Ir para a página of
Manuais similares
-
Network Router
3Com 1000BASE-SX (3CSFP91)
2 páginas 1.15 mb -
Network Router
3Com 812
144 páginas 0.79 mb -
Network Router
3Com Model WL-605
68 páginas 2.98 mb -
Network Router
3Com 3CRWE90096A
20 páginas 0.21 mb -
Network Router
3Com 3500
16 páginas 0.19 mb -
Network Router
3Com 980-000077/002
78 páginas 0.71 mb -
Network Router
3Com 5000
72 páginas 0.69 mb -
Network Router
3Com DIN Digital Indicator 59039-2
64 páginas 0.98 mb
Bom manual de uso
As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto 3Com 10014303. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónico3Com 10014303 vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.
O que é a instrução?
A palavra vem do latim "Instructio" ou instruir. Portanto, no manual 3Com 10014303 você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.
Infelizmente, pequenos usuários tomam o tempo para ler o manual 3Com 10014303, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.
Então, o que deve conter o manual perfeito?
Primeiro, o manual 3Com 10014303 deve conte:
- dados técnicos do dispositivo 3Com 10014303
- nome do fabricante e ano de fabricação do dispositivo 3Com 10014303
- instruções de utilização, regulação e manutenção do dispositivo 3Com 10014303
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes
Por que você não ler manuais?
Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque 3Com 10014303 não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos 3Com 10014303 e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço 3Com na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas 3Com 10014303, como para a versão papel.
Por que ler manuais?
Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo 3Com 10014303, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.
Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual 3Com 10014303. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação
Índice do manual
-
Página 1
3Com R outer Configuration Guide for V1.20 http://www.3com.com/ Part No. 10014303 Published Janu ary 2004[...]
-
Página 2
1.1. Intr oduction 1.1.1. Scope This manual provide s configuration inform ation for new software features foun d in V1.20 of the 3Com Router ope rating system. Use thi s addendum to supplement configuration in formation foun d in the 3Com Router Configuration Guide . 1.1.2. Online Re sources Download the Ro uter 3000 Installati on Guid e from: htt[...]
-
Página 3
Chapter 1 Configuring Class-Based Queuing As an extension of WFQ, class based queui n g (CBQ) provides users with class definition support. CBQ assigns individual FIFO re servation queues to the classes defined by each user to buffer dat a of the same class. Whe n there is network congestion, CBQ matches outbound p ackets a ccording to the classifi[...]
-
Página 4
policing upon cong estion. If no congestion occurs, the pri ority class is permitted to use bandwid th exceeding the a ssigned val ue. In case of congestion, pa ckets exceeding the assigne d bandwidth of the priori ty class will be disca rded. Burst size is also configurable under LL Q. When the system matches packet s with rules, it matches prior [...]
-
Página 5
Table 1-2 Define/delete the rule matching all packets Operation Command Define the rule ma tching all pack ets if-match [logic-n ot ] any Delete the rule ma tching all pack ets undo if-match [logic- not ] an y 2) Define the class matching rule Perform the following configuration s in class view . Table 1-3 Define/delete the class matching rule Oper[...]
-
Página 6
The matching rules of the source MAC address are only meaningf ul for the policies in inbound direction and the interface of Ethernet type. 5) Define the inbound interface matching rule of a class Perform the following configuration s in class view . Table 1-6 Define/delete the inbound interface matching rule of a class Operation Command Define the[...]
-
Página 7
Use the corresponding command to co nfigure the value of ip precedence duri ng the configuration; otherwise, the configuration of the if-match ip pre cedence command will overwrite the prev ious configurations. 8) Define the RTP port matc hing rule Perform the following configuration s in class view . Table 1-9 Define/delete RTP port matching rule [...]
-
Página 8
Perform the following configurat ions in the system view . Table 1-12 Define the policy and enter the policy view Operation Command Define the policy and enter the policy view qos policy policy-name Delete the specifi ed policy undo qos poli cy policy-name If an interface applies this policy , this policy is not allowed to b e deleted. Y ou must re[...]
-
Página 9
configured with a maximum band width, the sy stem will assign the cla ss an individual queue, called the default queue. Theoretically , each class can be configured with bandwid th of any size, but generally , the priority classes can occ upy 70% of the total bandwidth, and other ordinary classes and the default class occupy less t han 10%. It shou[...]
-
Página 10
3) Configure the maximum queue length of the class Configure maximum queue len gth of the cl ass and co nfigure the drop type as t ail drop. Perform the following configuratio n s in the poli cy-class view . Table 1-16 Configure the maximum queue length of the class Operation Command Configure the max imum queue leng th of the class queue-length qu[...]
-
Página 11
Table 1-18 Configure exponential of average queue length calculated by WRED Operation Command Configure expone ntial of average queue length calculat ed by WRED wred weighting-constant exponent Delete the configu ration of exponen tial of average queue le ngth calculated by WRED undo wred weig hting-constant This command can be used only af ter the[...]
-
Página 12
The discarding mode ba sed on WRED mu st already have been en abled via the wr ed ip-precedence command. When the configuration of qos wred is deleted, the wred ip-precedence is also deleted. When the af configuration is deleted, the configuration of discarding p arameters will also be deleted. 8) Enable/Disable traffic policing Perform the followi[...]
-
Página 13
If qos gts is used in the class-policy that is app lied to the interface, it can o nly be applied to the outbound interface. When the class including T S is applied to the interface, the original qos gts command that is configured on the in terface will become invalid. If this command is repeatedly executed to co nfigure the same class policy , the[...]
-
Página 14
The following is the rule for a policy to be applied in interface view . A policy configured with vari ous features (including remark , car , gts , af , ef , wfq , and wr e d ,) a pply to a common physical interface and a virtual template interface over MP. The policy configured wit h TS (gts), and ef, af, wfq cannot be applied on the inter[...]
-
Página 15
In terms of service, service flow 1 must occupy a b andwidth of 10K, service flow 2 must occupy a bandwidt h of 20K, under t he premise of ensuring voice service. 10.1.1.1/24 E0 1.1.1.2/24 E0 1.1.4.2/24 Router A Router B s0 1.1.6.1 s0 1.1.6.2/24 1.1.1.1/24 PC 2 PC 1 PC 3 PC 4 Te l e phone Te l e ph on e E1 10.1.1.2/24 E1: 10.1.4.2/24 10.1.4.1/24 1.[...]
-
Página 16
[RouterA-qosclass-voip] if-match rtp start-port 16384 end-port 32767 [RouterA-qosclass-voip] quit 5 Configure CBQ policy: [RouterA] qos policy 1 6 Configure the bandwid t h of service 1 to be 10K: [RouterA-qospolicy-1] qos-class 1 [RouterA-qospolicy-c-1 1] af bandwidth 10 [RouterA-qospolicy-c-1 1] quit 7 Configure the bandwid t h of service 2 to be[...]
-
Página 17
Chapter 2 Configuring TACACS+ T ACACS+ is facilitated wit h AAA to control PPP , VPDN, and login ac cess to routers. CISCO ACS is the only applicatio n softwa re that is supported. Compared to RADIUS, T ACACS+ features more reliable transmissi on and encryption, and is more suit able for security control. The following t able list s the primary dif[...]
-
Página 18
2.2 The Basic Message Inte raction Flow of TACACS+ For example, use T ACACS+ to implement AAA on a telnet user , and the basic message interaction flow descri bed below is used: 1) A user requests access to the rout er . The router(T ACACS+ client) sends t he authentication sta rt packet to the T ACACS+ server upon receipt of the request. 2) The T [...]
-
Página 19
Us e r HW T A CA C S C lien t HW T ACA C S Se r v e r U s er logs in A u th e n ti c a ti o n S t ar t Re q u e s t p a c k e t A uth en tic a ti o n r es p ons e pa c k e t, req ues ti ng f or th e us e r nam e R e q u e s t U s e r fo r th e u s er n a m e U s er ent er s t he u s er nam e A uth en tic a ti on c o n ti n ua nc e p ac k e t c ar r[...]
-
Página 20
Standby/Primary server switchover interval The shared key for the AAA negotiati on between the r outer and TACACS+ Server Set the timeout time waiting for a TACACS+ server to make a resp onse Specify a source IP address for all t he TA CACS + packets to be transmitted 2.4.1 Create a TACACS+ server group Before a T ACACS+ server can [...]
-
Página 21
Note: When this command is used without being configured with the parameter shared-key key-string for negotiation, the default key configured using the shared-key command will be used. 2.4.3 Standby/Primary Se rver Switchover Interval If you have specified the primary and st andby servers in a T ACACS+ server group, the router regularly test s [...]
-
Página 22
Caution: 1) The entered key must match the key used by the TACACS+ server. 2) All the leading spaces and ending spaces in a key string will be ignored. In addition, a key that contains spaces in the middle is not supported. 2.4.5 Specify a Source IP Address for the TACACS+ Packets to be Transmitted Y ou can specify a source IP address for the T ACA[...]
-
Página 23
2.5 Displaying and Debugging TACACS+ Execute the following commands in all views. Table 2-7 Display and debug AAA and RADIUS Operation Command Display all the ac counting detai ls. display hwtacacs accounting [ verbose ] Display all the router-TACACS+ interaction de tails. display hwtacacs server [ verbose ] Clear all the accounting d etails. reset[...]
-
Página 24
2 Configure “mykey” as the shared key for the AAA negotiation with the T ACACS+ server . [3Com-HWTACACS-tactemplate1] shared-key mykey [3Com-HWTACACS-tactemplate1] quit 3 Enable AAA. [3Com] aaa-enable 4 Implement authentication on telnet login use r s. [3Com] login telnet [3Com] aaa authentication-scheme login login-authen-list template tactemp[...]
-
Página 25
[3Com-serial0] quit 12 Assign an IP add re ss to the interface Ethernet0. [3Com] interface ethernet 0 [3Com-ethernet0] ip address 10.110.1.10 255.255.0.0 13 Assign an IP add re ss to Ethernet1. [3Com-ethernet0] interface ethernet 1 [3Com-ethernet0] ip address 192.10.1.1 255.255.255.0 [3Com-ethernet0] return 2.6.2 Integrating TACACS+ and RADIUS In t[...]
-
Página 26
[3Com-HWTACACS-tactemplate1] shared-key mykey [3Com-HWTACACS-tactemplate1] quit 5 Configure the IP address, authentic ation port, and acco unting port on the RADIUS server . [3Com] radius server 10.110.1.2 6 Configure the key , retransmission time s, and the timeout time for the RADIUS server . [3Com] radius shared-key my-secret [3Com] radius retry[...]
-
Página 27
13 Apply the default scheme for ac counting on telnet login use r s. [3Com] login-method accounting-mode login telnet default 14 Enable accounting on Serial0, and conf igure and apply the default accou nting scheme. [3Com] aaa accounting-scheme ppp default radius template tactemplate1 [3Com] interface Serial0 [3Com-Serial0] link-protocol ppp [3Com-[...]
-
Página 28
Chapter 3 Configuring SSH Terminal Service Secure Shell (SSH) is a feature that p rov ides information about security and powerful authentication functions, whic h can protect a router from the att a cks such as IP address spoo fing and plain text p assword. This is especially evident for remote users who access the router from a nonsecure network [...]
-
Página 29
T o set up a secure and au thenticated SSH conne ctio n, the server and client must go through the communication procedure t hat fa lls into five stages; version negoti ation, key algorithm negotiation, authentica tion type negotiation, session reques t, and session inte r action. 3.1 Configuring SSH The basic configuration of SSH is required for t[...]
-
Página 30
Table 3-2 Configure and destroy RSA key-pairs Operation Command Generate RSA key-pairs rsa local-key-pair create Destroy the RSA key-pairs rsa local-key-pair destroy Caution: An essential operation underlying a successful SSH log in is generating local RSA key-pairs. Before performing any other SSH configuration tasks, you must generate a local key[...]
-
Página 31
Set a server key-pair u pdating interval ssh server rekey-interval hours Restore the defaul t updating interv al undo ssh server rekey-interval By default, the system does not update the server key-p air . Perform this task to set an SSH authenti cation timeout time period. Perform the following confi guration in sy stem view . Table 3-5 Set SSH au[...]
-
Página 32
when entering key dat a but they will be del eted by the syste m. The configured public key must be a consecutive hexadeci mal char acter string coded in the public key format. Execute the public-key-code end comma nd to stop public key editing and save the key . Before you save the key however , you should verify the validity of the key in case th[...]
-
Página 33
Perform the following confi guration in sy stem view . Table 3-11 Close SSH processes by force Operation Command Kill SSH process(es ) by force kill ssh { all | userID userid } VI. Display and Debug SSH Information After finishing the configurations de scribed above, view the running st ate of SSH by executing the display commands in all views to v[...]
-
Página 34
Choose the proper SSH versi on. Genera lly the client provide s several SSH versions. V1.20 supports SSH Server 1 .5, so you must choose 1.5 or lower. Specify the RSA key file. If you have conf igured to choose RSA authentication a t the server, you must specify the RSA key file at the client. In normal case, RSA key file is created by the [...]
-
Página 35
III. Choose the SSH version Click “SSH” under “Conn ection” in the left “Category” of the interface, then the following interface appears. Figure 3-2 SSH Client configuration interface (2) S pecify the SSH version to “1”, as shown in the above interfa ce. IV. Enable the SSH connection in p assword authentication mode Click [Open] bu[...]
-
Página 36
Figure 3-3 SSH Client login interface (in password authentication mode ) After you have entered the correct user name and p assword, you can implem ent the connectio n. T o log out, just use the logout command. V. Enable the SSH connection in RAS authentication mode T o enable the SSH connection in RSA mode, you need to configure the RSA key on bot[...]
-
Página 37
Figure 3-4 PuTTY Generator Software interface (1) Choose “SSH1(RSA)” o r “SSH2 RSA” as the p arameter and ente r the number of bit s in the key . Click [Generate] button to generate the RSA key . T o ensure the random key , you are required to move the mouse. Once y ou stop moving the cursor , the generating process will pause. After the ke[...]
-
Página 38
Figure 3-5 PuTTY Key Gen erator interface (2) Enter a passphrase, if you want to use one. Save the key After you have generated t he keys, you have an RSA public key and an RSA private key . Click [Save public key] button and [Save pr ivate key] menu to save the keys into files (e.g., publicMyKey .ppk and privateMykey .ppk). Configure R[...]
-
Página 39
If you need to perform an RSA authentication, you must specify the RSA private key file. If you only need to perform the passwo r d authenti cation, it is no t nece ssary . Click the “auth” unde r “SSH” in the PuTTY configuration interface and the foll owing figure appears. Figure 3-6 SSH Client Configuration interface (3) Click [Browse] bu[...]
-
Página 40
Figure 3-7 SSH Client login interface (in RSA authentication mode) After you have entered the correct username , you can perform the SSH co nnection. If a passphrase was u sed when gener ating the keys, the p assphrase is also re quired before a successful SSH connection can be achieve d. Note: The key generator may be different, depending on t[...]
-
Página 41
N o t e : If a local key-pair exists, you can omit this step. Authenticate login users with the password approach [3Com] protocol inbound ssh 5 [3Com] local-user client001 service-type operator ssh password simple 3Com [3Com] ssh user client001 authentication-type password Y ou can adopt the default SSH authentication timeout time, retry ti[...]
-
Página 42
Chapter 4 Configuring NTP As provisioned in RFC1305, Network T ime Prot ocol (NTP) is a protocol of the TCP/IP suite, which is used to synchronize the timekeepi ng among a set of distributed time servers and client s o n a network. The transmission reli es on UDP . Ne t w o r k Ne t w o r k NT P me ssa g e 10: 00 : 00a m Ne t w o r k Ne t w o r k 1[...]
-
Página 43
Upon the departure of the NTP mess age, Router B adds its timestam p 11:00:02am (T 3 ) again. Upon the receipt of the respo nse, Rout er A adds a new timestamp, that is, 10:00:03am (T 4 ). In this way , Router A obtains adequate information for calculating two esse ntial parameters. They are: Roundtrip delay of a NTP message, tha t is, [...]
-
Página 44
Configure the NTP server mode Configure the NTP peer mode Configure the NTP broadcast se rver m ode Configure NTP broadcast client mode Configure NTP multicast server mode Configure NTP multicast client mode I. Configure NTP Server Mode This task sets a remote server as the loca l time server by specifying its address X.X.X.[...]
-
Página 45
Table 4-2 Configure NTP peer mode Operation Command Configure NTP peer mode ntp-service unicast-peer X.X.X.X [ version number | authentication-key keyid | source-interface { { interface-name | interface-type } interface-number } | priority ] * Disable NTP peer mode undo ntp-service unicast-peer X.X.X.X NTP versi on is in the range of 1 to 3 and def[...]
-
Página 46
Table 4-4 Configure NTP broadcast client mode Operation Command Configure NTP broadcast clien t mode ntp-service broadcast - client Disable NTP broadcast client mode undo ntp-service broadcast - client This command must be configured on the in terfa ce to be used for receiving NTP broadcas t messages . V. Configure NTP multicast server mode This ta[...]
-
Página 47
Table 4-6 Configure NTP multicast client mode Operation Command Configure NTP multicast clien t mode ntp-service multicast - client [ X.X.X.X ] Disable NTP multicast client m ode undo ntp-service multicast - client Multicast IP address X.X.X.X default s to 224.0.1.1. This command must be configured on the interface to be used for receiving NTP mult[...]
-
Página 48
4.2.4 Specify Reliable Key Y ou must specify a key to be a reliable one before it can be u sed for authentication. For example, if two routers w ant to use keyid 1 for a uthentication, both of them must specify it to be a reliable one. Perform the following confi guration in sy stem view . Table 4-9 Specify a key to be a reliable key Operation Comm[...]
-
Página 49
Table 4-11 Set an external reference clock or the local clock as the NTP master clock Operation Command Set an external ref erence clock or the local clock as the NTP master clock ntp-service refclock-m aster [ X.X.X.X ] [ stratum ] Disable the NTP master c lock setting undo ntp-service refclock-master [ X.X.X.X ] X.X.X.X represents the IP address [...]
-
Página 50
Table 4-13 Set the right for accessing the NTP services provided by the local router Operation Command Set the right for ac cessing the NTP services provided by the local rout er ntp-service access { query | synchronization | server | peer } acl-number Disable setting th e rights for accessing the serv ices provided by the local rout er undo ntp-se[...]
-
Página 51
Perform the debugging command in all views to debu g the NTP information. Table 4-15 Display and debug the NTP information Operation Command Display the state i nformation of t he NTP services display ntp-service st atus Display the se ssi ons state of the NTP service maintenance display ntp-service s essions [ verbose ] Display the brief informati[...]
-
Página 52
4.3.2 ntp-service s ource-interface disable Syn tax ntp-service source-interface disable undo ntp-service source-i nterface disable View Interface view Parameter None Description Using the ntp-service source-inte rface disable command, you can disable an interface to receive NTP messages. Using the undo ntp-serv ice source-interface disable command[...]
-
Página 53
vers io n : Defines NTP version number . number : NTP version number in the range of 1 to 3. authentication-k eyid : Defines an authenticatio n key . keyid : The key ID carried i n the messages transmitted to the remote serve r , which is in the range of 1 to 4294967295. source-interface : S pecifies interface name . interface-name : Interface name[...]
-
Página 54
4.3.4 ntp-servi ce unicast-server Syn tax ntp-service unicast-s erver X.X.X.X [ ver sio n number | authentication-keyid keyid | source-interface { interface-name | interface-type interface-number } | priority ] * undo ntp-service unicast-server X.X.X.X View System view Parameter X.X.X.X : IP address of the remote server . vers io n : Defines NTP ve[...]
-
Página 55
This command declare s that the local time se rver is the remote server spe cified by X.X.X.X . X.X.X.X represents a host a ddress, which must not be a broadcast or multicast address, or the IP address of the reference clock. Configured with this command, the local device is working in client mode and th erefore it is up to the local client to sync[...]
-
Página 56
Chapter 5 Configuring X2T The X.25 to TCP swit ch (X2T) technology can interco nnect X.25 and IP networks and enables access b etween X.25 and IP hosts. X.25 Te rmi nal IP Host Router X.25 Network TCP/IP Ne twork X.25 LAPB X.25 LAPB Physical Layer Physical Layer Data Link Layer X2T IP Data Link Layer IP TCP TCP Figure 5-1 Typical X2T networking Fro[...]
-
Página 57
Configure X2T route I. Enabling X.25 Swit c hing Before configuring X2T , yo u must enable X.25 switching. Perform the following confi guration in sy stem view . Table 5-1 Configure X.25 switching Operation Command Enable X.25 switc hing x25 switching Disable X.25 switc hing undo x25 switching 5.2.2 Configuring the Inte rface at the X.25 Networ[...]
-
Página 58
forwarding route Delete the X.25-to-IP X2T forwarding route undo translate x25 x.121-address 2) Configuring an IP-to-X.25 X2T forwarding route Perform the following confi guration in sy stem view . Table 5-4 Configure an IP-to-X.25 X2T forwarding route Operation Command Configure an IP-to-X.25 X2T forwarding route translate ip ip-address port port-[...]
-
Página 59
2 Configure the interface at the X.25 network side. [3Com] interface serial 0 [3Com-Serial0] link-protocol x25 dce [3Com-Serial0] x25 x121-address 1111 3 Configure the interface at the IP network side. [3Com] interface ethernet 0 [3Com-Ethernet0] ip address 10.1.1.1 255.255.255.0 4 Configure an X.25 route [3Com] x25 switch svc 2222 interface serial[...]
-
Página 60
Chapter 6 Configuring Additional ISDN Support ISDN configuration includes the followin g t a sks: • Configuring the ISDN signaling type. • Configuring the negotiation p arameters of ISDN Layer 3. • Configuring the SPID pa rameters of the National (NI) ISDN protocol. 6.1 Configuring ISDN Signaling Type By default, DSS1 signaling is used on ISD[...]
-
Página 61
Configure the router to become ACTIVE to s tart data ex change before receiving C ONNECT ACK messages. undo isdn waitconnectack Configure the inter val for the Q931 timers isdn q931-timer timer-name time-interval Restore the defaul t interval timers undo isdn q931-timer timer-name ti me-interval The ISDN SETUP message contai ns th e following infor[...]
-
Página 62
These can optionally be removed from the SETUP m essag e. 6.2.3 ATT 5ESS (Lucent 5E) Table 6-5 Required ATT 5ESS Commands Operation Command Disable the Sendi ng-Complete Information Ele ment in the Setup message undo isdn sending-complete Disable the SETUP ACK mess ages if the receiv ed SETUP messages in data service calls do not carry the cal led [...]
-
Página 63
Restore the SETUP mes sage. undo isdn ignore llc Configure the router to w ait for CONNECT ACK message replies from the c onnected exchan ge until switc hing to the ACTIVE state. isdn waitconnectack Configure the router to become ACTIVE to s tart data ex change before receiving C ONNECT ACK messages. undo isdn waitconnectack The ISDN SETUP message [...]