3Com 11.1 manual Approved Dram, SIMMs, New Features, DPE 40 module

Page 10

Approved DRAM SIMMs 11

Approved DRAM

Table 2 lists 3Com–approved vendors of the 32 MB DRAM SIMM for upgrading

SIMMs

the DPE 40 module.

 

 

 

Table 2 3Com–approved DRAM SIMMs

 

 

 

 

 

 

Size

Vendor and Description

Part Number

 

 

 

 

 

32 MB

NEC

MC428000A32B-60

 

 

 

 

 

72-pin 8Mx32 60 ns page mode

Toshiba

THM328020S-60

 

 

 

 

 

 

Toshiba

THM328020B5-60

 

 

 

 

 

 

New Features

This section describes new features in software version 11.1 for the

 

NETBuilder II, SuperStack II, and OfficeConnect NETBuilder bridge/routers.

VPN Features

Layer Two Tunneling Protocol

 

 

 

Layer Two Tunnelling Protocol (L2TP) is a standards-based protocol created from

 

combining two similar but incompatible proprietary tunneling protocols,

 

Point-to-Point Tunneling Protocol (PPTP) and L2F (Cisco’s tunneling protocol). L2TP

is primarily used in Virtual Private Networking (VPN) environments and allows the creation of a tunnel between a remote site and a central site in order to transport Layer 3 multiprotocol traffic (such as IP, IPX, and AppleTalk) over a public IP network.

L2TP is a connection-oriented protocol that provides flow control, packet sequencing, and retransmission capabilities. The transport network of L2TP can be any packet-oriented network, but for this release, UDP/IP is the supported transport network type. Similar to a PPTP connection, L2TP puts the data inside a PPP frame and then encapsulates the frame with a UDP/IP header.

A notable difference between L2TP and PPTP is that PPTP precedes Layer 3 frames with a GRE header and forwards them to IP via TCP, but L2TP precedes Layer 3 frames with its own protocol header (which looks similar to a GRE header) and forwards them to IP via UDP.

From a security standpoint, L2TP by itself, like PPTP by itself, does not provide data encryption, authentication, or integrity functions (other than those that exist with IP and PPP) that are critical to maintaining VPN privacy. Also, L2TP does not provide a mechanism for key management. These areas are for further development.

IPX RAS

With this release, the NETBuilder RAS service has been extended to include IPX RAS support. The IPX RAS functionality implemented is Proxy routing (unlike IP RAS which can be either LAN Extension or Proxy Routing). The NETBuilder bridge/router routes IPX traffic between the external IPX network and the internal “Proxy” IPX network. All the IPX clients share a single Proxy IPX network and sit logically on the Proxy IPX network. Forwarding IPX traffic to clients is based on the Node ID (MAC address) of each client.

Image 10
Contents NETBuilder Family Software Version 11.1 Release Notes Santa Clara, California 3Com CorporationBayfront Plaza 95052-8145Contents Bcmfdinteg File Conversion Considerations Web Link Documentation Path Zmodem Time Out Known ProblemsCPU Utilization Statistic Deleting ATM Neighbors Displaying Configuration Profiles Dynamic Paths Web Link Login SupportNAT Proxy ARP RouteDiscovery Sdhlc Half-Duplex Mode Limitations Accm Not ConfigurableConfiguring IPsec Authentication Header AHCONFiguration How IPsec Works PoliciesStatPollInterval Packages Netbuilder Software Version Release NotesEncryption Contact 3Com or your network supplierLists 3Comapproved vendors of the PC flash memory card New ProductsSupported PC Flash Memory Cards Approved 20 MB Flash Memory CardsApproved Dram New FeaturesVPN Features Layer Two Tunneling Protocol SIMMsDhcp Proxy Extensible Authentication ProtocolAdditional RAS Enhancements Encryption StrengthEncryption Key Virtual Circuit PrioritizationSummary of Encryption Strengths Algorithm Package ID LengthFirewall Enhancements IP Version 6 PhaseBGP-4 Enhancements Data Over Voice B-Channel Isdn Specification Ospf Not-So-Stubby-Area NssaFrame Relay PVC Q.933 Support Boundary Router Remote LAN Detection56/64K CSU/DSU External Loopback Features Ascii BootToken Ring in Fast Ethernet Tife NETBuilder Web Link ImprovementsFlash Load Upgrade Management Utilities and NETBuilder Upgrade LinkApplication Notes Placing a Data OverExample Toggle the respective paths. TypeNew Features Application Notes Software NETBuilder II Software FeaturesVersion 11.1 for the NETBuilder bridge/router platforms NETBuilder II Firmware Requirements Other FeaturesNETBuilder II Firmware Requirements IBM ProtocolsSuperStack II NETBuilder SI Software Features 438 458Models Features Token Ring SuperStack II NETBuilder Ethernet and Token Ring FeaturesMemory Requirements Model and Software Package 112 132 111 145 OfficeConnect NETBuilder Software FeaturesModels Features Token Ring WAN Protocols 131112 131 120 132 Additional OfficeConnect NETBuilder Models Software Features 116 117 137136 Memory Requirements Utilities for the HP-UX 10.x platforms Utilities for the Solaris 2.5 platformsRuuhp111.1 Ruuaix111.1NETBuilder Upgrade Management Utilities Known Issues Etc/passwd. You must add an entry can be ignoredDLSw PROfile ServiceBridge Static Routes SVCsDialog boxes will be fully visible without scrolling Token Ring a non-source routed frameSupported Synchronous Modem Ports in DCE ModeSupported Asynchronous Modems ModemsHistory, the PPP link does not come up IBM-Related Feature Settings for Token Ring Ports Frame Copy Errors under LAN Net Manager Token Ring Frame Copy Errors3Com Bridge/Routers and Supported Features Known Problems This system Interrupt the boot cycle and enter monitor modeValue SHow !profileID -PROFILE CONFiguration Notation Known Problems ADD !v1 -PPP ARU user, password Limitations Front-End Processor/Frame Relay Relay port is Access for LLC2 TrafficNumber of TCP Connections IBM Boundary RoutingPort running PPP SpeedMultilink PPP Snmp ManagementStations for Appn Service Point Source-RouteSdlc Adjacent Link Source RouteUsing Netbuilder Family Software Update PagesConfiguring IPsec Configuring IpsecProcedures in this section describe how to configure IPsec Replace with this chapterCreating a Security Policy Creating an Encryption PolicyOn bridge/router, 2 enter On bridge/router 2, enterFor example, to create a new encryption key set, enter Manual key information, useTo disable Ipsec on port 1, enter Confidentiality and data integrityCreate a route between the two tunnel endpoints by entering Enable Layer 2 Tunnelling by enteringAssign an IP address to the tunnel virtual port by entering Configure an Ipsec policy/security association by enteringCreate a route between two tunnel endpoints by entering Enable Layer 2 Tunnelling Pptp by enteringHow IPsec Works Intercepted and viewedHow IPsec Works Configuring Ipsec Reference for Netbuilder Family Ipsec Service Parameters and Commands Ipsec Service ParametersCONFiguration CONTrolKeySet ManualKeyInfo ManualPOLicyBe all or ALL Is assigned dynamically using Ipcp or DhcpPolicyname Name you assign to the policy you are adding Srcipaddr/maskSpecifies Cipher Block Chaining mode of the Data Encrypt phases, and the second 8 bytes for the decryptPhase of the encrypt-decrypt-encrypt 239.255.255.254Ipsec Service Parameters Rsvp Service Parameters RESerVation MaxFlowRateREQuest UDPEndcapAllRoutes SR Service ParametersPlace this page in front of Chapter ROUte ROUte SR Service Parameters SYS Service Parameters SYS Service Parameters Weblink Service Parameters StatPollIntervalWeblink Service Parameters