3Com 11.1 manual New Features Application Notes

Page 18

New Features Application Notes 19

WARNING: For network security, do not include security sensitive information such as passwords. The ASCII text file is not encyrpted, which means the passwords are readable by anyone who has access to the file.

When the router is booted and the BOOT.CFG file is detected in the configuration directory, all existing configuration files (except CCSMACRO and IOXM) in the configuration directory are deleted. The configuration commands in the BOOT.CFG file are then executed. If a configuration command fails to execute successfully, it does not stop, but continues with the next configuration command. Just as when you enter a configuration command on the command line, new encoded configuration files are created. As long as the file BOOT.CFG is detected in the configuration directory, this operation is repeated every time the router is rebooted.

To suspend this operation and use the encoded configuration files when the router is rebooted, the BOOT.CFG file can be renamed (ReName command is now supported by LoadConfigs) as the last command in the BOOT.CFG file.

To minimize the impact of executing configuration commands at boot time, the configuration commands are not displayed. However, as with normal LoadConfigs operations, a log file is created, which contains the configuration commands that were executed along with any comments from the BOOT.CFG file and system messages that may have been generated.

If the router has intelligent I/O modules (6 port Ethernet, ATM module, Multiport BRI modules), they are loaded before any of the commands are executed. The "System Initialized and Running" message is not displayed (that is, no user interaction is possible) until after all of the commands in the BOOT.CFG file have executed. If the ASCII boot feature has been invoked, a message appears as part of the SysconF command Boot Statistics information to indicate this.

Configuration changes executed after the router is booted are not automatically captured in the BOOT.CFG file and would be lost if the router was rebooted. Also, the execution of the ASCII boot feature does not affect any macros that have been defined or the SysconF configuration.

After booting with the boot.cfg file, any changes made to the device via telnet, console, SNMP, or web interface are not saved to the boot.cfg file. It is recommended that you make all changes in the boot.cfg file directly.

Image 18
Contents NETBuilder Family Software Version 11.1 Release Notes Santa Clara, California 3Com CorporationBayfront Plaza 95052-8145Contents Web Link Documentation Path Zmodem Time Out Known Problems Bcmfdinteg File Conversion ConsiderationsCPU Utilization Statistic Deleting ATM Neighbors Displaying Configuration Profiles Dynamic Paths Web Link Login SupportNAT Proxy ARP RouteDiscovery Sdhlc Half-Duplex Mode Limitations Accm Not ConfigurableConfiguring IPsec Authentication Header AHCONFiguration How IPsec Works PoliciesStatPollInterval Packages Netbuilder Software Version Release NotesEncryption Contact 3Com or your network supplierLists 3Comapproved vendors of the PC flash memory card New ProductsSupported PC Flash Memory Cards Approved 20 MB Flash Memory CardsApproved Dram New FeaturesVPN Features Layer Two Tunneling Protocol SIMMsDhcp Proxy Extensible Authentication ProtocolAdditional RAS Enhancements Encryption StrengthEncryption Key Virtual Circuit PrioritizationSummary of Encryption Strengths Algorithm Package ID LengthIP Version 6 Phase Firewall EnhancementsBGP-4 Enhancements Data Over Voice B-Channel Isdn Specification Ospf Not-So-Stubby-Area NssaFrame Relay PVC Q.933 Support Boundary Router Remote LAN Detection56/64K CSU/DSU External Loopback Features Ascii BootToken Ring in Fast Ethernet Tife NETBuilder Web Link ImprovementsFlash Load Upgrade Management Utilities and NETBuilder Upgrade LinkApplication Notes Placing a Data OverExample Toggle the respective paths. TypeNew Features Application Notes NETBuilder II Software Features SoftwareVersion 11.1 for the NETBuilder bridge/router platforms NETBuilder II Firmware Requirements Other FeaturesNETBuilder II Firmware Requirements IBM ProtocolsSuperStack II NETBuilder SI Software Features 438 458SuperStack II NETBuilder Ethernet and Token Ring Features Models Features Token RingMemory Requirements Model and Software Package 112 132 111 145 OfficeConnect NETBuilder Software FeaturesModels Features Token Ring WAN Protocols 131112 131 120 132 Additional OfficeConnect NETBuilder Models Software Features 117 137 116136 Memory Requirements Utilities for the HP-UX 10.x platforms Utilities for the Solaris 2.5 platformsRuuhp111.1 Ruuaix111.1NETBuilder Upgrade Management Utilities Known Issues Etc/passwd. You must add an entry can be ignoredDLSw PROfile ServiceBridge Static Routes SVCsDialog boxes will be fully visible without scrolling Token Ring a non-source routed frameSupported Synchronous Modem Ports in DCE ModeSupported Asynchronous Modems ModemsHistory, the PPP link does not come up IBM-Related Feature Settings for Token Ring Ports Token Ring Frame Copy Errors Frame Copy Errors under LAN Net Manager3Com Bridge/Routers and Supported Features Known Problems Interrupt the boot cycle and enter monitor mode This systemValue SHow !profileID -PROFILE CONFiguration Notation Known Problems ADD !v1 -PPP ARU user, password Limitations Front-End Processor/Frame Relay Relay port is Access for LLC2 TrafficNumber of TCP Connections IBM Boundary RoutingPort running PPP SpeedMultilink PPP Snmp ManagementStations for Appn Service Point Source-RouteSdlc Adjacent Link Source RouteUsing Netbuilder Family Software Update PagesConfiguring IPsec Configuring IpsecProcedures in this section describe how to configure IPsec Replace with this chapterCreating a Security Policy Creating an Encryption PolicyOn bridge/router, 2 enter On bridge/router 2, enterFor example, to create a new encryption key set, enter Manual key information, useTo disable Ipsec on port 1, enter Confidentiality and data integrityCreate a route between the two tunnel endpoints by entering Enable Layer 2 Tunnelling by enteringAssign an IP address to the tunnel virtual port by entering Configure an Ipsec policy/security association by enteringCreate a route between two tunnel endpoints by entering Enable Layer 2 Tunnelling Pptp by enteringHow IPsec Works Intercepted and viewedHow IPsec Works Configuring Ipsec Reference for Netbuilder Family Ipsec Service Parameters and Commands Ipsec Service ParametersCONFiguration CONTrolKeySet ManualKeyInfo ManualPOLicyBe all or ALL Is assigned dynamically using Ipcp or DhcpPolicyname Name you assign to the policy you are adding Srcipaddr/maskSpecifies Cipher Block Chaining mode of the Data Encrypt phases, and the second 8 bytes for the decryptPhase of the encrypt-decrypt-encrypt 239.255.255.254Ipsec Service Parameters Rsvp Service Parameters RESerVation MaxFlowRateREQuest UDPEndcapSR Service Parameters AllRoutesPlace this page in front of Chapter ROUte ROUte SR Service Parameters SYS Service Parameters SYS Service Parameters Weblink Service Parameters StatPollIntervalWeblink Service Parameters