3Com 11.1 manual 3Com Corporation, Bayfront Plaza, Santa Clara, California, 95052-8145

Page 2

3Com Corporation

Copyright © 3Com Corporation, 1998. All rights reserved. No part of this documentation may be

5400 Bayfront Plaza

reproduced in any form or by any means or used to make any derivative work (such as translation,

Santa Clara, California

transformation, or adaptation) without permission from 3Com Corporation.

95052-8145

3Com Corporation reserves the right to revise this documentation and to make changes in content from

 

 

time to time without obligation on the part of 3Com Corporation to provide notification of such revision or

 

change.

 

3Com Corporation provides this documentation without warranty of any kind, either implied or expressed,

 

including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose.

 

3Com may make improvements or changes in the product(s) and/or the program(s) described in this

 

documentation at any time.

 

UNITED STATES GOVERNMENT LEGENDS:

 

If you are a United States government agency, then this documentation and the software described herein

 

are provided to you subject to the following restricted rights:

 

For units of the Department of Defense:

 

Restricted Rights Legend: Use, duplication, or disclosure by the Government is subject to restrictions as set

 

forth in subparagraph (c) (1) (ii) for Restricted Rights in Technical Data and Computer Software Clause at 48

 

C.F.R. 52.227-7013. 3Com Corporation, 5400 Bayfront Plaza, Santa Clara, California 95052-8145.

 

For civilian agencies:

 

Restricted Rights Legend: Use, reproduction, or disclosure is subject to restrictions set forth in subparagraph

 

(a) through (d) of the Commercial Computer Software – Restricted Rights Clause at 48 C.F.R. 52.227-19 and

 

the limitations set forth in 3Com Corporation’s standard commercial agreement for the software.

 

Unpublished rights reserved under the copyright laws of the United States.

 

If there is any software on removable media described in this documentation, it is furnished under a license

 

agreement included with the product as a separate document, in the hard copy documentation, or on the

 

removable media in a directory file named LICENSE.TXT. If you are unable to locate a copy, please contact

 

3Com and a copy will be provided to you.

 

The software you have received may contain strong data encryption code that cannot be

 

exported outside of the U.S. or Canada. You agree that you will not export/reexport, either

 

physically or electronically, the encryption software or accompanying documentation (or copies

 

thereof) or any products utilizing the encryption software or such documentation without

 

obtaining written authorization from the U.S. Department of Commerce.

 

Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may

 

not be registered in other countries.

 

3Com, AccessBuilder, Boundary Routing, NETBuilder, NETBuilder II, OfficeConnect, SuperStack, and

 

Transcend are registered trademarks and Edge Server and Total Control are trademarks of 3Com

 

Corporation.

 

IBM, AS/400, SNA, and LAN Net Manager are registered trademarks of International Business Machines

 

Corporation. Advanced Peer-to-Peer Networking and APPN are trademarks of International Business

 

Machines Corporation. DECnet is a registered trademark of Digital Equipment Corporation. AppleTalk is a

 

registered trademark of Apple Computer, Inc. NetWare is a registered trademark of Novell, Inc. RealPlayer is

 

a trademark of Real Networks. UNIX is a registered trademark in the United States and other countries,

 

licensed exclusively through X/Open Company, Ltd. VINES is a registered trademark of Banyan Systems.

 

SunOS is a trademark of Sun Microsystems, Inc. XNS is a trademark of Xerox Corporation.

 

Other brand and product names may be registered trademarks or trademarks of their respective holders.

Image 2
Contents NETBuilder Family Software Version 11.1 Release Notes Santa Clara, California 3Com CorporationBayfront Plaza 95052-8145Contents CPU Utilization Statistic Deleting ATM Neighbors Web Link Documentation Path Zmodem Time Out Known ProblemsBcmfdinteg File Conversion Considerations Displaying Configuration Profiles Dynamic Paths Web Link Login SupportNAT Proxy ARP RouteDiscovery Sdhlc Half-Duplex Mode Limitations Accm Not ConfigurableConfiguring IPsec Authentication Header AHCONFiguration How IPsec Works PoliciesStatPollInterval Packages Netbuilder Software Version Release NotesEncryption Contact 3Com or your network supplierLists 3Comapproved vendors of the PC flash memory card New ProductsSupported PC Flash Memory Cards Approved 20 MB Flash Memory CardsApproved Dram New FeaturesVPN Features Layer Two Tunneling Protocol SIMMsDhcp Proxy Extensible Authentication ProtocolAdditional RAS Enhancements Encryption StrengthEncryption Key Virtual Circuit PrioritizationSummary of Encryption Strengths Algorithm Package ID LengthBGP-4 Enhancements IP Version 6 PhaseFirewall Enhancements Data Over Voice B-Channel Isdn Specification Ospf Not-So-Stubby-Area NssaFrame Relay PVC Q.933 Support Boundary Router Remote LAN Detection56/64K CSU/DSU External Loopback Features Ascii BootToken Ring in Fast Ethernet Tife NETBuilder Web Link ImprovementsFlash Load Upgrade Management Utilities and NETBuilder Upgrade LinkApplication Notes Placing a Data OverExample Toggle the respective paths. TypeNew Features Application Notes Version 11.1 for the NETBuilder bridge/router platforms NETBuilder II Software FeaturesSoftware NETBuilder II Firmware Requirements Other FeaturesNETBuilder II Firmware Requirements IBM ProtocolsSuperStack II NETBuilder SI Software Features 438 458Memory Requirements SuperStack II NETBuilder Ethernet and Token Ring FeaturesModels Features Token Ring Model and Software Package 112 132 111 145 OfficeConnect NETBuilder Software FeaturesModels Features Token Ring WAN Protocols 131112 131 120 132 Additional OfficeConnect NETBuilder Models Software Features 136 117 137116 Memory Requirements Utilities for the HP-UX 10.x platforms Utilities for the Solaris 2.5 platformsRuuhp111.1 Ruuaix111.1NETBuilder Upgrade Management Utilities Known Issues Etc/passwd. You must add an entry can be ignoredDLSw PROfile ServiceBridge Static Routes SVCsDialog boxes will be fully visible without scrolling Token Ring a non-source routed frameSupported Synchronous Modem Ports in DCE ModeSupported Asynchronous Modems ModemsHistory, the PPP link does not come up IBM-Related Feature Settings for Token Ring Ports 3Com Bridge/Routers and Supported Features Token Ring Frame Copy ErrorsFrame Copy Errors under LAN Net Manager Known Problems Value Interrupt the boot cycle and enter monitor modeThis system SHow !profileID -PROFILE CONFiguration Notation Known Problems ADD !v1 -PPP ARU user, password Limitations Front-End Processor/Frame Relay Relay port is Access for LLC2 TrafficNumber of TCP Connections IBM Boundary RoutingPort running PPP SpeedMultilink PPP Snmp ManagementStations for Appn Service Point Source-RouteSdlc Adjacent Link Source RouteUsing Netbuilder Family Software Update PagesConfiguring IPsec Configuring IpsecProcedures in this section describe how to configure IPsec Replace with this chapterCreating a Security Policy Creating an Encryption PolicyOn bridge/router, 2 enter On bridge/router 2, enterFor example, to create a new encryption key set, enter Manual key information, useTo disable Ipsec on port 1, enter Confidentiality and data integrityCreate a route between the two tunnel endpoints by entering Enable Layer 2 Tunnelling by enteringAssign an IP address to the tunnel virtual port by entering Configure an Ipsec policy/security association by enteringCreate a route between two tunnel endpoints by entering Enable Layer 2 Tunnelling Pptp by enteringHow IPsec Works Intercepted and viewedHow IPsec Works Configuring Ipsec Reference for Netbuilder Family Ipsec Service Parameters and Commands Ipsec Service ParametersCONFiguration CONTrolKeySet ManualKeyInfo ManualPOLicyBe all or ALL Is assigned dynamically using Ipcp or DhcpPolicyname Name you assign to the policy you are adding Srcipaddr/maskSpecifies Cipher Block Chaining mode of the Data Encrypt phases, and the second 8 bytes for the decryptPhase of the encrypt-decrypt-encrypt 239.255.255.254Ipsec Service Parameters Rsvp Service Parameters RESerVation MaxFlowRateREQuest UDPEndcapPlace this page in front of Chapter SR Service ParametersAllRoutes ROUte ROUte SR Service Parameters SYS Service Parameters SYS Service Parameters Weblink Service Parameters StatPollIntervalWeblink Service Parameters