IBM SC30-3681-08 Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 773 Seiten
- 2.98 mb
Zur Seite of
Ähnliche Gebrauchsanleitungen
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung IBM SC30-3681-08 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von IBM SC30-3681-08, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung IBM SC30-3681-08 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung IBM SC30-3681-08. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung IBM SC30-3681-08 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts IBM SC30-3681-08
- Den Namen des Produzenten und das Produktionsjahr des Geräts IBM SC30-3681-08
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts IBM SC30-3681-08
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von IBM SC30-3681-08 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von IBM SC30-3681-08 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service IBM finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von IBM SC30-3681-08 zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts IBM SC30-3681-08, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von IBM SC30-3681-08 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
N w a ys M ul ti p r o to c o l R o uting S e rvi ce s Sof t w ar e U ser ’ s Gu i d e V e rsi o n 3 .2 SC30-3681-08 IBM[...]
-
Seite 2
[...]
-
Seite 3
N w a ys M ul ti p r o to c o l R o uting S e rvi ce s Sof t w ar e U ser ’ s Gu i d e V e rsi o n 3 .2 SC30-3681-08 IBM[...]
-
Seite 4
Note Before using this document, read the general information under “Notices” on page xxiii. Ninth Edition (November 1998) This edition applies to V ersion 3.2 of the IBM Nways Multiprotocol Routing Services and to all subsequent releases and modifications until otherwise indicated in new editions or technical newsletters. Order publications t[...]
-
Seite 5
Contents Figures ........................... x i x T ables ........................... x x i Notices ........................... xxiii Notice to Users of Online V ersions of This Book ........... x x v T rademarks ......................... xxvii Preface ........................... xxix Who Should Read This Manual .................. xxix About the S[...]
-
Seite 6
Chapter 3. The OPCON Process ................. 2 5 Chapter 4. Using OPCON .................... 2 7 Accessing the OPCON Process .................. 2 7 OPCON Commands ...................... 2 7 Breakpoint ......................... 2 8 Divert ........................... 2 8 Flush ........................... 2 9 Halt ............................ 2 9 In[...]
-
Seite 7
Protocol .......................... 7 4 Qconfig .......................... 7 5 S e t ............................ 7 5 T i m e ........................... 7 9 Unpatch .......................... 8 0 Update .......................... 8 0 Chapter 7. The Boot CONFIG Process ............... 8 3 What is Boot CONFIG? ..................... 8 3 Configuring[...]
-
Seite 8
BP (Boot using BOOTP) .................... 1 1 9 D (Dump using stored configuration) ............... 1 2 0 DIAG (Execute IBM Extended Diagnostic Program) .......... 1 2 0 DM (Dump using Console Queries) ................ 1 2 1 UB (Display TFTP Boot Configuration) ............... 1 2 1 UC (Display Hardware Configuration) ............... 1 2 2 UG ([...]
-
Seite 9
Configuring ELS So Event Messages Are Sent In SNMP Traps ...... 1 5 3 Using ELS to T roubleshoot a Problem ................ 1 5 3 ELS Example 1 ....................... 1 5 3 ELS Example 2 ....................... 1 5 4 ELS Example 3 ....................... 1 5 4 Using and Configuring ELS Remote Logging ............. 1 5 5 Syslog Facility and Level[...]
-
Seite 10
V i e w ........................... 2 0 4 Packet-trace Monitoring Commands ................ 2 0 5 ELS Net Filter Monitoring Commands ............... 2 0 7 ELS Message Buffering Monitoring Commands ........... 2 1 0 Chapter 14. Configuring and Monitoring Performance ......... 2 1 5 Performance Overview ...................... 2 1 5 Performance Repor[...]
-
Seite 11
S e t ............................ 2 4 4 Chapter 18. Using the Ethernet Network Interface .......... 2 4 7 Displaying Ethernet Statistics through the Interface Command ....... 2 4 7 Chapter 19. Configuring and Monitoring the Ethernet Network Interface . . 251 Accessing the Ethernet Interface Configuration Process ......... 2 5 1 Ethernet Configu[...]
-
Seite 12
A d d ............................ 2 7 9 List ............................ 2 7 9 QoS Configuration ...................... 2 8 0 Remove .......................... 2 8 0 S e t ............................ 2 8 0 Enable .......................... 2 8 4 Disable .......................... 2 8 4 Accessing the Virtual A TM Interface Configuration Process[...]
-
Seite 13
X.25 Support Over ISDN BRI D-Channel (X.31) ............ 3 2 2 Null Encapsulation ....................... 3 2 2 Limitations ......................... 3 2 2 Configuration Changes .................... 3 2 2 Configuring Null Encapsulation and Closed User Groups (CUG) ..... 3 2 2 Understanding Closed User Groups ................. 3 2 4 Bilateral Clos[...]
-
Seite 14
Delete ........................... 3 7 8 Enable .......................... 3 8 0 Disable .......................... 3 8 0 S e t ............................ 3 8 0 List ............................ 3 8 0 XTP Monitoring Commands .................... 3 8 2 A d d ............................ 3 8 2 Delete ........................... 3 8 3 List .........[...]
-
Seite 15
Frame Relay Monitoring Commands ................. 4 3 2 Clear ........................... 4 3 3 Disable .......................... 4 3 3 Enable .......................... 4 3 3 List ............................ 4 3 4 L L C ........................... 4 4 2 Notrace .......................... 4 4 2 S e t ............................ 4 4 3 T race ....[...]
-
Seite 16
List ............................ 4 8 4 L L C ........................... 5 0 6 Point-to-Point Protocol Interfaces and the GWCON Interface Command . . . 506 Chapter 34. Using the Multilink PPP Protocol ............ 5 0 9 MP Considerations ....................... 5 1 0 Multi-Chassis MP ....................... 5 1 1 Configuring a Multilink PPP Inter[...]
-
Seite 17
Enable .......................... 5 4 1 List ............................ 5 4 2 S e t ............................ 5 4 4 Accessing the SDLC Monitoring Environment ............. 5 4 9 SDLC Monitoring Commands ................... 5 5 0 A d d ............................ 5 5 0 Clear ........................... 5 5 0 Delete ........................... [...]
-
Seite 18
Parameters ......................... 5 8 9 Statistics .......................... 5 9 0 V .25bis and the GWCON Commands ................ 5 9 2 Statistics for V .25bis Interfaces and Dial Circuits ........... 5 9 2 Chapter 43. Using the V .34 Network Interface ............ 5 9 5 Before Y ou Begin ....................... 5 9 5 Configuration Procedure[...]
-
Seite 19
Chapter 46. Configuring and Monitoring the ISDN Interface ....... 6 2 7 ISDN Configuration Commands .................. 6 2 7 Block-Calls ......................... 6 2 7 Disable .......................... 6 2 8 Enable .......................... 6 2 8 List ............................ 6 2 8 Remove .......................... 6 2 9 S e t ............[...]
-
Seite 20
BOOTP Boot ........................ 6 7 1 IBD Boot .......................... 6 7 2 Enabling Console Modem-Control ................. 6 7 2 Restarting the Router ...................... 6 7 2 Appendix B. X.25 National Personalities .............. 6 7 5 GTE-T elenet ......................... 6 7 5 D D N ............................ 6 7 5 Appendix C. M[...]
-
Seite 21
Figures 1. Multiprotocol Routing Services ................. 7 2. Relationship of Processes and Commands ............ 8 3. Memory Utilization ..................... 3 1 4. Message Generated by an Event ................ 1 4 9 5. Syslog Message Description .................. 1 5 5 6. syslog.conf Configuration File ................. 1 5 7 7. Configuri[...]
-
Seite 22
xx MRS V3.2 Software User ’s Guide[...]
-
Seite 23
T ables 1. Processes, Their Purpose, and Commands to Access ........ 1 0 2. Network Architecture and the Supported Interfaces ......... 1 7 3. OPCON Commands ..................... 2 7 4. CONFIG Command Summary ................. 5 1 5. Access Permission ..................... 5 8 6. Environment Command Summary ................ 6 6 7. IBM 2210 Feature[...]
-
Seite 24
54. XTP Monitoring Commands Summary .............. 3 8 2 55. Protocol Address Mapping .................. 3 9 4 56. Frame Relay Management Options ............... 4 0 3 57. Frame Relay Configuration Commands Summary .......... 4 0 5 58. Frame Relay Management Options ............... 4 3 1 59. T ransmit Delay Units and Range for the 2210 Serial Inte[...]
-
Seite 25
Notices References in this publication to IBM products, programs, or services do not imply that IBM intends to make these available in all countries in which IBM operates. Any reference to an IBM product, program, or service is not intended to state or imply that only IBM’s product, program, or service may be used. Any functionally equivalent pro[...]
-
Seite 26
xxiv MRS V3.2 Software User ’s Guide[...]
-
Seite 27
Notice to Users of Online V ersions of This Book For online versions of this book, you are authorized to: v Copy , modify , and print the documentation contained on the media, for use within your enterprise, provided you reproduce the copyright notice, all warning statements, and other required statements on each copy or partial copy . v T ransfer [...]
-
Seite 28
xxvi MRS V3.2 Software User ’s Guide[...]
-
Seite 29
T rademarks The following terms are trademarks of the IBM Corporation in the United States or other countries or both: Advanced Peer-to-Peer Networking IBM PS/2 AIX Micro Channel RS/6000 AIXwindows NetView System/370 APPN AS/400 Nways VT AM BookManager UNIX is a registered trademark in the United States and other countries licensed exclusively thro[...]
-
Seite 30
xxviii MRS V3.2 Software User ’s Guide[...]
-
Seite 31
Preface This manual contains the information that you will need to use the router user interface for configuration and operation of the Multiprotocol Routing Services base code installed on your Nways device. With the help of this manual, you should be able to perform the following processes and operations: v Configure, monitor , and use the Mult[...]
-
Seite 32
The Configuration Program is not pre-loaded at the factory; it is shipped separately from the device as part of the software order . Y ou can also obtain the Configuration Program for IBM Nways Multiprotocol Routing Services from the IBM Networking T echnical Support home page. See Configuration Program User ’s Guide for Nways Multiprotocol an[...]
-
Seite 33
http://www.networking.ibm.com/220/220prod.html Operations and Network Management SC30-3681 Software User ’s Guide This book explains how to: v Configure, monitor , and use the IBM Nways Multiprotocol Routing Services software shipped with the router . v Use the Multiprotocol Routing Services command-line router user interface to configure and m[...]
-
Seite 34
The following list shows the books in the IBM 2210 Nways Multiprotocol Router library , arranged according to tasks. Planning and Installation GA27-4068 IBM 2210 Introduction and Planning Guide GC30-3867 IBM 2210 Nways Multiprotocol Router Installation and Initial Configuration Guide These books are shipped with the 2210. They explain how to prepa[...]
-
Seite 35
- Timed configuration change support from the configuration tool that is persistent across reloads and restarts - Packet trace support for PPP , Frame Relay , and V .34 interfaces. – Bridging support for a multiaccess bridge port for source route bridging over Frame Relay . The multiaccess port incorporates many DLCIs in a single bridge port fo[...]
-
Seite 36
- Configuration of the APPN transmission group (TG) number for all link station types - Support for the APPN Ping (APING) command in T alk 5 - New trace options – TN3270 Enhancements Note: These TN3270 enhancements will not be available in the initial release of V3.2, but will be available on the 2210 Web server by 12/31/98. - TN3270 LU pooling [...]
-
Seite 37
Part 1. Understanding and Using the Software © Copyright IBM Corp. 1994, 1998 1[...]
-
Seite 38
2 MRS V3.2 Software User ’s Guide[...]
-
Seite 39
Chapter 1. Getting Started This chapter shows you how to get started with using the following components related to the IBM 2210 Nways Multiprotocol Router (2210) and the Multiprotocol Routing Services: v Router console terminals v Router software (Multiprotocol Routing Services) v Router software user interface The information in this chapter is d[...]
-
Seite 40
Local Consoles Local consoles are either directly connected by an EIA 232 (RS-232) cable, or connected via modems to the router . Y ou may need to use a local console during the initial software installation. After the initial setup connection, you can connect using T elnet, as long as IP forwarding has been enabled. (Refer to Protocol Configurati[...]
-
Seite 41
Remote Consoles Remote consoles attach to the router using a standard remote terminal protocol. Remote consoles provide the same function as local consoles, except that a local console must be used for initial configuration if your IBM 2210 was not pre-configured at the factory . T elnet Connections The router supports both T elnet Client and Ser[...]
-
Seite 42
Y ou may have to press the Enter key more than once or press Ctrl-P to obtain the * prompt. Once at this level, you can begin to enter commands from the keyboard. Press the Backspace key to delete the last character typed in on the command line. Press the Delete key or Ctrl-U to delete the whole command line entry so that you can reenter a command.[...]
-
Seite 43
Discussing the User Interface System The software (Multiprotocol Routing Services) is a multitasking system that schedules use of the CPU among various processes and hardware devices. The router software: v Provides timing and memory management, and supports both local and remote operator consoles from which you can view and modify the router ’s [...]
-
Seite 44
Figure 2 is an example of the relationship between the various process levels. Note: Also shown in Figure 2 are the various commands to access each process level and return from each process level. See “Chapter 3. The OPCON Process” on page 25 for more information about OPCON, and “Config-Only Mode” on page 41 for more information about CO[...]
-
Seite 45
Chapter 2. Using the Software This chapter describes how to use the software. It consists of: v “Entering Commands” v “Connecting to a Process” v “Some Configuration Suggestions” on page 1 1 v “Accessing the Second-Level Processes” on page 13 v “Accessing the Third-Level Processes” on page 15 v “Command History for GWCON and [...]
-
Seite 46
2. Use the talk pid command, where pid is the number of the process to which you want to connect. (For more information about these and other OPCON commands, refer to “Chapter 3. The OPCON Process” on page 25.) Note: Not every process listed has a user interface (for example, the talk 3 process). The talk 4 command is for use by IBM service rep[...]
-
Seite 47
STATUS of process(es) TALK to process TELNET to IP-Address Exiting a Lower Level Environment The multiple-level nature of the software places you in secondary , tertiary , and even lower level environments as you configure or operate the 2210. T o return to the next higher level, enter the exit command. T o get to the secondary level, continue ent[...]
-
Seite 48
4. Configure any base services, such as boot options. Access the configuration process as described in “Accessing the Configuration Process, CONFIG (T alk 6)” on page 14. 5. Configure the interfaces. Access the interface configuration process as described in “Accessing the Network Interface Configuration Process” on page 15 . 6. Con?[...]
-
Seite 49
2. Retrieve the configuration from the 2210 on which you want to base the new configuration. 3. Make the changes you need for the new configuration. These changes include addresses, the host names, users, and other items. 4. Save the configuration with a different name from the name that you used to retrieve the configuration. 5. Send the con?[...]
-
Seite 50
v The configuration process to initially configure and enable the interface, feature, or protocol, as well as perform later configuration changes. v The operating/monitoring process to display information about each interface, feature, or protocol, to make temporary configuration changes, or to activate configuration changes. Y ou can also con[...]
-
Seite 51
Accessing the Operating/Monitoring Process, GWCON (T alk 5) T o view information about the interfaces, features, or protocols or to change parameters while running, you must access and use the operating (monitoring) process. Operating command interfaces are modes of the GWCON interface. Within the GWCON mode, each interface, feature, or protocol in[...]
-
Seite 52
The following example adds a dial circuit interface: Config> add device dial-circuit Enter the number of PPP Dial Circuit interfaces [1]? Adding device as interface 8 Base net for this circuit[0]? 4 Defaulting Data-link protocol to PPP Use "set data-link" command to change the data-link protocol Use "net 8" command to configu[...]
-
Seite 53
Note: Not all network interfaces are user-configurable. For interfaces that cannot be configured, you receive the message: That network is not configurable Displaying the Interface Configuration: From the same interface configuration prompts, you can list configuration information specific to that selected interface by using the list command.[...]
-
Seite 54
T able 2. Network Architecture and the Supported Interfaces (continued) Network Architecture Supported Interfaces Dial-In A PPP dial circuit interface that has configuration parameters defaulted to support DIALs Multilink PPP (MP) Supported on any PPP link L2TP Supports virtual PPP DIALs connections through the Layer 2 T unneling Protocol (L2TP). [...]
-
Seite 55
+ network 2 X.25> In this example, the X.25 console prompt is displayed on the console. Y ou can then view information about the X.25 interface by entering the X.25 console commands. Monitoring the Network Interface: Refer to the specific chapters in this manual for complete information on monitoring your 2210’s network interfaces. Accessing [...]
-
Seite 56
1. At the CONFIG> prompt, enter the list configuration command to see the numbers and names of the protocols purchased in your copy of the software. See page 69 for sample output of the list configuration command. 2. From the Config> prompt, enter the protocol command with the number or short name (for example, IP , IPX, and ARP) of the pro[...]
-
Seite 57
or + protocol IP The protocol console prompt then displays on the console. This example shows the IP protocol console prompt: IP> Y ou can now begin entering the protocol’s commands. See the corresponding protocol section of the Protocol Configuration and Monitoring Reference for more information on specific protocol console commands. Comman[...]
-
Seite 58
Repeating a Series of Commands in the Command History There is an additional feature for advanced users to facilitate repeating a particular series of GWCON or CONFIG commands. C1, C2,...,Cn in the Command History is referred to as a repeat sequence . This feature may be more convenient than simply using Ctrl-B and Ctrl-F when you must repeat a giv[...]
-
Seite 59
ELS config> Ctrl-N for NEXT to retrieve the next command in sequence- ELS config>exit Enter Config> Starting a Repeat Sequence After All Commands Are Entered On the other hand, if you first enter C1, C2, ... Cn, and retrieve C1 via Ctrl-B or Ctrl-F . Entering Ctrl-R , entering Ctrl-N successively brings commands C2,..., Cn, C1, C2,..., Cn[...]
-
Seite 60
24 MRS V3.2 Software User ’s Guide[...]
-
Seite 61
Chapter 3. The OPCON Process The Operator Console process (OPCON) is the root-level process of the router software user interface. The main function of OPCON is to control which processes are connected to consoles. Using OPCON commands, you can: v Manipulate the output from a process v Change the intercept character v Display information about rout[...]
-
Seite 62
26 MRS V3.2 Software User ’s Guide[...]
-
Seite 63
Chapter 4. Using OPCON This chapter describes the OPCON interface configuration and operational commands. It includes the following sections: v “Accessing the OPCON Process” v “OPCON Commands” Accessing the OPCON Process When the router starts for the first time, a boot message appears on the console. Then the OPCON prompt (*) appears on [...]
-
Seite 64
T able 3. OPCON Commands (continued) Command Function T alk Connects to another router process and enables the use of its commands. T elnet Connects to another router . Breakpoint Use the breakpoint command to trap information in the MOS system debugging tool, inspect memory , place breakpoints, or obtain a core dump. This command should be used on[...]
-
Seite 65
* status Pid Name Status TTY Comments 1 COpCN1 IOW TTY0 gzs 2 Monitr IDL TTY0 3 Tasker RDY -- 4 MOSDDT DET -- 5 CGWCon DET -- 6 Config DET -- 7 Ezystrt IDL -- 8 ROpCN1 IDL TTY1 9 ROpCN2 RDY TTY2 jlg@128.185.40.40 10 CES3 IDL -- 11 TOUT IDL -- 12 L2S3 IDL -- 13 L3L2 IDL -- 14 LLL2 IDL -- 15 S3CE IDL -- Flush Use the flush command to clear the outpu[...]
-
Seite 66
2 Monitr IDL -- 3 Tasker RDY -- 4 MOSDDT DET -- 5 CGWCon DET -- 6 Config DET -- 7 Ezystrt IDL -- 8 ROpCN1 IDL TTY1 9 ROpCN2 RDY TTY2 jlg@128.185.40.40 Intercept Use the intercept command to change the OPCON intercept character . The intercept character is what you enter from other processes to get back to the OPCON process. The default intercept ke[...]
-
Seite 67
memory Example: memory Number of bytes: Busy = 319544, Idle = 1936, Free = 1592 Busy Specifies the number of bytes currently allocated. Idle Specifies the number of bytes previously allocated but freed and available for reuse. Free Specifies the number of bytes that were never allocated from the initial free storage area. Note: The sum of the Id[...]
-
Seite 68
EasyStart> EZ.001: Starting. EZ.007: Waiting up to 60 seconds for devices to pass self-test. BTP.010: net 0, int TKR/0, Sent client request (htype: 6) BTP.011: net 1, int FR/0, Could not snd client req because: Ifc not up BTP.011: net 2, int FR/1, Could not snd client req because: Ifc not up BTP.011: net 3, int FR/2, Could not snd client req bec[...]
-
Seite 69
Pid Name Status TTY Comments 1 COpCN1 IOW TTY0 2 Monitr IDL -- 3 Tasker RDY -- 4 MOSDDT DET -- 5 CGWCon IOW -- 6 Config IOW TTY1 7 Ezystrt IDL -- 8 ROpCN1 IOW TTY1 128.185.46.101 9 ROpCN2 RDY TTY2 128.185.46.104 Pid Specifies the PID. This is the process to talk to or from OPCON, or it can be an argument to the ST A TUS command to request status i[...]
-
Seite 70
stop EasyStart> EZ.001: Starting. EZ.007: Waiting up to 6 seconds for devices to pass self-test. stop EZ.006: All dlinks/parameters tried but failed; resetting to def values. EZ.009: *** Restarting Router *** No Protocols Configured. Entering Quick Config Router Quick Configuration for the following: o Interfaces o Bridging Spanning Tree Bridge [...]
-
Seite 71
Y ou can use the telnet command with IPv4 or with IPv6 addresses. A router has a maximum of five T elnet sessions: two servers (inbound to the router), and three clients (outbound from the router). Note: T o use T elnet in a pure bridging environment, enable Host Services. Syntax: telnet ip-address terminal-type Example 1: telnet 128.185.10.30 or [...]
-
Seite 72
The status and send subcommands have one of two responses depending on whether or not the user is connected to another host. For example: Connected to a host: telnet> status Connected to 128.185.10.30 Operating in character-at-a-time mode. Escape character is ^ ]. telnet> send ayt Note: The send command currently supports only ayt. Not connec[...]
-
Seite 73
Part 2. Understanding, Configuring, and Using Base Services © Copyright IBM Corp. 1994, 1998 37[...]
-
Seite 74
38 MRS V3.2 Software User ’s Guide[...]
-
Seite 75
Chapter 5. The Configuration Process (CONFIG - T alk 6) and Commands This chapter describes the CONFIG process and includes the following sections: v “What is CONFIG?” v “Using EasyStart” on page 40 v “Config-Only Mode” on page 41 v “Quick Configuration” on page 42 v “Configuring User Access” on page 44 v “Configuring Spa[...]
-
Seite 76
Using EasyStart EasyStart mode automatically downloads the configuration of the router from a BOOTP server . During the process the router displays the EasyStart> prompt and ELS messages which track the process. 1. The Network Administrator sets up the BOOTP server with records for downloading configurations. The Network Administrator must con[...]
-
Seite 77
Config-Only Mode Config-Only mode is entered if the configuration file that you are using is empty or no protocols are configured. Config-Only mode can also be entered manually to recover from an invalid configuration that is causing the router to crash during start-up. Automatic Entry Into Config-Only Mode Config-Only mode is entered if t[...]
-
Seite 78
Device types available: IBD Token Ring WAN Device type: 2. Press Ctrl-C to go to the bootstrap monitor . The > prompt appears. Bootstrap Monitor v1.15 Copyright IBM Corp. 1994, 1997 > 3. Boot to Config-Only mode. > bc PROM Load/Dump Program * Revision: 1.15 * Copyright IBM Corp. 1994, 1997 Host **VL-51* loading Device types available: IBD[...]
-
Seite 79
– The CPU board, which contains the configuration memory chip, was replaced in the router . v Demonstration purposes, for which the router needs to be quickly configured to demonstrate its capabilities. v Bench-marking tests to get the tests going without having to learn the router ’s operating system commands. Quick Config operates as follo[...]
-
Seite 80
Configuring User Access The router configuration process allows for a maximum of 50 user names, passwords, and levels of permission. Each user needs to be assigned a password and level of permission. There are three levels of permission: Administration, Operation, and Monitoring . For more information, see the add user command. T echnical Support[...]
-
Seite 81
2. Add a dial circuit using the add device command. 3. Configure the spare interface by using the net command to configure the interface or add A TM LAN Emulation clients. 4. Configure the various protocols and features using the protocol and feature commands. 5. Exit the CONFIG process by pressing Ctrl-P . 6. Access the GWCON process by enterin[...]
-
Seite 82
Y ou can configure the following protocols on spare interfaces, but you cannot activate them on the network using the activate command: v IPv6 v LNM v OSI/DECnet V v XTP Note: When using the configuration program, use the following to work with spare interfaces: 1. Make the configuration changes for the spare interface on the device 2. Enter the[...]
-
Seite 83
Bridging v Bridging was not already active. v NetBIOS filters are defined on the spare interface. v The spare interface caused a change to the bridge personality or behavior (for example, adding SR port to pure TB bridge or SR-TB conversion enabled). IP Use the reset IP command to bring configuration changes online for access-controls and packet[...]
-
Seite 84
6. Use the reset command to reset the interface and the protocols and features on the interface. Example: * talk 6 Config> net 1 PPP Config> . . . change PPP parameter s... PPP Config> exit Config> protocol ipx IPX Config> . . . change IPX parameters on the PPP interfac e... IPX Config> exit Config> * talk 5 + reset 1 Resetting[...]
-
Seite 85
Y ou can change the configuration parameters of the following protocols and features, but you cannot activate the changes using the reset command: v AppleT alk v Vines v OSI/DECnet V v LNM v XTP v W AN Restoral v W AN Reroute Y ou must restart the device to activate these configuration changes. There are also requirements for certain functions. T[...]
-
Seite 86
Using the CONFIG (T alk 6) Process 50 MRS V3.2 Software User ’s Guide[...]
-
Seite 87
Chapter 6. Configuring and Monitoring the CONFIG Process This chapter describes the CONFIG process configuration and operational commands. It includes the following sections: v “Entering and Exiting CONFIG” v “CONFIG Commands” Entering and Exiting CONFIG T o enter CONFIG from OPCON (*): 1. At the OPCON prompt, enter the status command to [...]
-
Seite 88
T able 4. CONFIG Command Summary (continued) Command Function List Displays system parameters, hardware configuration, a complete user list (including PPP users). Network Enters the configuration environment of the specified network. Patch Modifies the router ’s global configuration. Performance Provides a snapshot of the main processor util[...]
-
Seite 89
All device and protocol configuration information related to network interfaces is stored by interface number . Any changes made to interface numbers will invalidate much of the device configuration information in the protocols. Config> add device dial-circuit Adding device as interface 8 Defaulting Data-link protocol to PPP Use "set data[...]
-
Seite 90
See “Using a Dial-In Access to LANs (DIALs) Server” in the Using and Configuring Features for more information. A user profile stored locally on the device consists of the following: Name The userid of the PPP user , used during authentication. See “PPP Authentication Protocols” on page 455. Password The password known to the user and the[...]
-
Seite 91
A user profile-based IP address to of fer to a dial-in client if requested. There are a number of ways for a 2210 to obtain an IP address for a dial-in client. See “IP Control Protocol” on page 462 for more information. V alid values: any valid IP address Default value: none Net-Route Mask Mask for a network user . If the dial-in user is conne[...]
-
Seite 92
This parameter is displayed only if PPP Encryption Control Protocol (ECP) has been enabled using the talk 6 PPP Config> enable ecp command. MPPE does not require an encryption key . This ECP encryption key is used by the PPP Encryption Control Protocol (ECP). See “Using and Configuring Encryption Protocols” in Using and Configuring Feature[...]
-
Seite 93
Will user be able to dial-out ? (Yes, No): [No] Set ECP encryption key for this user? (Yes, No): [No] y Encryption key should be 16 characters long. Encryption Key (16 characters ) in Hex(0-9, a-f, A-F): Encryption Key again (16 characters) in Hex(0-9, a-f, A-F): ECP encryption key is set. Disable user ? (Yes, No): [No] PPP user name: ppp_user2 Use[...]
-
Seite 94
When the first user is added, console login is automatically enabled. Each user added must be assigned one of the permission levels defined in T able 5. When users are added, set login authentication to local. Otherwise a remote server must be used. T able 5. Access Permission Permission Level Description Administrator (A) Displays configuration[...]
-
Seite 95
communicating with the router . The network address-name can be anything, such as a description of the port. Y ou can use any string of up to 23 printable ASCII characters. The network-dial-address is the telephone number of the local or destination port. Y ou can enter up to 31 characters that are in the valid dial characters for the connected mod[...]
-
Seite 96
Example: change password Enter current password: Enter new password: Enter new password again: Enter current password Specifies your current password. Enter new password Specifies your new password. Enter new password again Specifies your new password again for confirmation. If your confirmation does not match the previous new password, the ol[...]
-
Seite 97
change user User name: [] Change password? (Yes or No) Change permission? (Yes or [No]) tunnel-profile Changes the configuration for a tunnel peer . Config> change tunnel-profile Enter name: []? lac.org Enter hostname to use when connecting to this peer: [lns.org]? set shared secret? (Yes, No): [No] Tunnel-Server endpoint address: [11.0.0.1]? [...]
-
Seite 98
ip (IP) ip-security ipv6 ipx (Novell IPX) isdn l2tp lnm mcf named-profiles nat ndp6 ndr osi (OSI) ospf (OSPF routing protocol) ppp (Point-to-Point) prompt rip6 rsvp sdlc snmp srly (SDLC Relay) tcp/ip-host time (T ime of day information) user v25bis v34 vines (Banyan VINES) wrs (W AN Restoral feature) x25 xtp T o clear a process from nonvolatile co[...]
-
Seite 99
Notes: 1. T o clear user information, you must have administrative permission. 2. There may be other items in the list, depending upon what is included in the software load. Example: clear els You are about to clear all Event Logging configuration information Are you sure you want to do this (Yes or No): Note: The previous message appears for any p[...]
-
Seite 100
tunnel-profile Deletes a tunnel from the tunnel profile database. user user_name Removes user access to the router for the specified user . v25-bis-address address-name Removes a previously added V25bis address. Note: If the address-name contains spaces (for example, remote site Baltimore ), you cannot enter the command on one line. T ype delete[...]
-
Seite 101
Syntax: enable console-login interfac e... modem-control console-login Enables the user to be prompted for a user ID and password on the physical console. This is useful for security situations. If you do not configure any administrative users and you enable this feature, the following message appears: Warning: Console login is disabled until an a[...]
-
Seite 102
Y ou can tell the router to wait for the ring-indication signal before raising Request to Send or Data T erminal Ready . This is provided for countries requiring an earlier handshake. Example: Config> enable modem-control carrier-wait service1 Environment Note: This command is to be invoked only for routers with two service ports. The Environmen[...]
-
Seite 103
High Temperature Alarm Threshold: 80C (176F) Low Temperature Alarm Threshold: 0C (32F) (Hysteresis value: +/- 5C) Hysteresis is the amount the temperature must change past the set alert threshold before the alert condition is cleared. For a device with two service ports, hysteresis value is fixed at ± 5 degrees. For example, if you specify a high[...]
-
Seite 104
Feature Use the feature command to access configuration commands for specific router features outside of the protocol and network interface configuration processes. Syntax: feature [ feature# or feature-short-name ] All 2210 features have commands that are executed by: v Accessing the configuration process to initially configure and enable the[...]
-
Seite 105
tunnel-profile user s... v25-bis-address v34-address devices [ device or devicerange ] Displays the relationship between an interface number and the hardware interface. Y ou can also use this command to check that a device was added correctly issuing the add command. Y ou can also specify a range of devices to list as shown in the following exampl[...]
-
Seite 106
30 APPN Advanced Peer-to-Peer Networking [ISR] Configurable Features: Num Name Feature 0 WRS WAN Restoral 1 BRS Bandwidth Reservation 2 MCF MAC Filtering 6 QoS Quality of Service 7 CMPRS Data Compression Subsystem 8 NDR Network Dispatching Router 10 AUTH Authentication 12 LAYER L2TP 27616 bytes of configuration memory free isdn-address Displays the[...]
-
Seite 107
Call (callback) List callback information for each user , including the type of callback and number . Time List time allowed configured for each user . Dial (dialback) List dial out status for each user . Encr (encryption) List whether encryption is enabled for each user . tunnel-profile Displays the tunnel-profile parameters. Example: Config>[...]
-
Seite 108
Example: list v34-address Local Network Address Name = v403 Local Network Address = 1-508-898-2403 Network Use the network command to enter the network interface configuration environment for supported networks. Enter the interface or network number as part of the command. (T o obtain the interface number , use the CONFIG list device command.) The[...]
-
Seite 109
bgp-subnets new value If you want the BGP speaker to advertise subnet routes to its neighbors, set new value to 1. The default is 0. dls-ignore-lfs new value When set to 1, DLSw ignores the “largest frame” size bits in source-routed frames when setting up a circuit. This avoids circuit setup problems with some older LAN products that do not set[...]
-
Seite 110
the ping command as described in the “Ping” section of the “Monitoring IP” chapter of Protocol Configuration and Monitoring Reference V olume 1 .) ping-ttl seconds The TTL (time-to-live) sent in PINGs by the IP> ping command. Default: 64. (The TTL can also be entered as a parameter of the ping command as described in the “Ping” sect[...]
-
Seite 111
The changes you make through CONFIG are kept in a configuration database in nonvolatile memory and are recalled when you restart the router . Qconfig Use the qconfig command to initiate Quick Config. Quick Config allows you to configure parameters for interfaces, boot records, and bridging and routing protocols without entering separate con?[...]
-
Seite 112
v BSC v FRAME-RELA Y v PPP v SDLC v SRL Y v V25BIS v V34 v X25 Interface# is the number of the interface you are configuring. Note: The data-link parameter cannot be changed for integrated modems. down-notify interface# # of seconds Allows the user to specify the number of seconds before declaring an interface as being down. The normal maintenance[...]
-
Seite 113
v Less than 78 characters and is case sensitive v Set before storing the router ’s configuration memory in IBD. inactivity-timer #_of_min Changes the setting of the Inactivity T imer . The Inactivity Timer logs out a user if the remote or physical console is inactive for the period of time specified in this command. This command af fects only c[...]
-
Seite 114
receive buffers for an interface is based on that interface’s configured packet size and the packet size of global buffers are autoconfigured. If you specify a non-zero value, the configured value is used as the global buffer packet size and any interfaces that have a configured packet size that is larger than the maximum packet size will use[...]
-
Seite 115
receive-buffers interface# max# Adjusts the number of private receive buffers for most interfaces. The range is 5 to 1000. Note: This command is not applicable for ISDN Primary Rate Interfaces . For ISDN PRI, the number of receive buffers is fixed at 5 per B-channel, 1 15 for T1 and 150 for E1. When in channelized mode, the PRI gets 5 receive buff[...]
-
Seite 116
host IP_address Sets the IP address of the RFC 868-compliant host that will be used as the time source. This is the address of a host which will respond to an empty datagram on UDP port 37 with a datagram containing the current time. list Displays all configured time-related parameters. This includes the current time (if set) and the source of the[...]
-
Seite 117
Follow the instructions on the release notice sent with the software. The update command is the last command that you enter when loading new software. After you enter this command, the console displays a message indicating configuration memory is being updated. CONFIG Commands Chapter 6. Configuring and Monitoring the CONFIG Process 81[...]
-
Seite 118
CONFIG Commands 82 MRS V3.2 Software User ’s Guide[...]
-
Seite 119
Chapter 7. The Boot CONFIG Process This chapter describes the Boot CONFIG process. This chapter includes the following sections: v “What is Boot CONFIG?” v “How the BOOTP Forwarding Process W orks” on page 84 v “Using the T rivial File T ransfer Protocol (TFTP)” on page 86 v “V alidating the Configuration Load” on page 88 v “Load[...]
-
Seite 120
Y ou can configure more than one boot file in the boot configuration database by specifying the path and name of each boot file (using the add command described on page “Add” on page 94). If you have more than one host server , you can use a different host server to boot the router when another host server cannot be reached over the network[...]
-
Seite 121
A Device as a BOOTP Relay Agent If BOOTP request requires multiple hops before reaching the BOOTP server , the BOOTP relay agent routes the packet via IP to all BOOTP servers that it knows about. If any other router receives this packet while it is being routed via IP , it will examine the packet to determine whether it is a BOOTP packet and route [...]
-
Seite 122
constructs a BOOTP reply and adds the client’s IP address, along with the location of the Boot server and boot filename. If a match does not occur , the packet is dropped. T o add a BOOTP server to the router’s configuration, enter the following command at the IP configuration prompt: IP Config> add BOOTP-SERVER [IP address of server] Y o[...]
-
Seite 123
2. Configure IP so that the device can reach each host with the archived configuration. The Protocol Configuration and Monitoring Reference explains the IP configuration commands. v The source IP address for TFTP transfers is the device ID. This ID, by default, is a configured IP address for one of the device’s network interfaces. T o change[...]
-
Seite 124
The router accepts any printable ASCII character as part of the file name definition, with two exceptions: v The file name cannot begin with a numeric character v The file name cannot contain a RETURN or LF (line feed) character . The character string can accept a space, but it is recommended that you avoid using a space character , as this cha[...]
-
Seite 125
Loading an Image at a Specific T ime There may be occasions when you may want to load an image into a device on a specific day and time when you will be unavailable. Y ou can configure the device to perform a timed load using the timedload activate command . Other commands allow you to view a device’s scheduled load information or cancel a sch[...]
-
Seite 126
be globally readable and the dump directories globally writable. The boot and dump functions use the TFTP protocol. Y our TFTP server may impose additional restrictions. Installing Software/Code T o download a new load module from a server into the IBD, perform the following steps: 1. Install your load file into a server that is reachable by the d[...]
-
Seite 127
Boot config> tftp get Local filename []? ibd/newloadfile Remote host []? Host filename []? 10. Enter list boot-entries at the Boot config> prompt. This lists the load modules in your IBD. Boot config> list boot-entries Note the entry number of the load module in the IBD that you were using prior to receiving this load module. The boot data[...]
-
Seite 128
Using the Boot CONFIG Process 92 MRS V3.2 Software User ’s Guide[...]
-
Seite 129
Chapter 8. Configuring Boot CONFIG This chapter describes the Boot CONFIG configuration and operational commands. It includes the following sections: v “Entering and Exiting Boot CONFIG” v “Boot CONFIG Commands” Entering and Exiting Boot CONFIG T o enter the Boot CONFIG command environment, use the CONFIG boot command. When the router’s[...]
-
Seite 130
T able 1 1. Boot CONFIG Commands (continued) Command Function T imedload Schedules an image load into the device on a specific day and time, cancels a scheduled load or displays scheduled load information. TFTP Initiates TFTP file transfers between device memory or IBD and remote hosts. Exit Returns you to the previous command level. See “Exiti[...]
-
Seite 131
can configure more than one boot device. Obtain the loadname using the list ibd command. The loadname is case-sensitive. Example: add boot-entry remote host or IBD loadname [0.0.0.0]? 128.185.30.0 via gateway (0.0.0.0 if none) [0.0.0.0]? 0.0.0.0 timeout in seconds [3]? 10 file name [ ]? loads/Y21.ldc v If the device is booting using software store[...]
-
Seite 132
dump-entry Specifies the IP address of the remote host that will receive the dump file(s). When you enter the add dump-entry command, you must supply the following information: remote host? IP address of the remote host on which the dump file will be stored, usually same as boot server via gateway? If host is on a remote network (not directly co[...]
-
Seite 133
change address Change which entry [1]? 1 Which interface is this address for [0]? 1 New address [192.9.1.1]? 128.185.162.1 Net mask for this interface [255.255.255.0]? boot-entry Modifies the configuration about a previously added network boot file. When you enter the change boot-entry command, you must supply the following information: v Boot e[...]
-
Seite 134
Copy Use the copy command to copy boot files and configuration files to and from remote routers and hosts. T o use the copy command, the device must have IP configured and running on at least one interface. The device cannot be in Config-only mode. Syntax: copy config [ibd or filename ] [ host-ip-address or filename ] Example 1 - Copying fr[...]
-
Seite 135
[ibd or filename ] Copies a boot file or configuration file from an IBD. Y ou must include the file name. [ host-ip-address or filename ] Copies a boot file or configuration file from a remote host. Y ou must include the file name. Delete Use the delete command to remove entries from the boot and dump configuration database. Syntax: dele[...]
-
Seite 136
When you enter the delete dump-entry command, a prompt appears for the entry you want to delete. The dump entry number is the first number that appears on each line when you enter the list dump-entries command at the Boot config> prompt. T o verify the deletion, use the list command. Example: delete dump-entry Delete which entry [1]? Describe U[...]
-
Seite 137
list all command to verify the dump settings. Dumping is suppressed until you enter the enable dumping command. Disable dumping is the default setting. unique-naming Suppresses the automatic unique naming of dump files. After entering this command, use the Boot CONFIG list all command to verify the unique naming settings. Unique naming is suppress[...]
-
Seite 138
Specifying a bank number may result in a partial erase of the load image file if it is large enough to traverse more than one bank. Example 1: erase test Erasing bank 5 ... Banks 1-4 contain ... Banks 5-7 have been erased Example 2: erase 2 Are you sure you want to erase bank 2? (Yes or [No]): yes Erasing bank 2 ... Banks 5-7 has been erased Examp[...]
-
Seite 139
list addresses Interface addresses: 1: 192.9.1.1 on interface 0, mask 255.255.255.252 2: 192.9.223.39 on interface 2, mask 255.255.255.0 all Displays all boot and dump configuration data and the current settings for the dump, unique-naming capabilities, and scheduled image load information. Example: Interface Addresses: Boot files: 1: "/u/ste[...]
-
Seite 140
Banks 2-3 contain load "vl/load-ver2.ldc" which uses 1652961 bytes Loaded using TFTP over IP Filename loads/vl/load-ver2.ldc Host 128.185.210.125 Bank 4 contains load "vl/load-ver4.cfg" which uses 131084 bytes Loaded using TFTP over IP Filename CONFIG Host 0.0.0.0 “Loaded using TFTP over IP” implies that you used the copy co[...]
-
Seite 141
2. A prompt then asks you to confirm the load. Enter no to cancel the command. Enter yes to load the boot file from the remote host into RAM. Example: load remote Remote Host Address [0.0.0.0]? 128.185.210.125 Remote Pathname[]? /loads/vl.ldc First Hop Address[0.0.0.0]? 128.185.208.38 TFTP Timeout Value [3]? Are you sure you want to reload the ga[...]
-
Seite 142
T imedload Use the timedload command to schedule an image load on a device, cancel a scheduled load, or to view scheduled load information. This command allows you to load a software image into the device outside of peak network traff ic periods when support personnel may not be present. Syntax: timedload activate deactivate view activate Schedules[...]
-
Seite 143
Boot config> timedload activate Time Activated Load Processing... Remote host IP address or IBD load name [0.0.0.0] ibd:vl3.cce Time of day to load image (YYYYMMDDHMM) []? 199703191630 The load timer has been activated. deactivate Cancels a scheduled load. Example 1. Deactivate time activated load: Boot Config> timedload deactivate Deactivate[...]
-
Seite 144
Syntax: tftp get put get CONFIG address-remote-server path/filename Initiates a request to a TFTP server to transfer a file from the server to the device. The server sends a data packet and the client node acknowledges receipt of the data. This cycle continues until the transfer is complete and the following message appears on the console: TFTP t[...]
-
Seite 145
The console display is the same as the TFTP get command. Example: tftp put Local filename [CONFIG]? Remote host [0.0.0.0]? 128.185.163.1 Host filename [0A019947.cfg]? TFTP transfer complete, status: Timeout local filename? CONFIG is a filename that refers to the device’s nonvolatile memory . remote Host? Y ou must specify the IP address of the [...]
-
Seite 146
11 0 MRS V3.2 Software User ’s Guide[...]
-
Seite 147
Chapter 9. Boot Options This chapter covers the boot options available. Normally , the device boots from the Integrated Boot Device (IBD). Y ou need to use this chapter only for maintenance or diagnostic operations or for software upgrades. The boot options allow you to boot the 2210 using the following methods: T able 13. Description of Boot Metho[...]
-
Seite 148
2. Enter bm and the console displays the following information and the first boot prompt: PROM Load/Dump Program * Revision: 1.0 * Copyright IBM Corp. 1994, 1997 IBD has load(s) load image names Device Slot Number or IBD Load Name: 3. Enter the load image name. The IBD load name is case-sensitive. Press Return . The software is loading when you se[...]
-
Seite 149
Enter @ to retry BOOTP . If the retry fails, use another method to boot the 2210. Booting from a TFTP host server using a console terminal Y ou can use a load image file on a TFTP host server to boot the 2210. Another router can act as a TFTP host server . An example of a TFTP boot is shown below . 1. At the boot monitor prompt, (>), enter bm t[...]
-
Seite 150
T able 14. Boot Options Option Name Description B Boot using stored Configuration Boots automatically using the configuration stored in TFTP or in the IBD. BC Boot to Config-only Mode using console queries Displays prompts to manually boot the 2210 and then enters Config-only mode, allowing you to begin configuring the 2210. BM Boot using Cons[...]
-
Seite 151
T able 15. Boot Option Prompts Prompt Description Device T ype The device type over which to boot the 2210; either the IBD, the T oken-ring, or Ethernet interface. IBD Loadname The IBD loadname, which can include up to 79 characters, digits, and symbols and is case-sensitive. For initial installations, enter the filename in the Release Notes (fil[...]
-
Seite 152
T able 15. Boot Option Prompts (continued) Prompt Description Cable T ype (X21/Other) Enter X21 to connect an X.21 cable to this port. Enter other to connect any other cable type to this port. B (Boot) Boots the router automatically using the configuration stored in configuration memory . This option causes the router to boot from the IBD unless [...]
-
Seite 153
The Standalone Configuration Process. You are here because the watchdog timer timed out and/or Autoboot not selected. Config (only)> If there is no T oken-Ring link active, you receive the following message: lobe media test failed: function failure v If you enter Ethernet , you see the following: Connector Type (AUI/RJ45)[AUTO_CONFIG]: Interface[...]
-
Seite 154
T o reload the current configuration, press Enter . T o load another configuration, enter the load name at the prompt. Loading using IBD Load Image "load name" If you specify an incorrect or nonexistent load name, the system issues the following message: No such load and returns you to the IBD Load Name prompt. v If you enter T oken Rin[...]
-
Seite 155
Note: The PPP protocol is currently the only data link layer protocol that can be used when booting over a W AN interface. BN (Boot, But Do Not Run, Using Console Queries) Do not use this boot option. This option is used by field service personnel only . BP (Boot using BOOTP) Boots using the Bootstrap Protocol. The following example shows how to b[...]
-
Seite 156
Unsuccessful BOOTP A BOOTP boot fails if the server is down, if the server cannot find the file you specified, or if TFTP fails. If BOOTP is unsuccessful, the terminal displays the message Manual BOOTP failed - enter "@" at prompt to BOOTP again. Enter @ to retry BOOTP . If the retry fails, use another method to boot the 2210. D (Dump [...]
-
Seite 157
If you try to execute one of these tests without the wrap plugs installed, you receive the following message: You have selected a test that requires external wrap plugs to be present. Remove the cable(s) from the network, and attach the appropriate wrap plug(s). 3. Press the space bar to select one of the diagnostic options available and follow the[...]
-
Seite 158
T o display this information: Enter ub at the boot prompt (>). The screen displays information similar to the example shown below . TFTP bootstrap configuration: Host ibmMRNSV1 - .191, Dumping disabled, Unique dump naming off Interface Addresses: 1: 128.196.145.191 on port 0 (Token Ring/Ethernet), mask FFFFF00 Boot Files 1: ibmMRNS.ldc on 123.17[...]
-
Seite 159
LC (Load Configuration Memory) Loads configuration memory from a host on the network. T o use this option, do the following: Enter lc at the boot prompt (>). The screen displays information similar to the following: Device Types available: IBD Token Ring/Ethernet WAN Device type [Token Ring]: v If you enter T oken Ring , you will see the follo[...]
-
Seite 160
WAN port [2]: Timeout (secs) [20] ? Clock Source (INT/EXT) [INT]: Internal Clock Speed 1 Interface IP address: 123.175.56.119 IP mask [FFFFFF00]: Load Cfg from host: 123.175.68.219 Via gateway: 123.175.56.190 Config file name: ibmMRNS.cfg Using Serial Line at ( 0, 0). Trying host 123.175.68.219 via 123.175.56.190 file ibmMRNS.cfg .loading Receiving[...]
-
Seite 161
4. Enter n to return to the OPCON prompt. Note: Refer to the documentation supplied with your ZModem software for the ZModem commands to use at your console terminal. Configuring the 2210 After the 2210 has booted, you can configure it. The sections that follow briefly describe the configuration processes available when using an ASCII terminal [...]
-
Seite 162
126 MRS V3.2 Software User ’s Guide[...]
-
Seite 163
Chapter 10. The Operating/Monitoring Process (GWCON - T alk 5) and Commands This chapter describes the GWCON process and includes the following sections: v “What is GWCON?” v “Entering and Exiting GWCON” v “GWCON Commands” What is GWCON? The Gateway Console (monitoring) process, GWCON (also referred to as CGWCON), is a second-level proc[...]
-
Seite 164
T able 16. GWCON Command Summary Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See “Getting Help” on page 10. Activate Enables a newly configured spare interface. Boot Displays information about how the device was booted last. Buffer Displays inf[...]
-
Seite 165
In the first example, the router was booted using TFTP over Ethernet. The message indicates the method of booting, the line number , the CSR (Command and Status Register) address, the IP address, the filename, the host, and the gateway . The line number distinguishes one port from another on a multiport board. The CSR address (the first of the t[...]
-
Seite 166
Low Low water mark (flow control). Curr Current number of buffers on this device. The value will be 0 if the device is disabled. When a packet is received, if the value of Curr is below Low , then the packet is eligible for flow control. (See the queue command for conditions.) Buf fer Sizes: Hdr Sum of the maximum hardware, MAC, and data link hea[...]
-
Seite 167
configuration Multiprotocol Routing Services 2210-MRS Feature 3768 V3.2 Mod 0 PTF 0 RPQ 0 MRS.E00 cc4_2a Boot ROM version 1.20 Watchdog timer enabled Auto-boot enabled Time: 15:46:12 Friday September 20, 1996 Console baud rate: 9600 Num Name Protocol 0 IP DOD-IP 3 ARP Address Resolution 11 SNMP Simple Network Management Protocol 12 OSPF Open SPF-Ba[...]
-
Seite 168
State Current state of the network interface. T esting Indicates that the interface is undergoing a self-test. Occurs when the router is first started, when a problem is detected on the interface, or when the test command is used. When an interface is operational, the interface periodically sends out maintenance packets and/or checks the physical [...]
-
Seite 169
Not Present Indicates that the interface’s adapter is not plugged in. Not Present is also used as the state for a null device. Spare interfaces are displayed as null devices until they are activated. HW Mismatch Indicates that the configured adapter type does not match the adapter type that is actually present in the slot. Disable Use the disabl[...]
-
Seite 170
The list command displays a status screen with the current temperature, the amount of time between successive temperature readings, the noted maximum and minimum seen since the last reset/clear , and alerts when the temperature threshold, high or low , has been passed, as well as the hysteresis value. Example: ENV> list Time: 14:23:12 Sunday, Ja[...]
-
Seite 171
Input Unk Proto Number of packets received for an unknown protocol. Input Flow Drop Number of packets received that are flow controlled on output. Output Discards Number of packets that the router chose to discard rather than transmit due to flow control. Output Errors Number of output errors, such as attempts to send over a network that is down [...]
-
Seite 172
Syntax: feature feature# or feature-short-name Interface Use the interface command to display statistical information about the network interfaces (for example, Ethernet or T oken-Ring). This command can be used without a qualifier to provide a summary of all the interfaces (shown in the following output) or with a qualifier to reveal detailed in[...]
-
Seite 173
T o display the current logging level, do not enter an octal number as part of the command. T o change the logging level, enter the octal number of the new logging level as part of the command. The default logging level is 76 (octal). Note: T o change the initial logging level (that is, the level that the router uses when it starts), use the CONFIG[...]
-
Seite 174
Reserve Minimum amount of memory needed by the currently configured protocols and features. Never Alloc Memory that has never been allocated. Perm Alloc Memory requested permanently by router tasks. T emp Alloc Memory allocated temporarily to router tasks. Prev Alloc Memory allocated temporarily and returned. Number of global buffers: T otal T ota[...]
-
Seite 175
+ network 3 X.25> In the example, the X.25> prompt is displayed. Y ou can then view information about the X.25 interface by entering the X.25 operating commands. After identifying the interface number of the interface you want to monitor , for interface-specific information, see the corresponding monitoring chapter in this manual for the spe[...]
-
Seite 176
See the corresponding monitoring chapter in this manual or in the Protocol Configuration and Monitoring Reference for information on a specific protocol’s console commands. Queue Use the queue command to display statistics about the length of input and output queues on the specified interfaces. Information about input and output queues provide[...]
-
Seite 177
Due to the scheduling algorithms of the router , the dynamic numbers of Curr (particularly the Input Queue Curr) may not be fully representative of typical values during packet forwarding. The console code runs only when the input queues have been drained. Thus, Input Queue Curr will generally be nonzero only when those packets are waiting on slow [...]
-
Seite 178
Bytes T rans Number of bytes transmitted at the MAC layer . T est Use the test command to verify the state of an interface or to enable an interface that was previously disabled with the disable command. If the interface is enabled and passing traff ic, the test command will remove the interface from the network and run self-diagnostic tests on the[...]
-
Seite 179
v Whether the router was last reloaded or restarted. v T ime elapsed since the last reload. v T ime elapsed since the last restart. Syntax: uptime GWCON Process Chapter 10. The Operating/Monitoring Process (GWCON - T alk 5) and Commands 143[...]
-
Seite 180
GWCON Process 144 MRS V3.2 Software User ’s Guide[...]
-
Seite 181
Chapter 1 1. The Messaging (MONITR - T alk 2) Process This chapter explains how to collect and display messages. (Refer to “Chapter 12. Using the Event Logging System (ELS)” on page 147 for information about ELS and message formats. Refer also to the IBM Nways Event Logging System Messages Guide for a description of each message. This chapter i[...]
-
Seite 182
T o specify a default device for MONITR, define the device in Static RAM by using the CONFIG set logging disposition command. Specifying a default device is useful if you have a terminal set up to print. Messaging (MONITR) 146 MRS V3.2 Software User ’s Guide[...]
-
Seite 183
Chapter 12. Using the Event Logging System (ELS) This chapter describes the Event Logging System (ELS). The ELS continually logs all events, filtering them according to parameters that you select. A combination of operational counters and the ELS provides information for monitoring the health and activity of the system. The information is divided [...]
-
Seite 184
Entering and Exiting the ELS Configuration Environment The ELS configuration environment (available from the CONFIG process) is characterized by the ELS Config> prompt. Commands entered at this prompt create the ELS default state that takes effect after you restart the router . These commands are described in greater detail later in this chapt[...]
-
Seite 185
Interpreting a Message This section describes how to interpret a message generated by ELS. Figure 4 shows the message contents. The information illustrated in Figure 4 as well as the ELS logging level information displayed with the list subsystem command is as follows: Subsystem Subsystem is a predefined short name for a router component, such as [...]
-
Seite 186
T able 17. Logging Levels Logging Level T ype UI ERROR Unusual internal errors CI ERROR Common internal errors UE ERROR Unusual external errors CE ERROR Common external errors ERROR Includes all error levels above UINFO Unusual informational comment CINFO Common informational comment INFO Includes all comment levels above ST ANDARD Includes all err[...]
-
Seite 187
T able 18. Packet Completion Codes (Error Codes) (continued) Code Meaning 1 Random, unidentified error 2 Packet not queued for output due to flow control reasons 3 Packet not queued because network is down 4 Packet not queued to avoid looping or bad broadcast 5 Packet not queued because destination host is down (only on networks where this can be[...]
-
Seite 188
v Use the IBM Nways Event Logging System Messages Guide to determine which messages are not normal. When initially viewing ELS from the MONITR process, you will see a considerable amount of information. Because the router cannot buffer and display every packet under moderate to heavy loads the buffers are flushed. When this occurs the following me[...]
-
Seite 189
Y ou can also use remote logging instead of capturing ELS output on a UNIX Host. For more information about remote logging, see “Using and Configuring ELS Remote Logging” on page 155. Configuring ELS So Event Messages Are Sent In SNMP T raps ELS can be configured so that event messages are sent to a network management workstation in an SNMP [...]
-
Seite 190
ELS> nodisplay subsystem all all ELS> display subsystem tkr all Ctrl-P * t2 As the messages begin to scroll by , look for ELS message tkr .031. ELS Example 2 SRB bridging is not working. 1. Check the configuration. 2. Use the GWCON bridging console to verify that the bridging interfaces are enabled. 3. Enter: * t6 config> event ELS config[...]
-
Seite 191
Using and Configuring ELS Remote Logging The remotely-logged ELS message contains all of the information that is contained in ELS messages found in the monitor queue, as viewed under talk 2, and also contains additional information as shown in Figure 5. Note the following differences in the remote log display: v The month and day of month in addit[...]
-
Seite 192
remote workstation. However , a particular 2210 can log to one and only one remote workstation. The operating system used in this example is AIX 4.2. Y our environment may be slightly different. For more information on syslog, refer to the documentation for your operating system. T o perform the configuration on an AIX workstation, you must log in[...]
-
Seite 193
Configuring the 2210 for Remote Logging T o configure a 2210: 1. In talk 6, configure the remote-logging facility as shown in Figure 7 on page 158. The IP address specified as the source-ip-addr should be an IP address that is configured in the 2210 for easier identification when the IP address or the hostname is shown in the remotely-logged [...]
-
Seite 194
the name server at least responds quickly with “address not found.” T o determine whether this happens, issue the host command on your workstation as follows: workstation> host 5.1.1.1 host: address 5.1.1.1 NOT FOUND workstation> If the response takes more than 1 second, select an IP address which resolves more quickly . 2. In talk 6 con?[...]
-
Seite 195
Remote Logging Output Figure 9 on page 160 shows a sample from the /tmp/syslog_news_info file. Notice that the first message has a sequence number of 310. This means that the first 309 ELS messages were not sent from the source 2210. There are several reasons for this: v The remote-logging facility had not completed initialization when the messa[...]
-
Seite 196
v A route from the source 2210 to the remote workstation was not in the routing table v The interface for the outbound UDP packet containing the ELS messages was not in the “Up” state Notice in 1 that messages 31 1-313 did not get remote-logged. This is because an ARP request was outstanding and until the ARP response is received, all but the ?[...]
-
Seite 197
Y ou can use the timestamp, which appears in both the remote-logging output file and the talk 2 output, to determine when the first ELS message is successfully remote-logged. T o use the timestamp for this purpose, configure ELS such that the timestamp in the monitor queue displays the time-of-day . Also notice in Figure 9 on page 160 that messa[...]
-
Seite 198
3. Use the net number from the previous step to determine the associated MAC address 4. In talk 6, add an ARP entry to establish a static IP address to MAC address relationship Additional Considerations ELS Messages Containing IP Addresses ELS messages containing an IP address which matches the IP address of the remote workstation will not be remot[...]
-
Seite 199
Duplicate Logging If a facility value is repeated in syslog.conf , for example: user.debug /tmp/syslog_user_debug user.alert /tmp/syslog_user_alert The syslog daemon will log user .debug messages only to the /tmp/syslog_user_debug file while user .alert messages will be logged to both the /tmp/syslog_user_debug file and the /tmp/syslog_user_alert[...]
-
Seite 200
v Specify an event that stops message buffering and what action the system takes when the event occurs. v Send a formatted version of the buffer to a file at a remote server . v View a specific number or all of the ELS messages in the buf fer . For specifics about the commands, see “ELS Message Buffering Configuration Commands” on page 184 [...]
-
Seite 201
Bughlt: Dump initiated by ELS Stop Action. BUGHLT+80; Dump initiated by ELS Stop Action. Note: In reality if the stop action is the SYSTEM-DUMP you will not be able to list the final status as above nor view the buffer because the router will be attempting to reload. Using ELS Chapter 12. Using the Event Logging System (ELS) 165 | | | | | | | | | |[...]
-
Seite 202
166 MRS V3.2 Software User ’s Guide[...]
-
Seite 203
Chapter 13. Configuring and Monitoring the Event Logging System (ELS) This chapter describes how to configure events logged by ELS and how to use the ELS commands. The information includes the following sections: v “Accessing the ELS Configuration Environment” v “ELS Configuration Commands” v “Entering and Exiting the ELS Operating En[...]
-
Seite 204
T able 19. ELS Configuration Command Summary (continued) Command Function Delete Deletes an event number from an existing group or deletes an entire group. Display Enables message display on the console monitor . Filter Filter ELS messages based upon the net number . List Lists information on ELS settings and messages. Nodisplay Disables message d[...]
-
Seite 205
Default Resets the display or trap setting of an event, group, or subsystem back to a disabled state. Syntax: default display trap remote display event OR group OR subsystem Controls the output of the display of messages to the monitoring. trap event OR group OR subsystem Controls the generation of traps to the network management station. remote ev[...]
-
Seite 206
display range gw 19 22 Displays events gw .19, gw .20, gw .21, and gw .22. subsystem subsystemname Displays messages associated with the specified subsystem. T o find out which subsystems are on the router , type list subsystems . Note: Although ELS supports all subsystems on the router , not all devices support all subsystems. See Event Logging [...]
-
Seite 207
list r Remote Logging is ON Source IP Address = 192.67.38.2 Remote Log IP Address = 192.9.200.1 Default Syslog Facility = LOG_DAEMON Default Syslog Priority Level = LOG_CRIT Number of Messages in Remote Log = 256 Remote Logging Local ID = MYHOSTNAME status Lists the subsystems, groups, and events that have been modified by the display , nodisplay [...]
-
Seite 208
trace-status Displays information on the status of packet tracing, including configuration and run-time information. Example: list trace-status ------------------------- Configuration ----------------------------- Trace Status:ON Wrap Mode:ON Decode Packets:ON HD Shadowing:ON RAM Trace Buffer Size:100000 Maximum Trace Buffer File Size:10000000 Max[...]
-
Seite 209
particular message level, “all” is assumed). Additionally , with the noremote subsystem command, you can set a syslog_facility and syslog_level for any remaining message levels that have not been turned off. Syntax: noremote even t... grou p... rang e... subsyste m... event subsystem.event# Suppresses the remote logging of messages for the spec[...]
-
Seite 210
Notrace Disables packet trace for the specified event/range/subsystem/group. Syntax: notrace even t... grou p... rang e... subsyste m... event subsystem.event# Suppresses the sending of packet trace data for the specified event# group groupname Suppresses the sending of packet trace data that was previously added to the specified group (groupnam[...]
-
Seite 211
Where first_event_number is the number of the first event in the specified event range, and last_event_number is the number of the last event of the specified event range. Suppresses the sending of messages for the events in the specified range for the specified subsystem in SNMP traps. Example: notrap range gw 19 22 Suppresses the sending of[...]
-
Seite 212
log_crit log_err log_warning log_notice log_info log_debug These values do NOT have any particular association with any daemons on the IBM 2210. They are merely identifiers which are used by the syslog daemon on the remote workstation. range subsystemname first_event_number last_event_number syslog_facility syslog_level Where first_event_number [...]
-
Seite 213
Set Use the set command to set the maximum number of tags per second, the timestamp feature, or to set tracing options. Syntax: set p i n... remote-loggin g... timestam p... trac e... pin max_traps Use the set pin command to set the pin parameter to the maximum number of traps that can be sent on a per-second basis. Internally , the pin resets ever[...]
-
Seite 214
log_kern log_lpr log_mail log_news log_syslog log_user log_uucp log_local0-7 level Specifies a value that, in conjunction with the facility value, is used by the syslog daemon in the remote workstation to determine where to log messages. This value is used for all remotely-logged ELS messages unless you specify a different value for a particular E[...]
-
Seite 215
included in the logged message at the remote file and can help identify which machine logged the message. timestamp [timeofday or uptime or off] Allows you to turn on message timestamping so that either the time of day or uptime (number of hours, minutes, and seconds, but no date, since the router was last initialized) appears next to each message[...]
-
Seite 216
on Enables packet tracing. reset Clears the trace buffer and resets all associated counters. stop-event event id Stops tracing when an event (event id) occurs. Enter either an ELS event id (for example: TCP .013) or “None”. “None” is the default. T racing stops only if the display of the particular ELS event is enabled. When a stop-event oc[...]
-
Seite 217
subsystem subsystemname Allows trace events associated with the specified subsystem to be displayed on the router monitoring. T rap Use the trap command to select the message to be sent to the remote SNMP network management workstation. A remote SNMP network management workstation is an IP host in the network acting as an SNMP manager . Syntax: tr[...]
-
Seite 218
“TRAP”, “TRACE”, or “REMOTE-LOGGING”). Finally , you specify the net number (or range of net numbers) that you want to filter . When you enable the filter , messages that have been turned on by the ELS commands are subject to filtering. The filter allows only messages with the specified net numbers. The filter causes the device to[...]
-
Seite 219
If you specify net#_start and net#_end as the same number , you are filtering on a single net number . The command create remote range ipx 19 22 3 6 filters all ipx messages beginning with IPX.019 and ending with IPX.022 for net numbers 3 through 6 for remote logging. subsystem subsystem_name net#_start net#_end Specifies the subsystem and net n[...]
-
Seite 220
List Use the list command to list a specific ELS filter or all ELS filters. Syntax: list all filter filter# all Lists all currently configured filters. filter Lists the filter specified by filter#. ELS Message Buf fering Configuration Commands T able 21 describes the commands available at the ELS Config Advanced> prompt. T able 21. EL[...]
-
Seite 221
range subsystem event subsystem.event# Causes the specified message ( subsystem.event# ) to be logged to the message buffer . group groupname Allows messages that were previously added to the specified group to be logged to the message buffer . range subsystemname first_event_number last_event_number Where first_event_number is the number of th[...]
-
Seite 222
Causes the messages in events gw .19, gw .20, gw .21, and gw .22 not to be logged to the message buffer . subsystem subsystemname Allows messages associated with the specified subsystem not to be logged to the message buffer . Set Use the set command to configure various ELS message buffering options. Syntax: set buffer-size Kbytes logging [on or[...]
-
Seite 223
2. Logging stops. 3. The system performs the specified “stop action.” Logging remains stopped until the next time you issue the set logging on command or reboot the router . If you do not specify the stop event when you enter the command, the system prompts you to enter the stop event. Specifying none disables the stop event function. Default [...]
-
Seite 224
ELS Monitoring Commands This section summarizes and then explains all the ELS monitoring commands. After accessing the ELS Monitoring environment, you can enter ELS monitoring commands at the ELS> prompt. T able 22. ELS Monitoring Command Summary Command Function ? (Help) Displays all the commands available for this command level or lists the op[...]
-
Seite 225
Syntax: clear even t... grou p... subsyste m... event subsystem. event# Resets the count of events to zero for displaying, trapping, tracing or remote logging of the specified event ( subsystem.event# ). group group.name Resets the count of events to zero for displaying, trapping, tracing or remote logging of the specified group ( group.name ). s[...]
-
Seite 226
Syntax: files trace tftp host_IP_addr filename host_IP_addr Is the IP address of the host to which you are transferring the files. filename Is the target file name. For TFTP , the file name must be fully path specified, and the file name must already exist on the target host. Filter Use the filter command to access the filter configurati[...]
-
Seite 227
event subsystem.event# Displays the logging level, the message, and the count of the specified event. Example: list event ip.007 Level: p-TRACE Message: source_ip_address -> destination_ip_address Active: Count: 84182 If Remote-logging had been activated for this event, and the syslog_facility and syslog_level values were log_daemon and log_cri[...]
-
Seite 228
subsystem all Lists all events, logging levels, and messages for every event that has occurred on the router . trace-status Displays information on the status of packettracing, including configuration and run-time information. Example: list trace-status ------------------------- Configuration ----------------------------- Trace Status:ON Wrap Mode[...]
-
Seite 229
Where first_event_number is the number of the first event in the specified event range, and last_event_number is the number of the last event of the specified event range. Suppresses the displaying of a range of messages for the specified subsystem. Example: nodisplay range gw 19 22 Suppresses the display of events gw .19, gw .20, gw .21, and [...]
-
Seite 230
Use the list event and list active commands to verify what you set with the remote and noremote commands. Notrace Use the notrace command to stop display of selected trace events at the monitoring. Syntax: notrace even t... grou p... rang e... subsyste m... event subsystem.event# Suppresses the display of the specified tracing event. group groupna[...]
-
Seite 231
event subsystem.event# Suppresses the sending of the specified message in an SNMP trap ( subsystem.event# ). group groupname Suppresses the sending of messages in SNMP traps that were previously added to the specified group ( groupname ). range subsystemname first_event_number last_event_number Where first_event_number is the number of the fir[...]
-
Seite 232
event subsystem.event# syslog_facility syslog_level Causes the specified event to be logged remotely . Syslog facility and level values are used by the syslog daemon in the remote workstation to determine where to log the messages. This value overrides the default values that are set with the set facility and set level commands. syslog_facility lo[...]
-
Seite 233
Example: remote range gw 19 22 log_user log_info Causes the event gw .19, gw .20, gw .21, and gw .22 to be logged remotely to the files specified by the syslog_facility value of log_user and the syslog_level value of log_info. subsystem subsystem.name message_level syslog_facility syslog_level Where subsystem.name is the name of the subsystem and[...]
-
Seite 234
Syntax: retrieve Save Use the save command to store the current configuration (except counters). Save does not affect the default configuration (the one you set with the configuration commands). Use save after modifying the configuration with the monitoring commands with the intention of saving this configuration over a restart. There can be o[...]
-
Seite 235
off T urns remote logging off. All messages selected by the remote command will be prevented from being logged. facility Specifies a value that, in combination with the level value, is used by the syslog daemon in the remote workstation to determine where to log messages. This value is used for all remotely-logged ELS messages unless you specify a[...]
-
Seite 236
this IP address is quickly resolved to a hostname by the name server , or at least that the name server responds quickly with “address not found.” T o determine that the IP address resolves properly enter the host command on your workstation as shown: workstation> host 5.1.1.1 host: address 5.1.1.1 NOT FOUND workstation> If the response t[...]
-
Seite 237
wrap-mod e... decode [off or on] T urns packet decoding on or off. Packet decoding is not supported by all components. default-bytes-per-pkt bytes Sets the default number of bytes traced. This value is used if a value is not specified by the component doing the tracing. max-bytes-per-pkt bytes Sets the maximum number of bytes traced for each packe[...]
-
Seite 238
TCP 60 57 2420 0 0 UDP 10 6 179 0 0 BTP 40 13 695 0 0 RIP 30 22 474 0 0 OSPF 80 73 2859 0 0 MSPF 40 17 593 0 0 TFTP 35 29 819 0 0 SNMP 30 28 821 0 0 DVM 30 21 589 0 0 DN 140 115 5842 0 0 XN 35 21 780 0 0 IPX 110 110 4705 0 0 CLNP 80 58 1763 0 0 ESIS 40 24 716 0 0 ISIS 80 58 2422 0 0 DNAV 50 26 1314 0 0 AP2 80 70 1755 0 0 ZIP2 60 51 1859 0 0 R2MP 50[...]
-
Seite 239
Maximum:7976 vector, 155 subsystem Memory:71784/620 vector+ 81256/217714 data+ 64 heap=371438Subsys Subsys Name of subsystem V ector Maximum size of subsystem Exist Number of events defined in this subsystem String Number of bytes used for message storage in this subsystem Active Number of active (displayed, trapped, or counted) events in the subs[...]
-
Seite 240
T rap Use the trap command to select the message to be sent to the remote SNMP network management workstation. A remote SNMP network management workstation is an IP host in the network acting as an SNMP manager . Syntax: trap even t... grou p... rang e... subsyste m... event subsystem.event# Causes the specified message ( subsystem.event# ) to be [...]
-
Seite 241
next prev search ... current Displays the current trace packet. If the current packet is not valid, the first packet in the trace buffer is displayed. first Displays the first traced packet in the trace buffer . jump n Displays the traced packet n packets ahead of or behind the current packet. last Displays the last traced packet in the trace bu[...]
-
Seite 242
on Reset Use the reset command to clear the trace buffer and reset all associated counters. Syntax: reset Set Use the set command to configure tracing options. Syntax: set decode default-bytes-per-pkt disk-shadowing max-bytes-per-pkt memory-trace-buffer-size stop-event wrap-mode exit For an explanation of the set command, see “Set” on page 198[...]
-
Seite 243
Tracing event LEC.12: control frames over ATM Forum LEC: interface 1 Note that if the user DISABLEs and TESTs this LEC interface, the LEC trace settings from Talk 6 Config will take effect. Example: subsystems summary Subsystems Being Traced ATM net number = 0, VPI Range: 0 - 0 VCI Range: 16 - 16 LEC net number = 1 T race-Status Use the trace-statu[...]
-
Seite 244
T able 24. ELS Net Filter Monitoring Commands Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See “Getting Help” on page 10. Create Creates a filter and assigns it a number . A maximum of 64 filters is allowed. Delete Deletes a specified filter [...]
-
Seite 245
Delete Use the delete command to delete a specific ELS filter or all ELS filters. Syntax: delete all filter filter# all Deletes all currently configured filters. filter filter# Deletes the filter specified by filter# . Use the list command to obtain the number for the filter you want to delete. Disable Use the disable command to disable[...]
-
Seite 246
ELS Message Buf fering Monitoring Commands T able 25 describes the commands available at the ELS Config Advanced> prompt. T able 25. ELS Message Buffering Monitoring Commands Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See “Getting Help” on p[...]
-
Seite 247
log event group range subsystem event subsystem.event# Causes the specified message ( subsystem.event# ) to be logged to the message buffer . group groupname Allows messages that were previously added to the specified group to be logged to the message buffer . range subsystemname first_event_number last_event_number Where first_event_number is [...]
-
Seite 248
Example: log range gw 19 22 Causes the messages in events gw .19, gw .20, gw .21, and gw .22 not to be logged to the message buffer . subsystem subsystemname Allows messages associated with the specified subsystem not to be logged to the message buffer . Set Use the set command to change configured ELS message buffering options. Syntax: set loggi[...]
-
Seite 249
stop event [ subsystem.event# or none] Specifies the event ( subsystem.event# ) that stops logging. If you have specified a stop string, the text in the stop string must also match. When the stop event occurs: 1. The next five ELS messages are logged. 2. Logging stops. 3. The system performs the specified “stop action.” Logging remains stop[...]
-
Seite 250
all scroll/noscroll Displays all of the messages in the message buffer . [scroll] Specifies that the screen pauses until you hit the spacebar . Note: If you are displaying a large number of messages, specify scroll so you do not miss any critical messages. noscroll Specifies that the messages will scroll off the screen if the number of messages e[...]
-
Seite 251
Chapter 14. Configuring and Monitoring Performance This chapter describes how to use the Performance configuration and monitor operating commands and includes the following sections: v “Performance Overview” v “Performance Reporting Accuracy” v “Accessing the Performance Configuration Environment” v “Performance Configuration Comm[...]
-
Seite 252
* talk 6 Config> After you enter the talk 6 command, the CONFIG prompt ( Config> ) displays on the terminal. If the prompt does not appear when you first enter configuration, press Return again. 2. At the CONFIG prompt, enter the perf command to get to the PERF Config> prompt. Performance Configuration Commands T o configure Performanc[...]
-
Seite 253
Set Use the set command to set the reporting period. Syntax: set time time Specifies the short window time. V alid V alues: 2 - 30 seconds Default V alue: 2 Accessing the Performance Monitoring Environment Use the following procedure to access the Performance monitoring commands. This process gives you access to the Performance monitoring process.[...]
-
Seite 254
Disable Use the disable command to disable collection of CPU utilization statistics and disable the talk 2 ELS monitor output. Syntax: disable cpu statistics t2 output Enable Use the enable command to enable collection of CPU utilization statistics and enable the talk 2 ELS monitor output. Syntax: enable cpu statistics t2 output List Use the list c[...]
-
Seite 255
set time time Specifies the short window time. V alid V alues: 2 - 30 seconds Default V alue: 2 Performance Monitoring Commands (T alk 5) Chapter 14. Configuring and Monitoring Performance 219[...]
-
Seite 256
Performance Monitoring Commands (T alk 5) 220 MRS V3.2 Software User ’s Guide[...]
-
Seite 257
Part 3. Understanding, Configuring and Operating Interfaces © Copyright IBM Corp. 1994, 1998 221[...]
-
Seite 258
222 MRS V3.2 Software User ’s Guide[...]
-
Seite 259
Chapter 15. Getting Started with Network Interfaces The chapters of this book describe how to configure and monitor network interfaces and link layer protocols supported by the Router . The purpose of this chapter is to give you some basic configuration and monitoring guidelines. This chapter also provides you with basic procedures and informatio[...]
-
Seite 260
Accessing Link Layer Protocol Configuration and Console Processes Refer to “Chapter 1. Getting Started” on page 3 for complete information on accessing the protocol configuration and console processes. Accessing these processes allows you to change and monitor configurable parameters for Link Layer protocols supported by your router . Defin[...]
-
Seite 261
Chapter 16. Configuring IEEE 802.5 T oken-Ring Network Interfaces This chapter describes T oken-Ring interfaces configuration and operational commands. It includes the following sections: v “Accessing the T oken-Ring Interface Configuration Process” v “T oken-Ring Configuration Commands” v “Accessing the Interface Monitoring Process?[...]
-
Seite 262
Note: If the MAC address is 0, the default station address is used. Syntax: list Example: list Token-Ring configuration: Packet size (INFO field): 2052 Speed: 16 Mb/sec RIF Aging Timer: 120 Source Routing: Enabled MAC Address: 000000000000 Packet size Size of the T oken-Ring packet. Speed Speed of the network. RIF Aging Timer Amount of time that th[...]
-
Seite 263
T able 29. T oken-Ring 4/16 V alid Packet Sizes Network Data Speed V alues (# of bytes) 4 Mbps 516 to 4498 Note: If a value greater than 4498 is defined fo ra4M bT R then the software will set it to 4498. If the user does not specify a value, then the default is 2052. 16 Mbps 516 to 18144 Note: If you do not specify a value, then the default is 20[...]
-
Seite 264
This switch is completely independent of whether this interface is providing source routing via the SRT forwarder . The default setting is enabled. Some stations cannot properly receive frames with a Source Routing RIF on them. This is especially common among NetW are drivers. Disabling source routing in this situation will allow you to communicate[...]
-
Seite 265
T oken-Ring Interface Monitoring Commands This section summarizes the T oken-Ring monitoring commands. Enter commands at the TKR> monitoring prompt. T able 30 lists the monitoring commands. T able 30. T oken-Ring Monitoring Command Summary Command Function ? (Help) Displays all the commands available for this command level or lists the options f[...]
-
Seite 266
LLC Use the LLC command to access the LLC monitoring prompt. LLC commands are entered at this new prompt. See “LLC Monitoring Commands” on page 239 for an explanation of each of these commands. Syntax: llc T oken-Ring Interfaces and the GWCON Interface Command While T oken-Ring interfaces have their own monitoring processes for monitoring purpo[...]
-
Seite 267
Maint: Fail Number of maintenance failures The following section describes the statistics displayed that are specific to the T oken-Ring interfaces: Physical address Specifies the physical address of the T oken-Ring interface. Network speed Specifies the speed of the T oken-Ring network that connects to the interface. The Network Speed counter d[...]
-
Seite 268
frames on the ring. The interface may be transmitting the claim T oken frames. This status remains until the interface transmits a ring purge frame. Interface Restarts Specifies the number of times the T oken Ring chip timed out, or the T oken Ring driver received a bad command from the handler . For information about why a restart occurred, see m[...]
-
Seite 269
Lobe wire faults Displays the number of times the network detects an open or short circuit in the cable between the interface and the wiring concentrator . Removes received Displays the number of times the interface receives a remove ring station MAC frame request and removes itself from the network. Burst errors Displays the number of times the in[...]
-
Seite 270
Using the GWCON Interface Command 234 MRS V3.2 Software User ’s Guide[...]
-
Seite 271
Chapter 17. Configuring and Monitoring LLC Interfaces This chapter describes how to configure specific LLC interfaces in the router by using either the interface commands or the GWCON interface command. Logical Link Level can be thought of as a “sub-protocol”. It is not accessed directly from either the T alk 6 (configuration) or the T alk [...]
-
Seite 272
T able 31. LLC Configuration Command Summary (continued) Command Function Exit Returns you to the previous command level. See “Exiting a Lower Level Environment” on page 1 1. List Use the list command to display the current configuration for the LLC. Syntax: list Example: list Reply Timer (T1): 1 seconds Receive ACK Timer (T2): 100 millisecon[...]
-
Seite 273
Set Use the set command to configure the LLC. Attention: Changing LLC parameters from the defaults can affect how the LLC protocol works. Syntax: set n2-max-retry count n3-frames-rcvd-before-ack count nw-acks-to-inc-window count rw-receive-window count t1-reply-timer seconds t2-receive-ack-timer seconds ti-inactivity-timer seconds tw-transmit-wind[...]
-
Seite 274
Example: set t1-reply-timer Reply Timer (T1) in sec. [1]? t2-receive-ack-timer This timer is used to delay sending of an acknowledgment for a received I-format frame. This timer is started when an I-frame is received. The timer is reset when an acknowledgment is sent. If this timer expires, LLC2 sends an acknowledgment as soon as possible. Set this[...]
-
Seite 275
LLC Monitoring Commands This section summarizes and then explains all of the LLC monitoring commands. These commands, shown in T able 32, let you monitor the LLC while passing packets over an SNA network. T able 32. LLC Monitoring Command Summary Command Function ? (Help) Displays all the commands available for this command level or lists the optio[...]
-
Seite 276
Frame Xmt Rcvd UI-frames 4 5 TEST-frames 0 1 XID-frames 0 0 I-frames 291 26 RR-frames 81 291 RNR-frames 0 0 REJ-frames 0 0 SABME-frames 1 0 UA-frames 0 1 DISC-frames 0 0 DM-frames 0 0 FRMR-frames 0 0 I-frames discarded by LLC 0 I-frames Refused by LLC user 0 Cumulative number of sessions 1 Number of active sessions 1 Session ID Remote (int-sap-id) [...]
-
Seite 277
I-frames refused by LLC user Counter that displays the number of I-frames discarded by the software above the LLC. For example, DLSw (Data Link Switching). Cumulative number of sessions The total number of sessions that were opened over this SAP . Number of active sessions The total number of currently active sessions that are running over the inte[...]
-
Seite 278
CKPT_REJ A combination of the checkpointing and rejection states. Resetting The local LLC peer has received a SABME and is reestablishing the link. Remote_Busy The state that occurs when an RNR is received from the remote LLC peer . LB_RB A combination of local_busy and remote_busy states. REJ_LB A combination of rejection and local_busy states. RE[...]
-
Seite 279
RR-frames 502 403 RNR-frames 0 0 REJ-frames 0 0 I-frames discarded by LLC 0 I-frames Refused by LLC user 0 Session Id Indicates the session ID number . Interface Indicates the number of the interface over which this session is running. Remote MAC addr Indicates the MAC address of the remote LLC peer . Source MAC addr Indicates the MAC address of th[...]
-
Seite 280
Current send seq (Vs) Send state variable (Ns value for the next I-frame to be transferred). Current Rcv seq (V r) Receive state variable (next in-sequence Ns to be accepted). Last ACK’d sent frame (V a) Acknowledged state variable (last valid Nr received). No. of frames in ACK pend q Number of transmitted I-frames waiting for acknowledgment. No.[...]
-
Seite 281
t1-reply-timer seconds t2-receive-ack-timer seconds ti-inactivity-timer seconds tw-transmit-window seconds n2-max_retry The maximum number of retries by LLC protocol. For example, N2 is the maximum number of times the LLC transmits an RR without receiving an acknowledgment when the inactivity timer expires. Default is 8. Minimum is 1. Maximum is 12[...]
-
Seite 282
Monitoring LLC 246 MRS V3.2 Software User ’s Guide[...]
-
Seite 283
Chapter 18. Using the Ethernet Network Interface This chapter describes how to use the Ethernet interface. It includes “Displaying Ethernet Statistics through the Interface Command”. Displaying Ethernet Statistics through the Interface Command Y ou can also use the interface command from the GWCON environment to display the following statistics[...]
-
Seite 284
received a bad command from the handler . For information about why a restart occurred, refer to messages Eth.043 and Eth.044 in the IBM Nways Event Logging System Messages Guide Interface type This specifies the connector type as AUI or RJ45. Input statistics: failed, packet too long or failed, frame too long The Failed, Packet T oo Long counter [...]
-
Seite 285
the second transmission attempt. This data is exported via SNMP as the dot3StatsSingleCollisionFrames counter . multiple collisions The Multiple Collisions counter increments when a packet has multiple collisions before being successfully transmitted. This data is exported via SNMP as the dot3MultipleCollisionFrames counter . total collisions The T[...]
-
Seite 286
Using Ethernet Network Interfaces 250 MRS V3.2 Software User ’s Guide[...]
-
Seite 287
Chapter 19. Configuring and Monitoring the Ethernet Network Interface This chapter describes Ethernet interface configuration and operational commands. It includes the following sections: v “Accessing the Ethernet Interface Operating Process” on page 253 v “Ethernet Interface Monitoring Commands” on page 253 Accessing the Ethernet Interfa[...]
-
Seite 288
T able 33. Ethernet Configuration Command Summary (continued) Command Function Physical-Address Sets the physical MAC address. Exit Returns you to the previous command level. See “Exiting a Lower Level Environment” on page 1 1. Connector-T ype Use the connector-type command to set the connector type. 2210s support AUI (10BASE5) and RJ-45 (10BA[...]
-
Seite 289
Example: set physical-address MAC address in 00:00:00:00:00:00 form []? 12:15:00:FA:00:FE Accessing the Ethernet Interface Operating Process T o monitor information related to the Ethernet Network Interface, access the interface monitoring process by doing the following: 1. At the OPCON prompt, enter talk 5 . For example: * talk 5 The GWCON prompt [...]
-
Seite 290
Syntax: collisions Example: Eth> coll Transmitted with 1 collisions:0 Transmitted with 2 collisions:0 Transmitted with 3 collisions:0 Transmitted with 4 collisions:0 Transmitted with 5 collisions:0 Transmitted with 6 collisions:0 Transmitted with 7 collisions:0 Transmitted with 8 collisions:0 Transmitted with 9 collisions:0 Transmitted with 10 c[...]
-
Seite 291
Chapter 20. Overview of LAN Emulation Note: See the glossary for definitions of the acronyms and terms used in this chapter . The IBM 2210 implements the LAN Emulation Over A TM: V ersion 1.0 Specification which is widely accepted as the industry standard for multivendor multiprotocol interoperability . This chapter introduces basic LAN emulation[...]
-
Seite 292
The network management benefits of emulated LANs (ELANs) come from increased flexibility in handling moves, adds, and changes. Membership in an ELAN is not based on physical location; instead, logically-related stations are grouped to form an ELAN (stations can also be members of multiple ELANs). As long as ELAN memberships are retained, no recon[...]
-
Seite 293
Broadcast and Unknown Server (BUS) A LAN emulation service component responsible for the delivery of multicast and unknown unicast frames. The LES, BUS, and LECS are collectively referred to as the LE service components. Each ELAN has a dedicated LES and BUS. LE clients reside in end systems, either in A TM-attached hosts or in bridges or LAN switc[...]
-
Seite 294
End stations obtain their Network Prefix from the switch and form their own addresses by appending an ESI and selector . These addresses must then be registered with the switch, which rejects the registration if the A TM address is not unique. ESI Each A TM interface on the router has a universally administered, or burned-in, MAC address. Y ou can[...]
-
Seite 295
explicit assignment; by default, 200 of the 256 possible selectors per ESI are reserved for explicit assignment. Run-time selector assignment is beneficial when you do not need to control the assigned selector , for example, when you are configuring clients in Classical IP that are not paired with an ARP server . While A TM addresses must be uniq[...]
-
Seite 296
Overview of the LECS Function LE clients are not required to use the LECS, although it is recommended. If the LECS is not used, each LE client must be configured with the A TM address of the LES that serves its ELAN. The LECS reduces the network management burden by serving as a centralized repository for configuration data, minimizing configura[...]
-
Seite 297
This field can specify the upper bound on the size of a data frame that can be processed by the LE client, or it can be unspecified. The LECS cannot assign a client to an ELAN with a maximum frame size larger than that specified by the client. If the ELAN allows frames too large for the client to handle, the client cannot function on that ELAN. [...]
-
Seite 298
Sample Situations for Use of the LECS Assignment Policies The following section offers examples of various LECS assignment policies. A TM Address Policy The LECS permits two types of A TM address policy values. The first type is a variable length A TM address prefix. For example, the policy value (3999999999999900000102, LES_A) means that all LE [...]
-
Seite 299
This setup requires configuring the LE clients with the correct ELAN Name. v Use names for the LE clients Each LE client can be given its own name. For example, you could create the policy values (Joe, LES_A) and (Mary , LES_A). Then, the LE clients configured with these names would be directed to the same LES. This method requires configuring t[...]
-
Seite 300
v By default, ELANs use best-effort connections to connect to the BUS. For ELANs where BUS traff ic is heavy , better performance can be obtained by using reserved bandwidth connections to the BUS. The characteristics of the Multicast Send VCC between the LE client and the BUS can be controlled with TL Vs. v A TL V can be used to download the ELAN [...]
-
Seite 301
Address Registration LE clients register LAN destinations with the LES to ensure uniqueness and to allow the LES to answer LE_ARP_REQUEST s, which LE clients issue to learn the A TM address associated with a particular LAN destination. Registrations include the LAN destination and the A TM address that the LE client associates with the LAN destinat[...]
-
Seite 302
This list is provided to help you clarify the A TM connections that are established between the LE client and the BUS: Multicast Send VCC (bidirectional point-to-point) From LE client to BUS Multicast Forward VCC (point-to-multipoint) From BUS to LE client BUS Functions The BUS has two basic functions: 1. Distribute multicast frames to all the LE c[...]
-
Seite 303
BUS processing requirements are increased and multicast frames must be transmitted twice (once on each Multicast Forward VCC). In general, IBUS operation is recommended; however , this option should be disabled in configurations that have source route bridges that join the ELAN as non-proxies. Establishing Data Direct VCCs Data Direct VCCs connect[...]
-
Seite 304
v LE clients that include the proxy function to provide bridging support forward the broadcast frame on to other LAN segments. v All end stations receive and process every broadcast frame. BCM can be enabled on individual ELANs for any of these protocols: IP IPX NetBIOS When BCM is enabled, a minimal amount of layer 2 and layer 3 information is dec[...]
-
Seite 305
With BCM IPX enabled, any quiet device (that is, a device that does not transmit IPX advertisements) that needs to receive IPX advertisements has to be configured as a BCM static target. An example of such a device is a station running software that discovers the IPX network topology by monitoring IPX advertisements. If BCM IPX Server Farm detecti[...]
-
Seite 306
Note: Broadcast Manager and Source Route Management are unavailable and cannot be enabled if bus-mode is set to adapter . LAN Emulation Reliability A perceived lack of robustness has been one of the most widely proclaimed criticisms of LAN emulation. While the A TM Forum is addressing this issue with specifications for distributing the LE service,[...]
-
Seite 307
The LECS retains a short-term memory of all client assignments so that it can alternately direct an LE client to a primary and backup LES. This simple heuristic makes the correct assignment in the nominal case of no failure and is self-correcting. At worst, the heuristic causes the LE client to repeat the configuration phase of joining an ELAN. LE[...]
-
Seite 308
1. At the LECS, use A TM addresses to assign clients to the LES. See “Overview of the LECS Function” on page 260 for more information. 2. Activate the LECS Interface on the router . 3. Activate the security option of the LESs. 4. Activate LECS Access Controls for any A TM address prefixes that should not be allowed to access the LECS. 5. Use A[...]
-
Seite 309
Chapter 21. Using A TM This chapter describes how to use the A TM interface. It includes the following sections: v “A TM and LAN Emulation” v “How to Enter Addresses” v “A TM-LLC Multiplexing” on page 274 v “A TM Virtual Interface Concepts” on page 274 A TM and LAN Emulation LAN emulation provides support for virtual T oken-Ring and[...]
-
Seite 310
This information applies to addresses entered for A TM; LAN emulation; Classical IP and ARP over A TM; and IPX and ARP over A TM. A TM-LLC Multiplexing Protocols that run natively over an A TM interface can use A TM-LLC multiplexing to share A TM addresses and both SVC and PVC channels between users. A TM-LLC is implicitly configured when the prot[...]
-
Seite 311
interfaces that can be created depends on the data packet size for the interfaces and is limited to a maximum number of 253 per router . The use of A VIs significantly improves the configuration options for protocols such as IPX that are limited to one instance or address per A TM interface. By configuring an appropriate number of A VIs, several[...]
-
Seite 312
Note: Because all resources are shared among the ARI and all its A VIs, an ESI added on an ARI is automatically available to all A VIs configured on the ARI. Y ou should not assign the same ESI and selector combination to two different protocol clients using the same ARI even though they are configured on different A VIs. Limited PVC sharing is a[...]
-
Seite 313
Chapter 22. Configuring and Monitoring A TM This chapter describe the A TM interface configuration and operational commands. It includes the following sections: v “Accessing the A TM Interface Configuration Process” v “A TM Configuration Commands” on page 278 v “A TM Interface Configuration Commands” on page 278 v “A TM Virtual I[...]
-
Seite 314
A TM Configuration Commands This section summarizes the A TM configuration commands. Enter the commands at the ATM config> prompt. T able 35. A TM Configuration Command Summary Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See “Getting Help”[...]
-
Seite 315
T able 36. A TM INTERF ACE Configuration Command Summary (continued) Command Function Remove Removes an ESI. Set Sets parameters of the A TM network. Disable Disables an ESI. Enable Enables an ESI. Exit Returns you to the previous command level. See “Exiting a Lower Level Environment” on page 1 1. Add Use the add command to add an ESI to your [...]
-
Seite 316
------------------------ ------- 000000000009 YES 000000000100 YES QoS Configuration Use the qos-configuration command to display the ATM I/F 0 QOS Config> prompt from which you can configure Quality of Service as described in “QoS Configuration”. Syntax: qos-configuration Remove Use the remove command to remove an ESI from your A TM co[...]
-
Seite 317
limit. The default value should be satisfactory in most situations. An example of a situation where it is beneficial to change this value would be if the majority of the stations use 25–Mbps adapters. In this case, it may be desirable to limit the data rate on VCCs to 25 Mbps so that the lower speed stations are not overwhelmed with frames from [...]
-
Seite 318
Each ESI can have up to 255 associated selectors (0x00 through 0xff). The range of selectors is partitioned into two subranges, a configured selector range and an automatically assigned selector range. The A TM interface parameter max-configured-selector gives the upper bound on the configured selector range. The A TM components on the router ha[...]
-
Seite 319
Example: ATM INTERFACE> set max-mp-parties 300 trace Sets the packet tracing parameters on the interface. Packet tracing can be enabled or disabled on a range of VPI/VCI values. Common VPI/VCI values to trace are: v 0/5 for signalling packets v 0/16 for ILMI packets. V alid V alues: ON or OFF Default V alue: ON Y ou are prompted for the VPI/VCI [...]
-
Seite 320
Default V alue: UNI 3.0 Note: Must be compatible with the A TM switch. Example: ATM INTERFACE> set uni-version 3.0 network-id Sets the network id of the A TM interface. Multiple A TM interfaces should have the same network id if there is A TM connectivity between the interfaces. V alid V alues: 0 - 255 Default V alue: 0 Enable Use the enable com[...]
-
Seite 321
Accessing the V irtual A TM Interface Configuration Process From the ATM Config> prompt of a selected real A TM interface, use the Virtual A TM command to enter the Virtual A TM configuration command mode. A TM Virtual Interface Configuration Commands This section summarizes the A TM virtual interface configuration commands. Enter the comman[...]
-
Seite 322
Remove Use the remove command to delete an A TM virtual interface. The virtual A TM interface on the real A TM interface with the specified interface number will be removed from the SRAM configuration records. If you do not specify an interface number , the last A TM virtual interface on this real A TM interface will be deleted. If you enter a qu[...]
-
Seite 323
Interface Displays the ATM Interface+ prompt, described in “A TM Interface Monitoring Commands (A TM INTERF ACE+ Prompt)”. Syntax: interface A TM-LLC Displays the ATM-LLC+ prompt, described in “A TM-LLC Monitoring Commands” on page 290. Syntax: atm-llc A TM Interface Monitoring Commands (A TM INTERF ACE+ Prompt) This section summarizes and [...]
-
Seite 324
ATM INTERFACE+ list addresses ATM Address Name ---------------------------------------- ------------------------------------- 3999999999999900009999020000041347391804 LEC 1 'eth1' 3999999999999900009999020000041347391802 LES/BUS 'eth1' all Lists all of the following: v Addresses v Circuit statistics v VCCs v Reserved Bandwidth c[...]
-
Seite 325
list Displays the current packet tracing options on the A TM interface. Example: ATM Interface+ trace on | off | list []? list Packet trace is ON Range of VPIs to be traced: 0 - 0 Range of VCIs to be traced: 32 - 39 on Starts packet tracing on all active VCCs within the specified VPI/VCI range. Example: ATM Interface+ trace on beginning of VPI ran[...]
-
Seite 326
stop Stops the wrap procedure and displays final wrap statistics. A TM-LLC Monitoring Commands This section explains the commands for monitoring A TM LLC multiplexing. Enter the commands at the ATM-LLC+ prompt. T able 40. A TM LLC Configuration Command Summary Command Function ? (Help) Displays all the commands available for this command level or[...]
-
Seite 327
Chapter 23. Using LAN Emulation Clients This chapter describes LAN Emulation Clients (LECs). It includes the following sections: v “LAN Emulation Client Overview” LAN Emulation Client Overview On the router , LECs serve the purpose of “ports” or “interfaces” on traditional routers and bridges. The router bridges and routes traf fic betw[...]
-
Seite 328
292 MRS V3.2 Software User ’s Guide[...]
-
Seite 329
Chapter 24. Configuring and Monitoring LAN Emulation Clients This chapter describes how to configure LAN Emulation Clients (LECs). It includes the following sections: v “Configuring LAN Emulation Clients” v “Configuring an A TM Forum-Compliant LE Client” on page 295 v “Accessing the LEC Monitoring Environment” on page 308 v “LEC M[...]
-
Seite 330
ethernet Ethernet emulated LAN Example: add ethernet LE Client Config> add ethernet Added Emulated LAN as interface 2 Config Use the config command to get you to the LEC Config> prompt, from which you can configure the details of a specific LAN Emulation Client. Syntax: config interface# interface# An integer number assigned by the route[...]
-
Seite 331
Configuring an A TM Forum-Compliant LE Client This section explains the commands for configuring an A TM Forum-compliant LAN Emulation Client. Enter the appropriate commands at either the Ethernet Forum Compliant LEC Config> prompt or the Token Ring Forum Compliant LEC Config> prompt. Commands in the following table apply to both T oken-Rin[...]
-
Seite 332
T able 43. A TM LAN Emulation Client ARP Configuration Commands Summary (continued) Command Function Remove Removes an ARP cache entry . Exit Returns you to the previous command level. See “Exiting a Lower Level Environment” on page 1 1. Add Use the add command to add an ARP cache entry using the MAC address or a route descriptor . MAC address[...]
-
Seite 333
Syntax: set max-reserved-bandwidth traff ic-type peak-cell-rate sustained-cell-rate qos-class max-burst-size Example: ARP entry 'identifier' config> set ? MAX-RESERVED-BANDWIDTH TRAFFIC-TYPE PEAK-CELL-RATE SUSTAINED-CELL-RATE QOS-CLASS MAX-BURST-SIZE See Configuring and Monitoring Quality of Service (QoS) in Using and Configuring Fea[...]
-
Seite 334
This function of the device is not changed whether source routing is enabled or disabled. The default setting is enabled. Some stations cannot properly receive frames with Source Routing RIF on them. This is especially common among NetW are drivers. Disabling source routing in this situation will allow you to communicate with these stations. Source[...]
-
Seite 335
set arp-aging-time arp-cache-size arp-queue-depth arp-response-time auto-config best-effort-peakrate bus-connect-retries conn-completion-time control-timeout elan-name esi-address flush-timeout forward-delay forward-disconnect-timeout frame-size initial-control-timeout lecs-atm-address les-atm-address mac-address multicast-send-avg multicast-send[...]
-
Seite 336
V alid V alues: An integer number of seconds in the range of 10 to 300. Default V alue: 300 Example: LEC Config> set arp-aging-time 200 arp-cache-size Sets the number of entries in the ARP cache. The size of the ARP cache limits the number of simultaneous data direct VCCs. Larger ARP caches require more memory , but permit the client to simultan[...]
-
Seite 337
V alid V alues: If YES, then you do not have to configure the A TM address of the LES. If NO, then you must configure the A TM address of the LES using the set les-atm-address command as described on page 303. Default V alue: NO Example: LEC Config> set auto-config yes best-effort-peakrate Sets the Best Effort Peak Rate. Used when establishing[...]
-
Seite 338
Default V alue: 4 Example: LEC Config> set connection-completion-time 5 control-timeout This parameter sets the maximum cumulative control timeout of a request. A current timeout value is initialized to the value of initial-control-timeout . If a response to a request is not received within the current timeout value, the current timeout is multi[...]
-
Seite 339
flush-timeout Sets the flush timeout. This is the time limit to wait to receive the LE_FLUSH_RESPONSE after the LE_FLUSH_REQUEST has been sent before taking recovery action. During recovery , any queued frames are dropped and a new flush request is sent. When switching from the multicast send to a data direct data path, the client sends a flush[...]
-
Seite 340
Default V alue: If the ELAN type is token ring, the default is 4544. If the ELAN type is Ethernet, the default is 1516. Example: LEC Config> set frame-size 4544 initial-control-timeout This parameter sets the value of the initial control timeout used in the control timeout algorithm described in 302. V alid V alues: 1-1 0 Default V alue: 5 Examp[...]
-
Seite 341
different MAC address. If you have two clients that are bridged together , they should use different MAC addresses. This MAC address is registered with the LES when the client joins the ELAN. V alid V alues: Any valid MAC address. Default V alue: none Example: LEC Config> set mac-address Use adapter address for MAC? [No] MAC address []: 10.00.5a[...]
-
Seite 342
If multicast-send-avg equals multicast-send-peak, then a constant bit rate (CBR) multicast send is signalled. Otherwise, a variable bit rate (VBR) multicast send is signalled. Multicast-send-avg must at least equal multicast-send peak. A reserved bandwidth multicast send VCC may improve data transfer rates in congested networks, but reserving bandw[...]
-
Seite 343
Example: LEC Config> set reconfig-delay-min 5 reconfig-delay-max This parameter sets the maximum delay time when LEC returns to the initial state. This value must be ≥ reconfig-delay-min . V alid V alues: 1-1 0 Default V alue: 5 Example: LEC Config> set reconfig-delay-max 9 retry-count Sets the retry count. This is maximum number of times[...]
-
Seite 344
a specific unicast MAC address or route descriptor that may be sent to the BUS within the time specified by the unknown-time parameter . Larger values decrease the number of discarded frames while increasing the load on the BUS. V alid V alues: An integer number of frames in the range of 1 to 255. Default V alue: 10 unknown-time Sets the unknown [...]
-
Seite 345
3 : Bridge Application 5 : CHARM ATM Adapter Network number [0]? 1 LEC+ The LEC monitoring prompt ( LEC+ ), is displayed. If you know the interface number of the LEC you wish to monitor , enter the network command followed by the interface number of the LEC. + network 1 LEC+ LEC Monitoring Commands This section summarizes and then explains the LEC [...]
-
Seite 346
statistics vcc-table arp Lists the LEC Address Resolution T able (entries in the ARP cache). Example: LEC+ list arp LEC Address Resolution (LE ARP Cache) Table Max Table Size = 10 Free Table Entries = 10 Current Mac Entries = 0 Current RD Entries = 0 Arp Aging Time = 300 Verify Sweep Interval = 60 Xmit BUS Arp Conn Queue Frame Retry Aging MAC Addre[...]
-
Seite 347
configuration Lists the LEC configuration. For Ethernet: Example: IBM LEC+ list config ATM IBM LEC Configuration Physical ATM interface number = 0 LEC interface number = 7 Primary ATM address ESI address = Use burned in addr Selector byte = 0x3 Emulated LAN type = Ethernet IBM Maximum frame size = 1523 LE Client MAC address = Use burned in addr L[...]
-
Seite 348
lecMulticastSendType = 1 lecMulticastSendAvgRate = 365566 lecMulticastSendPeakRate = 365566 lecConnectionCompleteTimer = 4 lecInitialControlTimeout = 5 lecControlTimeoutMultiplier = 2 V2 Capable = TRUE lecForwardDisconnectTimeout = 60 lecMinReconfigDelay = 1 lecMaxReconfigDelay = 5 lecMaxBusConnectRetries = 0 lecElanId = 0 ExplorerExclude = TRUE LE[...]
-
Seite 349
MIB Use the mib command to display MIB objects. Note: Some of this information may be displayed in a different format using the list command. Syntax: mib config-table mac-arp-table rd-arp-table server-vcc-table statistics-table status-table config Displays the LEC MIB Configuration T able. Example: LEC+ mib config lecConfigTable: lecConfigMode =[...]
-
Seite 350
lecMaxUnknownFrameTime Period in which LEC will send a maximum of MaxUnknownFrameCount frames to the BUS for a given unicast LAN Destination, and it must also initiate the address resolution protocol to resolve that LAN Destination. lecVccTimeoutPeriod Inactivity timeout of SVC Data Direct VCCs lecMaxRetryCount LE ARP retry count lecAgingTime Life [...]
-
Seite 351
lecConfigDirectVpi VPI which identifies the above VCC if it exists lecConfigDirectVci VCI which identifies the above VCC if it exists lecControlDirectInterface The interface associated with the Control Direct VCC lecControlDirectVpi VPI which identifies the above VCC if it exists lecControlDirectVci VCI which identifies the above VCC if it ex[...]
-
Seite 352
lecControlFramesOut No. of Control Packets sent by this LEC lecControlFramesIn No. of Control Packets received by this LEC lecSvcFailures The total number of: v Outgoing LAN Emulation SVCs which this client tried but failed, to open v Incoming LAN Emulation SVCs which this client tried, but failed to establish v Incoming LAN Emulation SVCs which th[...]
-
Seite 353
Chapter 25. Configuring Serial Line Interfaces This chapter describes the interface configuration process for a serial interface and includes the following sections: v “Accessing the Interface Configuration Process” v “Network Interfaces and the GWCON Interface Command” on page 318 IMPORT ANT : T o configure Frame Relay , PPP , X.25, V [...]
-
Seite 354
The other router will take on the DTE role in terms of clocking and should be configured as if it were attached to a modem or CSU/DSU Note: Configuring a DTE as opposed to a DCE cable has no impact on whether or not the W AN net handler takes on the peer device. For example, the router always acts as a Frame Relay DTE device and uses a FR UNI int[...]
-
Seite 355
Chapter 26. Using the X.25 Network Interface The X.25 network interface connects a router to an X.25 virtual circuit switched network. The X.25 network interface software and hardware allows the router to communicate over a public X.25 network. The X.25 network interface complies with CCITT 1980, CCITT 1984, CCITT 1988 and ISO 8208 1990 specificat[...]
-
Seite 356
9. T ype add protocol protocol_name to add the protocols that will be running over the X.25 interface. Y ou will be prompted for window size, default packet size, maximum packet size, circuit idle time, and max VCs. Note: Y ou need to add the protocols only once for all X.25 networks on the router . 10. T ype add address protocol_name to add an add[...]
-
Seite 357
T able 46. Set Command (continued) Parameter Default svc low inbound=0, high inbound=0 low 2-way=1, high 2-way=64 low outbound=0, high outbound=0 throughput-class ... inbound=outbound=2400 vc-idle ... 30 T able 47. National Enable Parameters Parameter DDN Default GTE Default accept-reverse-charges off on bi-cug off of f bi-cug-with-outgoing-access [...]
-
Seite 358
T able 48. National Set Parameters (continued) Paramter DDN Default GTE Default collision-timer 10 seconds 10 seconds standard-version 1984 1984 t1-timer 4 seconds 4 seconds t2-timer 00 truncate-called-addr-size 22 X.25 Support Over ISDN BRI D-Channel (X.31) X.25 provides the same protocol support over ISDN BRI D-channel (X.31) with the following r[...]
-
Seite 359
Configure CUG using the add address. The CUG(s) defined must be the same for each protocol defined at the same address. If the CUG is defined at the add protocol level, The CUG(s) must be the same for all peers. (This method is more restrictive). Configure CUG at the interface level. This insures all peers have the same CUG values. (This metho[...]
-
Seite 360
Understanding Closed User Groups A closed user group (CUG) is a group of X.25 DTEs allowed to establish connections with other specific DTEs. CUG numbers are defined by your network provider and you can only use the CUGs the provider assigns you. Y ou can configure an address-specific CUG, a protocol-specific CUG, or an interface-specific CUG[...]
-
Seite 361
T able 49. Establishing Incoming X.25 Circuits for Closed User Groups Incoming Call Request Contains Receiving DTE CUG Definition Interface CUG Only Protocol CUG Only Address Specific CUG Interface and Protocol CUG Interface and Address CUG Protocol and Address CUG All CUGs No CUGs No CUG Reject Reject Reject Reject Reject Reject Reject Accept In[...]
-
Seite 362
Note: Y ou should only configure these CUGs if you are restricting all X.25 circuits established over the X.25 interface to DTEs belonging to this set of unique CUGs or BCUGs unless uyou override it with an address or protocol-specific CUG. Using the X.25 Network Interface 326 MRS V3.2 Software User ’s Guide[...]
-
Seite 363
Chapter 27. Configuring and Monitoring the X.25 Network Interface This chapter describes the X.25 configuration and operational commands and includes the following sections: v “X.25 Configuration Commands” v “Accessing the Interface Monitoring Process” on page 353 v “X.25 Monitoring Commands” on page 353 v “X.25 Network Interfaces [...]
-
Seite 364
Set Use the set command to configure local X.25 node addresses, maximum number of calls, frame and packet level window size, lowest to highest PVC and SVC channels, and the idle time for a switched circuit. Syntax: set addres s... cable calls-ou t... clockin g... default-window-siz e... encoding equipment-typ e... h t fa d d r... inter-frame-dela [...]
-
Seite 365
V alid V alues: 1t o2 3 9 Default V alue: 4 clocking external or internal T o connect to a modem or DSU, configure clocking as external. T o connect directly to another DTE device, use a DCE cable, set the clocking to internal, and configure the line speed. Default: external default-window-size value Sets the window size for the packet level assi[...]
-
Seite 366
– An X.25 serial line having a packet size of 128 with a window size of 7 and a bit rate of 9600 bps – An Ethernet LAN with a packet size of 1500 In this case, you should probably set the X.25 MTU to 1500. That means that about 12 packets will be sent over the X.25 interface. (MTU / X.25 packet size = number of X.25 packets to be sent). When us[...]
-
Seite 367
svc low/high inbound or two-way or outbound value Defines the lowest to the highest switched virtual circuit channel number . When low=high=0, no VCs in this category are defined. Example: set SVC low-two-way 1 Inbound Specifies the range of logical channel numbers to be assigned to inbound SVCs. By default, there are no inbound-only SVCs. V ali[...]
-
Seite 368
Enable Use the enable command to enable DDN address translations, interface resets, or the incoming-calls-barred, outgoing-calls-barred, and lower-dtr features. Syntax: enable ddn—address-translations Note: Enabling ddn-address-translations is no longer allowed. This feature defaults to enabled when the national personality selected is DDN, and d[...]
-
Seite 369
Note: If you set DDN as the national personality , DDN address translation is enabled automatically and this parameter has no effect. Syntax: disable ddn-address-translations Note: Disabling ddn-address-translations is no longer allowed. This feature defaults to enabled when the national personality selected is DDN, and defaults to disabled in all [...]
-
Seite 370
bi-cug Enables the bilateral closed user group facility on this device. By default, this facility is disabled. Note: Y ou cannot add any bilateral CUGs unless this parameter is enabled. bi-cug-outgoing-access Enables the bilateral CUG with outgoing access facility on this device. By default, this facility is disabled. cug Enables the closed user gr[...]
-
Seite 371
DDN Default off GTE Default off request-reverse-charges Requests reverse charges for all outgoing calls. DDN Default off GTE Default on suppress-calling-address Suppresses the source address in call packets. DDN Default off GTE Default off throughput-class-negotiation Enables the registration of throughput class. DDN Default off GTE Default on trun[...]
-
Seite 372
flow-control-negotiation frame-ext-seq-mode packet-ext-seq-mode request-reverse-charges suppress-calling-addresses throughput-class-negotiation truncate-called-addresses National Set Use the national set command to set one or all of the default values made to the National Personality configuration. Syntax: national set call-req clear-re q... disc[...]
-
Seite 373
Retries Number of clear request transmissions permitted before action is taken. In a list command output, this is displayed as the r23 retry count. DDN Default retries=1 GTE Default retries=1 Timer Number of 10–second intervals to wait before retransmitting a clear request packet. A zero in the timer value indicates an indefinite wait. In a list[...]
-
Seite 374
GTE Default 20 packet-size default or maximum or window Specifies the size of the packet. default Number of bytes in the data portion of the packet. Possible options include 128, 256, 512, 1024, 2048, and 4096. This value is used in the absence of packet size negotiation. Default cannot be greater than maximum . DDN Default 128 GTE Default 128 max[...]
-
Seite 375
restart retries or timer Specifies the number of restart request transmissions. retries Number of restart request transmissions permitted before the interface is recycled. The range is 0 to 255. In a list command output, this is displayed as the r20 retry count. DDN Default 1 GTE Default 1 timer Number of 10–second intervals to wait before retra[...]
-
Seite 376
t1-timer Specifies the frame retransmit time in seconds. The range is 1 to 255. DDN Default 4 seconds GTE Default 4 seconds t2-timer Specifies the amount of time in seconds to delay before acknowledging an I-frame. This is an optimization parameter . Setting the timer to 0 disables it. The range is 0 to 255. DDN Default 0 GTE Default 0 truncate-c[...]
-
Seite 377
frame-ext-seq-mode frame-window-size min-collission-timer min-connect-timer min-recall-timer network-typ e... n2-timeouts packet-siz e... packet-ext-seq-mode request-reverse-charges rese t... restar t... standard-version suppress-calling-addresses throughput-class-negotiation t1-timer t2-timer truncate-called-addresses truncate-called-addr–size A[...]
-
Seite 378
an X.25 remote address to dial out and an optional incoming remote address for call ID. IF only remote called address is entered, then this address will be used for outgoing calls and incoming call verification. Example: add address IP example: Protocol [IP]? IP IP Address [0.0.0.0]? 128.185.1.2 Enc Priority 1 []? CC Enc Priority 2 []? SNAP Enc Pr[...]
-
Seite 379
pref cug Specifies the preferred closed user group number for this DTE. The DTE uses this CUG when placing outgoing calls. V alid values: 0 to 9999 Default value: None Note: Y ou will not be prompted for this value if you have not enabled the closed user group facility using the national enable command. CUG Specifies the closed user group numbers[...]
-
Seite 380
pref cug Specifies the preferred closed user group number for this DTE. This DTE uses this CUG when placing outgoing calls. V alid values: 0 to 9999 Default value: None Note: Y ou will not be prompted for this value if you have not enabled the closed user group facility using the national enable command. cug Specifies the closed user group number[...]
-
Seite 381
Note: Y ou will not be prompted for this value if you have not enabled the bilateral closed user group facility using the national enable command. htf-address Adds a Defense Data Network (DDN) X.25 address translation. Example: add htf-address Protocol [IP] Convert HTF address Protocol Specifies the protocol that you are running over the X.25 inte[...]
-
Seite 382
of packets that can be outstanding before requiring packet confirmation. The default is 2. The window size can be negotiated down to 1 by the called DTE. Related configuration parameters are: v Set Default Window Default Packet Size Specifies the default requested packet size for SVCs. This value serves as the lowest negotiable packet size and m[...]
-
Seite 383
Request Reverse Charges Allows this protocol to override the setting of this National Personality parameter . This does not af fect the National Personality parameter . Station T ype Specifies the default station type for this protocol: Pri Primary Station Sec Secondary Station Peer Peer Station Max message size The maximum message size for this p[...]
-
Seite 384
configured for this parameter is 4096 bytes. The maximum for X.31 is 256 bytes. This value is utilized in calculating the maximum frame size for this X.25 interface. Related configuration parameters are: v Nat Set Packet Size Default v Nat Set Packet Size Maximum Change Use the change command to change an X.121 address, an DDN X.25 Address, a pro[...]
-
Seite 385
Default Packet Size [128] Maximum Packet Size [256] Circuit Idle Time [30] Maximum VCs [6] QLLC example: X.25 Config> change prot Protocol [IP]? dls Idle Timer [30]? QLLC response timer (in decaseconds) [15]? QLLC response count [255]? Accept Reverse Charges [N]? Request Reverse Charges [N]? Station Type (1) PRI (2) SEC (3) PEER [3]? Max Packet [...]
-
Seite 386
bi-cugs Deletes a bilateral closed user group number used by this interface. V alid values: Y Deletes the current CUG. N Does not delete the current CUG. ALL Deletes all remaining CUGs. Q Stops deleting any remaining CUGs. Example: delete bi-cugs Delete Pref BI-CUG [Y]? Delete BI-CUG (2) [Y]? N Delete BI-CUG (3) [Y]? q cugs Deletes the closed user [...]
-
Seite 387
Example: list address IF# Prot # Active Enc Protocol -> X.25 address 1 0(IP) CC 10.1.2.3 -> 1238765742 1 7(IPX) SNAP 10 -> 12389 CUGS: 11 12 13 14 15 BI-CUGS: 21 22 all Lists all the X.25 addresses, National Personality parameters, all defined protocols and their values, and all defined PVCs. Example: list all X.25 Configuration Summary [...]
-
Seite 388
detailed Lists the value of all the default parameters that the national set command modifies. Descriptions of the screen display are listed in the national set command described later in this chapter . Example: list detail X.25 National Personality Configuration Follow CCITT: on OSI 1984: on OSI 1988: off Request Reverse Charges: off Accept Rever[...]
-
Seite 389
Example: list summary X.25 Configuration Summary Node Address: 313131 Max Calls Out: 4 Inter-Frame Delay: 0 Encoding: NRZ Speed: 64000 Clocking: Internal MTU: 2048 Cable: V.35 DCE Lower DTR: Disabled Default Window: 2 SVC idle: 30 seconds National Personality: GTE Telenet (DTE) PVC low: 1 high: 1 Inbound low: 0 high: 0 Two-Way low: 2 high: 64 Outbo[...]
-
Seite 390
T able 52. X.25 Monitoring Command Summary (continued) Monitoring Command Function List Lists individual PVC or SVC statistics and general information. Parameters Displays the current parameters for any level of the X.25 configuration. Statistics Displays the current statistics for any level of the X.25 configuration. Exit Returns you to the prev[...]
-
Seite 391
Example: parameters packet Packet Layer Parameters: Default Packet Size = 128 Maximum Packet Size = 256 Log 2 Packet size = 2 Acknowledge Delay = 0 Layer Enabled = YES Default Window Size = 2 Lowest SVC = 1 Highest SVC = 64 Lowest PVC = 0 Highest PVC = 0 T20 (Restart) = 18 R20 (Retry) = 1 T21 (Call) = 20 T22 (Reset) = 18 R22 (Retry) = 1 T23 (Clear)[...]
-
Seite 392
Example: statistics packet Packet Counters: Received Transmitted Call Request 0 0 Call Accepted 0 0 Clear Request 0 0 Clear Confirm 0 0 Interrupt Request 0 0 Interrupt Confirm 0 0 RR Packet 0 0 RNR Packet 0 0 REJ Packet 0 0 Reset Request 0 0 Reset Confirm 0 0 Restart Request 0 0 Restart Confirm 0 0 Diagnostic 0 0 Data Packet 0 0 Data Bytes 0 0 Buff[...]
-
Seite 393
Buffers Queued 0 0 Invalid Packets Received = 0 Switched Circuits Opened = 0 Frame Layer Counters: Received Transmitted Information Frames 0 0 X.25 Physical Layer Counters: Rx Bytes 0 Tx Bytes 0 Adapter cable: Generic DTE RISC Microcode Revision: 2 V.24 circuit: 105 106 107 108 109 125 141 Nicknames: RTS CTS DSR DTR DCD RI LL PUB 41450: CA CB CC CD[...]
-
Seite 394
Invalid Packets Received Displays the number of invalid X.25 packets received from the network. Switched Circuits Open Displays the number of switched circuits currently open. Frame Layer Counters Provides statistics generated from Frame Layer counters. Information Frames Displays the number of X.25 Information frames the interface has transmitted [...]
-
Seite 395
Missed frame When a frame arrives at the device and there is no buffer available, the hardware drops the frame and increments the missed frame counter . L & F bits not set On serial interfaces, the hardware sets input-descriptor information for arriving frames. If the buffer can accept the complete frame upon arrival, the hardware sets both the[...]
-
Seite 396
Configuring the X.25 Network Interface 360 MRS V3.2 Software User ’s Guide[...]
-
Seite 397
Chapter 28. Using XTP This chapter describes the X.25 T ransport Protocol (XTP) for transporting X.25 traff ic over TCP/IP . Included are the following sections: v “The X.25 T ransport Protocol” v “DTE Address Wildcards” on page 363 v “XTP Backup Peer Function” on page 364 v “Local XTP” on page 365 v “XTP and Closed User Groups”[...]
-
Seite 398
Configuration Information X.25 recognizes an incoming call for XTP based on the node addresses configured for XTP . Therefore, in order to transport X.25 traff ic between the X.25 nodes, you must configure X.25 to map to the data terminal equipment (DTE) address and IP addresses of the routers to which the nodes are connected. For example, in Fi[...]
-
Seite 399
v Remote DTEs v PVCs v CUGs Local DTEs X.25 nodes connected to the X.25 interfaces on the router T o configure local DTEs, use the X.121 address that is assigned to the local DTE. Multiple local DTEs can be configured on an interface. Peer Routers Routers with which you communicate over TCP/IP Peer routers can differ depending on “point of view[...]
-
Seite 400
or “*”. The special case of a DTE address of “*” represents any DTE address, even a null address. The null address is useful for handling incoming calls with no calling address in the X.25 Call Request packet. Use of the “*” wildcard increases the chances for adding a local or a remote DTE address that conflicts with an existing addres[...]
-
Seite 401
This causes the search for the remote DTE to proceed to the next router in the peer router list. If a pass through the list of peer routers is completed without a successful connection through any of the peer routers, the call to the local DTE is cleared. Connection Request T imer The Connection Request T imer is used to ensure that no call setup p[...]
-
Seite 402
Configuring XTP XTP is a protocol forwarder used to transport X.25 traf fic over TCP/IP . XTP allows existing X.25 devices to communicate over a TCP/IP backbone and migrate from an X.25 network to a network of your choice. Configuration Procedures This section defines the detail for configuring the network displayed in Figure 20. This configur[...]
-
Seite 403
v Set the Internal IP address v Configure XTP Note: New configurations do not take effect until you restart the router . Setting the Data Link The data link defines the protocol you are using to send data packets over the network. Define the data link between the router you are configuring and each serial interface. The example in Figure 20 on[...]
-
Seite 404
4. Enter set clocking followed by internal or external based on your router type. X.25 Config> set clocking internal 5. Enter set speed followed by the access rate (line speed). X.25 Config> set speed Access rate in bps [9600]? 19200 6. Enter set equipment-type and specify whether the frame and packet levels act as DCE or DTE. X.25 Config>[...]
-
Seite 405
Setting the National Personality Each X.25 public network has its own standard configuration. The National Personality refers to a group of 28 variables that define the characteristics of the public data network. These variables provide the router with control information for packets transferred over the link and influence the X.25 facilities us[...]
-
Seite 406
Implement the following steps to configure XTP for the router: 1. T o access the XTP config> prompt, enter protocol xtp at the Config> prompt. 2. Add interface 1 to the XTP configuration. Enter add local-dte at the XTP Config> prompt. XTP config> add local-dte Interface number [0]? 1 Allow inbound calls without calling DTE address? (Y[...]
-
Seite 407
XTP config> add remote-dte DTE address [ ]? 402 Peer router's internal IP Address [0.0.0.0]? 128.185.100.3 Peer router's internal IP Address [0.0.0.0]? XTP config> add remote-dte DTE address [ ]? 403 Peer router's internal IP Address [0.0.0.0]? 128.185.100.3 Peer router's internal IP Address [0.0.0.0]? XTP config> add r[...]
-
Seite 408
Config> protocol xtp XTP config> add local-dte Interface number [0]? 1 Allow inbound calls without calling DTE address? (Y or N) [N]? n DTE address [ ]? 301 DTE address [ ]? XTP config> add peer-router Router's IP address? 128.185.100.1 XTP config> add remote-dte DTE address [ ]? 101 Peer router's internal IP Address ]0.0.0.0][...]
-
Seite 409
XTP Config> add peer-router Router's IP address? 128.185.100.1 XTP config> add remote-dte DTE address [ ]? 201 Peer router's internal IP Address [0.0.0.0]? 128.185.100.1 Peer router's internal IP Address [0.0.0.0]? XTP config> exit Config> Using XTP Chapter 28. Using XTP 373[...]
-
Seite 410
Using XTP 374 MRS V3.2 Software User ’s Guide[...]
-
Seite 411
Chapter 29. Configuring and Monitoring XTP This chapter describe the XTP configuring and monitoring commands. It includes the following sections: v “XTP Configuring Commands” v “XTP Monitoring Commands” on page 382 XTP Configuring Commands This section describes the XTP configuring commands. T o access the XTP configuring environment,[...]
-
Seite 412
remote-dte pvc cug Specifies the closed user group numbers for the XTP protocol. The first CUG you are prompted for is the preferred cug. V alid values: 0 to 9999 Default value: None Example: add cug Pref CUG []? 114 CUG (2) []? 314 CUG (3) []? 478 CUG (4) []? bi-cug Specifies the bilateral closed user group numbers for the XTP protocol. The fi[...]
-
Seite 413
Example: add peer-router Router's internal IP Address [0.0.0.0]? 128.185.100.2 Connection setup timeout [230]? remote-dte Adds remote X.25 nodes and corresponding routers. Y ou can connect remote nodes with local X.25 nodes so they can exchange data. Y ou must configure an IP address for each remote X.25 node you configure. Any request or da[...]
-
Seite 414
Remote X.25 DTE address [ ]? 108 3. A PVC range can be defined through the PVC range start and PVC range end parameters. The same number of circuits must be defined in the local PVC range as in the remote PVC range. For example, if one circuit is defined in the local PVC range, one circuit must be defined in the remote PVC range. 4. The PVCs de[...]
-
Seite 415
remote-dte pvc bi-cug Deletes a bilateral closed user group number used by this interface. V alid values: Y Deletes the current CUG. N Does not delete the current CUG. ALL Deletes all remaining CUGs. Q Stops deleting any remaining CUGs. Example: delete bi-cug Delete Pref BI-CUG [Y]? Delete BI-CUG (2) [Y]? N Delete BI-CUG (3) [Y]? q cug Deletes the [...]
-
Seite 416
Enable Activates the XTP forwarder . Syntax: enable-xtp Example: enable-xtp Disable Deactivates the XTP forwarder . Syntax: disable-xtp Example: disable-xtp Set Sets the XTP Keepalive Timer . Syntax: keep-alive-timer Example: set keep-alive-timer Keepalive timer in seconds [10]? 60 List Lists the interfaces, peer routers, remote DTEs, or PVCs. Synt[...]
-
Seite 417
4 33333 Calling DTE address is optional Pref CUG : 1 Other s:2345 Pref BI-CUG : 6 Other s:7891 0 Peer Routers Connection Timeout Remote DTEs: DTE Address Peer Router(s) PVCs: Local PVC Local DTE Remote PVC Remote DTE LCN Range Address LCN Range Address Pref CUG : 114 Others : 314 478 Pref BI-CUG : 1 Other s:111 1111 KEEP-ALIVE-TIMER: 10 seconds cug[...]
-
Seite 418
XTP Monitoring Commands This section describes the XTP monitoring commands. These commands allow you to display the current active interfaces, peer routers, remote DTE, PVCs and SVCs. They also allow you to dynamically add or delete interfaces, DTEs, or peer routers. T o display the XTP> prompt, enter protocol xtp at the monitoring ( + ) prompt:[...]
-
Seite 419
Delete Deletes a local DTE, peer router , or remote DTE from the router configuration. Syntax: delete local-dtes peer-router remote-dtes local-dtes Deletes a local interface from the XTP configuration. Example: delete local-dtes Interface Number [0]? 1 DTE address [ ]? 101 DTE address [ ]? peer-router Deletes a peer router from the XTP configura[...]
-
Seite 420
list all STATUS: XTP-ENABLED KEEP-ALIVE TIMER = 20 seconds LIST OF LOCAL DTES ------------------ Interface Local No DTE 1 101 Calling DTE address is required 2 201 Calling DTE address is required LIST OF PEER ROUTERS -------------------- Router CNN Number Received Sent State of Ckts Pkts Bytes Pkts Bytes 128.185.100.3 Active 15 60 1533 12 142 128.1[...]
-
Seite 421
No DTE 1 101 Calling DTE address is required 2 201 Calling DTE address is required peer-routers Displays all the peer routers configured for XTP . Example: list peer-routers LIST OF PEER ROUTERS -------------------- Router CNN Number Received Sent State of Ckts Pkts Bytes Pkts Bytes 128.185.100.3 Active 15 60 1533 12 142 128.185.100.2 Active 12 63[...]
-
Seite 422
list svcs LIST OF SVCS ------------ Index Int LOG SVC Local Remote Peer No No Chan State DTE DTE Router 1 1 Active 200 401 3.3.3.3 2 1 Active 200 402 3.3.3.3 3 2 Active 200 403 3.3.3.3 4 2 Active 200 404 3.3.3.3 svc-detailed Displays information for specific SVC definitions. Example: list svc-detailed SVC Index Number [1]? 1 SVC 1 IN DETAIL -----[...]
-
Seite 423
Chapter 30. Using Frame Relay Interfaces This chapter describes how to use the Frame Relay interface and includes the following sections: v “Frame Relay Overview” v “Frame Relay Network Management” on page 395 v “Frame Relay Data Rates” on page 396 v “Circuit Congestion” on page 399 v “Bandwidth Reservation over Frame Relay” on [...]
-
Seite 424
Frame Relay Network The FR network consists of the FR backbone (consisting of FR switches provided by the FR carrier) providing the FR service. The router functions as the FR connection device. The router encapsulates FR frames and routes them through the network based on a Data Link Connection Identifier (DLCI). The DLCI is the medium access cont[...]
-
Seite 425
v Preserves the ordering of frame transfer on individual VCs v Does not acknowledge or retransmit frames Frame Relay Switched V irtual Circuits Frame Relay Switched Virtual Circuits (SVCs) provide the ability to implement ″ cut-through ″ routing in a Frame Relay network, minimizing or eliminating intermediate router hops between DTEs. Network c[...]
-
Seite 426
end-to-end PVC connection is not established. Router B receives an inactive status for that PVC. When the LMI and SVCsare disabled, the FR interface is running on a serial line and a DTE cable is being used, the FR protocol asserts the DTR and RTS modem control signals. (The Control signal is asserted for X.21). The FR interface goes up once the DS[...]
-
Seite 427
By enabling orphan circuits, you allow the router to forward packets over circuits you did not configure. Packets that would normally be dropped are now forwarded. An orphan switched virtual circuit is an SVC that is not configured for your router but is created when a call-in is received for it. This is similar to Figure 23. However , Q.933 mess[...]
-
Seite 428
If multiple PVCs are required and are not in a PVC group, the interface is not activated until all required PVCs are active. If a required PVC belongs to a PVC group, the Frame Relay interface becomes inactive when all PVCs in the PVC group are inactive. If at least one PVC in the group is active, the interface becomes active following a successful[...]
-
Seite 429
Command/Response (C/R) This field’s use is not defined within the Frame-Relay standards and the field is passed transparently across the network. Extended Address This version of FR does not support extended addressing. Forward Explicit Congestion Notification (FECN) The FR backbone network sets this bit to 1 to notify the user receiving the [...]
-
Seite 430
Frame Forwarding over the Frame Relay Network When the FR protocol receives a packet for encapsulation, it compares the packet’s network address to the entries in the Address resolution Protocol (ARP) cache. If the ARP cache contains the DLCI number that matches the network address, the FR protocol encapsulates that packet into a frame and transm[...]
-
Seite 431
Multicast can also be enabled or disabled for an individual SVC. Use the multicast option on add switched-virtual-circuit . Frame Relay Network Management The supplier of the FR network backbone provides FR network management. It is management’s responsibility to provide FR end-stations (routers) with status and configuration information concern[...]
-
Seite 432
The PVC status information element contains the following information: the local DLCI number for the particular PVC; the state of the PVC (active or inactive); and whether the PVC is new or an existing PVC that management already knows about. Note: The number of PVCs supplied at the FR interface is restricted by the network frame size and the amoun[...]
-
Seite 433
switched-virtual-circuit configuration command. Y ou can also dynamically change the CIR with the set circuit console command. Y ou can also set the default CIR for all Frame Relay circuits on this interface using the set CIR-defaults command. Some Frame Relay switches allow a value of 0 to be configured for CIR. When CIR is equal to 0, little or[...]
-
Seite 434
The network delivers this excess data with a lower probability of success than committed burst size data. Set the Be to a value greater than zero only if you are willing to accept the risk of discarded data and its effect on higher-layer protocol performance. The Be should equal the value set up with the network provider . Use the add permanent-vir[...]
-
Seite 435
If the CIR monitoring feature is not enabled the maximum information rate is equal to the line speed. V ariable Information Rate The variable information rate (VIR) ranges from the configured minimum IR to the calculated maximum IR when the CIR monitoring or congestion monitoring features are enabled. The VIR is gradually decreased down to the min[...]
-
Seite 436
monitoring. Y ou can also dynamically enable and disable CIR monitoring using the enable cir-monitor and disable cir-monitor console commands. Congestion Monitoring Congestion monitoring is an optional feature, set per interface, that allows the VIR of VCs to vary in response to network congestion. The VIR assumes values between the minimum IR and [...]
-
Seite 437
for all VCs to relieve congestion. Enabling the throttle-transmit-on-fecn parameter , along with either the CIR or congestion monitoring options, causes the device to treat a FECN like a BECN thus reducing overall FR network congestion when any congestion notification is received. Use the throttle-transmit-on-fecn parameter only in FR networks who[...]
-
Seite 438
v A long-term condition, the Frame Relay protocol will set the transmit rate for the affected PVCs to the calculated minimum information rate. v Facility or equipment failure or maintenance action, or if the CIR was configured as zero, the FR protocol will continue to transmit any queued data for the affected PVCs but will not accept any more outg[...]
-
Seite 439
v Configure FR destination addresses. If you are running a protocol such as IP or IPX over the FR interface, and are interconnecting with devices not supporting the Address Resolution Protocol (ARP) or Inverse ARP on FR, use the add protocol-address command to add the static protocol and address mapping. v Configure Bandwidth Reservation over Fra[...]
-
Seite 440
Enabling Frame Relay SVC Management Frame Relay SVC management is automatically enabled when SVCs are enabled. Using Frame Relay 404 MRS V3.2 Software User ’s Guide | | |[...]
-
Seite 441
Chapter 31. Configuring and Monitoring Frame Relay Interfaces This chapter describes the Frame Relay configuration and operational commands and includes the following sections: v “Frame Relay Configuration Commands” v “Accessing the Frame Relay Monitoring Prompt” on page 432 v “Frame Relay Monitoring Commands” on page 432 v “Frame [...]
-
Seite 442
Add Use the add command to add a PVC, Required PVC group, or destination protocol address supported by the Frame Relay interface. Syntax: add permanent-virtual-circui t... protocol-addres s... pvc-grou p... switched-virtual-circui t... permanent-virtual-circuit Adds a PVC to the Frame Relay interface beyond the reserved range 0 through 15. The maxi[...]
-
Seite 443
Notes: 1. If CIR is configured as 0 then the committed burst size is set to 0 and you are not prompted for a value. For additional information, see “Committed Burst (Bc) Size” on page 397. Excess Burst Size The maximum amount of uncommitted data in bits in excess of committed burst size that the network attempts to deliver during a measurement[...]
-
Seite 444
nor ARP is an option, or for other reasons such as security . Adding protocol name and address mappings (static ARP) is less eff icient than Inverse ARP or ARP . v Inverse ARP is the preferred, ef ficient method because of dynamic address mapping with no broadcasts. v ARP is recommended if Inverse ARP is not an option. It is less ef ficient than In[...]
-
Seite 445
Node Number Defines the node number of the interface attached to the remote AppleT alk host. Node address Defines the DECnet node address of the remote DECnet host. Configure the node address in the format x . y , where x is a 6-bit area address and y is a 10-bit node number . Circuit Number or name Defines the PVC by DLCI or name or SVC by nam[...]
-
Seite 446
Remote party numbering plan Specifies the format of the remote party number . The numbering plan must match that used by the FR network. V alid V alues : E.164 (ISDN) or X.121 (Data) Default V alue : E.164 Remote party number type Specifies the destination Frame Relay party number type. The number type must match that used by the FR network. V al[...]
-
Seite 447
Default V alue : Default value is determined according to CIR-defaults at the interface level Requested incoming CIR Specifies the requested incoming CIR. V alid V alues : The CIR can be either 0 or a value in the range 300 bps to 2 048 000 bps. Default V alue : V alue of the requested outgoing CIR Minimum acceptable incoming Committed Information[...]
-
Seite 448
Establish circuit to learn remote protocol addresses Specifies whether this SVC should be established when the interface comes up to learn the protocol addresses of the adjacent node. This option can be used in place of statically configured destination protocol names and addresses for protocols that support dynamic address discovery , such as IP[...]
-
Seite 449
Example: change permanent-virtual-circuit Circuit Number [16]? Committed Information Rate in bps [64000]? Committed Burst Size (Bc) in bits [64000]? Excess Burst Size (Be) in bits [0]? Assign Circuit Name: []? Is the circuit required for interface operation [N]? Does the circuit belong to a required group [N]? What is the group name []? Do you want[...]
-
Seite 450
switched-virtual-circuits throttle-transmit-on-fecn cir-monitor Disabling this feature allows the circuit’s information rate to exceed the maximum information rate that is calculated using the parameters configured with the add permanent-virtual-circuit or add switched-virtual-circuit command. The default setting for this feature is disabled. Se[...]
-
Seite 451
multicast-emulation Disables multicast emulation on each active VC. The default setting for this feature is enabled. If you disable this feature, you are required to add protocol static address maps. Some protocols, such as IPX RIP , will not function on the Frame Relay interface if multicast-emulation is disabled. The protocol-broadcast feature al[...]
-
Seite 452
notify-fecn-source no-pvc orphan-circuits protocol-broadcast switched-virtual-circuits throttle-transmit-on-fecn cir-monitor Enables the circuit monitoring feature. The circuit monitoring feature ensures that the circuit’s information rate varies between the minimum information rate and the maximum information rate, calculated using the parameter[...]
-
Seite 453
congestion-monitor Enables the congestion monitoring feature. This feature allows a circuit’ s information rate to vary in response to congestion between the minimum information rate and the line speed. Note: The circuit monitoring feature overrides the congestion monitoring feature if there is a conflict when both are enabled. The default setti[...]
-
Seite 454
modem dials a stored number to the backup site. When the primary interface is restored, the alternate interface is disabled, DTR is lowered, and the modem hangs up the dial connection. The following cable types are supported: EIA 232 (RS-232) V .35 V .36 The default setting is disable lower-dtr . multicast-emulation Enables multicast emulation. Thi[...]
-
Seite 455
Local party number type (Unknown or International) [International]? Are call-ins allowed on this interface [Y]? Call-out redial attempts [2]? Network emulation mode [N]? Local party number Specifies the destination’s Frame Relay address. V alid V alues : A 1 - 20 character string of decimal digits Default V alue : None Local party numbering plan[...]
-
Seite 456
pvc-groups switched-virtual-circuits all Displays the Frame Relay configuration. The display is a combination of the list hdlc, the list lmi , and the list permanent virtual circuits commands. See list hdlc and list lmi for descriptions of the parameters. hdlc Displays the Frame Relay High-Level Data Link Control (HDLC) configuration. Example: li[...]
-
Seite 457
LMI type = ANSI LMI Orphans OK = Yes CLLM enabled = Yes Timer Ty seconds = 10 SVC network number = 4141990 SVC Number type = International SVC Numbering plan = E.164 SVC Call-out redial attempts = 2 SVC Call-ins allowed = Yes SVC Network emulation mode = No Protocol broadcast = Yes Congestion monitoring = Yes Emulate multicast = Yes CIR monitoring [...]
-
Seite 458
Protocol Broadcast Indicates whether protocols such as IP RIP can function over the Frame Relay interface, yes or no. Emulate multicast Indicates whether the multicast emulation feature is enabled on each active PVC, yes or no. Congestion Monitoring Indicates whether the congestion monitoring feature that responds to network congestion is enabled, [...]
-
Seite 459
LMI N2 error threshold Indicates the number of management event errors occurring within the N3 window that will cause a reset of the Frame Relay interface. LMI N3 error threshold window Indicates the number of monitored management events used to measure the N2 error threshold. MIR % of CIR Minimum IR, expressed as a percentage of CIR. IR % Incremen[...]
-
Seite 460
Circuit Name Indicates the ASCII designation of the configured PVC. Circuit Number Indicates the DLCI of a currently configured PVC. Circuit T ype Indicates the type of virtual circuit currently configured. This release of Frame Relay only supports permanent virtual circuits. Committed Information Rate Indicates the information rate at which the[...]
-
Seite 461
circ01 ILM 60 CIR: 64000 64000 Remote party number: IE12345 Min CIR: 64000 64000 Remote subaddress: None Burst: 64000 64000 Excess: 0 0 svc01 ILM 60 CIR: 64000 64000 Remote party number: IE12345 Min CIR: 64000 64000 Remote subaddress: Burst: 64000 64000 P01 Excess: 0 0 Options: I - call-ins allowed, L - learn protocols, M - Multicast required c - c[...]
-
Seite 462
Syntax: llc Remove Use the remove command to delete any PVC, Required PVC group, or protocol-address previously added using the add command. Syntax: remove permanent-virtual-circui t... protocol-address pvc-group switched-virtual-circuit circuit-name permanent-virtual-circuit pvc# Deletes any configured PVC in the range 16 to 1007. Notes: 1. When [...]
-
Seite 463
Protocol name or number Defines the name or number of the protocol that you are deleting. If you try to delete an unsupported protocol the system will display the error message: Unknown protocol name, try again T o see a list of supported protocols, type ? at the Protocol name or number [IP]? prompt. IP Address Defines the 32-bit internet address[...]
-
Seite 464
For the status of the network to be considered network up , the number of events in error within the window must be less than n2 prior to any change in status. Syntax: set cable* cir-defaults clocking* encoding* frame-size i d l e... * ir-adjustmen t... line-speed* lmi-type n1-parameter n2-parameter n3-parameter p1-parameter t1-parameter transmit-d[...]
-
Seite 465
V alid V alues: See “Committed Burst (Bc) Size” on page 397 Default V alue: 64 000 be Sets the default value of be to the value provided by a Frame Relay network provider . V alid V alues: See “Excess Burst (Be) Size” on page 397 Default V alue: 0 Example: FR 6 config> set cir-default Default Committed Information Rate (CIR) in bps [6400[...]
-
Seite 466
APPN 58 bytes (see note) Note: Assumes worst case for APPN BAN where a T/R MAC address header and LLC header are added in addition to the FR header bytes. If FR data encryption is enabled then you must subtract up to an additional 12 bytes. When using Frame Relay SVCs, the maximum information field size must be the same at both ends of the virtual[...]
-
Seite 467
If you want to use a line speed greater than 2048000, you can only do this on: v interface 1. v port 1 of a 4-port W AN concentration adapter . v ports 1 and 5 of an 8-port W AN concentration adapter . The other W AN ports must be clocked at 64 Kbps or less. lmi-type [rev1 or ansi or ccitt] Sets the management type for the interface. See “Enablin[...]
-
Seite 468
line hello packets between the lines. # is between 0 and 15 extra flags. The default is zero (0). Setting this parameter provides 0 to 15 extra flags between transmit frames. T able 59 lists the units and range values for serial interfaces. T able 59. T ransmit Delay Units and Range for the 2210 Serial Interface Unit Minimum Maximum Extra Flags 0[...]
-
Seite 469
T able 60. Frame Relay Monitoring Commands Summary (continued) Command Function T race Enables packet tracing capability for individual circuits or for the entire interface. Exit Returns you to the previous command level. See “Exiting a Lower Level Environment” on page 1 1. Note: In this section, the terms circuit number and PVC are equivalent [...]
-
Seite 470
List Use the list command to display statistics specific to the data-link layer and the Frame Relay interface. Syntax: list all circui t... lmi permanent-virtual-circuits pvc-groups switched-virtual-circuit svcs virtual-circuits all Displays circuit, management, and VC statistics on the Frame Relay interface. The output displayed for this command [...]
-
Seite 471
Frames/Bytes transmitted Indicates how many frames and bytes this VC has transmitted. Frames/Bytes received Indicates how many frames and bytes this VC has received. T otal FECNS Indicates the number of times that this VC has been notified of inbound or downstream congestion. T otal BECNS Indicates the number of times that this VC has been notifi[...]
-
Seite 472
R-Rs received Indicates the number of Reset-Request packets sent by the peer decompressor . A peer decompressor sends a Reset-Request whenever the peer detects that it is out of synch with its peer compressor . If this number increases rapidly , packets are being lost or corrupted on this circuit. R-Rs transmitted Indicates the number of Reset-Requ[...]
-
Seite 473
FR. These frames are waiting for space to become available on the serial device handler transmit queue for this interface. Xmit frames dropped due to queue overflow Indicates the number of frames that could not be transmitted for this VC due to output queue overflow . lmi Displays statistics relevant to the logical management on the Frame Relay i[...]
-
Seite 474
Timer T y seconds Indicates the value of the CLLM T y timer . This field is only displayed if CLLM is enabled. Last CLLM cause code Indicates the congestion cause code given in the last CLLM message received or None if no CLLM messages have been received. This field is only displayed if CLLM is enabled. SVC network number Specifies the network n[...]
-
Seite 475
LMI N2 error threshold Indicates the number of management event errors occurring within the N3 window that will cause a reset of the Frame Relay interface. LMI N3 error threshold window Indicates the number of monitored management events used to measure the N2 error threshold. MIR % of CIR Minimum IR, expressed as a percentage of CIR. IR % Incremen[...]
-
Seite 476
Data compression enabled Indicates whether data compression is enabled on this interface. Orphan compression Indicates whether orphan circuits on this interface will have data compression enabled. Note: Enabling compression on orphan circuits will decrease the number of available compression contexts available for the native VCs on the device. Orph[...]
-
Seite 477
18 Boston No &#P/A 0 0 19 Orlando No *P/A 0 0 20 Port Royal No $P/A 0 0 21 New York No @P/A 2 0 A - Active I - Inactive R - Removed P - Permanent C - Congested * - Required # - Required and belongs to a PVC group @ - Data compression capable but not operational & - Data compression capable and operational $ - Data encryption capable but not[...]
-
Seite 478
-------------------------------- ----- ------ ---------- ---------- flotsam ILM 60 CIR: 0 0 Call state: Null Burst: 0 0 Call Initiated by: None DLCI: 0 Excess: 0 0 Remote party number: IE911 Remote subaddress: None Options: I - call-ins allowed, L - learn protocols, M - multicast required C - compression capable and operational, c - compression cap[...]
-
Seite 479
Example: notrace 16 Disables packet tracing on circuit (PVC or SVC) with DLCI 16. notrace circuit phoenix Disables packet tracing on circuit (PVC or SVC) named phoenix. notrace circuit all Disables packet tracing on all circuits on this interface. Set Use the set command to set the values for Committed Information Rate (CIR), Committed Burst Rate, [...]
-
Seite 480
information, see “Excess Burst (Be) Size” on page 397. ir-adjustment increment-% decrement-% minimum-IR Sets the minimum information rate (IR) and the percentages for incrementing and decrementing the IR in response to network congestion. The minimum IR, expressed as a percentage of CIR, is the lower limit of the information rate. The minimum p[...]
-
Seite 481
Frame Relay Interfaces and the GWCON Interface Command While Frame Relay interfaces have a monitoring process for monitoring purposes, the router also displays complete statistics for installed interfaces when you use the interface command from the GWCON environment. (For more information on the interface command, refer to “Chapter 10. The Operat[...]
-
Seite 482
Maintenance Failed Indicates the total number of times the interface was unable to communicate with Frame Relay management. V .24 circuit, Nicknames, and State The circuits, control signals, pin assignments and their state (ON or OFF). Note: The symbo l---i n monitoring output indicates that the value or state is unknown. Line speed The transmit cl[...]
-
Seite 483
Output aborts sent The number of transmissions that were aborted as requested by upper-level software. Statistics similar to the following are displayed for Frame Relay dial circuits when you execute the interface command from the GWCON environment: + interface 4 Self-Test Self-Test Maintenance Nt Nt' Interface CSR Vec Passed Failed Failed 4 3[...]
-
Seite 484
Monitoring Frame Relay Interfaces 448 MRS V3.2 Software User ’s Guide[...]
-
Seite 485
Chapter 32. Using Point-to-Point Protocol Interfaces This chapter describes how to use the Point-to-Point Protocol for interfaces on the device. Sections in this chapter include: v “PPP Overview” v “The PPP Link Control Protocol (LCP)” on page 451 v “PPP Authentication Protocols” on page 455 v “Using AAA with PPP” on page 460 v “T[...]
-
Seite 486
PPP currently supports the following control protocols: v AppleT alk Control Protocol (A TCP) v DECnet Protocol Control Protocol (DNCP) v Banyan VINES Control Protocol (BVCP) v Bridging protocols (BCP , NBCP , and NBFCP) v Internet Protocol Control Protocol (IPCP) v Internet Protocol V ersion 6 Control Protocol (IPv6CP) v IPX Control Protocol (IPXC[...]
-
Seite 487
Flag Fields The flag field begins and ends each frame with a unique pattern of 0 111111 0 . Generally a single flag ends one frame and begins the next. The receiver attached to the link continuously search for the flag sequence to synchronize the start of the next frame. Address Field The address field is a single octet (8 bits) and contains t[...]
-
Seite 488
1. Before exchanging any network layer datagrams, PPP first opens the connection through an exchange of LCP configuration packets. As part of this negotiation process, the PPP processes at each end of the link agree on various basic link level parameters such as the maximum packet size that can be transferred and whether the ends must use an auth[...]
-
Seite 489
LCP Packets LCP packets are used to establish and manage a PPP link and can be loosely divided into three categories: v Link establishment packets that exchange configuration information and establish the link. v Link termination packets that shut down the link or signal that a link is not accepting connections at a particular time. They also can [...]
-
Seite 490
establishment type packets that LCP defines. They may implement some of the additional LCP packet types, and they also may define additional packet types beyond what LCP uses. Unlike LCP packets, the structure of an NCP frame may be modified according to options negotiated by LCP during the link establishment phase. Link Establishment Packets Li[...]
-
Seite 491
Protocol-Reject LCP packet code field is set to 8. The transmission of this packet type indicates that a PPP frame has been received that contains an unsupported or unknown protocol (the PPP “protocol” field was unrecognized for some packet). This usually occurs if you try to negotiate some NCP for a protocol that the other end doesn’t supp[...]
-
Seite 492
There are different authentication protocols in use: Password Authentication Protocol (P AP) and Challenge/Handshake Authentication Protocol (CHAP). Microsoft PPP CHAP (MS-CHAP) is also available to authenticate Windows workstations and peer routers. P AP and CHAP are described in detail in RFC 1334, and briefly described later in this section. MS[...]
-
Seite 493
Challenge-Handshake Authentication Protocol (CHAP) The Challenge-Handshake Authentication Protocol (CHAP) is used to periodically verify the identity of the peer using a three-way handshake. This is done upon initial link establishment, and may be repeated anytime after the link has been established. After the initial link establishment, the authen[...]
-
Seite 494
Configuring PPP Authentication The following sections describe configuring PPP authentications for two situations: v Configuring the 2210 to authenticate a remote device. v Configuring the 2210 to be authenticated by a remote device. These two situations are independent. Y ou can do one or the other . Configuring a PPP Interface to Authenticat[...]
-
Seite 495
Attention: Do not use the following commands unless you want the device to perform authentication as described in “Using Local or Remote Authentication” in Using and Configuring Features . v enable pap v enable chap v enable spap Note: SP AP is only available on interfaces that have IBM DIALs Dial-In circuits configured. v enable mschap Con?[...]
-
Seite 496
PPP User Name: no callback Type: Single User User IP Address: Interface Default SubNetMask: 255.255.255.255 Hostname: <undefined> Time-Alotted: Box Default Call-Back Type: Not Enabled Dial-Out: Not Enabled Encryption: Not Enabled Is information correct? (Yes, No, Quit): [No] yes Example 3: Roaming callback enabled Config> add PPP roaming_c[...]
-
Seite 497
v APPN Intermediate Session Routing Control Protocol (APPN ISRCP) AppleT alk Control Protocol A TCP is specified in Request for Comments (RFC) 1378. IBM’ s implementation of A TCP supports the AppleT alk-Address option. The implementation supports both full router mode and half router mode. For additional information, refer to “AppleT alk over[...]
-
Seite 498
IP Control Protocol IPCP is specified in RFC 1332. IBM’ s implementation supports the following options: v V an Jacobsen IP Header Compression as described in RFC 1 144. v IP Address The router can send its IP address, as well as accept an IP address, from a peer , or supply an IP address to a peer , if requested. If the router is configured to[...]
-
Seite 499
The router automatically adds a static route directed to the PPP interface for the address that is successfully negotiated, allowing data to be routed properly to the dial-in client. When the IPv6CP connection is ended for any reason, this static route is subsequently removed. By default, the prefix length for this route is 128 (hostroute). IPX Co[...]
-
Seite 500
v The client configuration controls the suspension and resumption of a VC. The DIALs server cannot control that aspect of the connection. v A VC can be established through an MP bundle. v VCs cannot run over L2TP . v Suspended VCs cannot be displayed with current network management tools. v Do not assign an IP address to remote users by interface.[...]
-
Seite 501
Chapter 33. Configuring and Monitoring Point-to-Point Protocol Interfaces This chapter describes Point-to-Point Protocol interface configuration and operational commands in the device. Sections in this chapter include: v “Accessing the Interface Configuration Process” v “Point-to-Point Configuration Commands” on page 466 v “Accessing [...]
-
Seite 502
Accessing the PPP Interface Configuration Prompt T o display the PPP config> prompt: 1. Enter list devices at the Config> prompt to display a list of interfaces. 2. If you have not already done so, set the data link protocol on one of the serial interfaces to PPP by entering set data-link ppp at the Config> prompt. For example: Config>[...]
-
Seite 503
pap spap ccp Disables the use of data compression on the interface. Refer to “Using the Data Compression Subsystem” in the Using and Configuring Features for more information. chap Disables the use of the Challenge-Handshake Authentication Protocol. Refer to “Challenge-Handshake Authentication Protocol (CHAP)” on page 457 for more informat[...]
-
Seite 504
1. MS-CHAP 2. SP AP 3. CHAP 4. P AP Syntax: enable ccp chap dials ecp lower-dtr mp mppe mschap pap spap ccp Enables the use of data compression on the interface. chap Enables the use of the Challenge-Handshake Authentication Protocol. Y ou are prompted for a rechallenge interval. Specify 0 if you do not want to rechallenge periodically after the in[...]
-
Seite 505
If Lower DTR is set to “enabled”, then the DTR signal will be dropped when the interface is disabled. This behavior may be desirable in situations where the interface has been configured as an alternate link for W AN Reroute and the interface is connected to a dial-out modem which maintains its dial connection based on the state of the DTR sig[...]
-
Seite 506
Use the set name command to configure the name of the 2210 if the peer router is configured to authenticate the 2210’s local name. Note: MS-CHAP is not supported on 4M V2L models. Note that MS-CHAP cannot be enabled if an external authentication server , as described in the chapter “Using Local or Remote Authentication” in Using and Config[...]
-
Seite 507
ecp Displays the current Encryption Control Protocol state. Example: list ecp ECP Options ----------- Data Encryption enabled Algorithm list: DESE-CBC DESE (Data Encryption Standard Encryption Protocol) Data Encryption Enabled/Disabled Indicates whether data encryption is enabled or disabled on interface. Algorithm List Displays the supported encry[...]
-
Seite 508
ipcp Lists the Internet Protocol control protocol options. Example: list ipcp IPCP Options ------------ IPCP Compression: None Send Our IP Address: Yes Remote IP Address to Offer if Requested: 10.0.0.3 IPCP compression Indicates whether the PPP handler accepts compressed IP headers. PPP supports V an Jacobson TCP/IP header compression (RFC 1 144). [...]
-
Seite 509
Example: PPP 7 Config>list lcp LCP Parameters -------------- Config Request Tries: 20 Config Nak Tries: 10 Terminate Tries: 10 Retry Timer: 3000 LCP Options ----------- Max Receive Unit: 1522 Magic Number: Yes Peer to Local (RX) ACCM: A0000 Protocol Field Comp(PFC): No Addr/Cntl Field Comp(ACFC): No Authentication Options ----------------------[...]
-
Seite 510
list ncp NCP Parameters --------------- Config Request Tries: 20 Config Nak Tries: 10 Terminate Tries: 10 Retry Timer: 3000 Config Request T ries: Number of times NCP sends configure-request packets to a peer station while attempting to open a PPP link. T erminate T ries: While awaiting a T erminate-Ack, the number of times NCP sends T erminate-R[...]
-
Seite 511
ncp... bcp Sets the Bridging Control Protocol (BCP) parameters. Example: set bcp TINYGRAM COMPRESSION [no]: Tinygram Compression Specifies whether or not T inygram Compression is used. This option is useful for protocols that are prone to problems when bridged over low-speed (64 Kbps and below) lines. These protocols add zeroes between the data an[...]
-
Seite 512
Note: Failure to detect a bad packet can cause all subsequent data to be decompressed incorrectly . This option sets the exact form of check value used. Choose one of the following: 0 None: No check value is used. Without a check value, there is no way to determine that a packet has been lost, out-of-sequence, or corrupted. Do not use this mode unl[...]
-
Seite 513
ST AC-LZS The ST AC-LZS algorithm as described in RFC 1974 MPPC The Microsoft Point-to-Point Compression algorithm as described in RFC 21 18. Example: set ccp protocols Enter a prioritized list of enabled compressors (first is preferred), all on one single line. Choices (can be abbreviated) are: Stac-LZS, MPPC Compressor list [Stac-LZS:]? hdlc cabl[...]
-
Seite 514
hdlc speed value For internal clocking, this command specifies the speed of the transmit and receive clock lines. The range is 2400 to 2 048 000 bps. For external clocking, this command does not affect the hardware but it sets the speed of some protocols, such as IPX, used to determine the routing parameters. In these cases, set the speed to match[...]
-
Seite 515
ipv6cp Sets the IPv6 Control Protocol option for the link. Example: set ipv6cp Send Our IP address [no]: Send Our IP address Specifies whether or not to send the local IPv6 address to the remote end of the link. Set this option to yes if the other end of the link requires the IPv6 address. If this parameter is set to yes , IPv6CP will send the IPv[...]
-
Seite 516
Specify a 32-bit bit mask in hexadecimal. If a bit in position ’N’ of the mask is set, the corresponding ASCII character ’N’ must be escaped (the LSB is bit number 0, corresponding to the ASCII NUL character). The default value for this option is ’0A0000’, indicating that XON and XOFF (control-Q and control-S) need to be escaped. This i[...]
-
Seite 517
PPP protocol values are all assigned such that the upper byte of the protocol is an even value and the lower byte is an odd value (a limited use of the more generalized mechanism described by the ISO 3309 extension mechanism for address fields). Thus, the receiver can readily detect when the leading byte of a protocol value has been omitted (the ?[...]
-
Seite 518
Notes: 1. While the “case” that you use for names and passwords sent to the peer on the link are preserved for this product, interoperability with other vendor products is easier if all names and passwords are entered in lowercase. 2. Other implementations may not handle names with the same maximum length as supported in this product. The only [...]
-
Seite 519
T erminate tries Sets the number of terminate-request packets sent by NCP to a peer station to close a PPP link. The range is 1 to 100. The default value is 10. This action indicates the desire to close an NCP connection. The retry timer is started after a terminate-request packet is transmitted. This is done to guard against packet loss. Retry tim[...]
-
Seite 520
List Use the list command to display information and counters related to the point-to-point interface and PPP parameters and options. Syntax: list all cbcp callback cp control errors interface lcp - PPP link CP pap - P AP Authentication CP chap - CHAP Authentication CP mschap - MS-CHAP Authentication CP ecp - Encryption Control Protocol edp- Encryp[...]
-
Seite 521
bvcp - Banyan VINES CP vines - Banyan VINES isrcp - APPN ISR CP isr - APPN ISR hprcp - APPN HPR CP hpr - APPN HPR all Lists all information and counters related to the point-to-point interface and PPP options and parameters. The output displayed for this command is a combination of the displays from all of the individual list item commands. Note: I[...]
-
Seite 522
isrcp hprcp Examples of the List Control CCP Command Example for ST AC-LZC compression: list control ccp CCP State: Open Previous State: Ack Sent Time Since Change: 264 hours, 56 minutes and 58 seconds Compressor: STAC-LZS histories 1, check_mode SEQ Decompressor: STAC-LZS histories 1, check_mode SEQ Max size of compression dictionary: 12494. Max s[...]
-
Seite 523
PPP x> list control ecp ECP State: Open Previous State: Ack Sent Time Since Change: 16 minutes and 40 seconds Local (transmit) encrypter: DES Remote (receive) encrypter: DES Definitions of T erms in the List Control ECP Example ECP State: The current state of the point-to-point link. If “Open” then encryption was successfully negotiated on [...]
-
Seite 524
LCP The link is in LCP negotiation. This state occurs when first bringing up an interface. The interface may be in self-test at this time. Authenticate The link is performing initial authentication. ECP The link is negotiating an ECP encryption algorithm. Note: Encryption support is optional. If your software load does not include encryption, you [...]
-
Seite 525
Remote Username When authentication is required on the link, this field shows the name that the peer supplied. Last Identification Rx’d An optional packet type that is defined for LCP is an “Identification” packet. The contents of this packet are undefined but are normally expected to be a human-readable string provided by the peer to gi[...]
-
Seite 526
list control bcp BCP State: Closed Previous State: Closed Time Since Change: 5 hours, 25 minutes and 3 seconds BCP Option Local Remote Tinygram Compression DISABLED DISABLED Source-route Info: Remote side does not support source-route bridging Definitions of T erms in the List Control BCP Example The BCP State fields are the same as those describ[...]
-
Seite 527
Remote Peer Class: 0 Remote Peer Version Major: 0 Remote Peer Version Minor: 0 Definitions of T erms in the List Control NBFCP Example The NBFCP State fields are the same as those described under the list control lcp command. Local MAC Address The Local MAC Address is the MAC Address that is used by the Win 95/NT Dial-Up Networking client. It is [...]
-
Seite 528
DHCP State This is the Proxy DHCP as described in RFC 1541. Lease Server The server from which the lease was acquired. Leased IP address The address leased to the client. This address should be equivalent to the “Remote IP Address” listed above. Lease Time Length of lease from the DHCP server for this address. When “Lease T ime Elapsed” equ[...]
-
Seite 529
The A TCP State fields are the same as those described under the list control lcp command. Common Network Number Network number of the two ends of the point-to-point link. (Y ou must statically configure both ends of the link to have the same network number .) Local Node ID Unique node number of the local end of the link. Remote Node ID Unique no[...]
-
Seite 530
error Lists information related to all error conditions tracked by the PPP software. Example: list error Error Type Count Last One ---------- ----- -------- Bad Address: 0 0 Bad Control: 0 0 Unknown Protocol: 0 0 Invalid Protocol: 0 0 Config Timeouts: 0 0 Terminate Timeouts: 0 0 Bad address Indicates the total number of bad addresses encountered ov[...]
-
Seite 531
TERM ACK 0 0 ECHO REQ: 21 21 ECHO RESP: 21 21 DISC REQ: 0 0 CODE REJ: 0 0 Packets Indicates the total number of LCP packets transmitted (out) and received (in) over the current point-to-point interface. Octets For LCP frames, indicates the total number of bytes in octets transmitted and received over the current point-to-point interface. CFG REQ In[...]
-
Seite 532
Packets The total number of P AP packets sent or received. Octets The number of bytes of data that were sent or received in those packets. Requests The number of P AP “Request” packets sent or received. These are the packets which contain the P AP name/password pairs. Acks The number of Acks (success replies) sent or received for the P AP reque[...]
-
Seite 533
Packets T otal number of MS-CHAP packets. Octets T otal number of bytes contained in MS-CHAP packets. Challenges Number of MS-CHAP challenge packets. Responses Number of MS-CHAP response packets. Successes Number of MS-CHAP success packets. Failures Number of MS-CHAP failure packets. Failure: Restricted Hours Number of failure packets sent due to t[...]
-
Seite 534
Packets Indicates the total number of ECP packets transmitted (out) and received (in) over the current point-to-point interface. Octets Indicates the total number of bytes transmitted and received in the ECP packets. Reset Reqs Indicates the number of Reset requests transmitted and received on this interface. A Reset Request will be sent whenever E[...]
-
Seite 535
Prot Rejects Indicates the total number of protocol reject packets transmitted and received over the current point-to-point interface. mppe Displays encryption data statistics for Microsoft PPP Encryption (MPPE) configuration. Example: list mppe MPPE Statistic In Out -------------- -- --- Encrypted Octets : 0 0 Encrypted Packets : 0 0 Discarded Pa[...]
-
Seite 536
Change Passwords The number of change password requests that sent or received on this interface. Alerts The number of SP AP banners that have been sent or received. MCCP Call Reqs Indicates that the sender requested another phone number to dial a second MP link. MCCP Callbacks Indicates that the sender supplied a phone number on which to be called [...]
-
Seite 537
Packets: 31035 46550 Octets: 1614885 2421137 Compressed Octets: 931416 1521039 Incompressible Packets: 0 0 Discarded Packets: 0 0 Copied Packets: 1 0 Prot Rejects: 0 - Compressor (transmit) statistics: Recent compression ratio: 1.7:1 Decompressor (receive) statistics: Recent compression ratio: 1.7:1 Packets These counters indicate the number of com[...]
-
Seite 538
compressed bytes, so values greater than 1 are preferable for both input and output. The higher the number , the more effective the compression. The output ratio is computed as the ratio of the number of original plain-text bytes divided by the number of bytes sent as a result of attempting compression - whether the packet actually was compressed o[...]
-
Seite 539
Example: list nbcp NBCP Statistic In Out --------------- -- --- Packets: 0 0 Octets: 0 0 Prot Rejects: 0 - nbfcp Lists NetBIOS Frame Control Protocol statistics for the point-to-point interface. These fields are the same as those described under the list ip command. (See “ip”.) Example: list nbfcp NBFCP Statistic In Out --------------- -- --- [...]
-
Seite 540
ipv6 Lists all information related to IPv6 packets over the point-to-point link. These fields are the same as those described under the list ip command. (See “ip” on page 503.) Example: list ipv6 IPv6 Statistic In Out -------------- -- --- Packets: 0 0 Octets: 0 0 Prot Rejects: 0 ipxcp Lists statistics for the IPX control protocol. These fiel[...]
-
Seite 541
Example: list dn DN Statistic In Out ------------ -- --- Packets: 0 0 Octets: 0 0 Prot Rejects: 0 - osicp Lists statistics for the OSI control protocol. These fields are the same as those described under the list ip command. (See “ip” on page 503.) Example: list osicp OSICP Statistic In Out --------------- -- --- Packets: 0 0 Octets: 0 0 Prot [...]
-
Seite 542
list isr APPN ISR Statistic In Out ------------- -- --- Packets: 220 219 Octets: 1266 1157 Prot Rejects: 0 - hprcp Lists statistics for APPN HPR Control Protocol packets. These fields are the same as those described under the list ip command. (See“ip” on page 503 .) Example: list hprcp APPN HPRCP Statistic In Out --------------- -- --- Packets[...]
-
Seite 543
Point to Point MAC/data-link on SCC Serial Line interface Adapter cable: V.35 DCE RISC Microcode Revision: 0 V.24 circuit: 105 106 107 108 109 Nicknames: RTS CTS DSR DTR DCD PUB 41450: CA CB CC CD CF State: ON ON ON ON ON Line speed: unknown Last port reset: 1 minute, 54 seconds ago Input frame errors: CRC error 0 alignment (byte length) 0 missed f[...]
-
Seite 544
Line speed Configured line speed or default value assumed (if line speed is configured as 0). Last port reset Length of time since the port was reset. CRC error The number of packets received that contained checksum errors and as a result were discarded. Alignment (byte length) The number of packets received that were not an even multiple of 8 bi[...]
-
Seite 545
Chapter 34. Using the Multilink PPP Protocol This chapter describes how to use the Multilink PPP Protocol (MP). It includes the following sections: v “MP Considerations” on page 510 v “Multi-Chassis MP” on page 51 1 v “Configuring a Multilink PPP Interface” on page 51 1 The Multilink PPP Protocol allows you to increase the bandwidth of[...]
-
Seite 546
MP interfaces that do not have a dedicated link must be inbound-only interfaces. These interfaces are similar to the any inbound dial circuit. The Bandwidth Allocation Protocol (BAP) and its control protocol (BACP) allow an MP interface to increase and decrease its bandwidth by adding and dropping dial circuits. When the bandwidth utilization algor[...]
-
Seite 547
Multi-Chassis MP An MP bundle with a Layer 2 Tunnel that contains a phone hunt group that spans multiple physical Network Access Servers is known as a multi-chassis MP . Multi-chassis MP uses rhelm or user-based tunneling (see “Using Local or Remote Authentication” in Using and Configuring Features ) to establish the MP endpoint destination. S[...]
-
Seite 548
Enabled as a Multilink PPP Link, Use as a dedicated Multilink PPP link? [No]: yes Multilink PPP net for this Multilink PPP link [1]? 9 NOTE: PPP configuration will be obtained from the Multilink PPP net. It is NOT necessary to configure PPP for this net! Note: Y ou cannot configure PPP parameters for dedicated links from this prompt. Dedicated lin[...]
-
Seite 549
Config> feature layer-2-tunneling Layer-2-Tunneling Config> encapsulator PPP-L2TP Config> enable mp NOTE: It IS necessary to configure PPP for this net! PPP negotiation parameters must be configured the same for all nets wishing to join the same Multilink PPP bundle. PPP-L2TP Config> Configuring Multi-Chassis MP T o configure MP for M[...]
-
Seite 550
client PPP negotiation idiosyncrasies when using dif ferent media types for each link in a bundle (for example, tunnel one link and not the other). For example, DIALs clients cannot renegotiate LCP at any point. Also, Microsoft DUN clients do not fully support LCP renegotiation. Using MP 514 MRS V3.2 Software User ’s Guide | | | ||[...]
-
Seite 551
Chapter 35. Configuring and Monitoring Multilink PPP Protocol (MP) This chapter describes how to configure specific Multilink PPP interfaces in a device. The chapter includes: v “Accessing the MP Configuration Prompt” v “MP Configuration Commands for Multilink PPP Interfaces” v “Monitoring MP Interface Status” on page 519 v “Acce[...]
-
Seite 552
Enable Use the enable command to enable the negotiation of BOD. Enabling BOD allows the link to allocate additional bandwidth when necessary . Syntax: enable bod Encapsulator Use the encapsulator command to access the PPP link-layer configuration for the Multilink PPP interface. Syntax: encapsulator Example: encapsulator Point-to-Point user config[...]
-
Seite 553
Dialout MP link net The dial circuit configured to place the first call for an outbound MP circuit. Max fragment size Specifies the largest number of bytes of data a packet can contain before the packet is fragmented to be sent over MP links. Min fragment size This is the minimum size of the fragments (in bytes) the software creates when a packe[...]
-
Seite 554
Add bandwidth % The amount of bandwidth utilization at which the software will try to add a new link. V alid V alues: 1t o9 9 Default V alue: 90 Drop bandwidth % The amount of bandwidth utilization at which the software will remove a link from the MP bundle. V alid values: 1t o9 9 Default value: 70 Bandwidth test interval (sec) The time, in seconds[...]
-
Seite 555
Min frag size This is the minimum size of the fragments (in bytes) the software creates when a packet exceeds Max fragment size . V alid V alues: 100 to 3 000 Default V alue: 375 Max number of active links Specifies the configured maximum number of links in the MP virtual link (also known as bundle ). V alid V alues: 1t o6 4 Default V alue: 2 Mon[...]
-
Seite 556
control mp mp Note: The examples that follow assume that the MP interface on this device is net number 6. bacp The list bacp command lists the statistics for bandwidth allocation control packets which have been sent or received on this MP circuit. Example: PPP 6> list bacp BACP Statistic In Out ------------- -- --- Packets: 6 8 Octets: 60 80 Rej[...]
-
Seite 557
T ypically , the call initiator will choose a magic number of X'1' and the call receiver will choose a magic number of X'FFFFFFFF' establishing the call initiator as the favored peer . PPP 6> list control bacp BACP State: Open BACP Option Local Remote ---------- ----- ------ Magic Number: FFFFFFFF 1 Favorite Peer: NO YES cont[...]
-
Seite 558
v The bandwidth utilization across all links in the MP bundle is less than the drop percentage of the total available bandwidth for the MP bundle for the number of links minus one. Bandwidth can be polled only when BAP is in the ready state. The information listed from the previous poll will give you an idea of the bandwidth utilization across the [...]
-
Seite 559
Dropped Frags (lost packets): 0 Dropped Frags (timeout or receive overflow): 0 Dropped Frags (sequence not expected): 0 PPP 11> mp The list mp command lists the statistics for packets which have been sent or received on this MP circuit. The number of bytes displayed is for pre-decompressed packets if compression was negotiated for the multilink [...]
-
Seite 560
Monitoring MP 524 MRS V3.2 Software User ’s Guide[...]
-
Seite 561
Chapter 36. Configuring SDLC Relay This chapter describes the Synchronous Data Link Control (SDLC) Relay configuration and operational commands. For further information on when to use DLSw SDLC versus SDLC Relay , refer to “Relationship to the SDLC Relay Function” in the “Using and Configuring DLSw” chapter of Protocol Configuration and[...]
-
Seite 562
SDLC Relay Configuration Commands This section summarizes the SDLC Relay configuration commands. Both the network and protocol parameters for SDLC relay are documented in this chapter . The SDLC Relay configuration commands allow you to specify router parameters for interfaces transmitting SDLC Relay frames. Restart the router to activate the co[...]
-
Seite 563
Interface number The interface number of the router that designates the local port. Primary or Secondary Designates the port type, primary (P) or secondary (S). remote–port Identifies the IP address of the port directly connected to the serial line on the remote router . Example: add remote – port Group number: [1]? 1 IP address of remote rout[...]
-
Seite 564
Syntax: disable grou p... port group group# Suppresses transfer of SDLC Relay frames to or from a specific group (group#). Example: disable group 1 port Suppresses transfer of SDLC Relay frames to or from a specific local port. Example: disable port Group number: [1]? 2 (P)rimary or (S)econdary:[S]? s Group number The group number of the port tha[...]
-
Seite 565
Example: list Maximum frame size in bytes = 2048 Encoding: NRZ Idle State: Flag Clocking: External Cable Type: RS-232 DTE Speed (bps): 0 Transmit Delay Counter: 0 Maximum frame size in bytes Maximum frame size that can be sent over the link. The maximum frame size must be large enough to accommodate the largest frame and the 15 byte SRL Y header . [...]
-
Seite 566
Net Number Indicates the device number of the local port. This number matches the number displayed using the Config list devices command. IP Address Indicates the IP address of the remote port. group group# Displays the configuration of a specified group. Example: list group 1 SDLC Relay Configuration Group Number Port Status Net SDLC Station IP[...]
-
Seite 567
A DTE cable is used when you are attaching the router to some type of DCE device (for example, a modem or a DSU/CSU). A DCE cable is used when the router is acting as the DCE and providing the clocking for direct attachment. clocking internal or external Configures the SRL Y link’s clocking. T o connect to a modem or DSU, configure clocking as [...]
-
Seite 568
The other W AN ports must be clocked at 64 Kbps or less. transmit-delay value Allows the insertion of a delay between transmitted packets. This command ensures a minimum delay between frames so that it is compatible with older , slower serial devices at the other end. This value is specified as the number of flag bytes that should be sent between[...]
-
Seite 569
Clear-Port-Statistics Use the clear-port-statistics command to discard the SDLC Relay statistics for all ports. The statistics include counters for packets forwarded and packets discarded. Syntax: clear-port-statistics clear-port-statistics Clears port statistics gathered since the last time you restarted the router or cleared statistics. Example: [...]
-
Seite 570
group group# Allows transfer of SDLC Relay frames to or from the specified group (group#). port Allows transfer of SDLC Relay frames to or from the specified local port. Example: enable port Interface number: [0]? 2 (P)rimary or (S)econdary: [s]? P Interface number Indicates the interface number of the local port that you want to enable. Primary [...]
-
Seite 571
list group 1 SDLC Relay Configuration Group Port Status Net Packets IP Address Num Num fwrd disc 1 (E) Local PRMRY (D) 2 2880 57 1 (E) Remote SCNDRY (E) 4860 13 128.185.452.11 SDLC Relay Interfaces and the GWCON Interface Command While SDLC Relay interfaces have their own monitoring processes for monitoring purposes, the router also displays comple[...]
-
Seite 572
536 MRS V3.2 Software User ’s Guide[...]
-
Seite 573
Chapter 37. Using SDLC Interfaces This chapter how to use the SDLC interface and includes the following sections: v “Basic Configuration Procedure” v “Configuring Switched SDLC Call-In Interfaces” v “SDLC Configuration Requirements” on page 538 Y ou enter SDLC configuration commands at the SDLC # Config> prompt, where # identifi[...]
-
Seite 574
Config> net 14 Dial circuit config> set net 2 1 Dial circuit config> encapsulator sdlc config> (configure SDLC) sdlc config> exit Dial circuit config> exit Config> 5. Configure DLSw: Config> prot dls DLSw protocol user configuration DLSw config> add sdlc Interface # [0]? 3 SDLC Address or 'sw' (switched dial-in[...]
-
Seite 575
Chapter 38. Configuring and Monitoring SDLC Interfaces This chapter describes the SDLC configuration and operational commands. This chapter includes the following sections: v “Accessing the SDLC Configuration Environment” v “SDLC Configuration Commands” on page 540 v “Accessing the SDLC Monitoring Environment” on page 549 v “SDLC [...]
-
Seite 576
Refer to “Chapter 1. Getting Started” on page 3 for information related to the configuration environment. SDLC Configuration Commands The SDLC configuration commands allow you to create or modify the SDLC interface configuration. This section summarizes and describes the commands you can issue from the SDLC Config> prompt within the netw[...]
-
Seite 577
Enter station name The name designation of the SDLC station (maximum characters is 8). Include station in group poll list Select whether or not to include this station in the group poll list for this link. The SDLC software supports the IBM 3174 group poll function for SDLC secondary station. Y ou must add a group poll address using the set link gr[...]
-
Seite 578
link Allows subsystems in the router (for example, DLSw) to use SDLC’s facilities. station name or address Allows connections to the specified secondary remote end station (link station name). List Use the list command to display configuration information on one or all SDLC link stations. Syntax: list link station name or all link Displays the [...]
-
Seite 579
Group Poll Address used for the group poll feature for multipoint link configurations. Secondary stations having group inclusion coded as yes will respond to unnumbered polls received from this address. This address must be non-null for the group poll feature to be in effect for any secondary stations under this link. Each secondary station will s[...]
-
Seite 580
SNRM The maximum number of times the router will send an SNRM(E) frame without receiving a response before timing out. A value of 0 indicates that the router will retry indefinitely . Poll retry The maximum number of times the router polls the station without receiving a response before timing out. A value of 0 indicates that the router will conti[...]
-
Seite 581
link frame-size link group poll* ... link idle *... link inactivity ... link inter-frame delay* link modul o... link name link pol l... link role *... link rts-hold link snrm link speed* link type *... link xid/test station address ... *Note: These commands are not available for SDLC dial circuit interfaces. link cable type Sets the cable connected[...]
-
Seite 582
T able 70. V alid Values for Frame Size in Link Frame-Size Command Minimum Maximum Default 128 18000 2048 Set the link frame size greater than the maximum packet size that you configured with the set station xxx max packet command. Otherwise, the router automatically resets the maximum packet size to the link frame size and issues the following EL[...]
-
Seite 583
delay is not suff icient to allow a response from the 2210 to another device. Y ou cannot set leading flags to a non-zero value if inter-frame delay is 0. V alid values: 0t o1 5 Default value: 0 Example: set link leading flags Leading flag counter [0]? link modulo 8 or 128 Specifies the sequence number range to use on the link: MOD 8 (0-7) or MOD[...]
-
Seite 584
2. For APPN point-to-point or negotiable, the broadcast address is used for the initial poll. For primary multipoint, the specific address is used. 3. For switched SDLC, the device must be primary , so link role type is not configurable for SDLC dial circuit interfaces. link rts-hold The time to hold Request-to-Send (RTS) high after transmitting [...]
-
Seite 585
remote-secondary address or link_station_name address < argument > Changes the remote station’s SDLC address in the range 02 - FE. Example: set remote-secondary SDLC_C1 address ce station address or name address Changes the station’s SDLC address in the range 01 to FE. Example: set station c1 address Enter station address (in hex) [C1]? s[...]
-
Seite 586
MOS Operator Control * talk 5 + 2. Next, enter the network # command using the number that identifies the interface that you previously configured for the SDLC device. + network 2 SDLC Console SDLC-2> Y ou enter all GWCON (Monitoring) commands at the + prompt. Refer to “Chapter 1. Getting Started” on page 3 for information related to the m[...]
-
Seite 587
Syntax: clear link station ... link name or address Clears the counters for an SDLC interface. station name or address or all Clears counters for a specific station or for all stations. Delete Use the delete command to terminate an existing SDLC connection without affecting the SDLC configuration in SRAM. This command terminates any SDLC session [...]
-
Seite 588
list link configuration link counters statio n... link configuration Displays information for all configured SDLC link stations on the interface. For an example and for additional information on the list command, see “List” on page 542. link counters Displays information for the SDLC counters since the last router restart or the last clear c[...]
-
Seite 589
Enabled Enabled, but not allocated Idle Allocated, but not in use Connected Connected Disconnected Disconnected Connecting Connection establishment in progress. Discnectng Disconnection in progress Recovering Attempting to recover from a temporary data link error . Max BTU The frame size limit of the remote station. This frame size must not be larg[...]
-
Seite 590
SNRM Number of Set Normal Response Mode frames received and transmitted DISC Number of Disconnect frames received and transmitted UA Number of Unnumbered Acknowledgment frames received and transmitted DM Number of Disconnected Mode frames received and transmitted FRMR Number of Frame Reject frames received and transmitted UP Unnumbered Polls (group[...]
-
Seite 591
set link modul o... link name link pol l... link role *... link rts-hold link snrm(e) link type *... link xid/test statio n... *Note: These commands are not supported on SDLC dial circuit interfaces. link modulo Dynamically changes the range of sequence numbers to be used on the data link without affecting the SRAM configuration. Modulo 8 specifi[...]
-
Seite 592
When using broadcast address to negotiate the role, the link uses a default SDLC configuration. When primary is the link role, the link performs an initial poll to a specific address. 2. For APPN point-to-point or negotiable, the broadcast address is used for the initial poll. For primary multipoint, the specific address is used. 3. For switched[...]
-
Seite 593
station address or name name Name of the SDLC station. station address or name receive-window Maximum number of frames router sends before responding. station address or name transmit-window Maximum number of frames router transmits before receiving a response frame. T est T ransmits a specified number of TEST frames to the specified station and [...]
-
Seite 594
Note: For SDLC interfaces, the Nt’ interface number is always the same as the Nt interface number . CSR Indicates the memory location of the control status register for the SDLC interface. Self-test passed Indicates the total number of times the SDLC interface passed its self-test. Self-test failed Indicates the total number of times the SDLC int[...]
-
Seite 595
Note: It is unlikely that the L & F bits not set counter will be af fected by traff ic. Configuring SDLC Interfaces Chapter 38. Configuring and Monitoring SDLC Interfaces 559[...]
-
Seite 596
Configuring SDLC Interfaces 560 MRS V3.2 Software User ’s Guide[...]
-
Seite 597
Chapter 39. Using Binary Synchronous Relay (BRL Y) This chapter describes how to use the Binary Synchronous Relay (BRL Y) protocol. It includes the following sections: v “BRL Y Overview” v “BRL Y Considerations” on page 564 Binary Synchronous Relay (BRL Y) is a protocol that encapsulates binary synchronous communications (BSC) traff ic and [...]
-
Seite 598
BSC Relay also supports a combination of virtual and physical multipoint connections. Figure 32 is a diagram of a combination of virtual and physical multipoint connections. Sample BRL Y Configuration The following examples illustrate configuring a BRL Y network similar to the network in Figure 32. These examples use the following assumptions: v [...]
-
Seite 599
Notes: 1. The configuration for group 1 starts at 1 . 2. The configuration for group 2 starts at 2 . Config> protocol brly BSC Relay protocol user configuration BRLY config> add group 1 Local group number: [1]? Point to Point connection?(Yes or [No]): BRLY config> add local Local group number: [1]? Interface number: [0]? 1 (P)rimary or ([...]
-
Seite 600
BRL Y Considerations When configuring BRL Y , keep the following in mind: BRLY config> add group Local group number: [1]? Point to Point connection?(Yes or [No]): BRLY config> add local Local group number: [1]? Interface number: [0]? 1 (P)rimary or (S)econdary: [S]? s Station address in hexadecimal (1 - FF): [1]? c1 BRLY config> add remot[...]
-
Seite 601
v Enabling BRL Y will result in an increase of polling in the network which will reduce the total network throughput. v BSC devices automatically disconnect if their inactivity timer expires. By default, this occurs after three seconds. An extremely busy network could result in BSC devices that disconnect frequently . Chapter 39. Using Binary Synch[...]
-
Seite 602
566 MRS V3.2 Software User ’s Guide[...]
-
Seite 603
Chapter 40. Configuring and Monitoring BSC Relay This chapter describes the binary synchronous communications (BSC) Relay configuration and operational commands. It also includes a procedure for configuring a BSC interface. The chapter includes the following sections: v “Basic Configuration Procedure” v “BSC Relay Configuration Commands?[...]
-
Seite 604
configuration commands. T able 72 shows the commands for both the network BSC and protocol BRL Y . T able 72. BSC Relay Configuration Commands Summary Command Network BSC Protocol BRL Y Function ? (Help) yes yes Lists all of the configuration commands or lists the options associated with specific commands. Add yes Adds groups, local ports, and [...]
-
Seite 605
Group number The group number for the port. This number must be configured previously using the add group command. Interface number The interface number of the router that designates the local port. Primary or Secondary Designates the port type, primary (P) or secondary (S). Default value: S Station Address Character Specifies the character that [...]
-
Seite 606
Delete Use the delete command to remove groups, local ports, and remote ports. Syntax: delete group group# local-port remote–port group group# Removes a group (group#). Example: delete group 1 local–port group# Removes the local port for the specified group. Example: delete local – port Group number: [1]? 2 Group number The group number for [...]
-
Seite 607
Enable Use the enable command to turn on data transfer for an entire relay group or a specific relay port. Syntax: enable group group# port group group# Allows transfer of BSC Relay frames to or from the specified group. Example: enable group 1 port Allows transfer of BSC Relay frames to or from the specified local port. Example: enable port Gro[...]
-
Seite 608
Cable T ype The serial interface cable type. Speed (bps) Lists the speed of the transmit and receive clocks. Code The code type used by this device. Link EOT Specifies whether EOT transmissions are combined with poll and select transmissions when the transmissions occur back-to-back. Number of pairs of SYNs The number of pairs of synchronization c[...]
-
Seite 609
group group# Displays the configuration of a specified group. Set Use the set command to configure the BSC interface parameters. Syntax: set cable clocking [internal or external] code [ebcdic or ascii] encoding [nrz or nrzi] eotlink [yes or no] frame-size idle [sync or mark] speed bps syns number cable Sets the cable used on the serial interface[...]
-
Seite 610
Example: set encoding nrz eotlink [yes or no] Specifies whether to combine EOT transmissions with poll and select transmissions when the transmissions occur back-to-back. Default value: yes frame-size Configures the maximum size of the frames that the system can transmit and receive on the data link. If this value is set to a value larger than th[...]
-
Seite 611
* talk 5 + The system displays the GWCON prompt (+) on the console. If the prompt does not appear when you first enter GWCON, press Return again. 2. At the GWCON prompt, enter the configuration command to see the protocols and networks for which the router is configured. For example: + configuration See page 130 for more sample output from the c[...]
-
Seite 612
Disable Use the disable command to suppress data transfer for an entire group or a specific relay port. SRAM (static read access memory) does not permanently store the effects of the disable monitoring command. Therefore when you restart the router , the effects of this command are erased. Syntax: disable group group# port group group# Suppresses [...]
-
Seite 613
List Use the list command to display the configuration of a specific group or of all groups. Syntax: list all group group# all Displays the statistics of all local groups. See the list group command for a sample output. group group# Displays the statistics of a specified group. Example: list group 1 BSC Relay Configuration Local Group Port Net R[...]
-
Seite 614
BSC Relay Interfaces and the GWCON Interface Command While BSC Relay interfaces have their own monitoring processes, the router also displays complete statistics for installed network interfaces when you use the interface command from the GWCON environment. (For more information on the interface command, refer to Chapter 10. The Operating/Monitorin[...]
-
Seite 615
Chapter 41. Using the V .25bis Network Interface The V .25bis interface allows routers to establish serial connections over switched telephone lines using V .25bis modems. This chapter describes how to use the V .25bis interface. It includes the following sections: v “Before Y ou Begin” v “Configuration Procedures” Note: Y ou can assign a [...]
-
Seite 616
– Colon (:) — ″ Wait T one ″ – Left-angled bracket (<) — ″ Pause ″ , used for inserting a fixed delay (dependent on modem) between digit sequences. For example, when going through a PBX or PTN. – Equal (=) — ″ Separator 3 ″ , which is ″ for national use. ″ (Consult your modem manual.) – The letter P — ″ Dialing[...]
-
Seite 617
v The set connect-timeout command specifies the number of seconds allowed for a call to be established. v The set duplex command specifies the duplexing mode for the call. v The set encoding command sets the encoding for the call. v When you have finished configuring the interface, you can use the list command to display your configuration. Ad[...]
-
Seite 618
Circuit Config> set calls outbound Circuit Config> set calls inbound Note: For W AN Restoral operations or another dial-on-demand application, you should set up the circuit for either inbound or outbound calls. 5. Specify the timeout period for the circuit. Use the set idle command. If there is no traff ic over the circuit for this specified[...]
-
Seite 619
Chapter 42. Configuring and Monitoring the V .25bis Network Interface This chapter describes the V .25bis configuration and operational commands and GWCON commands. It includes the following sections: v “Accessing the Interface Configuration Process” v “V .25bis Configuration Commands” v “Accessing the Interface Monitoring Process” [...]
-
Seite 620
T able 75. V .25bis Configuration Commands Summary Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See “Getting Help” on page 10. List Displays the V .25bis configuration. Set Sets the local address, connect, disconnect, and no answer timeouts, nu[...]
-
Seite 621
non-responding address, it does not attempt to establish the call until this time has expired. This timeout period begins when the router attempts the first call. Call timeouts: Number of call timeouts. Command Delay Amount of time, in milliseconds, that the router waits to initiate or answer a call after it turns on DTR (Data T erminal Ready). If[...]
-
Seite 622
takes to establish connections to various destinations. Y ou can then set this parameter to a number slightly higher than the longest connect time. Note: Normally government regulation limits modem manufacturers to a maximum length for call setup. This value is merely an optimization, although inter-operation with some DSUs may require that you cha[...]
-
Seite 623
GWCON (+) prompt and when you enter the statistics command at the V.25bis> monitoring prompt. The range is 300 to 2 048 000 bps. Note: This command does not affect the actual line speed but it sets the speed some protocols, such as IPX, use when calculating routing cost parameters for dial circuits mapped to the V .25bis interface. local-address[...]
-
Seite 624
T able 76. V .25bis Monitoring Command Summary Monitoring Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See “Getting Help” on page 10. Calls List the number of completed and attempted connections made for each dial circuit mapped to this interface[...]
-
Seite 625
Circuits The circuits command shows the status of all dial circuits configured on the V .25bis port. Syntax: circuits Example: circuit Net Interface MAC/Data-Link State Reason Duration 2 PPP/0 Point to Point Avail Rmt Disc 1:02:25 Net Number of the dial circuit mapped to this interface Interface T ype of interface and its instance number . MAC/Dat[...]
-
Seite 626
parameters V.25bis port Parameters Local Network Address Name = v402 Local Network Address = 15088982402 Non-Responding addresses: Retries = 1 Timeout = 0 seconds Call timeouts: Command Delay = 0 ms Connect = 0 seconds Disconnect = 0 seconds Local Network Address Name: Network address name of the local port. Local Network Address: Network dial addr[...]
-
Seite 627
statistics V.25bis port Statistics Adapter cable: RS-232 DTE RISC Microcode Revision: 1 V.24 circuit: 105 106 107 108 109 125 141 Nicknames: RTS CTS DSR DTR DCD RI LL RS-232 CA CB CC CD CF CE State: OFF OFF OFF OFF OFF OFF OFF Line speed: 4800 Last port reset: 24 seconds ago Input frame errors: CRC error 0 alignment (byte length) 0 missed frame 0 t[...]
-
Seite 628
DMA/FIFO overrun The number of times the serial interface card could not send data fast enough to the system packet buffer memory to receive packets from the network. L & F bits not set On serial interfaces, the hardware sets input-descriptor information for arriving frames. If the buffer can accept the complete frame upon arrival, the hardware[...]
-
Seite 629
RS-232: CA CB CC CD CF CE State: OFF OFF OFF OFF OFF OFF OFF Line Speed: 14.400 Kbps Last port reset: 1 hour, 28 minutes, 25 seconds ago Input frame errors: CRC error 0 alignment (byte length) 0 missed frame 0 too long (> 2182 bytes) 0 aborted frame 0 DMA/FIFO overrun 0 Output frame counters: DMA/FIFO underrun errors 0 Output aborts sent 0 T o d[...]
-
Seite 630
CRC error Number of packets received that contained checksum errors and as a result were discarded. Alignment (byte length) Number of packets received that were not an even multiple of 8 bits in length and as a result were discarded. Missed Frame When a frame arrives at the device and there is no buffer available, the hardware drops the frame and i[...]
-
Seite 631
Chapter 43. Using the V .34 Network Interface The V .34 interface allows routers to establish serial connections over switched telephone lines using externally attached modems that support the standard A T command set or integrated modem adapters. This chapter describes how to use a V .34 interface. It includes the following sections: v “Before Y[...]
-
Seite 632
– Colon (:) – ″ Wait T one ″ – Left-angled bracket (<) – ″ Pause ″ , used for inserting a fixed delay (dependent on modem) between digit sequences. For example, when going through a PBX or PTN. – Equal (=) – ″ Separator 3 ″ , which is ″ for national use. ″ (Consult your modem manual.) – The letter P – ″ Dialing[...]
-
Seite 633
v The set command-delay-timeout command specifies the amount of time the router waits to initiate or answer a call after it turns on DTR. v The set connect-timeout command specifies the number of seconds allowed for a call to be established. v The speed command sets the maximum DTE speed for the modem. v The modem-init-string command allows flex[...]
-
Seite 634
4. Configure the dial circuit to initiate outbound calls only , accept inbound calls only , or both initiate and accept calls. Use the set calls command. T o avoid a conflict if both ends of the link attempt to establish a call at the same time, configure the dial circuit at one end of the link to accept inbound calls only , and configure the d[...]
-
Seite 635
Chapter 44. Configuring and Monitoring the V .34 Network Interface This chapter describes the V .34 configuration and operational commands and GWCON commands. It includes the following sections: v “Accessing the Interface Configuration Process” v “V .34 Configuration Commands” v “Accessing the Interface Monitoring Process” on page 6[...]
-
Seite 636
T able 77. V .34 Configuration Commands Summary Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See “Getting Help” on page 10. List Displays the V .34 configuration. Set Sets the local address, connect, disconnect, and no answer timeouts, number o[...]
-
Seite 637
set this parameter to 0, the router waits for the modem to respond to DTR with the CTS (Clear to Send) signal before it issues commands. Connect Number of seconds allowed for a call to be established. If this parameter is set to 0, the modem controls the connection establishment timeout. Disconnect After the routers drops DTR it waits this amount o[...]
-
Seite 638
takes to establish connections to various destinations. Y ou can then set this parameter to a number slightly higher than the longest connect time. Note: Normally government regulation limits modem manufacturers to a maximum length for call setup. This value is merely an optimization, although inter-operation with some DSUs may require that you cha[...]
-
Seite 639
Where # is the number of the V .34 interface. Y ou cannot directly access the V .34 monitoring process for dial circuits, but you can monitor the dial circuits that are mapped to the serial line interface. Note: V .34 interfaces also have ELS troubleshooting messages that you can use to monitor V .34 related activity . See the IBM Nways Event Loggi[...]
-
Seite 640
In Number of inbound connections accepted for this dial circuit. Out Number of completed connections initiated by this dial circuit. Rfsd Number of connections initiated by this dial circuit that were refused by the network or the remote destination port. Blckd Number of connection attempts that the router blocked. The router blocks connection atte[...]
-
Seite 641
Duration Length of time that the circuit has been in the current state. Parameters Use the parameters command to display the current V .34 serial line configuration. Note that this is the same information displayed in the V.34 Config> list command. Syntax: parameters Example: parameters V.34 port Parameters Local Network Address Name = v402 Loc[...]
-
Seite 642
initiates further calls. If you set this parameter to 0, the router waits for the modem to respond to the DTR drop by dropping CTS and DSR before it initiates the next call. Statistics Use the statistics command to display the current statistics for this V .34 interface. Syntax: statistics Example: statistics V.34 port Statistics Adapter cable: RS-[...]
-
Seite 643
Missed Frame When a frame arrives at the device and there is no buffer available, the hardware drops the frame and increments the missed frame counter . too long (> nnnn bytes) Number of packets received that were greater than the configured frame size (nnnn) and as a result were discarded. aborted frame Number of packets received that were abo[...]
-
Seite 644
T o display the following statistics for a V .34 serial line interface, use the interface command followed by the interface number of the V .34 serial line interface. Example: interface 1 Self-Test Self-Test Maintenance Nt Nt' Interface CSR Vec Passed Failed Failed 1 1 V.34/0 80000000 44 1 0 0 V.34 MAC/data-link on SCC Serial Line interface Ad[...]
-
Seite 645
Nicknames Common names for the circuits. RS-232 EIA 232 (also known as RS-232) names for the circuits. State Current state of the circuits (ON or OFF). Line speed The transmit clock speed (approximate). Last port reset Length of time since the port was reset. Input frame errors: CRC error Number of packets received that contained checksum errors an[...]
-
Seite 646
Configuring V .34 610 MRS V3.2 Software User ’s Guide[...]
-
Seite 647
Chapter 45. Using the ISDN Interface This chapter describes the Integrated Services Digital Network (ISDN) interfaces on the IBM 2210. It includes the following sections: v “ISDN Overview” v “ISDN Cause Codes” on page 614 v “Sample ISDN Configurations” on page 616 v “Channelized T1/E1” on page 617 v “Requirements and Restrictions[...]
-
Seite 648
– The PRI adapter provides T1/J1 or E1 support. - T1/J1 supports twenty-three 64-Kbps B-channels and one 64-Kbps D-channel. - E1 supports thirty 64-Kbps B-channels and one 64-Kbps D-channel. – Channelized T1/E1 - T1/J1 supports up to twenty-four 64-Kbps time slots. - E1 supports up to thirty-one 64-Kbps time slots. - Y ou can group time slots i[...]
-
Seite 649
Note: Y ou can assign a destination name to a connection list (add ISDN address) and assign a destination number to each line in the list. When that destination name is called, the numbers in the list are tried one by one until a connection is made or the list is exhausted. Routable protocols and bridging and routing features cannot communicate dir[...]
-
Seite 650
See “Set” on page 646 for more information about priority . Cost Control Over Demand Circuits Dial-on-demand circuits always appear to be in the Up state to the protocols. Most protocols send out periodic routing information that could cause the router to dial out each time the routing information is sent over dial-on-demand circuits. T o limit[...]
-
Seite 651
1. If cause0 is not ″ 0x5 ″ ignore the cause code. 2. If cause0 is ″ 0x5 ″ look at cause1. If the high-order (most significant) bit of cause1 is ON , set it to OFF . 3. Convert the result to decimal and look up the meaning in the following table, which is taken from ITU-T Recommendation Q.850 . T able 79. ISDN Q.931 Cause Codes Code Cause [...]
-
Seite 652
T able 79. ISDN Q.931 Cause Codes (continued) Code Cause 82 Identified channel does not exist 83 A suspended call exists, but this call identity does not 84 Call identity in use 85 No call suspended 86 Call having the requested call identity has been cleared 88 Incompatible destination 91 Invalid transit network selection 95 Invalid message, unspe[...]
-
Seite 653
W AN Restoral Configuration Figure 37 shows how you can use an ISDN connection to back up a failed dedicated W AN link (WAN restoral). In this example, Router A normally uses the W AN link to communicate with Router B. If that connection fails, the ISDN dial-up link reconnects the two routers. When the W AN link recovers, the secondary link automa[...]
-
Seite 654
Circuit config: 7> set net 6 Circuit config: 7> set timeslo t2342 4 Circuit config: 7> list Base net = 6 Idle character = 7E Bandwidth = 64 Kbps Timeslot =2342 4 Note: If this were an E1 circuit, the available timeslots would be 1 to 31. Requirements and Restrictions for ISDN Interfaces Router The ISDN software requires the following model[...]
-
Seite 655
Switch names V alid command Channelized T1/E1 CHANNELIZED ISDN Interface Restrictions v Y ou cannot boot or dump the router over an ISDN interface. v Except for BRI, which allows you to use the D-channel for X.25 packet data, you cannot use the D-channel for data traff ic. Normally the D-channel is used only for setting up and taking down B-channel[...]
-
Seite 656
v Network Subdial Address . Optional. This is an additional part of telephone number , such as an extension, that is interpreted once the interface connects to a PBX. Y ou can enter up to 20 numbers, as well as 1 1 additional spaces and punctuation. The router uses only the numbers. T o add an ISDN address, enter the add isdn-address command at the[...]
-
Seite 657
4. For BRI only , set the ISDN interface to either point-to-point (pp) or multipoint (mp). Point-to-point is one ISDN device on an ISDN line. Multipoint is two or more ISDN devices sharing an ISDN line. With some switch variants, you must configure the line as multipoint regardless of how many devices are on it. Check with your ISDN service provid[...]
-
Seite 658
When you have finished configuring the ISDN interface, you can use the list command to display your configuration. Configuring the ISDN Interface T1/J1 PRI Interface Specify the following T1/J1 parameters: 1. For the T1/J1 PRI interface, line build out specifies the attenuation of the signal transmitted by the router ’s T1 port. Specify the [...]
-
Seite 659
T o add a dial circuit, enter the add device dial-circuit command at the Config> prompt. The software assigns an interface number to each circuit. Y ou will use this number to configure the dial circuit. For example: Config> add device dial-circuit Enter the number of PPP Dial Circuit interfaces [1]? Adding device as interface 6 Base net for[...]
-
Seite 660
Circuit Config> set idle Idle timer (seconds, 0 means always active) [0]? 0 Note: W AN restoral/reroute must be fixed. 6. Optionally , you can provide a LID name to send (instead of the default LID, which is the destination name) by specifying a lid_out_addr. When more than one circuit is configured between two routers (parallel circuits), the[...]
-
Seite 661
ISDN I.430 and I.431 Switch V ariants T o use the Native I.430 mode that is supported in Japan and is known as D64S in Germany , you must code the ISDN switch variant as I.430. This treats the ISDN interface like a leased line. There is no D-channel signalling traf fic in this mode. Code the switch variant as I.431 when running a leased line over I[...]
-
Seite 662
Config> n 6 Circuit config: 6>set net 5 Circuit config: 6>list all Base net = 5 X.31 Support The ITU Standard X.31 is for transmitting X.25 packets over ISDN. This standard provides support for X.25 with Unconditional Notification on the ISDN BRI D-channel. X.31 is available from service providers in several countries. It gives the router[...]
-
Seite 663
Chapter 46. Configuring and Monitoring the ISDN Interface This chapter describes the ISDN commands and GWCON commands. It includes the following sections: v “ISDN Configuration Commands” v “Accessing the Interface Monitoring Process” on page 635 v “ISDN Monitoring Commands” on page 635 v “ISDN and the GWCON Commands” on page 641 N[...]
-
Seite 664
remove Add Adds a caller ’s number to be blocked. List Lists the callers’ numbers to be blocked. Remove Removes a caller ’s number for the list to be blocked. Disable The disable command disables Power Source 1 detection. If your switch does not supply Power Source 1, you should disable PS1. Note: This command is valid only for BRI. Syntax: d[...]
-
Seite 665
DN0 (Directory Number 0) = 5551234 DN1 (Directory Number 1) = 5553456 Service Profile ID (B1) = 91955555550100 Service Profile ID (B2) = 91955555550101 TEI for B-Channel 1 = Automatic TEI for B-Channel 2 = Automatic TEI for X.25 = Automatic PS1 detect = Disabled No circuit address accounting information being kept. Remove The remove command lets yo[...]
-
Seite 666
included. Y ou must set the ISDN frame size so that it is greater than or equal to the frame size configured for the dial circuits using the ISDN interface. For PPP dial circuit interfaces, you can change the PPP MRU using the set lcp options command. The ISDN frame size must include enough bytes for the PPP MRU and the PPP header . Note: If you c[...]
-
Seite 667
esf-data-link The service subscription. This information is provided by the service provider . V alid V alues : ANSI-T1.403 ANSI-IDLE A T&T -IDLE Default V alue : ANSI-T1.403 For E1 PRI: code This information is provided by the service provider . V alid V alues : HDB3 or AMI Default V alue : HDB3 crc4 Specifies whether the router ’s E1 port [...]
-
Seite 668
maximum number of calls the router attempts to make at one time. Setting retries-call-address to 0 causes the router to bring up all circuits at once. If you set the switch-variant to INS64, you cannot change the retries-call-address default. It is fixed at 2. V alid V alues :0t o3 0 Default V alue : 23 (2 for BRI) service-profile-id B-channel# s[...]
-
Seite 669
v A T&T 5ESS (North America) v A T&T 4ESS (North America) v Australia (AUSTEL) v INS-Pri (Japan, NTT) v National ISDN 2 (North America) v NET 5 (Euro-ISDN, ETSI) v Northern T elecom 250 (DMSPRI) v Native I.431 v Channelized T1/E1 Default V alue : DMSPRI dn0 directory number 0 T o accept inbound calls DN0 must match the network dial address [...]
-
Seite 670
v DN0, and DN1 are used to verify that the incoming call is being delivered to the correct ISDN destination. v If the destination number (Called Party Number) in the ISDN call being delivered does not match either DN0 or DN1, then the call is rejected. v If the user wishes to bypass the destination verification checking, then do not configure eit[...]
-
Seite 671
Default V alue: None Syntax: cause code remove value Example: remove FF Accessing the Interface Monitoring Process T o access the interface monitoring process for ISDN, enter the following command at the GWCON (+) prompt: + network # Where # is the number of the ISDN interface. Y ou cannot directly access the monitoring process for dial circuits, b[...]
-
Seite 672
remove Add Adds a caller ’s number to be blocked. List Lists the callers’ numbers to be blocked. Remove Removes a caller ’s number for the list to be blocked. Calls Use the calls command to list the number of completed and attempted connections made for each dial circuit mapped to this interface since the last time statistics were reset on th[...]
-
Seite 673
Circuits The circuits command shows the status of the dial circuits configured on the ISDN interface that are in the state of “Up” or “Available”. Syntax: circuits Example: circuit Net Interface MAC/Data-Link State Reason Duration 4 PPP/1 Point to Point Up B1 SelfTest 91:24:03 5 PPP/2 Point to Point Up B2 Inbound 91:24:00 Net Number of the[...]
-
Seite 674
Dial-dump Use the dial-dump command to display the operation characteristics of the specified dial circuit. Syntax: dial-dump ciruitname L2_Counters Use the L2_counters command to list the L2/L1 states along with some L2 counters. Syntax: L2_counters L3_Counters Use the L3_Counters command to list counters of set ups sent/received/accepted. Syntax[...]
-
Seite 675
Example: parameters ISDN Port parameters: Local Address Name: vl233 Local Network Address: 20 Local Network Subaddress: Frame Size: 2048 TEI 0: Automatic TEI 1: Automatic X.25 TEI: 21 Switch Variant: AT&T 5ESS (United States) Multipoint Selection: Multipoint Directory Number 0: 20 Outbound call address Timeout: 180 Retries: 0 Statistics Use the[...]
-
Seite 676
Overflow 23 Overflow 3 Underrun 0 Too Long 6 Abort 4 CRC error 8 Misaligned 3 Transmit B Channels Receive B Channels Packets 1499094 Packets 1499228 Bytes 59955660 Bytes 59951780 Overflow 0 Overflow 90 Underrun 0 Too Long 171 Abort 139 CRC error 232 Misaligned 72 E1 Status Register E1 Error Count Registers Receive AIS : Off CRC6 Errors: 4 Receive R[...]
-
Seite 677
ISDN and the GWCON Commands While ISDN has its own monitoring process for monitoring purposes, the router also displays configuration information and complete statistics for devices and circuits when you use the interface, statistics, and error commands from the GWCON environment. Y ou can also use the GWCON test command to test DCEs and circuits.[...]
-
Seite 678
Interface Interface type and its instance number . CSR Command and status register addresses of base network. Ve c Interrupt vector address. Self-T est Passed Number of self-tests that succeeded. Self-T est Failed Number of self-tests that failed. Maintenance: Failed Number of maintenance failures. Configuration - Information on Router Hardware an[...]
-
Seite 679
Chapter 47. Configuring and Monitoring Dial Circuits This chapter describes how to configure dial circuits on a dial circuit interface mapped to a V .25bis, V .34,or ISDN interface. It contains the following sections: v “Dial Circuit Configuration Commands” v “Dial Circuit Monitoring Commands” on page 650 Dial-in and Dial-out interfaces [...]
-
Seite 680
T able 83. Dial Circuit Configuration Commands Summary (continued) Command Function Set Configures the dial circuit for inbound or outbound calls, maps the dial circuit to a serial line interface, and sets addresses, idle timeout, priority , lid_out address, inbound destination, and self-test delay . Exit Returns you to the previous command level[...]
-
Seite 681
Be aware that you cannot configure HDLC parameters of the dial circuit configuration when you configure PPP or Frame Relay for ISDN. Physical layer parameters are configured on the ISDN interface. For information on configuring the PPP protocol, refer to “Chapter 25. Configuring Serial Line Interfaces” on page 317 or refer to “Chapter 3[...]
-
Seite 682
Bandwidth Displays the bandwidth value in Kbps. Base net Displays the name of the serial line interface to which this dial circuit is mapped. Callback Displays the setting of this option. Calls Displays the setting of this option. Destination name Displays the network address name to be called for outbound circuits, and the default comparison addre[...]
-
Seite 683
Notes: 1. If you are running SDLC, I.430, I.431, Channelized, or X.25 on a dial circuit, you will be unable to use the set command to change the following parameters as the software will use specific defaults: v Any_inbound - any_inbound is set v Calls - inbound v Destination - default address v Inbound destination - no destination inbound address[...]
-
Seite 684
For Channelized: 56 or 64 Default value: 64 callback [ Ye s or No ] The callback feature uses the callers telephone number to verify the call against an authentication table and then disconnects the incoming call. Callback then makes an outgoing call to the same caller . Callback should always be disabled. The default is no. calls [ outbound or inb[...]
-
Seite 685
lid_out_addr address_name The lid_out_addr is the name of a dial circuit between two routers. When more than one circuit is configured between two routers (parallel circuits), then there needs to be a way to unambiguously know which dial circuit connects between them. For this purpose, a lid_out_addr is sent from the router at one end (the caller)[...]
-
Seite 686
Note: Y ou can only use this parameter for Channelized T1/E1 circuits. V alid values: For Channelized T1: 1 to 24 For Channelized E1: 1 to 31 Default value: None Example: set timeslo t1458 Dial Circuit Monitoring Commands T able 84 describes the dial circuit monitoring commands. Enter the dial circuit monitoring commands at the Circuit Config> p[...]
-
Seite 687
Appendix A. Quick Configuration Reference Important If you are attempting to configure or monitor your IBM 2210 and your service terminal is unreadable, see “Service T erminal Display Unreadable” in IBM 2210 Nways Multiprotocol Router Service and Maintenance Manual. Quick Configuration T ips Making Selections On the panels that you view when[...]
-
Seite 688
Router Quick Configuration for the following: o Interfaces o Multilink PPP (w/o DIALs) o Dial Circuits (w/o DIALs) o Dial-in Access to LANs (DIALs) o Bridging Spanning Tree Bridge (STB) Source Routing Bridge (SRB) Source Routing/Transparent Bridge (SR/TB) Source Routing Transparent Bridge (SRT) o Protocols IP (including OSPF, RIP, and SNMP) IPX DNA[...]
-
Seite 689
Configuring Interfaces ********************************************** Interface Configuration ********************************************** Type 'Yes' to Configure Interfaces Type 'No' to skip Interface Configuration Type 'Quit' to exit Quick Config Configure Interfaces? (Yes, No, Quit): [Yes] 1. T ake one of the fol[...]
-
Seite 690
Cable type (RS-232 DTE, RS-232 DCE, V.35 DTE, V.35 DCE, V.36 DTE, X.21 DTE, X.21 DCE: [RS-232 DTE] V.35 DCE Note: DTE cable types are used when attaching to a modem or DSU. DCE cable types are used when connecting directly to another DTE device and you want the 2210 to provide the clocking. 3. Enter the cable type you have or will connect to this W[...]
-
Seite 691
Intf 1 is a WAN PPP Encapsulation for WAN 1 (PPP, Frame Relay, V34): [PPP] Cable type (RS-232 DTE, RS-232 DCE, V.35 DTE, V.35 DCE, V.36 DTE, X.21 DTE, X.21 DCE: [RS-232 DTE] V.35 DCE Intf 2 is a WAN PPP Encapsulation for WAN 2 (PPP, Frame Relay, V34): [PPP] Cable type (RS-232 DTE, RS-232 DCE, V.35 DTE, V.35 DCE, V.36 DTE, X.21 DTE, X.21 DCE: [RS-23[...]
-
Seite 692
Enter maximum number of active links (2 - 23): [2] 3 Set Call Direction (Inbound, Outbound, Both): [Inbound] Inbound Enter Idle timer (seconds, 0 means always active) (0 - 65535): [0] 0 3. Next you are prompted to add/edit the ISDN dial-circuits that can be used by the MP interface. The example below demonstrates adding one dial-circuit but you may[...]
-
Seite 693
Current Multilink PPP Configuration: Num Intf# Direction Max Links Link Intf# Base Intf# Destination 1 7 In 3 8 6 default_ad Save this configuration (Yes, No): [Yes] y Multilink PPP configuration saved. Configuring Dial-Circuits The following configuration questions are displayed for dial-circuit configuration: **********************************[...]
-
Seite 694
Interface #: 13 Interface Type: PPP Dial Circuit Base Intferface #: 6 (ISDN Base Net) Idle timer: 0 (fixed circuit) Call Direction: Inbound only Destination Name: default_address Line ID *IN* Name: * ANY * Is this correct (Yes, No): [Yes] Yes 4. Next, you may choose to add/edit more dial-circuits in the same way as the example above. Add another Di[...]
-
Seite 695
Current Multilink PPP Configuration: Num Intf# Direction MaxLinks DIALs 1 8 In 2 No Enter the number of Multilink PPP DIALs interfaces:(0-23) 2 Enter maximum number of active links per Multilink PPP interface: 3 Next, the following prompt will be shown. For Base Interface #1 (V.34 Base Net) no Dial Circuits are configured! Add a DIALs (Dial-in) Int[...]
-
Seite 696
DIALs Server name - up to 30 chars: (DIALOUT_SERVER) 7. Enter the name of the DIALs server . The default is DIALOUT_SERVER. This is the name of the server that will be displayed when dial-out clients ″ discover ″ DIALs Dial-out Servers on the network when they invoke the DIALs client’s CHOOSER application. Dial-out client type(s) supported (D[...]
-
Seite 697
14. The previous question enables the device to provide an IP address from a DHCP server to the client for use for the duration of the connection. DHCP gateway (giaddr) interface: [] 10.0.0.15 15. The DHCP Gateway interface, or giaddr (as defined in RFC1531), is an IP address associated with the subnet you wish the DHCP server to of fer addresses [...]
-
Seite 698
Configuring Bridging ********************************************** Bridging Configuration ********************************************** Type 'Yes' to Configure Bridging Type 'No' to skip Bridging Configuration Type 'Quit' to exit Quick Config Configure Bridging? (Yes, No, Quit): [Yes] 1. In response to Configure Bri[...]
-
Seite 699
A unique hexadecimal value from 1 to FFF is assigned to each interface. The interfaces on each ring (segment) have the same segment number , but the segment number is unique to each ring. These prompts appear for each T oken Ring interface. Interface 1 (Port 2) is of type Token Ring Configure Source Routing on this interface? (Yes, No): [Yes] Confi[...]
-
Seite 700
v Enter n to skip protocol configuration and continue with quick configuration. v Enter q to exit quick configuration. Y ou will first configure IP , then IPX, and then DECnet. Configuring IP When you answer y to the Configure Protocol panel, quick configuration displays the following messages: Type 'r' any time at this level to r[...]
-
Seite 701
Per-Interface IP Configuration complete Configuring IP Routing Information Enable Dynamic Routing (Yes, No): [Yes] 4. Enter y if you want the routing protocols (RIP or OSPF) to build the routing tables. Enter n to manually add IP address destinations to the routing tables (static routes). Enable OSPF? (Yes, No): [Yes] 5. Enter y to enable the OSPF [...]
-
Seite 702
Configure IPX? (Yes, No): [Yes] 1. Enter y to configure IPX. Enter n to skip IPX configuration and continue with quick configuration. Y ou will see messages similar to the following: Type 'r' any time at this level to restart IPX Configuration IPX Configuration is already present Configure IPX anyway? (Yes, No): [No] yes 2. Enter y to [...]
-
Seite 703
a. The following prompts are displayed: Ethernet encapsulation type? (ETHERNET_8022, ETHERNET_8023, ETHERNET_ii, ETHERNET_SNAP): [ETHERNET_8023] b. Enter the encapsulation type used by the IPX protocol on your Ethernet end stations. Ethernet_8022 Packet includes an 802.2 header . Ethernet_8023 Uses an IEEE 802.3 packet format without the 802.2 head[...]
-
Seite 704
This is the information you have entered: Per-Interface Configuration Information Cir Ifc IPX Net(hex) Encapsulation IPXWAN 1 1 10 ETHERNET_8023 Not Configured 2 3 300 Not Configured 3 5 400 Not Configured 4 6 600 Enabled Host Number for Serial Lines: 0002210A0000 IPXWAN Node ID = 2210A IPX Router Name = ipxwan_router-2210A Save this configuration?[...]
-
Seite 705
Highest Area This number should be at least as high as the highest area number in the overall network. Node Address Is the node ID of this router and must be unique in the network. When you press Enter , the following is displayed: Configuring Per-Interface DNA Information Configuring Max Routers on each interface Configuring Interface 0 (Ethernet)[...]
-
Seite 706
DNA Configuration Saved Configuring Booting ********************************************** Boot Configuration ********************************************** Type 'Yes' to Configure Booting Type 'No' to skip Booting Configuration Type 'Quit' to exit Quick Config Configure Booting? (Yes, No, Quit): [Yes] 1. Enter y to d[...]
-
Seite 707
TFTP Boot Select Booting Method (TFTP Boot, BOOTP Boot, IBD Boot): [ ] 1. Enter TFTP to boot using a TFTP host server and respond to the following prompts: Interface Number ( ):[0] The number of the LAN interface over which to boot. For this version of the IBM 2210, you must use the default of 0. Interface IP Address: [0.0.0.0] IP address of the in[...]
-
Seite 708
IBD Boot Select Booting Method (TFTP Boot, BOOTP Boot, IBD Boot): [ ] 1. Enter IBD and the console displays a list of software loads in the IBD. The following # loads(s) exist in the IBD load.name load.name load.name load.name You may use only these loads to configure an IBD boot record IBD Load Name: ( load.name )[] 2. Enter the name of the load y[...]
-
Seite 709
Type RESTART at the Config> prompt for the configuration to take effect Config> 3. Enter restart restart after the Config> prompt to restart the IBM 2210 with the new configuration. T o change or view the current configuration, enter qc . Appendix A. Quick Configuration Reference 673[...]
-
Seite 710
674 MRS V3.2 Software User ’s Guide[...]
-
Seite 711
Appendix B. X.25 National Personalities This appendix lists the default settings for GTE-T elenet and DDN. GTE-T elenet The following parameters are the default settings for GTE-T elenet: v Callreq: 20 v Clearreq: – Retries: 1 – Timer: 18 v Disconnect: Passive v DP-timer: 500 milliseconds v Frame window size: 7 v Network T ype: CCITT v N2 timeo[...]
-
Seite 712
– Window size: 2 v Reset – Retries: 1 – Timer: 18 v Restart – Retries: 1 – Timer: 18 v Standard: 1984 v T1-timer: 4 v T2-timer: 2 676 MRS V3.2 Software User ’s Guide[...]
-
Seite 713
Appendix C. Making a Router Load File from Multiple Disks If a software load arrives on multiple disks, use the procedure in the following sections to combine the loads into one load file that the router can use at the time of booting. The first disk contains the following four files that you need if you want to fragment an existing load for tra[...]
-
Seite 714
kopy /dev/fd0 /kew /pcfs Please insert the first diskette Copying the first load file fragment Please mount the second diskette Copying the second load file fragment Load file reassembly was successful # ls /kew gw0 gw1 gw.ldc If you can’t use the UNIX Bourne shell script, you can assemble the load manually using the following procedure: 1. Copy [...]
-
Seite 715
Disassembling a Load File Under UNIX T o disassemble a load under use cutup.c. Begin by compiling the program using your UNIX compiler to make a cutup executable file. Then use the following syntax: cutup < file_extension >< file_name >< cut_length > The file_extension is attached to the front of each slice needed to cut. The ?[...]
-
Seite 716
680 MRS V3.2 Software User ’s Guide[...]
-
Seite 717
List of Abbreviations AARP AppleT alk Address Resolution Protocol ABR area border router ack acknowledgment AIX Advanced Interactive Executive AMA arbitrary MAC addressing AMP active monitor present ANSI American National Standards Institute AP2 AppleT alk Phase 2 APPN Advanced Peer-to-Peer Networking ARE all-routes explorer ARI A TM real interface[...]
-
Seite 718
BRS bandwidth reservation BSD Berkeley software distribution BTP BOOTP relay agent BTU basic transmission unit CAM content-addressable memory CCITT Consultative Committee on International T elegraph and T elephone CD collision detection CGWCON Gateway Console CIDR Classless Inter-Domain Routing CIP Classical IP CIR committed information rate CLNP C[...]
-
Seite 719
DNCP DECnet Protocol Control Protocol DNIC Data Network Identifier Code DoD Department of Defense DOS Disk Operating System DR designated router DRAM Dynamic Random Access Memory DSAP destination service access point DSE data switching equipment DSE data switching exchange DSR data set ready DSU data service unit DTE data terminal equipment DTR da[...]
-
Seite 720
GTE General T elephone Company GWCON Gateway Console HDLC high-level data link control HEX hexadecimal HPR high-performance routing HST TCP/IP host services HTF host table format IBD Integrated Boot Device ICMP Internet Control Message Protocol ICP Internet Control Protocol ID identification IDP Initial Domain Part IDP Internet Datagram Protocol I[...]
-
Seite 721
LRM LAN reporting mechanism LS link state LSA link state advertisement LSB least significant bit LSI LAN shortcuts interface LSreq link state request LSrxl link state retransmission list LU logical unit MAC medium access control Mb megabit MB megabyte Mbps megabits per second MBps megabytes per second MC multicast MCF MAC filtering MIB Management[...]
-
Seite 722
NRZ non-return-to-zero NRZI non-return-to-zero inverted NSAP Network Service Access Point NSF National Science Foundation NSFNET National Science Foundation NET work NVCNFG nonvolatile configuration OPCON Operator Console OSI open systems interconnection OSICP OSI Control Protocol OSPF Open Shortest Path First OUI organization unique identifier P[...]
-
Seite 723
ROpcon Remote Operator Console RPS ring parameter server RTMP Routing T able Maintenance Protocol RTP RouT ing update Protocol RTS request to send Rtype route type rxmits retransmissions rxmt retransmit SAF source address filtering SAP service access point SAP Service Advertising Protocol SCR Sustained cell rate SCSP Server Cache Synchronization P[...]
-
Seite 724
SR-TB source routing-transparent bridge ST A static STB spanning tree bridge STE spanning tree explorer STP shielded twisted pair; spanning tree protocol SVC switched virtual circuit TB transparent bridge TCN topology change notification TCP T ransmission Control Protocol TCP/IP T ransmission Control Protocol/Internet Protocol TEI terminal point i[...]
-
Seite 725
XNS Xerox Network Systems XSUM checksum ZIP AppleT alk Zone Information Protocol ZIP2 AppleT alk Zone Information Protocol 2 ZIT Zone Information T able List of Abbreviations 689[...]
-
Seite 726
690 MRS V3.2 Software User ’s Guide[...]
-
Seite 727
Glossary This glossary includes terms and definitions from: v The American National Standard Dictionary for Information Systems , ANSI X3.172-1990, copyright 1990 by the American National Standards Institute (ANSI). Copies may be purchased from the American National Standards Institute, 1 1 West 42nd Street, New Y ork, New Y ork 10036. Definition[...]
-
Seite 728
initiates the transmission of tokens and provides token error recovery facilities. Any active adapter on the ring has the ability to provide the active monitor function if the current active monitor fails. address. In data communication, the unique code assigned to each device, workstation, or user connected to a network. address mapping table (AMT[...]
-
Seite 729
arbitrary MAC addressing (AMA). In DECnet architecture, an addressing scheme used by DECnet Phase IV -Prime that supports universally administered addresses and locally administered addresses. area. In Internet and DECnet routing protocols, a subset of a network or gateway grouped together by definition of the network administrator . Each area is [...]
-
Seite 730
broadcast address. In communications, a station address (eight 1’s) reserved as an address common to all stations on a link. Synonymous with all-stations address . C cache. (1) A special-purpose buffer storage, smaller and faster than main storage, used to hold a copy of instructions and data obtained from main storage and likely to be needed nex[...]
-
Seite 731
data and control characters. (2) A method of controlling the number of data bits sent on a telecommunication line in a given time. collision. An unwanted condition that results from concurrent transmissions on a channel. (T) collision detection. In carrier sense multiple access with collision detection (CSMA/CD), a signal indicating that two or mor[...]
-
Seite 732
Notes: 1. Between data switching exchanges, the data circuit may include data circuit-terminating equipment (DCE), depending on the type of interface used at the data switching exchange. 2. Between a data station and a data switching exchange or data concentrator , the data circuit includes the data circuit-terminating equipment at the data station[...]
-
Seite 733
and the network. (I) (2) In TCP/IP , the basic unit of information passed across the Internet environment. A datagram contains a source and destination address along with the data. An Internet Protocol (IP) datagram consists of an IP header followed by the transport layer data. (3) See also packet and segment . Datagram Delivery Protocol (DDP). In [...]
-
Seite 734
LUs) without regenerating complete configuration tables or deactivating the affected major node. Dynamic Routing. Routing using learned routes rather than routes statically configured at initialization. E echo. In data communication, a reflected signal on a communications channel. For example, on a communications terminal, each signal is display[...]
-
Seite 735
flash memory . A data storage device that is programmable, erasable, and does not require continuous power . The chief advantage of flash memory over other programmable and erasable data storage devices is that it can be reprogrammed without being removed from the circuit board. flow control. (1) In SNA, the process of managing the rate at which[...]
-
Seite 736
host. In the Internet suite of protocols, an end system. The end system can be any workstation; it does not have to be a mainframe. hub (intelligent). A wiring concentrator , such as the IBM 8260, that provides bridging and routing functions for LANs with different cables and protocols. hysteresis. The amount the temperature must change past the se[...]
-
Seite 737
protocol does not provide error recovery and flow control and does not guarantee the reliability of the physical network. interoperability . The capability to communicate, execute programs, or transfer data among various functional units in a way that requires the user to have little or no knowledge of the unique characteristics of those units. (T[...]
-
Seite 738
LES. LAN Emulation Server . A LAN Emulation Service component that resolves LAN Destinations to A TM Addresses. line switching. Synonym for circuit switching . link. The combination of the link connection (the transmission medium) and two link stations, one at each end of the link connection. A link connection can be shared among multiple links in [...]
-
Seite 739
shared. (T) The LLC protocol was developed by the IEEE 802 committee and is common to all LAN standards. logical link control (LLC) protocol data unit. A unit of information exchanged between link stations in different nodes. The LLC protocol data unit contains a destination service access point (DSAP), a source service access point (SSAP), a contr[...]
-
Seite 740
the functions of a modem is to enable digital data to be transmitted over analog transmission facilities. (T) (A) (2) A device that converts digital data from a computer to an analog signal that can be transmitted on a telecommunication line, and converts the analog signal received to data for the computer . modulo. (1) Pertaining to a modulus; for[...]
-
Seite 741
throughout the world who provide assistance, documentation, training, and other services to users. network layer . In Open Systems Interconnection (OSI) architecture, the layer that is responsible for routing, switching, and link-layer access across the OSI environment. network management. The process of planning, organizing, and controlling a comm[...]
-
Seite 742
packet loss ratio. The probability that a packet will not reach its destination or not reach it within a specified time. packet mode operation. Synonym for packet switching . packet switching. (1) The process of routing and transferring data by means of addressed packets so that a channel is occupied only during transmission of a packet. On comple[...]
-
Seite 743
private branch exchange (PBX). A private telephone exchange for transmission of calls to and from the public telephone network. problem determination. The process of determining the source of a problem; for example, a program component, machine failure, telecommunication facilities, user or contractor-installed programs or equipment, environmental [...]
-
Seite 744
rlogin (remote login). A service, offered by Berkeley UNIX-based systems, that allows authorized users of one machine to connect to other UNIX systems across an internet and interact as if their terminals were connected directly . The rlogin software passes information about the user’s environment (for example, terminal type) to the remote machin[...]
-
Seite 745
segment. (1) A section of cable between components or devices. A segment may consist of a single patch cable, several patch cables that are connected, or a combination of building cable and patch cables that are connected. (2) In Internet communications, the unit of transfer between TCP functions in different machines. Each segment contains control[...]
-
Seite 746
focal point. An APPN end node can be a SOC node if it supports the function to exchange management services capabilities. split horizon. A technique for minimizing the time to achieve network convergence. A router records the interface over which it received a particular route and does not propagate its information about the route back over the sam[...]
-
Seite 747
problem determination requests, and providing directory services and other session services for users of the network. Multiple SSCPs, cooperating as peers with one another , can divide the network into domains of control, with each SSCP having a hierarchical control relationship to the physical units and logical units within its own domain. Systems[...]
-
Seite 748
T ransmission Control Protocol/Internet Protocol (TCP/IP). A set of communications protocols that support peer-to-peer connectivity functions for both local and wide area networks. transmission group (TG). (1) A connection between adjacent nodes that is identified by a transmission group number . (2) In a subarea network, a single link or a group [...]
-
Seite 749
VIrtual NEtworking System (VINES). The network operating system and network software from Banyan Systems, Inc. In a VINES network, virtual linking allows all devices and services to appear to be directly connected to each other , when they may actually be thousands of miles apart. See also StreetT alk . virtual route (VR). (1) In SNA, either (a) a [...]
-
Seite 750
714 MRS V3.2 Software User ’s Guide[...]
-
Seite 751
Index Numerics 2210 as boot server 84 A accessing protocol configuration process 19 operating (monitor) process 19 second-level process 13, 15 accessing the mp configuration prompt 515 accessing the mp monitoring commands 519 activate GWCON command 128 activating spare interfaces 128 add add 550 A TM configuration command 279 A TM Virtual Interf[...]
-
Seite 752
Banyan VINES Control Protocol (BVCP) for PPP 461 basing configuration on existing 12 baud rate, setting console 75 BCM 267 Support for IP 268 Support for IPX BCM IPX Server Farm 268 preventing a LEC from being treated as 268 support for NetBIOS 269 NetBIOS Namesharing 269 support for Source Route Bridging 269 BCM IPX Server Farm preventing a LEC f[...]
-
Seite 753
BSC Relay configuration commands (continued) list 572 summary of 567 BSC Relay monitoring commands clear-port-statistics 575 disable 576 enable 576 list 577 summary of 575 buffer GWCON command 129 BUS 255, 256 connecting to 265 functions of 266 C cable type, clocking and 317 call verification ISDN 614 callback dial circuit monitoring command 650 [...]
-
Seite 754
Config-Only mode (continued) manual entry 41 CONFIG process accessing 14 commands available from 51 description of 39 entering 14, 51 exiting 51 configuration accessing the mp prompt 515 basing on existing 12 displaying information about 130 first 1 1 GWCON command 130 network interfaces 17 suggestions 1 1 updating 12 updating memory 80 configu[...]
-
Seite 755
dial circuits adding 580, 596, 622 configuring 581, 597, 623 configuring for MP 51 1 ISDN 612 dial-in circuit add device example 16 dial-in circuits virtual connections (VC) 463 configuring 464 considerations 463 dial-out circuit add device example 16 directories boot and dump 89 disable A TM configuration command 284 authentication protocols 4[...]
-
Seite 756
ELS configuration commands (continued) notrace 174 notrap 174 remote 175 set 177 summary of 167 trace 203 trap 181 ELS configuration environment entering and exiting 167 ELS console environment 2210 remote logging configuration 157 level defined 155 remote logging 155 remote workstation configuration 155 syslog facility defined 155 ELS messag[...]
-
Seite 757
environment, lower level 1 1 exiting 1 1 environment commands summary of 66 erase Boot CONFIG command 101 error GWCON command 134 ESI 257 Ethernet configuring using quick configuration 653 displaying statistics 247 encapsulation type 666 encapsulation types for IPX 667 network interface configuring 251 Ethernet configuration commands accessing [...]
-
Seite 758
Frame Relay (continued) using 387 variable information rate 399 variable information rate (VIR) 399 virtual circuits 387 Frame Relay configuration commands 413, 415 add 406 permanent-virtual-circuit 406 protocol-address 406 add-protocol AppleT alk2 protocol 408 DN protocol 408 IPX protocol 408 add protocol-address IP protocol 408 change 412 disabl[...]
-
Seite 759
GWCON (continued) process entering 15 GWCON commands activate 128 boot 128 buffer 129 clear 130 configuration 130 disable 133 environment 133 error 134 event 135 fault 135 features 135 interface 136, 223 log 136 memory 137 network 138 protocol 139 queue 140 reset 141 statistics 141 summary of 127 test 142 uptime 142 GWCON process description of 12[...]
-
Seite 760
ISDN monitoring commands (continued) circuits 637 L2_Counters 638 L3_Counters 638 parameters 638 statistics 639 summary of 635 TEI 638 K keepalive timer , setting for XTP 380 key parameters for LAN emulation 272 L L2_Counters ISDN monitoring command 638 L3_Counters ISDN monitoring command 638 LAN destination policy (MAC address policy) 262 LAN emul[...]
-
Seite 761
list (continued) list 551 LLC monitoring command 239 performance configuration command 216 performance monitoring command 218 Point-to-Point configuration command 470 PPP monitoring command 484 SDLC configuration command 542 SDLC monitoring command 551 SDLC Relay configuration command 528, 529 SDLC Relay monitoring command 534 T oken-Ring con?[...]
-
Seite 762
Modem disabling 64 enabling 64 monitoring accessing the mp commands 519 A TM 277 network interfaces 19 performance monitoring commands 217 monitoring commands LAN Emulation Client (LEC) 293 multilink ppp protocol (mp) 519 MONITR process commands affecting 145 description of 145 entering and exiting 145 OPCON commands 145 receiving messages 145 MOS [...]
-
Seite 763
OPCON commands (continued) reload 32 restart 32 status 32 summary of 27 talk 34 telnet 34 OPCON interface configuring 27 OPCON process accessing 27 commands available from 27 description 25 getting back to 1 1 summary 7 orphan permanent virtual circuits Frame Relay 390 orphan switched virtual circuits Frame Relay 391 OSI Control Protocol (OSICP) f[...]
-
Seite 764
Point-to-Point Protocol (PPP) (continued) Link Control Protocol (LCP) 451 link establishment packets 454 link maintenance packets 455 link termination packets 455 Network Control Protocols (NCP) 460 OSI Control Protocol (OSICP) 463 overview 449 protocol field 451 policies 255 agreement of 261 policies and policy values 261 PPP IP Control Protocol [...]
-
Seite 765
remote logging (continued) additional considerations (continued) messages containing IP addresses 162 recurring sequence numbers 163 output examples 159 remote login 5 remote terminals 5 remove A TM configuration command 280 A TM Virtual Interface configuration command 286 ELS monitoring command 197 Frame Relay configuration command 426 ISDN con[...]
-
Seite 766
set (continued) BSC interface configuration command 573 CONFIG command 75 dial circuit configuration command 646 ELS configuration command 177 ELS monitoring command 198 Frame Relay configuration command 427 Frame Relay monitoring command 443 ISDN configuration commands 629 LLC monitoring command 244 packet trace monitoring command 206 perform[...]
-
Seite 767
T oken-Ring network interfaces configuring 225 trace A TM monitoring commands 288 ELS configuration commands 203 Frame Relay monitoring commands 444 trace-status packet trace monitoring command 207 trap ELS configuration commands 181 ELS monitoring command 204 type length values 263 U UNIX assembling a load file 677 disassembling a load file 6[...]
-
Seite 768
X.25 monitoring commands (continued) parameters 354 statistics 355 summary of 353 X.25 network interface accessing the monitoring process 353 configuring 327 national personality 320, 675 statistics 356 using 319 X.25 T ransport Protocol (XTP) 361 XTP backup peer function 364 closed user groups overview 365 configuration commands Add 375 Change 3[...]
-
Seite 769
Readers’ Comments — W e’d Like to Hear from Y ou Nways Multiprotocol Routing Services Software User ’ s Guide V ersion 3.2 Publication No. SC30-3681-08 Overall, how satisfied are you with the information in this book? V ery Satisfied Satisfied Neutral Dissatisfied V ery Dissatisfied Overall satisfaction hhhhh How satisfied are you tha[...]
-
Seite 770
Readers’ Comments — We’d Like to Hear from Y ou SC30-3681-08 SC30-3681-08 IBMR Cut or Fold Along Line Cut or Fold Along Line Fold and T ape Please do not staple Fold and T ape Fold and T ape Please do not staple Fold and T ape NO POST AGE NECESSARY IF MAILED IN THE UNITED ST A TES BUSINESS REPL Y MAIL FIRST -CLASS MAIL PERMIT NO. 40 ARMONK, N[...]
-
Seite 771
[...]
-
Seite 772
IBMR Printed in the United States of America on recycled paper containing 10% recovered post-consumer fiber . SC30-3681-08[...]
-
Seite 773
Spine information: IBM Nways Multiprotocol Routing Services MRS V3.2 Software User ’ s Guide SC30-3681-08[...]