, and verify the routes in R2.
UltOs# show ip route
Vrf Name: default
C 10.0.0.0/8 is directly connected, vlan12
C 12.0.0.0/8 is directly connected, vlan1
O 20.0.0.0/8 [2] via 10.0.0.1
C 30.0.0.0/8 is directly connected, vlan23
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 353
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
C 100.0.0.0/8 is directly connected, vlan120
O 120.0.0.0/8 [2] via 30.0.0.3
O 130.0.0.0/8 [2] via 10.0.0.1
7. In R2, shutdown interfaces: Vlan12 and Vlan23.
UltOs# configure terminal
UltOs(config)# interface vlan 12
UltOs(config-if)# shutdown
UltOs(config-if)# end
UltOs# configure terminal
UltOs(config)# interface vlan 23
UltOs(config-if)# shutdown
8. Modify the route map aa.
UltOs# configure terminal
UltOs(config)# route-map aa deny 1
UltOs(config-rmap-aa)# no match destination ip 150.0.0.0 255.0.0.0
UltOs(config-rmap-aa)# match destination ip 130.0.0.0 255.0.0.0
UltOs(config-rmap-aa)# end
9. Start interfaces Vlan12 and Vlan23.
UltOs(config)# interface vlan 12
UltOs(config-if)# no shutdown
UltOs(config-if)# end
UltOs(config-if)# configure terminal
UltOs(config)# interface vlan 23
UltOs(config-if)# no shutdown
UltOs(config-if)#end
10. Wait for one minute for all the route updates and verify the routes in R2.
UltOs# show ip route
C 10.0.0.0/8 is directly connected, vlan12
C 12.0.0.0/8 is directly connected, vlan1
O 20.0.0.0/8 [2] via 10.0.0.1
C 30.0.0.0/8 is directly connected, vlan23
C 100.0.0.0/8 is directly connected, vlan120
O 120.0.0.0/8 [2] via 30.0.0.3
O 150.0.0.0/8 [2] via 30.0.0.3
11. In R2, shutdown interfaces Vlan12 and Vlan23.
UltOs(config-router)# end; configure terminal
CHAPTER 15: OSPF
`FDN40ConfigUM/20160505 354
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# interface vlan 12
UltOs(config-if)# shutdown
UltOs(config-if)# end
UltOs# configure terminal
UltOs(config)# interface vlan 23
UltOs(config-if)# shutdown
12. Delete the route map aa.
UltOs# configure terminal
UltOs(config)# no route-map aa 1
UltOs(config)# end
13. Start interfaces Vlan12 and Vlan23.
UltOs(config)# interface vlan 12
UltOs(config-if)# no shutdown
UltOs(config-if)# end
UltOs(config-if)# configure terminal
UltOs(config)# interface vlan 23
UltOs(config-if)# no shutdown
UltOs(config-if)#end
14. Wait for one minute for all the route updates, and verify the routes in R2.
UltOs# show ip route
Vrf Name: default
C 10.0.0.0/8 is directly connected, vlan12
C 12.0.0.0/8 is directly connected, vlan1
O 20.0.0.0/8 [2] via 10.0.0.1
C 30.0.0.0/8 is directly connected, vlan23
O 91.0.0.0/8 [10] via 30.0.0.2
C 100.0.0.0/8 is directly connected, vlan120
O 120.0.0.0/8 [2] via 30.0.0.3
O 130.0.0.0/8 [2] via 10.0.0.1
O 150.0.0.0/8 [2] via 30.0.0.3
FDN40ConfigUM/20160505 355
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
Chapter
16
DHCP Relay Agent
16.1 Protocol Description
DHCP relay agent is used to forward the DHCP packets between client and
server when they are not in the same subnets. The relay receives packets
from the client and inserts certain information like the network in which the
packet is received and then forwards it to the server. The Server identifies
the client’s network from this information and allocates IP accordingly, then
sends the reply to the relay. The Relay then strips the information inserted
and broadcasts the packets into the client’s network.
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 356
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
16.2 Topology
Figure 16-1: DHCP Topology
16.3 Configuration Guidelines
The following sections describe the configuration of DHCP running as a part
of ULTERIUS FDN40.
DHCP Server must be disabled before enabling the DHCP Relay agent.
Only when enabled, the Relay Agent,
- becomes active
- forwards the packets from the client to a specific DHCP server
- does any processing related to Relay Agent Information Options -
like inserting the necessary options while relaying a packet from a
client to a server and examining/stripping of options when relaying a
packet from a server to a client
16.4 Default Configurations
Table 16-1: Default Configurations
Feature
Default Setting
DHCP server status
Disabled
ICMP echo
Disabled
Offer reuse time out
5 seconds
FDN40 -1(DHCP SERVER)
FDN40 -2(DHCP RELAY)
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 357
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Feature
Default Setting
DHCP next server address
0.0.0.0 (none)
Boot file name
None
DHCP server pool lease time
3600 seconds
DHCP server pool utilization threshold
75%
DHCP server debug level
None
DHCP relay status
Disabled
DHCP relay server address
0.0.0.0 (none)
RAI option
Disabled
DHCP relay debug level
None
DHCP client debug level
None
16.5 Enabling DHCP Relay
16.5.1.1 CLI Configuration
Refer Figure 16-1 for Topology Setup. DHCP relay is disabled by default.
a. Execute the following commands in FDN40-2 to enable DHCP Relay.
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable the DHCP server.
UltOs(config)# service dhcp-relay
- Exit from the Global configuration mode.
UltOs(config)# end
b. View the DHCP relay status using the following command.
UltOs# show ip dhcp relay information
The output in the switch is
Dhcp Relay : Enabled
Dhcp Relay Servers only : Disabled
DHCP server : 0.0.0.0
Dhcp Relay RAI option : Disabled
Default Circuit Id information : router-index
Debug Level : 0x1
No of Packets inserted RAI option : 0
No of Packets inserted circuit ID suboption : 0
No of Packets inserted remote ID suboption : 0
No of Packets inserted subnet mask suboption : 0
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 358
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
No of Packets dropped : 0
No of Packets which did not inserted RAI option : 0
16.5.1.2 WEB Configuration
DHCP Relay can be enabled through WEB interface using the DHCP Relay
Configuration screen (Navigation Layer3 Management > DHCP Relay >
Basic Settings)
Screen 16-1: DHCP Relay Configuration
16.6 Configuring a DHCP Server Address
16.6.1.1 CLI Configuration
Refer Figure 16-1 for Topology Setup.
DHCP server address can be configured in the DHCP Relay Agent using the
following commands. A maximum of 5 servers can be configured. If no
servers are configured, then the DHCP packets will be broadcasted to entire
network, except to the network from which packet is received.
1. Execute the following commands to configure a DHCP Server Address.
- Enter into the global configuration mode.
UltOs# configure terminal
- Configure DHCP server address.
UltOs(config)# ip dhcp server 20.0.0.1
- Exit from the Global configuration mode.
UltOs(config)# end
2. View the server address configured in the relay using the following
command.
UltOs# show ip dhcp relay information
The output in the switch is
Dhcp Relay : Enabled
Dhcp Relay Servers only : Enabled
DHCP server 1 : 20.0.0.1
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 359
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Dhcp Relay RAI option : Disabled
Default Circuit Id information : router-index
Debug Level : 0x1
No of Packets inserted RAI option : 0
No of Packets inserted circuit ID suboption : 0
No of Packets inserted remote ID suboption : 0
No of Packets inserted subnet mask suboption : 0
No of Packets dropped : 0
No of Packets which did not inserted RAI option : 0
16.6.1.2 WEB Configuration
DHCP Server Address can be configured through WEB interface using the
DHCP Relay Configuration screen.(Navigation Layer3 Management >
DHCP Relay > Basic Settings)
For screenshot, refer section 16.5.1.2
16.7 Enabling Relay Agent Information
16.7.1.1 CLI Configuration
Refer Figure 16-1 for the Topology Setup.
1. Execute the following commands to enable the Relay agent information
option in FDN40-2.
- Enter into the Global configuration mode.
UltOs# configure terminal
- Configure DHCP server address.
UltOs(config)# ip dhcp relay information option
- Exit from the Global configuration mode.
UltOs(config)# end
2. View the Relay Agent information option status using the following
command.
UltOs# show ip dhcp relay information
The output in the Switch is
Dhcp Relay : Enabled
Dhcp Relay Servers only : Enabled
DHCP server 1 : 20.0.0.1
Dhcp Relay RAI option : Enabled
Default Circuit Id information : router-index
Debug Level : 0x1
No of Packets inserted RAI option : 0
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 360
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
No of Packets inserted circuit ID suboption : 0
No of Packets inserted remote ID suboption : 0
No of Packets inserted subnet mask suboption : 0
No of Packets dropped : 0
No of Packets which did not inserted RAI option : 0
16.7.1.2 WEB Configuration
Relay Agent Information can be enabled through WEB interface using the
DHCP Relay Configuration screen.(Navigation Layer3 Management >
DHCP Relay > Basic Settings)
For screenshot, refer section 16.5.1.2
16.8 Configuring Relay Agent Sub-options
16.8.1.1 CLI Configuration
Refer Figure 16-1 for the Topology Setup.
1. Execute the following commands to configure Circuit-id and Remote-id
Relay agent information option in FDN40-2.
- Enter into the Global Configuration mode.
UltOs# configure terminal
- Enter into the VLAN Interface Configuration mode.
UltOs(config)# interface vlan 1
- Execute the following commands to configure the Circuit-id sub-
option and the Remote-id sub-option.
UltOs(config-if)# ip dhcp relay circuit-id 340
UltOs(config-if)# ip dhcp relay remote-id hello
- Exit from the VLAN Interface Configuration mode.
UltOs(config-if)# end
2. Execute the following show command to view the Relay Agent
information option.
UltOs# show ip dhcp relay information
The output in the Switch is
Dhcp Relay : Enabled
Dhcp Relay Servers only : Enabled
DHCP server 1 : 20.0.0.1
Dhcp Relay RAI option : Enabled
Default Circuit Id information : router-index
Debug Level : 0x1
No of Packets inserted RAI option : 0
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 361
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
No of Packets inserted circuit ID suboption : 0
No of Packets inserted remote ID suboption : 0
No of Packets inserted subnet mask suboption : 0
No of Packets dropped : 0
No of Packets which did not inserted RAI option : 0
Interface vlan1
Circuit ID : 340
Remote ID : hello
UltOs# show ip dhcp relay information vlan 1
Interface vlan1
Circuit ID : 340
Remote ID : hello
Configuration of DHCP Relay circuit ID should be greater than the value of the
macro DHRL_MAX_L3_IF_INDEX.
The value of the macro DHRL_MAX_L3_IF_INDEX is different for FDN40 packages.
For METRO package the value of macro is 1136 and for Enterprise package, the
value of macro is 160.
16.8.1.2 WEB Configuration
Relay Agent Sub-options can be configured through WEB interface using the
DHCP Relay Interface Configuration screen (Navigation Layer3
Management > DHCP Relay > Interface Settings)
Screen 16-2: DHCP Relay Interface Configuration
16.9 Enabling Traces for DHCP Relay
Refer Figure 16-1 for Topology Setup.
1. Execute the following commands in FDN40-2 to enable DHCP relay
debug traces.
UltOs# debug ip dhcp relay all
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 362
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
2. View the debug trace level.
UltOs# show ip dhcp relay information
Dhcp Relay : Enabled
Dhcp Relay Servers only : Enabled
DHCP server 1 : 20.0.0.1
Dhcp Relay RAI option : Enabled
Default Circuit Id information : router-index
Debug Level : 0xff
No of Packets inserted RAI option : 0
No of Packets inserted circuit ID suboption : 0
No of Packets inserted remote ID suboption : 0
No of Packets inserted subnet mask suboption : 0
No of Packets dropped : 0
No of Packets which did not inserted RAI option : 0
Interface vlan1
Circuit ID : 340
Remote ID : hello
16.10 Acquiring IP from a Server Residing Outside the
Client Network
Refer Figure 16-1 for the Topology Setup.
Connect Port 1 of FDN40-1 to Port 1 of FDN40-2 and connect Port 2 of
FDN40-2 to Port 1 of DHCP client.
1. Create vlan2 in FDN40-1 with Port 1 as member port. Then, add a route
to 30.0.0.0 network though 20.0.0.2 (FDN40-2).
UltOs# configure terminal
UltOs(config)# vlan 2
UltOs(config-vlan)# ports lan 0/1 untagged lan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 2
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 20.0.0.1 255.0.0.0
UltOs(config-if)# no shutdown
UltOs(config-vlan)# exit
UltOs(config)# interface lan 0/1
UltOs(config-if)# switchport pvid 2
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 363
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-vlan)# exit
UltOs(config)# ip route 30.0.0.0 255.0.0.0 20.0.0.2
UltOs(config) # end
2. View the VLAN configurations and route configuration using the following
commands.
UltOs# show ip interface vlan 2
vlan2 is up, line protocol is up
Internet Address is 20.0.0.1/8
Broadcast Address 20.255.255.255
UltOs# show vlan id 2
Vlan database
-------------
Vlan ID : 2
Member Ports : lan0/1
Untagged Ports : lan0/1
Forbidden Ports : None
Name : lan
Status : Permanent
Egress Ethertype : 0x8100
MacLearning Admin-Status : Disabled
MacLearning Oper-Status : Enabled
-------------------------------------------------
UltOs# show ip route
C 12.0.0.0/8 is directly connected, vlan1
C 20.0.0.0/8 is directly connected, vlan2
S 30.0.0.0/8 [1] via 20.0.0.2
3. Create vlan2 with port1 as member port and vlan3 with port2 as member
port in FDN40-2.
UltOs# configure terminal
UltOs(config)# vlan 2
UltOs(config-vlan)# ports lan 0/1 untagged lan 0/1
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 2
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 20.0.0.2 255.0.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 364
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# interface lan 0/1
UltOs(config-if)# switchport pvid 2
UltOs(config-if)# exit
UltOs(config)# vlan 3
UltOs(config-vlan)# ports lan 0/2 untagged lan 0/2
UltOs(config-vlan)# exit
UltOs(config)# interface vlan 3
UltOs(config-if)# shutdown
UltOs(config-if)# ip address 30.0.0.2 255.0.0.0
UltOs(config-if)# no shutdown
UltOs(config-if)# exit
UltOs(config)# interface lan 0/2
UltOs(config-if)# switchport pvid 3
UltOs(config-if)# no shutdown
UltOs(config-if)# end
4. View the configuration using the following commands
UltOs# show vlan id 2
Vlan database
-------------
Vlan ID : 2
Member Ports : lan0/1
Untagged Ports : lan0/1
Forbidden Ports : None
Name : lan
Status : Permanent
Egress Ethertype : 0x8100
MacLearning Admin-Status : Disabled
MacLearning Oper-Status : Enabled
----------------------------------------------------
UltOs# show vlan id 3
Vlan database
-------------
Vlan ID : 3
Member Ports : lan0/2
Untagged Ports : lan0/2
Forbidden Ports : None
Name : lan
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 365
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Status : Permanent
Egress Ethertype : 0x8100
MacLearning Admin-Status : Disabled
MacLearning Oper-Status : Enabled
-------------------------------------------------
UltOs# show ip interface vlan 2
vlan2 is up, line protocol is up
Internet Address is 20.0.0.2/8
Broadcast Address 20.255.255.255
UltOs# show ip interface vlan 3
vlan3 is up, line protocol is up
Internet Address is 30.0.0.2/8
Broadcast Address 30.255.255.255
5. Enable DHCP server in FDN40-1. Since the client is in Vlan3, an address
pool with 30.0.0.0 network needs to be configured in the Server.
UltOs# configure terminal
UltOs(config)# service dhcp-server
UltOs(config)# ip dhcp pool 1
UltOs(dhcp-config)# network 30.0.0.0
UltOs(dhcp-config)# lease 0 0 30
UltOs(dhcp-config)# end
6. View the configuration using the following commands.
UltOs# show ip dhcp server information
DHCP server status : Enable
Send Ping Packets : Disable
Debug level : None
Server Address Reuse Timeout : 5 secs
Next Server Adress : 0.0.0.0
Boot file name : None
UltOs# show ip dhcp server pools
Pool Id : 1
----------------------------------
Subnet : 30.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 1800 secs
Utilization threshold : 75%
Start Ip : 30.0.0.1
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 366
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
End Ip : 30.255.255.255
Subnet Options
--------------
Code : 1, Value : 255.0.0.0
7. Enable DHCP Relay in FDN40-2, which connects the networks between
Client and Server.
UltOs# configure terminal
UltOs(config)# service dhcp-relay
UltOs(config)# end
8. View the configuration using the following commands.
UltOs# show ip dhcp relay information
Dhcp Relay : Enabled
Dhcp Relay Servers only : Disabled
DHCP server : 0.0.0.0
Dhcp Relay RAI option : Disabled
Debug Level : 0x1
No of Packets inserted RAI option : 0
No of Packets inserted circuit ID suboption : 0
No of Packets inserted remote ID suboption : 0
No of Packets inserted subnet mask suboption : 0
No of Packets dropped : 0
No of Packets which did not inserted RAI option : 0
9. Configure DHCP server address in FDN40-2.
UltOs(config)# ip dhcp server 20.0.0.1
UltOs(config)# end
10. View the server address configured in the DHCP Relay using the
following command.
UltOs# show ip dhcp relay information
The output in the switch is
Dhcp Relay : Enabled
Dhcp Relay Servers only : Enabled
DHCP server 1 : 20.0.0.1
Dhcp Relay RAI option : Disabled
Default Circuit Id information : router-index
Debug Level : 0x1
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 367
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
No of Packets inserted RAI option : 0
No of Packets inserted circuit ID suboption : 0
No of Packets inserted remote ID suboption : 0
No of Packets inserted subnet mask suboption : 0
No of Packets dropped : 0
No of Packets which did not inserted RAI option : 0
11. Enable DHCP Relay Information option in FDN40-2.
UltOs(config)# ip dhcp relay information option
UltOs(config)# end
12. In FDN40-2 view the Relay Agent information option status using the
following command.
UltOs# show ip dhcp relay information
The output in the Switch is
Dhcp Relay : Enabled
Dhcp Relay Servers only : Enabled
DHCP server 1 : 20.0.0.1
Dhcp Relay RAI option : Enabled
Default Circuit Id information : router-index
Debug Level : 0x1
No of Packets inserted RAI option : 0
No of Packets inserted circuit ID suboption : 0
No of Packets inserted remote ID suboption : 0
No of Packets inserted subnet mask suboption : 0
No of Packets dropped : 0
No of Packets which did not inserted RAI option : 0
13. In FDN40-2 execute the following commands to configure the Circuit-id
sub-option and the Remote-id sub-option.
UltOs(config)# interface vlan 2
UltOs(config-if)# ip dhcp relay circuit-id 340
UltOs(config-if)# ip dhcp relay remote-id hello
UltOs(config-if)# end
14. In FDN40-2 execute the following show command to view the Relay
Agent information option.
UltOs# show ip dhcp relay information
The output in the Switch is
Dhcp Relay : Enabled
Dhcp Relay Servers only : Enabled
DHCP server 1 : 20.0.0.1
CHAPTER 17: DHCP RELAY AGENT
`FDN40ConfigUM/20160505 368
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Dhcp Relay RAI option : Enabled
Default Circuit Id information : router-index
Debug Level : 0x1
No of Packets inserted RAI option : 0
No of Packets inserted circuit ID suboption : 0
No of Packets inserted remote ID suboption : 0
No of Packets inserted subnet mask suboption : 0
No of Packets dropped : 0
No of Packets which did not inserted RAI option : 0
Interface vlan2
Circuit ID : 340
Remote ID : hello
UltOs# show ip dhcp relay information vlan 2
Interface vlan2
Circuit ID : 340
Remote ID : hello
15. Enable DHCP Client to get the IP address from the DHCP server
(FDN40-2) via DHCP Relay (FDN40-1).
FDN40
FDN40ConfigUM/20160505 369
© Ulterius Technologies, LLC 2014. Confidential & Proprietary.
Chapter
17
RAVPN
17.1 Protocol Description
RAVPN (acronym for Client to Site VPN) connects individual hosts to private
networks. In a Remote Access VPN, every host must have VPN client
software. Whenever the host tries to send any traffic, the VPN client software
encapsulates and encrypts that traffic before sending it over the Internet to the
VPN gateway at the edge of the target network. If the target host inside the
private network returns a response, the VPN gateway performs the reverse
process to send an encrypted response back to the VPN client over the
Internet. These remote access VPNs may use passwords, or other
cryptographic methods. The most common secure tunneling protocol IPSec is
deployed in RAVPN.
Remote-Access VPNs allow employees to access their company's intranet
from home or while traveling outside the office, where as site-to-site VPNs
allow employees in geographically disparate offices to share one cohesive
virtual network.
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 370
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
17.2 Topology
Node
Interface Index/Name
Interface IP Address
DUT1
WAN
35.0.0.1
R1
WAN
35.0.0.2
H1
E0
192.168.1.10
DUT1
LAN
192.168.1.1
17.3 RAVPN Configurations
17.3.1 Enabling VPN Module
The VPN (Virtual Private Network) module is enabled for encryption and
decryption of the traffic flows. This section describes the steps involved in
enabling the VPN module globally and configuring a VPN policy. This section
also describes the verifying of the configuration using corresponding show
command.
17.3.1.1 CLI Configuration
To enable VPN globally
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enable the VPN module.
E0
LAN
WAN
DUT1
FDN40
R1
WAN
RAVPN Server
RAVPN Client
H1
Figure 17-1: RAVPN - Topology
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 371
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config)# set vpn enable
- Exit from the Global Configuration mode.
UltOs(config)# end
To view the VPN global status
- View the global VPN settings.
UltOs# show vpn config
VPN Global Configuration
------------------------
IPSecurity Status : Enabled
Maximum Number of Tunnels : 100
Number of Tunnels configured : 1
Number of Tunnels Established: 1
17.3.1.2 WEB Configuration
VPN can be enabled / disabled using the VPN Policy screen (Navigation -
Security Management > VPN > VPN Settings > VPN Policy)
Screen 17-1: VPN Policy - VPN Module Status
17.3.2 Configuring pool IP address
17.3.2.1 CLI Configuration
To create a pool ip address
- Enter the Global Configuration mode.
UltOs# configure terminal
- Create the pool IP address
UltOs# ip ra-vpn pool ravpnpool 192.168.2.1 192.168.2.2
- Exit from the Crypto Map Configuration mode.
UltOs# end
To view the pool IP address
- View the pool ip
UltOs# show ra-vpn address-pool
Address PoolName Start Ip End Ip Prefix length
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 372
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
---------------- ---------- -------- -----------
ravpnpool 192.168.2.1 192.168.2.2 8
17.3.2.2 WEB Configuration
RAVPN Pool can be created using the Address Pool screen (Navigation -
Security Management > VPN > Users >Address Pool)
Screen 17-2: RAVPN Pool IP Address configuration
17.3.3 Configuring RAVPN Policy Type
The VPN policy type defines the policy to be imposed for the authentication of
the users. The different policy types available are IPSec manual, preshared
key, extended authentication, certificate and RA VPN key.
This section describes the steps involved in configuring VPN policy type.
17.3.3.1 CLI Configuration
To configure RAVPN policy type
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enter the Crypto Map Configuration mode for an existing policy.
UltOs(config)# crypto map crypto_map_name
- Set the key mode as ravpn preshared key.
UltOs(config-crypto-map)# crypto key mode ravpn-
preshared-key
- Exit from the Crypto Map Configuration mode.
UltOs(config-crypto-map)# end
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 373
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
To view the RAVPN policy parameters
- View the parameters of the VPN policy.
UltOs# show crypto map
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Inactive
Policy Type : ravpn preshared key
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : None <== ==> None
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 0 / 0
Security Protocol : ESP
Encryption Algo : Not Configured
Anti Replay : Disable
Crypto Session Status : Inactive
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 0
No.of VPN policies configured = 1
17.3.3.2 WEB Configuration
RA-VPN policy Type can be configured using the Client termination screen
(Navigation - Security Management > VPN > Users > Client termination)
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 374
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 17-3: RAVPN Policy Type Configuration
17.3.4 Configuring IPSec mode
The mode of the IPSec is configured based on the set up for securing the
traffic. The mode can be either Tunnel or Transport.
The Tunnel mode is used to protect traffic between a SG and a host or
between two security gateways. The Transport mode is used to protect traffic
between a pair of hosts or security gateways.
Only the payload of the IP packet is encrypted and/or authenticated, when in
transport mode. The entire IP packet is encrypted and/or authenticated, when
in tunnel mode.
This section describes the steps involved in configuring the IPSec mode.
17.3.4.1 CLI Configuration
To configure the VPN policy mode
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enter the Crypto Map Configuration mode for an existing policy.
UltOs(config)# crypto map crypto_map_name
- Set the IPSec mode.
UltOs(config-crypto-map)# crypto ipsec mode tunnel
- Exit from the Crypto Map Configuration mode.
UltOs(config-crypto-map)# end
To view the VPN policy parameters
- View the parameters of the VPN policy.
UltOs# sh crypto map
VPN Policy Parameters
-------------------------
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 375
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Policy Name : crypto_map_name
Policy Status : Inactive
Policy Type : IPSec Manual
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : None <== ==> None
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 0 / 0
Security Protocol : ESP
Encryption Algo : Not Configured
Anti Replay : Disable
Crypto Session Status : Inactive
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 0
No.of VPN policies configured = 1
17.3.5 Configuring Peer Identity
Peer identity refers to the destination address set in the packet during
authentication and encryption of outbound datagram. This peer identity is
used for IPSec SA negotiations. This section describes the steps involved in
configuring the peer identity.
17.3.5.1 CLI Configuration
To configure the peer identity
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enter the Crypto Map Configuration mode for an existing policy.
UltOs(config)# crypto map crypto_map_name
- Set the peer identity.
UltOs(config-crypto-map)# set peer 35.0.0.2
- Exit from the Crypto Map Configuration mode.
UltOs(config-crypto-map)# end
To view the VPN policy parameters
- View the parameters of the VPN policy.
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 376
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs# show crypto map VPN
Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Inactive
Policy Type : IPSec Manual
Ike Version : v1
Local & Remote Protected N/W's :
198.168.1.0/24 <- - - - > 110.0.0.0/24
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.2
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 0 / 0
Security Protocol : ESP
Encryption Algo : Not Configured
Anti Replay : Disable
Crypto Session Status : Inactive
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 0
No.of VPN policies configured = 1
17.3.5.2 WEB Configuration
RA-VPN peer identity can be created using the Client termination screen
(Navigation - Security Management > VPN > Users > Client termination)
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 377
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 17-4: Peer Identity Configuration
17.3.6 Configuring IPSec Session Keys
The IPSec session keys are configured for a VPN policy to set the security
protocol, the authentication and encryption algorithms to be applied, and the
inbound and outbound security parameter index that is used to uniquely
identify a SA. This section describes the steps involved in configuring the
IPSec session keys.
17.3.6.1 CLI Configuration
To configure the IPSec session keys
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enter the Crypto Map Configuration mode for an existing policy.
UltOs(config)# crypto map crypto_map_name
- Configure the IPSec session key.
UltOs(config-crypto-map)# set session-key authenticator esp
hmac-sha1 abcdef7812345678123456781234567812345678 esp
des cipher abcdef7812345678 outbound 257 inbound 256
- Exit from the Crypto Map Configuration mode.
UltOs(config-crypto-map)# end
To view the VPN policy parameters
- View the parameters of the VPN policy.
UltOs# sh crypto map
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 378
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Inactive
Policy Type : IPSec Manual
Ike Version : v1
Local & Remote Protected N/W's : None <-- --> None
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.1
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 256 / 257
Security Protocol : ESP
Authentication Algorithm : HMAC-SHA1
Encryption Algo : DES
Anti Replay : Disable
Crypto Session Status : Inactive
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 0
No.of VPN policies configured = 1
17.3.6.2 WEB Configuration
RA-VPN IPSec session keys can be created using the Client termination
screen (Navigation - Security Management > VPN > Users > Client
termination)
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 379
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 17-5: IPSec Session Keys Configuration
17.3.7 Configuring Access List
The access list is configured to specify the traffic type, action to be taken, and
source and destination IP address to which the policy is applied. This section
describes the steps involved in configuring the access list.
17.3.7.1 CLI Configuration
To configure the access list
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enter the Crypto Map Configuration mode for an existing policy.
UltOs(config)# crypto map crypto_map_name
- Configure the access list.
UltOs(config-crypto-map)# access-list 1 apply any source
192.168.1.0 255.255.255.0 destination 192.168.2.0 255.255.255.0
- Exit from the Crypto Map Configuration mode
UltOs(config-crypto-map)# end
To view the VPN policy parameters
- View the parameters of the VPN policy.
UltOs# sh crypto map
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Inactive
Policy Type : IPSec Manual
Ike Version : v1
Local & Remote Protected N/W's : 192.168.1.0/24 <--
--> 192.168.2.0/24
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.1
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 256 / 257
Security Protocol : ESP
Authentication Algorithm : HMAC-SHA1
Encryption Algo : DES
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 380
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Anti Replay : Disable
Crypto Session Status : Inactive
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 0
No.of VPN policies configured = 1
17.3.7.2 WEB Configuration
RA-VPN policy can be created using the Client termination screen
(Navigation - Security Management > VPN > Users > Client termination)
Screen 17-6: Access List Configuration
17.3.8 Binding of Policy
The configured VPN policy is bound to particular WAN (Wide Area Network)
interface for configuring the interface details and local tunnel termination
address in the policy and for activating the VPN policy. This section describes
the steps involved in binding the policy to the WAN interface
17.3.8.1 CLI Configuration
To bind a policy to a particular WAN Interface
- Enter the Global Configuration mode.
UltOs# configure terminal
- Enter the Interface Configuration mode.
UltOs(config)# interface wan 0/1
- Apply the existing policy to the interface.
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 381
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs(config-if)# crypto map crypto_map_name
- Exit from the Interface Configuration mode.
UltOs(config-if)# end
To view the VPN policy parameters
- View the parameters of the VPN policy.
UltOs# show crypto map
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Active
Policy Type : IPSec Manual
Ike Version : v1
Local & Remote Protected N/W's : 192.168.1.0/24 <--
--> 192.168.2.0/24
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 35.0.0.2 <== ==>
35.0.0.1
Interface Name : wan0/1
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 256 / 257
Security Protocol : ESP
Authentication Algorithm : HMAC-SHA1
Encryption Algo : DES
Anti Replay : Disable
Crypto Session Status : Active
Crypto Session Encr Pkts : 0
Crypto Session Decr Pkts : 0
No.of ACTIVE VPN policies = 1
No.of VPN policies configured = 1
17.3.8.2 WEB Configuration
VPN policy can be bound over WAN interface using the Client termination
screen (Navigation - Security Management > VPN > Users > Client
termination)
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 382
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 17-7: Binding of Policy
17.3.9 Removing Policy from Interface
The policy assigned to the WAN interface is removed for inactivating the
policy. The policy should be inactivated before deleting. Policies assigned to
the WAN interface and activated cannot be deleted.
17.3.9.1 CLI Configuration
- To make the policy inactiveEnter the Global Configuration mode.
UltOs# configure terminal
- Enter the Interface Configuration mode.
UltOs(config)#interface wan 0/1
- Make the policy inactive.
UltOs(config-if)# no crypto map crypto_map_name
- Exit from the Interface Configuration mode.
UltOs(config-if)# end
To view the VPN policy parameters
- View the parameters of the VPN policy.
UltOs# show crypto map crypto_map_name
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : InActive
Policy Type : IKE Pre-shared
Ike Version : v1
Local & Remote Protected N/W's : 192.168.1.0/24 <--
--> 192.168.2.0/24
Local & Remote Port Range : 0-65535 <-- --> 0-
65535
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 383
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 35.0.0.1 <== ==>
35.0.0.2
17.3.9.2 WEB Configuration
VPN policy can be removed using the Client termination screen (Navigation
- Security Management > VPN > Users > Client termination)
Screen 17-8: Removal of Policy from Interface
17.3.10 Deleting Policy
This section describes the steps involved in deleting the policy. The policy
should be made as inactive before deleting.
17.3.10.1 CLI Configuration
To delete the configured policy
- Enter the Global Configuration mode.
UltOs# configure terminal
- Delete the configured policy.
UltOs(config)# no crypto map crypto_map_name
- Exit from the Global Configuration mode.
UltOs(config)# end
To check the deletion of the policy
- View the parameters of the VPN policy.
UltOs# show crypto map crypto_map_name
17.3.10.2 WEB Configuration
VPN policy can be created using the Client termination screen (Navigation -
Security Management > VPN > Users > Client termination)
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 384
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 17-9: Deleting Policy
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 385
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
17.3.11 Sample Configuration
This section describes the sample configuration steps to be performed for
configuring the RAVPN module in a switch.
Node Name
E0 V4 ADDR
WAN V4 ADDR
Host 1(H1)
192.168.1.2
NA
Host 2(H2)
35.0.0.2
NA
FDN40-1(R1)
192.168.1.1
35.0.0.1
R1
H1
E0
E0
WAN
RAVPN
SERVER
INTERNET
HOST
RAVPN
CLIENT
E0
H2
Figure 17-2: RAVPN Topology Sample Configuration
E0
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 386
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
17.3.11.1 RAVPN Server Configuration
IPSec RAVPN is installed in the R1 and the below mentioned commands are
executed to configure the IPSec policy in IKEv1 mode.
1. Create VLAN interface 100 and assigning an IP
UltOs# configure terminal
UltOs#interface lan 0/1
UltOs#no shutdown
UltOs#exit
UltOs#vlan 100
UltOs#ports add lan 0/1
UltOs#exit
UltOs#interface vlan 100
UltOs#ip address 192.168.1.0 255.255.255.0
UltOs#no shutdown
UltOs#exit
2. Assigning an IP to WAN 0/1 interface
UltOs#interface wan 0/1
UltOs#ip address 35.0.0.1 255.255.255.0
UltOs#no shutdown
UltOs#exit
3. Enable VPN and its parameter
UltOs#set vpn enable
UltOs#vpn remote-access server
UltOs#vpn remote identity keyId CLIENT psk KEY12345
UltOs#ra-vpn username myravpnuser password myravpnpass
UltOs#ip ra-vpn pool myravpnpoolname 192.168.2.1 192.168.2.2
4. Create crypto map
UltOs#crypto map sa
UltOs#set ike version v1
UltOs#crypto ipsec mode tunnel
UltOs#crypto key mode ravpn-preshared-key
UltOs#set peer 0.0.0.0
UltOs#isakmp local identity keyId SERVER
UltOs#isakmp peer identity keyId CLIENT
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505 387
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
UltOs#isakmp policy encryption DES hash sha1 dh Group2 exch
aggressive lifetime Secs 3000
UltOs#crypto map ipsec encryption esp DES authentication esp sha1
lifetime Secs 3000
UltOs#access-list Apply any source 192.168.1.0 255.255.255.0
destination 192.168.2.0 255.255.255.0
UltOs#exit
5. Add default route
UltOs#ip route 0.0.0.0 0.0.0.0 35.0.0.2
6. Bind crypto map to wan 0/1
UltOs#interface wan 0/1
UltOs#crypto map sa
UltOs#exit
UltOs#exit
Note: For IKEv2, set the version as v2.
UltOs# set ike version v2
CHAPTER 17: FCC COMPLIANCE STATEMENT
`FDN40ConfigUM/20160505 388
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
FCC Compliance Statement
(1) This device may not cause harmful interference, and
(2) This device must accept any interference received, including interference
that may cause undesired operation
FCC Caution!
• Any changes or modifications not expressly approved by the party
responsible for compliance could void the user's authority to operate this
equipment.
• This equipment should be installed and operated with minimum distance 20
cm between the radiator & your body.
Part 15B compliance statements for digital devices:
NOTE: This equipment has been tested and found to comply with the limits for
a Class B digital device, pursuant to part 15 of the FCC Rules. These limits
are designed to provide reasonable protection against harmful interference in
a residential installation.
This equipment generates, uses and can radiate radio frequency energy and
if not installed and used in accordance with the instructions, may cause
harmful interference to radio communications. However, there is no guarantee
that interference will not occur in a particular installation. If this equipment
does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try
to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which
the receiver is connected
Consult the dealer or an experienced radio/TV technician for help.

Navigation menu