Main
COPYRIGHT NOTICES
Page
INDUSTRY CANADA COMPLIANCE STATEMENT
Page
SAFETY INFORMATION: WICT1-12 T1 CARD
CONSUMER INFORMATION AND FCC REQUIREMENTS
EQUIPMENT ATTACHMENT LIMITATIONS NOTICE
Page
Page
Page
Page
Page
DECLARATION OF CONFORMITY ADDENDUM
TABLE OF CONTENTS
4 Hot Swapping Line Cards and Control Modules. . . . . . . . . . . . . . . . . . . . . .4-1
6 SmartTRUNK Configuration Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
9 Packet-over-SONET Configuration Guide . . . . . . . . . . . . . . . . . . . . . . . . . .9-1
Page
Page
Page
Page
20 IP Policy-Based Forwarding Configuration. . . . . . . . . . . . . . . . . . . . . . . . . 20-1
21 Network Address Translation Configuration . . . . . . . . . . . . . . . . . . . . . . . .21-1
Page
Page
Page
Page
LIST OF FIGURES
Page
Page
Page
LIST OF TABLES
Page
1 INTRODUCTION
1.1 RELATED DOCUMENTATION
1.2 DOCUMENT CONVENTIONS
2 MAINTAINING CONFIGURATION FILES
2.1 CONFIGURATION FILES
2.1.1 Changing Configuration Information
2.1.2 Displaying Configuration Information
2.1.3 Activating the Configuration Commands in the Scratchpad
2.1.4 Saving the Active Configuration to the Startup Configuration File
2.1.5 Viewing the Current Configuration
- -
-
2.1.6 Backing Up and Restoring Configuration Files
2.2 BACKING UP AND RESTORING SYSTEM IMAGE FILES
2.3 CONFIGURING SYSTEM SETTINGS
2.3.1 Setting Daylight Saving Time
2.3.2 Configuring a Log-in Banner
3 CLI AND RS BASICS
3.1 STARTING THE CLI
3.2 UNDERSTANDING CLI COMMAND MODES
3.2.3 Configure Mode
3.2.4 BootPROM Mode
3.3 UNDERSTANDING CLI COMMANDS
3.4 USING LINE EDITING COMMANDS
Page
3.5 GETTING HELP WITH CLI COMMANDS
Invoking Help While Entering a Command
Invoking Help Option by Option
3.6 SETTING CLI PARAMETERS
Command Completion
Command History
3.7 NAMING RS PORTS
3.7.1 Port Type
3.7.2 Slot Number
3.7.3 Port Number
Page
3.7.4 Channel Number
3.8 CLI AND RS CONFIGURATION EXAMPLE
Page
Page
4 HOT SWAPPING LINE CARDS AND CONTROL MODULES
4.1 HOT SWAPPING OVERVIEW
4.2 HOT SWAPPING LINE CARDS
4.2.1 Deactivating the Line Card
4.2.2 Removing the Line Card
4.2.3 Installing a New Line Card
4.3 HOT SWAPPING ONE TYPE OF LINE CARD WITH ANOTHER
4.4 HOT SWAPPING A SECONDARY CONTROL MODULE
4.4.1 Deactivating the Control Module
G8M-CM2-128 CONTROL MODULE
4.4.2 Removing the Control Module
4.4.3 Installing a Control Module
- -
4.5 HOT SWAPPING A SWITCHING FABRIC MODULE (RS 8600 ONLY)
4.5.1 Removing the Switching Fabric Module
4.5.2 Installing a Switching Fabric Module
4.6 HOT SWAPPING A GBIC (RS 32000 AND RS 38000 ONLY)
4.6.1 Removing a GBIC from the Line Card
4.6.2 Installing a GBIC into the Line Card
4.7 HOT SWAPPING A WIC
5 BRIDGING CONFIGURATION GUIDE
5.1 SPANNING TREE (IEEE 802.1D)
5.2 BRIDGING MODES (FLOW-BASED AND ADDRESS-BASED)
5.3 VLAN OVERVIEW
Port-based VLANs
MAC-address-based VLANs
Protocol-based VLANs
5.3.1 RS VLAN Support
VLANs and the RS
Ports, VLANs, and L3 Interfaces
5.3.2 Configuration Examples
Creating an IP or IPX VLAN
Creating a non-IP/non-IPX VLAN
5.4 ACCESS PORTS AND TRUNK PORTS (802.1P AND 802.1Q SUPPORT)
Explicit and Implicit VLANs
5.5 CONFIGURING RS BRIDGING FUNCTIONS
5.5.1 Configuring Address-based or Flow-based Bridging
5.6 CONFIGURING SPANNING TREE
5.6.1 Using Rapid STP
5.6.2 Adjusting Spanning-Tree Parameters
Setting the Bridge Priority
Setting a Port Priority
Assigning Port Costs
Adjusting Bridge Protocol Data Unit (BPDU) Intervals
Adjusting the Interval between Hello Times
Defining the Forward Delay Interval
Defining the Maximum Age
5.6.3 STP Dampening
5.7 CONFIGURING A PORT- OR PROTOCOL-BASED VLAN
5.7.1 Creating a Port or Protocol Based VLAN
5.7.2 Adding Ports to a VLAN
5.7.3 Configuring VLAN Trunk Ports
5.8 CONFIGURING VLANS FOR BRIDGING
5.9 CONFIGURING LAYER-2 FILTERS
5.10 MONITORING BRIDGING
5.11 GARP/GVRP
5.11.1 Running GARP/GVRP with STP
Page
5.11.3 Configuration Example
Page
5.12 TUNNELING VLAN PACKETS ACROSS MANS
5.12.1 Stackable VLAN Components
5.12.2 Configuration Examples
Multiple Customer VLANs
Page
Multiple Customers with Common VLANs
Page
R3 R4
Page
Single VLAN with Multiple Tunnel Entry Ports
Page
R3 R4
Page
STP/GVRP in Customer VLANs Tunneled over Backbone VLAN
R2R1
C1R1 C1R2
Page
Multiple VLANs on a Single Tunnel Entry Port
Page
Page
5.12.3 Displaying Stackable VLAN Information
Page
6 SMARTTRUNK CONFIGURATION GUIDE
6.1 CONFIGURING SMARTTRUNKS
- -
6.1.1 Creating a SmartTRUNK
6.1.2 Adding Physical Ports to the SmartTRUNK
SmartTRUNK Port Limitations
6.1.3 Specifying Traffic Load Policy
6.2 SMARTTRUNK EXAMPLE CONFIGURATION
Page
6.3 CONFIGURING THE LINK AGGREGATION CONTROL PROTOCOL (LACP)
6.3.1 Configuring SmartTRUNKs for LACP
6.3.2 LACP Configuration Example
st.12
R3 R4
st.14 st.23
st.24
Page
Configuration for R2:
Configuration for R3:
Configuration for R4:
the corresponding ports on the RS at the other end of the SmartTRUNK.
6.4 SMARTTRUNK LOAD REDISTRIBUTION
6.4.1 SLR Water-marks
6.4.2 Polling intervals
Creating an SLR Enabled SmartTRUNK
6.4.3 Additional Controls Provided by SLR
Redistribution of IP Flows
Using Low Water-Mark Events
7 CMTS CONFIGURATION GUIDE
7.1 HFC CABLE NETWORK ARCHITECTURE
7.2 CMTS MODULE DESCRIPTION
7.3 PROVISIONING THE HEADEND
7.3.1 Headend Certification
7.3.2 IF-RF-Upconverter
7.3.3 Diplex Filters
7-4 Riverstone Networks RS Switch Router User Guide Release 8.0
Provisioning the Headend CMTS Configuration Guide
Figure 7-2 CMTS Connection Overview
Test setup for transmission
Node 1 Node 2 Node n
Test setup for transmission
7.3.4 DHCP Servers
7.4 CONNECTING AND CONFIGURING THE DOWNSTREAM
7.4.1 Installing and Configuring the Upconverter
7.4.2 Setting the Upconverter Input Level
7.4.3 Setting the Upconverter Output Level
7.4.4 Setting the Upconverter Output Frequency
7.4.5 Completing the Downstream Configuration
7.5 CONNECTING THE UPSTREAM TO THE LASER RECEIVER
7.6 CONFIGURING THE CMTS MODULE
7.6.1 Configuring the CMTS Module in a Bridged Network
7.6.2 Configuring the CMTS Module in a Routed Network
7.7 CMTS CONFIGURATION EXAMPLES
7.7.1 Example One: Multiple ISPs Share a Single DHCP Server
Page
Following, is the configuration for the DHCP server:
Page
7.7.2 Example Two: Multiple ISPs with multiple DHCP servers
Following, is the AMERILINK DHCP configuration:
Following, is the MOONLINK DHCP configuration:
7.7.3 Example Three: Overlapping VLANs with Multiple DHCP Servers and Client-VLAN Bindings
TFTP Configuration Files
7.8 ANTI-SPOOFING
7.8.1 Anti-DHCP Spoofing
7.8.2 Anti-IP-spoofing
Static and Dynamic Anti-IP Spoofing
Static Anti-IP Spoofing
Dynamic Configuration of Anti-IP Spoofing
8 ATM CONFIGURATION GUIDE
8.1 CONFIGURING ATM PORTS
8.1.1 Configuring SONET Parameters
Configuring Automatic Protection Switching (APS) on the ATM OC-12 Line Card
8.1.2 Setting Parameters for the Multi-Rate Line Card
Cell Scrambling
Cell Mapping
VPI Bit Allocation
8.1.3 Displaying Port Information
8.2 CONFIGURING VIRTUAL CHANNELS
8.2.1 Gathering Traffic Statistics (OC-12)
8.3 TRAFFIC SHAPING
Page
8.4 TRAFFIC MANAGEMENT
8.4.1 Configuring QoS (Multi-Rate Line Card)
Relative Latency
Controlling Buffers for Each VC
8.4.2 Configuring Virtual Channel Groups (OC-12)
Creating a Virtual Channel Group
Applying Service Profiles to VC Groups
8.4.3 Traffic Management Configuration Example
Configuring QoS Policies (Multi-Rate Line Card)
Page
Configuring Virtual Channels Groups (OC-12)
Page
8.5 BRIDGING ATM TRAFFIC
Page
8.5.1 Enabling Forced Bridging on a Virtual Channel
8.5.2 Configuring Cross-Connects
8.5.3 Limiting MAC Addresses Learned on a VC
8.6 ROUTING ATM TRAFFIC
Page
Page
8.6.1 Peer Address Mapping
ATM Cloud
8.7 CONFIGURING PPP (OC-12)
Page
Page
Page
9 PACKET-OVER-SONET CONFIGURATION GUIDE
9.1 CONFIGURING IP INTERFACES FOR POS LINKS
9.2 CONFIGURING PACKET-OVER-SONET LINKS
9.3 CONFIGURING AUTOMATIC PROTECTION SWITCHING
9.3.1 Configuring Working and Protecting Ports
9.4 SPECIFYING BIT ERROR RATE THRESHOLDS
9.5 MONITORING POS PORTS
9.6 EXAMPLE CONFIGURATIONS
9.6.1 APS PoS Links Between RSs
9.6.2 PoS Link Between the RS and a Cisco Router
9.6.3 PoS Link Between the RS and a Juniper Router
9.6.4 Bridging and Routing Traffic Over a PoS Link
9.6.5 PoS Link Through a Layer 2 Cloud
Page
10 DHCP CONFIGURATION GUIDE
10.1 CONFIGURING DHCP
10.1.1 Configuring an IP Address Pool
10.1.2 Configuring Client Parameters
10.1.3 Configuring a Static IP Address
10.1.4 Grouping Scopes with a Common Interface
10.1.5 Configuring DHCP Server Parameters
10.2 UPDATING THE LEASE DATABASE
10.3 MONITORING THE DHCP SERVER
10.4 DHCP CONFIGURATION EXAMPLES
10.5 CONFIGURING SECONDARY SUBNETS
10.6 SECONDARY SUBNETS AND DIRECTLY-CONNECTED CLIENTS
10.7 INTERACTING WITH RELAY AGENTS
Page
11 IP ROUTING CONFIGURATION GUIDE
11.1 IP ROUTING PROTOCOLS
11.2 CONFIGURING IP INTERFACES AND
11.2.1 Configuring IP Interfaces to Ports
11.2.2 Configuring IP Interfaces for a VLAN
11.2.3 Specifying Ethernet Encapsulation Method
11.2.4 Unnumbered Interfaces
11.3 CONFIGURING JUMBO FRAMES
11.4 CONFIGURING ADDRESS RESOLUTION PROTOCOL (ARP)
11.4.1 Configuring ARP Cache En tries
11.4.2 Unresolved MAC Addresses for ARP Entries
11.4.3 Configuring Proxy ARP
11.5 CONFIGURING REVERSE ADDRESS RESOLUTION PROTOCOL (RARP)
11.5.1 Specifying IP Interfaces for RARP
11.5.2 Defining MAC-to-IP Address Mappings
11.5.3 Monitoring RARP
11.6 CONFIGURING DNS PARAMETERS
11.7 CONFIGURING IP SERVICES (ICMP)
11.8 CONFIGURING IP HELPER
11.9 CONFIGURING DIRECT BROADCAST
11.10 CONFIGURING DENIAL OF SERVICE (DOS)
11.11 MONITORING IP PARAMETERS
To display additional IP information, enter the following command in Enable mode:
Show ARP table entries. Show IP interface configuration. Show DNS parameters.
11.12 CONFIGURING IP FORWARDING
11.13 HARDWARE ROUTING TABLE
11.14 CONFIGURING ICMP REDIRECT
11.15 FORWARDING MODE
Defining a Profile
Applying a Profile
Enabling a Port
11.15.3 Monitoring Custom Forwarding Profiles
11.16 CONFIGURING ROUTER DISCOVERY
Page
11.17 SETTING MEMORY THRESHOLDS
Page
11.18 CONFIGURATION EXAMPLES
11.18.1 Assigning IP/IPX Interfaces
12 VRRP CONFIGURATION GUIDE
12.1 CONFIGURING VRRP
12.1.1 Basic VRRP Configuration
Configuration for Router R2
12.1.2 Symmetrical Configuration
Page
Configuration of Router R2
12.1.3 Multi-Backup Configuration
Configuration of Router R2
Configuration of Router R3
12.2 ADDITIONAL CONFIGURATION
12.2.1 Setting the Backup Priority
12.2.2 Setting the Warmup Period
12.2.3 Setting the Advertisement Interval
12.2.4 Setting Pre-empt Mode
12.3 MONITORING VRRP
12.3.1 ip-redundancy trace
12.3.2 ip-redundancy show
To display information about all virtual routers on interface int1:
12.4 VRRP CONFIGURATION NOTES
Page
13 RIP CONFIGURATION GUIDE
13.1 CONFIGURING RIP
13.1.1 Enabling and Disabling RIP
13.1.2 Configuring RIP Interfaces
13.2 CONFIGURING RIP PARAMETERS
Configuring RIP Route Preference
13.2.1 Configuring RIP Route Default-Metric
13.3 MONITORING RIP
13.4 CONFIGURATION EXAMPLE
Show detailed information of request packets sent by the router. Show RIP timer information.
Page
14 OSPF CONFIGURATION GUIDE
14.1 OSPF MULTIPATH
14.2 CONFIGURING OSPF
14.3 SETTING THE ROUTER ID
14.4 ENABLING OSPF
14.5 CONFIGURING OSPF AREAS
14.5.1 Configuring Summary Ranges
14.5.2 Configuring Stub Areas
14.5.3 Configuring Not-So-Stubby Areas (NSSA)
14.6 CONFIGURING OSPF INTERFACES
14.6.1 Configuring Interfaces for NBMA Networks
14.6.2 Configuring Interfaces for Point-to-Multipoint Networks
14.6.3 Configuring Interfaces for Point-to-Point Networks
14.7 CONFIGURING OSPF INTERFACE PARAMETERS
14.7.1 Setting the Interface State
14.7.2 Setting the Default Cost of an OSPF Interface
14.8 CREATING VIRTUAL LINKS
14.9 CONFIGURING OSPF PARAMETERS
14.9.1 Configuring OSPF Global Parameters
Configuring the Routing Table Recalculation
Configuring Autonomous System External (ASE) Link Advertisements
Configuring Support for Opaque LSAs
Setting Route Preference
Setting the Reference Bandwidth
14.10 MONITORING OSPF
Following is an example of the ospf show virtual-links command:
14.11 OSPF CONFIGURATION EXAMPLES
14.11.1 Exporting All Interface & Static Routes to OSPF
14.11.2 Exporting All RIP, Interface & Static Routes to OSPF
Page
into RIP.
Page
15 IS-IS CONFIGURATION GUIDE
15.1 DEFINING AN IS-IS AREA
15.2 CONFIGURING IS-IS INTERFACES
15.3 ENABLING IS-IS ON THE RS
15.4 SETTING IS-IS GLOBAL PARAMETERS
15.4.1 Setting the IS Operating Level
15.4.2 Setting the PSN Interval
15.4.3 Setting the System ID
15.4.4 Setting the SPF Interval
15.4.5 Setting the Overload Bit
15.4.6 Setting IS-IS Authentication
Authentication Between Neighbors
Authentication Within an Area
Authentication Within a Routing Domain
SNP Authentication
15.5 SETTING IS-IS INTERFACE PARAMETERS
15.5.1 Setting the Interface Operating Level
Page
15.6 DISPLAYING IS-IS INFORMATION
15.6.1 IS-IS Sample Configuration
Network Topology Overview
R2
R1
IS-IS Area 1
R3
R4
R5
R6
Area 49.da02
R7
IS-IS Area 2
R8
R9
IS-IS Area 3
C10 R11
Area 49.da04
IS-IS Area 4
R1 Configuration
R2 Configuration
The following is the configuration for router R2 in Area 1:
R3 Configuration
The following is the configuration for router R3 in Area 1:
R4 Configuration
The following is the configuration for R4 in Area 1:
R5 Configuration
The following is the configuration for R5 in Area 2:
R6 Configuration
The following is the configuration for R6 in Area 2:
R7 Configuration
The following is the configuration for R7 in Area 2:
The following is the configuration for R8 in Area 3:
R8 Configuration
R9 Configuration
The following is the configuration for R9 in Area 3:
C10 Configuration
The following is the configuration for the C10 Cisco router in Area 4:
C10 Configuration (continued)
R11 Configuration
The following is the configuration for R11 in Area 4:
Page
16 BGP CONFIGURATION GUIDE
16.1 THE RS BGP IMPLEMENTATION
16.2 BASIC BGP TASKS
16.2.3 Configuring a BGP Peer Group
16.2.4 Adding a BGP Peer
16.2.5 Starting BGP
16.2.6 Using AS-Path Regular Expressions
AS Path Regular Expression Examples
16.2.7 Using the AS Path Prepend Feature
Notes on Using the AS Path Prepend Feature
16.2.8 Creating BGP Confederations
BGP Confederation
16.2.9 Creating Community Lists
16.2.10 Using Route Maps
Defining Match Criteria in Route Map Conditions
Page
Displaying BGP Accounting Information
16.3 BGP CONFIGURATION EXAMPLES
16.3.1 BGP Peering Session Example
Page
16.3.2 IBGP Configuration Example
IBGP Routing Group Example
The following lines in the Cisco router configure OSPF:
The following lines in the R6 set up peering with the Cisco router using the routing group type.
16.3.3 EBGP Multihop Configuration Example
The CLI configuration for router R1 is as follows:
The gated.conf file for router R1 is as follows:
The CLI configuration for router R2 is as follows:
The gated.conf file for router R2 is as follows:
The CLI configuration for router R3 is as follows:
The CLI configuration for router R4 is as follows:
The gated.conf file for router R3 is as follows:
16.3.4 Community Attribute Example
Riverstone Networks RS Switch Router User Guide Release 8.0 16-23
BGP Configuration Guide BGP Configuration Examples
Figure 16-5 Sample BGP configuration (specific community)
AS-64902
Physical Link
CS1 CS2
AS-64900 AS-64899
Page
In Figure 16-5, router R11 has the following configuration:
Page
In Figure16-5, router R10 has the following configuration:
In Figure16-5, router R14 has the following configuration:
Notes on Using Communities
16.3.5 Local Preference Examples
Page
Using the local-pref Option
Using the set-pref Option
16.3.6 Multi-Exit Discriminator Attribute Example
16.3.7 EBGP Aggregation Example
16.3.8 Route Reflection Example
Page
Page
Page
R10 has the following CLI configuration:
R12 has the following CLI configuration:
R13 has the following CLI configuration:
R8 has the following CLI configuration:
Page
16.3.10 Route Map Example
16.3.11 BGP Accounting Examples
EBGP Accounting Example
Page
IBGP Accounting Example
R1 has the following configuration:
R2 has the following configuration:
BGP DSCP Accounting
Router R2 has the following CLI configuration:
Router R8 has the following CLI configuration:
To enable BGP accounting on the interface int1 on R8:
To view the BGP accounting information collected on R8:
Page
17 MPLS CONFIGURATION
17.1 MPLS ARCHITECTURE OVERVIEW
17.1.1 Labels
- -
Experimental
Bottom of Stack
-
Page
Label Distribution Protocols
2 1
34
Label Advertising Mode
17.1.6 MPLS Table Information
Output Tag Table (OTT)
R1 R2 R4R3 RC
Tunnel LSP
RA RB
Page
17.2 ENABLING AND STARTING MPLS ON THE RS
Page
17.3 RSVP CONFIGURATION
17.3.1 Establishing RSVP Sessions
1 2
17.3.2 RSVP Refresh Intervals
17.3.3 RSVP Hello Packets
17.3.4 Authentication
17.3.5 Blockade Aging Interval
17.3.6 RSVP Refresh Reduction
RSVP Message Aggregation
Message ID Extensions
17.3.7 Displaying RSVP Information
17.4 LDP CONFIGURATION
17.4.1 Establishing LDP Sessions
17.4.2 Monitoring LDP Sessions
17.4.3 Remote Peers
17.4.4 Loop Detection
17.4.5 MD5 Password Protection
17.4.6 Using LDP Filters
Page
17.4.7 Displaying LDP Information
17.5 CONFIGURING L3 LABEL SWITCHED PATHS
PHP LSR Configuration
L3 Static Path Configuration Example
Page
Page
17.5.2 Configuring L3 Dynamic LSPs
17.5.3 Configuring an Explicit LSP
Configuring an Explicit Path
Configuring the LSP
Page
Adaptive LSP
Bandwidth
CoS Value
Hop Limit
LSP Metric
Disabling CSPF
Disabling TTL Decrementing
Disabling Path Route Recording
Preference
Connection Retries
Standby
Policies
Dynamic L3 LSP Configuration Example
R7
secondary path
primary path
Page
Page
Page
Page
Page
Page
Page
The secondary path dp2l is now used for the LSP, as shown by the
configured secondary path dp2l is now both up and active.
Page
Page
Page
Page
Page
Page
MPLS with CMTS for Multiple ISPs Configuration Example
Page
Page
Page
DHCP Configuration
Configuring Shared Networks with Cisco Network Registrar
Page
17.6 CONFIGURING L2 TUNNELS
17.6.1 Configuring L2 Static Labels
Ingress LSR Configuration
- - - -
Page
R2 R3
Page
17.6.2 Configuring Dynamic L2 Labels
Virtual Circuit Signaling
Tunnel LSP Signaling
FEC-Label Bindings
Ingress and Egress LSR Configuration for L2 Dynamic Labels
-
Transit LSR Configuration for L2 Dynamic Labels
L2 Tunneling Based on VLAN ID Configuration Examples
Page
Page
Page
Page
Page
Page
! Configure RSVP
! Configure VLANs and interfaces
! Configure OSPF
Page
Page
Page
Page
L2 Tunneling Based on Ports Configuration Examples
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
L2 Tunneling Based on VLAN ID and Port Configuration Examples
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
17.7 TRAFFIC ENGINEERING
17.7.1 Administrative Groups
Page
17.7.2 Constrained Shortest Path First
Constrained Path Selection Configuration Example for OSPF Traffic Engineering
Page
Page
Page
Page
The following is the configuration for R2:
The following is the configuration for R3:
The following is the configuration for R4:
The following is the configuration for R5:
! Configure RSVP
Page
Page
The following command shows the IS-IS adjacencies on R1:
The following command shows the IS-IS traffic engineering database on R1:
Page
Page
17.7.3 IGP Shortcuts
IS-IS IGP Shortcuts Example
To enable IGP shortcuts on the router R1, enter the following command:
R1(config)# ip-router global set install-lsp-routes on R1(config)# isis set igp-shortcuts enable
Page
Advertising IGP Shortcuts
18 ROUTING POLICY CONFIGURATION
18.1 PREFERENCE
18.1.1 Import Policies
Import-Source
18.1.2 Export Policies
Export-Destination
Export-Source
18.1.3 Specifying a Route Filter
18.1.4 Aggr egates and Generates
Aggregate-Destination
Aggregate-Source
18.1.5 Authentication
Authentication Methods
Authentication Keys and Key Management
18.2 CONFIGURING SIMPLE ROUTING POLICIES
18.2.1 Redistributing Static Routes
18.2.2 Redistributing Directly Attached Networks
18.2.3 Redistributing RIP into RIP
18.2.4 Redistributing RIP into OSPF
18.2.5 Redistributing OSPF to RIP
18.2.6 Redistributing Aggregate Routes
18.2.7 Simple Route Redistribution Example: Redistribution into RIP
Exporting a Given Static Route to All RIP Interfaces
Exporting All Static Routes to All RIP Interfaces
Router R1 has several static routes. We would export these routes over all RIP interfaces.
Exporting All Static Routes Except the Default Route to All RIP Interfaces
18.2.8 Simple Route Redistribution Example: Redistribution into OSPF
Exporting All Interface & Static Routes to OSPF
Exporting All RIP, Interface & Static Routes to OSPF
18.3 CONFIGURING ADVANCED ROUTING POLICIES
18.3.1 Export Policies
-
18.3.2 Creating an Export Destination
18.3.3 Creating an Export Source
18.3.4 Import Policies
-
18.3.5 Creating an Import Source
18.3.6 Creating a Route Filter
18.3.7 Creating an Aggregate Route
-
-
Page
Page
Importing a Selected Subset of Routes from One RIP Trusted Gateway
Importing a Selected Subset of Routes from All RIP Peers Accessible Over a Certain Interface
18.3.11 Import Policies Example: Importing from OSPF
Page
Importing a Selected Subset of OSPF-ASE Routes
importation.
route.
18.3.12 Export Policies Example: Exporting to RIP
Exporting a Given Static Route to All RIP Interfaces
Exporting a Given Static Route to a Specific RIP Interface
Exporting All Static Routes Reachable Over a Given Interface to a Specific RIP Interface
Exporting Aggregate-Routes into RIP
18.3.13 Export Policies Example: Exporting to OSPF
Exporting All Interface & Static Routes to OSPF
Page
Page
Page
Page
19 MULTICAST ROUTING
19.1 IGMP OVERVIEW
19.2 DVMRP OVERVIEW
19.3 CONFIGURING IGMP
19.3.1 Configuring IGMP on an IP Interface
19.3.2 Configuring IGMP Query Interval
19.3.3 Configuring IGMP Response Wait Time
19.3.4 Configuring Per-Interface Control of IGMP Membership
19.3.5 Configuring Static IGMP Groups
19.4 CONFIGURING DVMRP
19.4.4 Configuring the DVMRP Routing Metric
19.4.5 Configuring DVMRP TTL & Scope
19.4.6 Configuring a DVMRP Tunnel
19.5 MONITORING IGMP & DVMRP
19.6 CONFIGURATION EXAMPLE
Page
20 IP POLICY-BASED FORWARDING
20.1 CONFIGURING IP POLICIES
20.1.1 Defining an ACL Profile
20.1.2 Associating the Profile with an IP Policy
Creating Multi-Statement IP Policies
Setting the IP Policy Action
Setting Load Distribution for Next-Hop Gateways
Verifying Next-Hop Gateways
20.1.3 Applying an IP Policy to an Interface
20.2 IP POLICY CONFIGURATION EXAMPLES
20.2.1 Routing Traffic to Different ISPs
20.2.2 Prioritizing Service to Customers
20.2.3 Authenticating Users through a Firewall
20.2.4 Firewall Load Balancing
Page
20.3 MONITORING IP POLICIES
Page
Page
Page
21 NETWORK ADDRESS TRANSLATION CONFIGURATION
21.1 CONFIGURING NAT
21.1.1 Setting Inside and Outside Interfaces
21.1.2 Setting NAT Rules
Static
21.2 FORCING FLOWS THROUGH NAT
21.3 MANAGING DYNAMIC BINDINGS
21.4 NAT AND DNS
21.5 NAT AND ICMP PACKETS
21.6 NAT AND FTP
21.7 MONITORING NAT
21.8 CONFIGURATION EXAMPLES
21.8.1 Static Configuration
Using Static NAT
21.8.2 Dynamic Configuration
Using Dynamic NAT
21.8.3 Dynamic NAT with IP Overload (PAT) Configuration
Using Dynamic NAT with IP Overload
21.8.4 Dynamic NAT with DNS
Using Dynamic NAT with DNS
21.8.5 Dynamic NAT with Outside Interface Redundancy
Using Dynamic NAT with Matching Interface Redundancy
22 WEB HOSTING CONFIGURATION
22.1 LOAD BALANCING
22.1.1 Creating the Server Group
Specifying a Protocol
Intrinsic Persistence Checking
22.1.2 Adding Servers to the Load Balancing Group
22.1.3 Setting Timeouts for Load Balancing Mappings
22.1.4 Optional Group or Server Operating Parameters
Specifying a Load Balancing Policy
Specifying a Connection Threshold
Checking Servers and Applications
22.1.7 Load Balancing and FTP
22.1.8 Allowing Load Balancing Servers to Ac cess the Internet
22.1.9 Allowing Access to Load Balancing Se rvers
22.1.10 Virtual State Replication Protocol (VSRP)
VSRP Example
www.fast.net
RS B
RS A
22.1.11 Displaying Load Balancing Information
22.1.12 Configuration Examples
Web Hosting with One Virtual Group and Multiple Destination Servers
Web Hosting with Multiple Virtual Groups and Multiple Destination Servers
Virtual IP Address Ranges
Page
Session and Netmask Persistence
Load Balancing with NAT
22.2 WEB CACHING
22.2.1 Configuring Web Cachi ng
Creating the Cache Group
Specifying the Client(s) for the Cache Group (Optional)
Redirecting HTTP Traffic on an Interface or Port
22.2.2 Configuration Example
22.2.3 Other Web-Cache Options
Bypassing Cache Servers
Proxy Server Redundancy
Disabling Redirection on an Inbound Interface or Port
Specifying Protocol for Redirected Traffic
Distributing Frequently-Accessed Sites Across Cache Servers
Specifying a Connection Threshold
22.2.4 Monitoring Web-Caching
23 IPX ROUTING CONFIGURATION
23.1 RIP (ROUTING INFORMATION PROTOCOL)
23.2 SAP (SERVICE ADVERTISING PROTOCOL)
23.3 CONFIGURING IPX RIP & SAP
23.3.4 IPX Addresses
23.4 CONFIGURING IPX INTERFACES AND
23.4.1 Configuring IPX Addresses to Ports
23.4.2 Configuring Secondary Addresses on an IPX Interface
23.4.3 Configuring IPX Interfaces for a VLAN
23.4.4 Specifying IPX Encapsulation Method
23.5 CONFIGURING IPX ROUTING
23.5.1 Enabling IPX RIP
23.5.2 Enabling SAP
23.5.3 Configuring Static Routes
23.5.4 Configuring Static SAP Table Entries
23.5.5 Controlling Access to IPX Networks
Creating an IPX Access Control List
Creating an IPX Type 20 Access Control List
Creating an IPX SAP Access Control List
Creating an IPX GNS Access Control List
Creating an IPX RIP Access Control List
23.6 MONITORING AN IPX NETWORK
23.7 CONFIGURATION EXAMPLES
Page
24 ACCESS CONTROL LIST
24.1 ACL BASICS
24.1.1 Defining Selection Criteria in ACL Rules
24.1.2 How ACL Rules are Evaluated
24.1.3 Implicit Deny Rule
24.1.4 Allowing External Responses to Established TCP Connections
24.2 CREATING AND MODIFYING ACLS
24.2.1 Editing ACLs Offline
24.2.2 Maintaining ACLs Using the ACL Editor
24.3 USING ACLS
24.3.1 Applying ACLs to Interfaces
24.3.2 Applying ACLs to Services
24.3.3 Applying ACLs to Layer-4 Bridging Ports
24.3.4 Using ACLs as Profiles
Using Profile ACLs with the IP Policy Facility
Using Profile ACLs with the Traffic Rate Limiting Fa cility
Using Profile ACLs with Dynamic NAT
Using Profile ACLs with the Port Mirroring Facility
Using Profile ACLs with the Web Caching Facility
24.4 ENABLING ACL LOGGING
24.5 MONITORING ACLS
Page
25 SECURITY CONFIGURATION
25.1 CONFIGURING RS ACCESS SECURITY
Monitoring RADIUS
25.1.2 Configuring TACACS
Monitoring TACACS
25.1.3 Configuring TACACS+
Monitoring TACACS+
25.1.4 Configuring Passwords
25.1.5 Configuring SSH
Establishing SSH Sessions
Monitoring SSH Sessions
25.2 LAYER-2 SECURITY FILTERS
25.2.1 Configuring Layer-2 Address Filters
25.2.2 Configuring Layer-2 Port-to-Address Lock Filters
25.2.3 Configuring Layer-2 Static Entry Filters
25.2.4 Configuring Layer-2 Secure Port Filters
25.2.5 Monitoring Layer-2 Security Filters
25.2.6 Layer-2 Filter Examples
Example 1: Address Filters
Static Entries Example
Port-to-Address Lock Examples
Example 2 : Secure Ports
25.3 LAYER-3 ACCESS CONTROL LISTS (ACLS)
25.4 LAYER-4 BRIDGING AND FILTERING
25.4.1 Creating an IP or IPX VLAN for Layer-4 Bridging
25.4.2 Placing the Ports on the Same VLAN
25.4.3 Enabling Layer-4 Bridging on th e VLAN
25.4.4 Creating ACLs to Specify Selection Criteria for Layer-4 Bridging
25.4.5 Applying a Layer-4 Bridging ACL to a Port
25.4.6 Notes
Page
26 QOS CONFIGURATION
26.1 LAYER-2, LAYER-3 AND LAYER-4 FLOW SPECIFICATION
26.2 PRECEDENCE FOR LAYER-3 FLOWS
26.3 RS QUEUING POLICIES
26.4 TRAFFIC PRIORITIZATION FOR LAYER-2 FLOWS
26.4.1 Configuring Layer-2 QoS
26.4.2 802.1p Class of Service Priority Mapping
Creating and Applying a New Priority Map
Removing or Disabling Per-Port Priority Map
Displaying Priority Map Information
26.5 TRAFFIC PRIORITIZATION FOR LAYER-3 & LAYER-4 FLOWS
26.5.1 Configuring IP QoS Policies
Setting an IP QoS Policy
Specifying Precedence for an IP QoS Policy
26.5.2 Configuring IPX QoS Policies
26.6 CONFIGURING RS QUEUEING POLICY
26.6.1 Allocating Bandwidth for a Weighted-Fair Queuing Policy
26.7 WEIGHTED RANDOM EARLY DETECTION (WRED)
26.7.1 WREDs Effect on the Network
26.7.2 Weighting Algorithms in WRED
Queue Time
26.8 TOS REWRITE
26.8.1 Configuring ToS Rewrite for IP Packets
26.9 MONITORING QOS
26.10 LIMITING TRAFFIC RATE
26.10.1 Rate Limiting Modes
26.10.2 Per-Flow Rate Limiting
26.10.3 Software-Based Flow-Aggregate Rate Limiting
26.10.4 Port Rate Limiting
26.10.5 Aggregate Rate Limiting
Page
26.10.6 Example Configurations
This section includes examples of rate limiting policy configurations.
Per-Flow Rate Limiting
The following is an example of configuring per-flow rate limiting on the RS.
Flow-Aggregate Rate Limiting
26.10.7 Displaying Rate Limit Information
Page
27 PERFORMANCE MONITORING
27.1 CONFIGURING THE RS FOR PORT MIRRORING
27.2 MONITORING BROADCAST TRAFFIC
Page
28 RMON CONFIGURATION
28.1 CONFIGURING AND ENABLING RMON
28.1.1 Example of RMON Configuration Commands
28.1.2 RMON Groups
Lite RMON Groups
Standard RMON Groups
Professional RMON Groups
28.1.3 Control Tables
28.2 USING RMON
28.3 CONFIGURING RMON GROUPS
Page
28.3.1 Configuration Examples
28.4 DISPLAYING RMON INFORMATION
28.4.1 RMON CLI Filters
Creating RMON CLI Filters
Using RMON CLI Filters
28.5 TROUBLESHOOTING RMON
28.6 ALLOCATING MEMORY TO RMON
Page
29 LFAP CONFIGURATION GUIDE
29.1 OVERVIEW
29.2 REQUIREMENTS
29.3 TRAFFIC ACCOUNTING SERVICES
29.4 CONFIGURING THE LFAP AGENT ON THE RS
29.5 MONITORING THE LFAP AGENT ON THE RS
Page
30 WAN CONFIGURATION
30.1 HIGH-SPEED SERIAL INTERFACE (HSSI) AND STANDARD SERIAL INTERFACES
30.2 CONFIGURING WAN INTERFACES
30.2.1 Primary and Secondary Addresses
30.2.2 Static, Mapped, and Dynamic Peer IP/IPX Addresses
Static Addresses
Mapped Addresses
Dynamic Addresses
30.2.3 Forcing Bridged Encapsulation
30.2.4 Packet Compression
Average Packet Size
Nature of the Data
30.2.5 Packet Encryption
30.2.6 WAN Quality of Service
Source Filtering and ACLs
Weighted-Fair Queueing
Congestion Management
Random Early Discard (RED)
Adaptive Shaping
30.3 FRAME RELAY OVERVIEW
30.3.1 Virtual Circuits
30.3.2 Permanent Virtual Circuits (PVCs)
30.4 CONFIGURING FRAME RELAY INTERFACES FOR THE RS
30.4.1 Defining the Type and Location of a Frame Relay and VC Interface
30.4.2 Setting up a Frame Relay Service Profile
30.4.3 Applying a Service Profile to an Active Frame Relay WAN Port
30.5 MONITORING FRAME RELAY WAN PORTS
30.6 FRAME RELAY PORT CONFIGURATION
30.7 POINT-TO-POINT PROTOCOL (PPP) OVERVIEW
30.7.1 Use of LCP Magic Numbers
30.8 CONFIGURING PPP INTERFACES
30.8.1 Defining the Type and Location of a PPP Interface
30.8.2 Setting up a PPP Service Profile
30.8.3 Applying a Service Profile to an Active PPP Port
30.8.4 Configuring Multilink PPP Bundles
Compression on MLP Bundles or Links
30.9 MONITORING PPP WAN PORTS
30.10 PPP PORT CONFIGURATION
30.11 CISCO HDLC WAN PORT CONFIGURATION
30.11.3 Assigning IP Addresses to a Cisco HDLC WAN Port
30.11.4 Monitoring Cisco HDLC Port Configuration
30.12 CISCO HDLC CONFIGURATION EXAMPLE
30.13 WAN RATE SHAPING
30.13.2 The WAN Rate Shaping Algorithm
1
2
4 5
6 7
3
30.13.3 WAN Rate Shaping Example
Page
30.13.4 Using WAN Rate Shaping
Using Multiple Rate Shaping Templates
Rate Shaping by Best Effort
Page
30.14 INVERSE MULTIPLEXER OVERVIEW
30.14.1 Bit Error Rate Testing an IMUX Group
30.15 WAN CONFIGURATION EXAMPLES
30.15.1 Simple Configuration File
30.15.2 Multi-Router WAN Configuration
30-26 Riverstone Networks RS Switch Router User Guide Release 8.0
WAN Configuration Examples WAN Configuration
R5
R3
R4
R2 R1 R6
Legend
Router R1 Configuration File
The following configuration file applies to Router R1.
The following configuration file applies to Router R2.
Router R2 Configuration File
Router R3 Configuration File
The following configuration applies to Router 3.
The following configuration file applies to Router R4
Router R4 Configuration File
Router R5 Configuration File
The following configuration file applies to Router R5
The following configuration file applies to Router R6
Router R6 Configuration File
30.16 CHANNELIZED T1, E1 AND T3 SERVICES OVERVIEW
30.16.1 T1 and E1 WAN Interface Cards
Page
Page
Page
Basic Channelized T1, E1 and T3 Interface Functions
Configuring Frame Relay over Channelized T1, E1 and T3 Interfaces
30.16.4 Bit Error Rate Testing
Example: Configuring Loopbacks and Using BERT Testing on a DS1 Interface
This example shows the use of BERT to test a structured DS1 interface for a duration of one hour.
Example: Configuring Loopbacks and Using BERT Testing on a DS3 Interface
Example: Configuring Loopbacks and Using BERT Testing on a Channelized E1 Interface
This example shows the use of BERT to test a structured E1 interface for a duration of one hour.
30.16.5 Configuring a Test using External Test Equipment
30.17 CLEAR CHANNEL T3 AND E3 SERVICES OVERVIEW
30.18 SCENARIOS FOR DEPLOYING CHANNELIZED T1, E1 AND T3
Figure 30-5 Bridged MSP MTU/MDU Aggregation
Metropolitan Sevice Provider
Page
hqsite RS 3000 Configuration
The following configuration applies to the RS 3000 router at the head office, hqsite.
The following configuration applies to router RS 3000 at the remote site, rsite2.
30.18.2 Scenario 2: Routed Inter-Office Connections with Only T1 on RS 8x00
Page
ISP RS 32000 Configuration
The following configuration applies to the RS 32000 router at the ISP.
Page
Page
Page
30.18.3 Scenario 3: Routed Inter-Office Connections with T1 and T3 on RS 8x00
Page
ISP RS 32000 Configuration
The following configuration applies to the RS 32000 router at the ISP.
Page
Page
Page
Page
30.18.4 Scenario 4: Routed Metropolitan Backbone with Only T1 on RS 8x00
Page
Page
Page
Page
Internet Service Provider B RS 32000 Configuration
The following configuration applies to the RS 32000 router at Internet Service Provider B.
Page
30.18.5 Scenario 5: Routed Metropolitan Backbone with T1 and T3 on RS 8x00
Figure 30-9 Routed Metropolitan Backbone with T1 and T3 on RS 8x00
Page
Page
Page
Page
Internet Service Provider B RS 32000 Configuration
The following configuration applies to the RS 32000 router at Internet Service Provider B.
Page
30.18.6 Scenario 6: Routed Inter-Office Connections with E1 on RS8x00
Page
Page
Page
30.18.7 Scenario 7: Transatlantic Connection using T1 and E1 on RS 8x00
T1
E1
RS 8600 Configuration (USA)
RS 8000 Configuration (Europe)
The following configuration applies to the RS 8000 router.
30.18.8 Scenario 8: Configuring Frame Relay over Channelized T1 Interfaces
Figure 30-12 Frame Relay over Channelized T1
rsite1 RS 3000 Configuration
rsite4 RS 3000 Configuration
rsite5 RS 3000 Configuration
rsite6 RS 3000 Configuration
30.19 SCENARIOS FOR DEPLOYING CLEAR CHANNEL T3 AND E3
30.19.1 Scenario 1: Routed Inter-Office Connections through and ISP
Page
ISP RS 8000 Configuration
The following configuration applies to the RS 8000 router at the ISP.
hqsite RS 8000 Configuration
The following configuration applies to the RS 8000 router at the head office, hqsite.
Page
Page
Page
30.19.2 Scenario 2: Routed Metropolitan Backbone
Page
Metropolitan Service Provider RS 8000 Configuration
The following configuration applies to the RS 8000 router at the Metropolitan Service Provider.
hqsite RS 8000 Configuration
The following configuration applies to the RS 8000 router at the head office, hqsite.
Page
Page
Internet Service Provider A RS 8000 Configuration
The following configuration applies to the RS 8000 router at Internet Service Provider A.
Internet Service Provider B RS 8000 Configuration
The following configuration applies to the RS 8000 router at Internet Service Provider B.
Page
Page
Page
31 SERVICE CONFIGURATION
31.1 SERVICE FACILITY RATE LIMITING TYPES
31.2 CREATING A SERVICE
31.2.1 Aggregate Rate Limiting Service
Hardware Credit Buckets
31.2.2 Flow-Aggregate Rate Limiting Service
31.2.3 Per-Flow Rate Limiting Service
31.2.4 Burst-Safe Rate Limiting Service
31.3 APPLYING A SERVICE
31.3.1 Applying Services With ACLs
31.3.2 Applying Services Using the MF-Classifier Command
31.4 SHOWING A SERVICE
31.4.1 Aggregate, Flow-Aggregate, Per-Flow, and Burst-Safe Show Commands
31.4.2 Show All Command
31.5 PORT-LEVEL RATE LIMITING
31.6 SERVICE CONFIGURATION EXAMPLES
31.6.1 Applying a Service to Multiple Servers
Page
31-12 Riverstone Networks RS Switch Router User Guide Release 8.0
Service Configuration Examples Service Configuration
Following is the configuration:
MAN
Figure 31-3 Burst-Safe Configuration
Customers
31.7 RATE LIMITING CONFIGURATION EXAMPLES
Per-Flow Rate Limiting
Flow-Aggregate Rate Limiting
The following is an example of configuring flow-aggregate rate limiting.
Network
Subnetwork 122.132.0.0/16
256 Kbps 64 Kbps