Instruction/ maintenance manual of the product SC30-3681-08 IBM
Go to page of 773
N w a ys M ul ti p r o to c o l R o uting S e rvi ce s Sof t w ar e U ser ’ s Gu i d e V e rsi o n 3 .2 SC30-3681-08 IBM.
.
N w a ys M ul ti p r o to c o l R o uting S e rvi ce s Sof t w ar e U ser ’ s Gu i d e V e rsi o n 3 .2 SC30-3681-08 IBM.
Note Before using this document, read the general information under “Notices” on page xxiii. Ninth Edition (November 1998) This edition applies to V ersion 3.2 of the IBM Nways Multiprotocol Routing Services and to all subsequent releases and modifications until otherwise indicated in new editions or technical newsletters.
Contents Figures ........................... x i x T ables ........................... x x i Notices ........................... xxiii Notice to Users of Online V ersions of This Book ........... x x v T rademarks ......................... xxvii Preface .
Chapter 3. The OPCON Process ................. 2 5 Chapter 4. Using OPCON .................... 2 7 Accessing the OPCON Process .................. 2 7 OPCON Commands ...................... 2 7 Breakpoint ......................... 2 8 Divert ...........
Protocol .......................... 7 4 Qconfig .......................... 7 5 S e t ............................ 7 5 T i m e ........................... 7 9 Unpatch .......................... 8 0 Update .......................... 8 0 Chapter 7. The Boot CONFIG Process .
BP (Boot using BOOTP) .................... 1 1 9 D (Dump using stored configuration) ............... 1 2 0 DIAG (Execute IBM Extended Diagnostic Program) .......... 1 2 0 DM (Dump using Console Queries) ................ 1 2 1 UB (Display TFTP Boot Configuration) .
Configuring ELS So Event Messages Are Sent In SNMP Traps ...... 1 5 3 Using ELS to T roubleshoot a Problem ................ 1 5 3 ELS Example 1 ....................... 1 5 3 ELS Example 2 ....................... 1 5 4 ELS Example 3 ..................
V i e w ........................... 2 0 4 Packet-trace Monitoring Commands ................ 2 0 5 ELS Net Filter Monitoring Commands ............... 2 0 7 ELS Message Buffering Monitoring Commands ........... 2 1 0 Chapter 14. Configuring and Monitoring Performance .
S e t ............................ 2 4 4 Chapter 18. Using the Ethernet Network Interface .......... 2 4 7 Displaying Ethernet Statistics through the Interface Command ....... 2 4 7 Chapter 19. Configuring and Monitoring the Ethernet Network Interface .
A d d ............................ 2 7 9 List ............................ 2 7 9 QoS Configuration ...................... 2 8 0 Remove .......................... 2 8 0 S e t ............................ 2 8 0 Enable .......................... 2 8 4 Disable .
X.25 Support Over ISDN BRI D-Channel (X.31) ............ 3 2 2 Null Encapsulation ....................... 3 2 2 Limitations ......................... 3 2 2 Configuration Changes .................... 3 2 2 Configuring Null Encapsulation and Closed User Groups (CUG) .
Delete ........................... 3 7 8 Enable .......................... 3 8 0 Disable .......................... 3 8 0 S e t ............................ 3 8 0 List ............................ 3 8 0 XTP Monitoring Commands .................... 3 8 2 A d d .
Frame Relay Monitoring Commands ................. 4 3 2 Clear ........................... 4 3 3 Disable .......................... 4 3 3 Enable .......................... 4 3 3 List ............................ 4 3 4 L L C ........................... 4 4 2 Notrace .
List ............................ 4 8 4 L L C ........................... 5 0 6 Point-to-Point Protocol Interfaces and the GWCON Interface Command . . . 506 Chapter 34. Using the Multilink PPP Protocol ............ 5 0 9 MP Considerations ............
Enable .......................... 5 4 1 List ............................ 5 4 2 S e t ............................ 5 4 4 Accessing the SDLC Monitoring Environment ............. 5 4 9 SDLC Monitoring Commands ................... 5 5 0 A d d ...........
Parameters ......................... 5 8 9 Statistics .......................... 5 9 0 V .25bis and the GWCON Commands ................ 5 9 2 Statistics for V .25bis Interfaces and Dial Circuits ........... 5 9 2 Chapter 43. Using the V .34 Network Interface .
Chapter 46. Configuring and Monitoring the ISDN Interface ....... 6 2 7 ISDN Configuration Commands .................. 6 2 7 Block-Calls ......................... 6 2 7 Disable .......................... 6 2 8 Enable .......................... 6 2 8 List .
BOOTP Boot ........................ 6 7 1 IBD Boot .......................... 6 7 2 Enabling Console Modem-Control ................. 6 7 2 Restarting the Router ...................... 6 7 2 Appendix B. X.25 National Personalities .............. 6 7 5 GTE-T elenet .
Figures 1. Multiprotocol Routing Services ................. 7 2. Relationship of Processes and Commands ............ 8 3. Memory Utilization ..................... 3 1 4. Message Generated by an Event ................ 1 4 9 5. Syslog Message Description .
xx MRS V3.2 Software User ’s Guide.
T ables 1. Processes, Their Purpose, and Commands to Access ........ 1 0 2. Network Architecture and the Supported Interfaces ......... 1 7 3. OPCON Commands ..................... 2 7 4. CONFIG Command Summary ................. 5 1 5. Access Permission .
54. XTP Monitoring Commands Summary .............. 3 8 2 55. Protocol Address Mapping .................. 3 9 4 56. Frame Relay Management Options ............... 4 0 3 57. Frame Relay Configuration Commands Summary .......... 4 0 5 58. Frame Relay Management Options .
Notices References in this publication to IBM products, programs, or services do not imply that IBM intends to make these available in all countries in which IBM operates. Any reference to an IBM product, program, or service is not intended to state or imply that only IBM’s product, program, or service may be used.
xxiv MRS V3.2 Software User ’s Guide.
Notice to Users of Online V ersions of This Book For online versions of this book, you are authorized to: v Copy , modify , and print the documentation contained on the media, for use within your enterprise, provided you reproduce the copyright notice, all warning statements, and other required statements on each copy or partial copy .
xxvi MRS V3.2 Software User ’s Guide.
T rademarks The following terms are trademarks of the IBM Corporation in the United States or other countries or both: Advanced Peer-to-Peer Networking IBM PS/2 AIX Micro Channel RS/6000 AIXwindows Ne.
xxviii MRS V3.2 Software User ’s Guide.
Preface This manual contains the information that you will need to use the router user interface for configuration and operation of the Multiprotocol Routing Services base code installed on your Nways device.
The Configuration Program is not pre-loaded at the factory; it is shipped separately from the device as part of the software order . Y ou can also obtain the Configuration Program for IBM Nways Multiprotocol Routing Services from the IBM Networking T echnical Support home page.
http://www.networking.ibm.com/220/220prod.html Operations and Network Management SC30-3681 Software User ’s Guide This book explains how to: v Configure, monitor , and use the IBM Nways Multiprotocol Routing Services software shipped with the router .
The following list shows the books in the IBM 2210 Nways Multiprotocol Router library , arranged according to tasks. Planning and Installation GA27-4068 IBM 2210 Introduction and Planning Guide GC30-3867 IBM 2210 Nways Multiprotocol Router Installation and Initial Configuration Guide These books are shipped with the 2210.
- Timed configuration change support from the configuration tool that is persistent across reloads and restarts - Packet trace support for PPP , Frame Relay , and V .34 interfaces. – Bridging support for a multiaccess bridge port for source route bridging over Frame Relay .
- Configuration of the APPN transmission group (TG) number for all link station types - Support for the APPN Ping (APING) command in T alk 5 - New trace options – TN3270 Enhancements Note: These TN3270 enhancements will not be available in the initial release of V3.
Part 1. Understanding and Using the Software © Copyright IBM Corp. 1994, 1998 1.
2 MRS V3.2 Software User ’s Guide.
Chapter 1. Getting Started This chapter shows you how to get started with using the following components related to the IBM 2210 Nways Multiprotocol Router (2210) and the Multiprotocol Routing Service.
Local Consoles Local consoles are either directly connected by an EIA 232 (RS-232) cable, or connected via modems to the router . Y ou may need to use a local console during the initial software installation. After the initial setup connection, you can connect using T elnet, as long as IP forwarding has been enabled.
Remote Consoles Remote consoles attach to the router using a standard remote terminal protocol. Remote consoles provide the same function as local consoles, except that a local console must be used for initial configuration if your IBM 2210 was not pre-configured at the factory .
Y ou may have to press the Enter key more than once or press Ctrl-P to obtain the * prompt. Once at this level, you can begin to enter commands from the keyboard. Press the Backspace key to delete the last character typed in on the command line. Press the Delete key or Ctrl-U to delete the whole command line entry so that you can reenter a command.
Discussing the User Interface System The software (Multiprotocol Routing Services) is a multitasking system that schedules use of the CPU among various processes and hardware devices.
Figure 2 is an example of the relationship between the various process levels. Note: Also shown in Figure 2 are the various commands to access each process level and return from each process level.
Chapter 2. Using the Software This chapter describes how to use the software. It consists of: v “Entering Commands” v “Connecting to a Process” v “Some Configuration Suggestions” on page .
2. Use the talk pid command, where pid is the number of the process to which you want to connect. (For more information about these and other OPCON commands, refer to “Chapter 3. The OPCON Process” on page 25.) Note: Not every process listed has a user interface (for example, the talk 3 process).
STATUS of process(es) TALK to process TELNET to IP-Address Exiting a Lower Level Environment The multiple-level nature of the software places you in secondary , tertiary , and even lower level environments as you configure or operate the 2210. T o return to the next higher level, enter the exit command.
4. Configure any base services, such as boot options. Access the configuration process as described in “Accessing the Configuration Process, CONFIG (T alk 6)” on page 14. 5. Configure the interfaces. Access the interface configuration process as described in “Accessing the Network Interface Configuration Process” on page 15 .
2. Retrieve the configuration from the 2210 on which you want to base the new configuration. 3. Make the changes you need for the new configuration. These changes include addresses, the host names, users, and other items. 4. Save the configuration with a different name from the name that you used to retrieve the configuration.
v The configuration process to initially configure and enable the interface, feature, or protocol, as well as perform later configuration changes. v The operating/monitoring process to display information about each interface, feature, or protocol, to make temporary configuration changes, or to activate configuration changes.
Accessing the Operating/Monitoring Process, GWCON (T alk 5) T o view information about the interfaces, features, or protocols or to change parameters while running, you must access and use the operating (monitoring) process. Operating command interfaces are modes of the GWCON interface.
The following example adds a dial circuit interface: Config> add device dial-circuit Enter the number of PPP Dial Circuit interfaces [1]? Adding device as interface 8 Base net for this circuit[0]? .
Note: Not all network interfaces are user-configurable. For interfaces that cannot be configured, you receive the message: That network is not configurable Displaying the Interface Configuration: From the same interface configuration prompts, you can list configuration information specific to that selected interface by using the list command.
T able 2. Network Architecture and the Supported Interfaces (continued) Network Architecture Supported Interfaces Dial-In A PPP dial circuit interface that has configuration parameters defaulted to support DIALs Multilink PPP (MP) Supported on any PPP link L2TP Supports virtual PPP DIALs connections through the Layer 2 T unneling Protocol (L2TP).
+ network 2 X.25> In this example, the X.25 console prompt is displayed on the console. Y ou can then view information about the X.25 interface by entering the X.25 console commands. Monitoring the Network Interface: Refer to the specific chapters in this manual for complete information on monitoring your 2210’s network interfaces.
1. At the CONFIG> prompt, enter the list configuration command to see the numbers and names of the protocols purchased in your copy of the software.
or + protocol IP The protocol console prompt then displays on the console. This example shows the IP protocol console prompt: IP> Y ou can now begin entering the protocol’s commands. See the corresponding protocol section of the Protocol Configuration and Monitoring Reference for more information on specific protocol console commands.
Repeating a Series of Commands in the Command History There is an additional feature for advanced users to facilitate repeating a particular series of GWCON or CONFIG commands. C1, C2,...,Cn in the Command History is referred to as a repeat sequence .
ELS config> Ctrl-N for NEXT to retrieve the next command in sequence- ELS config>exit Enter Config> Starting a Repeat Sequence After All Commands Are Entered On the other hand, if you first enter C1, C2, ... Cn, and retrieve C1 via Ctrl-B or Ctrl-F .
24 MRS V3.2 Software User ’s Guide.
Chapter 3. The OPCON Process The Operator Console process (OPCON) is the root-level process of the router software user interface. The main function of OPCON is to control which processes are connected to consoles.
26 MRS V3.2 Software User ’s Guide.
Chapter 4. Using OPCON This chapter describes the OPCON interface configuration and operational commands. It includes the following sections: v “Accessing the OPCON Process” v “OPCON Commands” Accessing the OPCON Process When the router starts for the first time, a boot message appears on the console.
T able 3. OPCON Commands (continued) Command Function T alk Connects to another router process and enables the use of its commands. T elnet Connects to another router . Breakpoint Use the breakpoint command to trap information in the MOS system debugging tool, inspect memory , place breakpoints, or obtain a core dump.
* status Pid Name Status TTY Comments 1 COpCN1 IOW TTY0 gzs 2 Monitr IDL TTY0 3 Tasker RDY -- 4 MOSDDT DET -- 5 CGWCon DET -- 6 Config DET -- 7 Ezystrt IDL -- 8 ROpCN1 IDL TTY1 9 ROpCN2 RDY TTY2 jlg@128.
2 Monitr IDL -- 3 Tasker RDY -- 4 MOSDDT DET -- 5 CGWCon DET -- 6 Config DET -- 7 Ezystrt IDL -- 8 ROpCN1 IDL TTY1 9 ROpCN2 RDY TTY2 jlg@128.185.40.40 Intercept Use the intercept command to change the OPCON intercept character . The intercept character is what you enter from other processes to get back to the OPCON process.
memory Example: memory Number of bytes: Busy = 319544, Idle = 1936, Free = 1592 Busy Specifies the number of bytes currently allocated. Idle Specifies the number of bytes previously allocated but freed and available for reuse. Free Specifies the number of bytes that were never allocated from the initial free storage area.
EasyStart> EZ.001: Starting. EZ.007: Waiting up to 60 seconds for devices to pass self-test. BTP.010: net 0, int TKR/0, Sent client request (htype: 6) BTP.011: net 1, int FR/0, Could not snd client req because: Ifc not up BTP.011: net 2, int FR/1, Could not snd client req because: Ifc not up BTP.
Pid Name Status TTY Comments 1 COpCN1 IOW TTY0 2 Monitr IDL -- 3 Tasker RDY -- 4 MOSDDT DET -- 5 CGWCon IOW -- 6 Config IOW TTY1 7 Ezystrt IDL -- 8 ROpCN1 IOW TTY1 128.
stop EasyStart> EZ.001: Starting. EZ.007: Waiting up to 6 seconds for devices to pass self-test. stop EZ.006: All dlinks/parameters tried but failed; resetting to def values.
Y ou can use the telnet command with IPv4 or with IPv6 addresses. A router has a maximum of five T elnet sessions: two servers (inbound to the router), and three clients (outbound from the router). Note: T o use T elnet in a pure bridging environment, enable Host Services.
The status and send subcommands have one of two responses depending on whether or not the user is connected to another host. For example: Connected to a host: telnet> status Connected to 128.185.10.30 Operating in character-at-a-time mode. Escape character is ^ ].
Part 2. Understanding, Configuring, and Using Base Services © Copyright IBM Corp. 1994, 1998 37.
38 MRS V3.2 Software User ’s Guide.
Chapter 5. The Configuration Process (CONFIG - T alk 6) and Commands This chapter describes the CONFIG process and includes the following sections: v “What is CONFIG?” v “Using EasyStart” on .
Using EasyStart EasyStart mode automatically downloads the configuration of the router from a BOOTP server . During the process the router displays the EasyStart> prompt and ELS messages which track the process. 1. The Network Administrator sets up the BOOTP server with records for downloading configurations.
Config-Only Mode Config-Only mode is entered if the configuration file that you are using is empty or no protocols are configured. Config-Only mode can also be entered manually to recover from an invalid configuration that is causing the router to crash during start-up.
Device types available: IBD Token Ring WAN Device type: 2. Press Ctrl-C to go to the bootstrap monitor . The > prompt appears. Bootstrap Monitor v1.15 Copyright IBM Corp. 1994, 1997 > 3. Boot to Config-Only mode. > bc PROM Load/Dump Program * Revision: 1.
– The CPU board, which contains the configuration memory chip, was replaced in the router . v Demonstration purposes, for which the router needs to be quickly configured to demonstrate its capabilities. v Bench-marking tests to get the tests going without having to learn the router ’s operating system commands.
Configuring User Access The router configuration process allows for a maximum of 50 user names, passwords, and levels of permission. Each user needs to be assigned a password and level of permission. There are three levels of permission: Administration, Operation, and Monitoring .
2. Add a dial circuit using the add device command. 3. Configure the spare interface by using the net command to configure the interface or add A TM LAN Emulation clients. 4. Configure the various protocols and features using the protocol and feature commands.
Y ou can configure the following protocols on spare interfaces, but you cannot activate them on the network using the activate command: v IPv6 v LNM v OSI/DECnet V v XTP Note: When using the configuration program, use the following to work with spare interfaces: 1.
Bridging v Bridging was not already active. v NetBIOS filters are defined on the spare interface. v The spare interface caused a change to the bridge personality or behavior (for example, adding SR port to pure TB bridge or SR-TB conversion enabled).
6. Use the reset command to reset the interface and the protocols and features on the interface. Example: * talk 6 Config> net 1 PPP Config> . . . change PPP parameter s... PPP Config> exit Config> protocol ipx IPX Config> . . . change IPX parameters on the PPP interfac e.
Y ou can change the configuration parameters of the following protocols and features, but you cannot activate the changes using the reset command: v AppleT alk v Vines v OSI/DECnet V v LNM v XTP v W AN Restoral v W AN Reroute Y ou must restart the device to activate these configuration changes.
Using the CONFIG (T alk 6) Process 50 MRS V3.2 Software User ’s Guide.
Chapter 6. Configuring and Monitoring the CONFIG Process This chapter describes the CONFIG process configuration and operational commands. It includes the following sections: v “Entering and Exiting CONFIG” v “CONFIG Commands” Entering and Exiting CONFIG T o enter CONFIG from OPCON (*): 1.
T able 4. CONFIG Command Summary (continued) Command Function List Displays system parameters, hardware configuration, a complete user list (including PPP users). Network Enters the configuration environment of the specified network. Patch Modifies the router ’s global configuration.
All device and protocol configuration information related to network interfaces is stored by interface number . Any changes made to interface numbers will invalidate much of the device configuration information in the protocols.
See “Using a Dial-In Access to LANs (DIALs) Server” in the Using and Configuring Features for more information. A user profile stored locally on the device consists of the following: Name The userid of the PPP user , used during authentication. See “PPP Authentication Protocols” on page 455.
A user profile-based IP address to of fer to a dial-in client if requested. There are a number of ways for a 2210 to obtain an IP address for a dial-in client. See “IP Control Protocol” on page 462 for more information. V alid values: any valid IP address Default value: none Net-Route Mask Mask for a network user .
This parameter is displayed only if PPP Encryption Control Protocol (ECP) has been enabled using the talk 6 PPP Config> enable ecp command. MPPE does not require an encryption key . This ECP encryption key is used by the PPP Encryption Control Protocol (ECP).
Will user be able to dial-out ? (Yes, No): [No] Set ECP encryption key for this user? (Yes, No): [No] y Encryption key should be 16 characters long. Encryption Key (16 characters ) in Hex(0-9, a-f, A-F): Encryption Key again (16 characters) in Hex(0-9, a-f, A-F): ECP encryption key is set.
When the first user is added, console login is automatically enabled. Each user added must be assigned one of the permission levels defined in T able 5. When users are added, set login authentication to local. Otherwise a remote server must be used.
communicating with the router . The network address-name can be anything, such as a description of the port. Y ou can use any string of up to 23 printable ASCII characters. The network-dial-address is the telephone number of the local or destination port.
Example: change password Enter current password: Enter new password: Enter new password again: Enter current password Specifies your current password. Enter new password Specifies your new password. Enter new password again Specifies your new password again for confirmation.
change user User name: [] Change password? (Yes or No) Change permission? (Yes or [No]) tunnel-profile Changes the configuration for a tunnel peer . Config> change tunnel-profile Enter name: []? lac.org Enter hostname to use when connecting to this peer: [lns.
ip (IP) ip-security ipv6 ipx (Novell IPX) isdn l2tp lnm mcf named-profiles nat ndp6 ndr osi (OSI) ospf (OSPF routing protocol) ppp (Point-to-Point) prompt rip6 rsvp sdlc snmp srly (SDLC Relay) tcp/ip.
Notes: 1. T o clear user information, you must have administrative permission. 2. There may be other items in the list, depending upon what is included in the software load.
tunnel-profile Deletes a tunnel from the tunnel profile database. user user_name Removes user access to the router for the specified user . v25-bis-address address-name Removes a previously added V25bis address. Note: If the address-name contains spaces (for example, remote site Baltimore ), you cannot enter the command on one line.
Syntax: enable console-login interfac e... modem-control console-login Enables the user to be prompted for a user ID and password on the physical console.
Y ou can tell the router to wait for the ring-indication signal before raising Request to Send or Data T erminal Ready . This is provided for countries requiring an earlier handshake. Example: Config> enable modem-control carrier-wait service1 Environment Note: This command is to be invoked only for routers with two service ports.
High Temperature Alarm Threshold: 80C (176F) Low Temperature Alarm Threshold: 0C (32F) (Hysteresis value: +/- 5C) Hysteresis is the amount the temperature must change past the set alert threshold before the alert condition is cleared. For a device with two service ports, hysteresis value is fixed at ± 5 degrees.
Feature Use the feature command to access configuration commands for specific router features outside of the protocol and network interface configuration processes.
tunnel-profile user s... v25-bis-address v34-address devices [ device or devicerange ] Displays the relationship between an interface number and the hardware interface. Y ou can also use this command to check that a device was added correctly issuing the add command.
30 APPN Advanced Peer-to-Peer Networking [ISR] Configurable Features: Num Name Feature 0 WRS WAN Restoral 1 BRS Bandwidth Reservation 2 MCF MAC Filtering 6 QoS Quality of Service 7 CMPRS Data Compress.
Call (callback) List callback information for each user , including the type of callback and number . Time List time allowed configured for each user . Dial (dialback) List dial out status for each user . Encr (encryption) List whether encryption is enabled for each user .
Example: list v34-address Local Network Address Name = v403 Local Network Address = 1-508-898-2403 Network Use the network command to enter the network interface configuration environment for supported networks. Enter the interface or network number as part of the command.
bgp-subnets new value If you want the BGP speaker to advertise subnet routes to its neighbors, set new value to 1. The default is 0. dls-ignore-lfs new value When set to 1, DLSw ignores the “largest frame” size bits in source-routed frames when setting up a circuit.
the ping command as described in the “Ping” section of the “Monitoring IP” chapter of Protocol Configuration and Monitoring Reference V olume 1 .
The changes you make through CONFIG are kept in a configuration database in nonvolatile memory and are recalled when you restart the router . Qconfig Use the qconfig command to initiate Quick Config.
v BSC v FRAME-RELA Y v PPP v SDLC v SRL Y v V25BIS v V34 v X25 Interface# is the number of the interface you are configuring. Note: The data-link parameter cannot be changed for integrated modems. down-notify interface# # of seconds Allows the user to specify the number of seconds before declaring an interface as being down.
v Less than 78 characters and is case sensitive v Set before storing the router ’s configuration memory in IBD. inactivity-timer #_of_min Changes the setting of the Inactivity T imer . The Inactivity Timer logs out a user if the remote or physical console is inactive for the period of time specified in this command.
receive buffers for an interface is based on that interface’s configured packet size and the packet size of global buffers are autoconfigured. If you specify a non-zero value, the configured valu.
receive-buffers interface# max# Adjusts the number of private receive buffers for most interfaces. The range is 5 to 1000. Note: This command is not applicable for ISDN Primary Rate Interfaces . For ISDN PRI, the number of receive buffers is fixed at 5 per B-channel, 1 15 for T1 and 150 for E1.
host IP_address Sets the IP address of the RFC 868-compliant host that will be used as the time source. This is the address of a host which will respond to an empty datagram on UDP port 37 with a datagram containing the current time. list Displays all configured time-related parameters.
Follow the instructions on the release notice sent with the software. The update command is the last command that you enter when loading new software. After you enter this command, the console displays a message indicating configuration memory is being updated.
CONFIG Commands 82 MRS V3.2 Software User ’s Guide.
Chapter 7. The Boot CONFIG Process This chapter describes the Boot CONFIG process. This chapter includes the following sections: v “What is Boot CONFIG?” v “How the BOOTP Forwarding Process W or.
Y ou can configure more than one boot file in the boot configuration database by specifying the path and name of each boot file (using the add command described on page “Add” on page 94).
A Device as a BOOTP Relay Agent If BOOTP request requires multiple hops before reaching the BOOTP server , the BOOTP relay agent routes the packet via IP to all BOOTP servers that it knows about.
constructs a BOOTP reply and adds the client’s IP address, along with the location of the Boot server and boot filename. If a match does not occur , the packet is dropped.
2. Configure IP so that the device can reach each host with the archived configuration. The Protocol Configuration and Monitoring Reference explains the IP configuration commands. v The source IP address for TFTP transfers is the device ID. This ID, by default, is a configured IP address for one of the device’s network interfaces.
The router accepts any printable ASCII character as part of the file name definition, with two exceptions: v The file name cannot begin with a numeric character v The file name cannot contain a RETURN or LF (line feed) character .
Loading an Image at a Specific T ime There may be occasions when you may want to load an image into a device on a specific day and time when you will be unavailable. Y ou can configure the device to perform a timed load using the timedload activate command .
be globally readable and the dump directories globally writable. The boot and dump functions use the TFTP protocol. Y our TFTP server may impose additional restrictions. Installing Software/Code T o download a new load module from a server into the IBD, perform the following steps: 1.
Boot config> tftp get Local filename []? ibd/newloadfile Remote host []? Host filename []? 10. Enter list boot-entries at the Boot config> prompt. This lists the load modules in your IBD. Boot config> list boot-entries Note the entry number of the load module in the IBD that you were using prior to receiving this load module.
Using the Boot CONFIG Process 92 MRS V3.2 Software User ’s Guide.
Chapter 8. Configuring Boot CONFIG This chapter describes the Boot CONFIG configuration and operational commands. It includes the following sections: v “Entering and Exiting Boot CONFIG” v “Boot CONFIG Commands” Entering and Exiting Boot CONFIG T o enter the Boot CONFIG command environment, use the CONFIG boot command.
T able 1 1. Boot CONFIG Commands (continued) Command Function T imedload Schedules an image load into the device on a specific day and time, cancels a scheduled load or displays scheduled load information. TFTP Initiates TFTP file transfers between device memory or IBD and remote hosts.
can configure more than one boot device. Obtain the loadname using the list ibd command. The loadname is case-sensitive. Example: add boot-entry remote host or IBD loadname [0.0.0.0]? 128.185.30.0 via gateway (0.0.0.0 if none) [0.0.0.0]? 0.0.0.0 timeout in seconds [3]? 10 file name [ ]? loads/Y21.
dump-entry Specifies the IP address of the remote host that will receive the dump file(s). When you enter the add dump-entry command, you must supply the following information: remote host? IP addre.
change address Change which entry [1]? 1 Which interface is this address for [0]? 1 New address [192.9.1.1]? 128.185.162.1 Net mask for this interface [255.255.255.0]? boot-entry Modifies the configuration about a previously added network boot file.
Copy Use the copy command to copy boot files and configuration files to and from remote routers and hosts. T o use the copy command, the device must have IP configured and running on at least one interface. The device cannot be in Config-only mode.
[ibd or filename ] Copies a boot file or configuration file from an IBD. Y ou must include the file name. [ host-ip-address or filename ] Copies a boot file or configuration file from a remote host. Y ou must include the file name. Delete Use the delete command to remove entries from the boot and dump configuration database.
When you enter the delete dump-entry command, a prompt appears for the entry you want to delete. The dump entry number is the first number that appears on each line when you enter the list dump-entries command at the Boot config> prompt. T o verify the deletion, use the list command.
list all command to verify the dump settings. Dumping is suppressed until you enter the enable dumping command. Disable dumping is the default setting. unique-naming Suppresses the automatic unique naming of dump files. After entering this command, use the Boot CONFIG list all command to verify the unique naming settings.
Specifying a bank number may result in a partial erase of the load image file if it is large enough to traverse more than one bank. Example 1: erase test Erasing bank 5 ... Banks 1-4 contain ... Banks 5-7 have been erased Example 2: erase 2 Are you sure you want to erase bank 2? (Yes or [No]): yes Erasing bank 2 .
list addresses Interface addresses: 1: 192.9.1.1 on interface 0, mask 255.255.255.252 2: 192.9.223.39 on interface 2, mask 255.255.255.0 all Displays all boot and dump configuration data and the current settings for the dump, unique-naming capabilities, and scheduled image load information.
Banks 2-3 contain load "vl/load-ver2.ldc" which uses 1652961 bytes Loaded using TFTP over IP Filename loads/vl/load-ver2.ldc Host 128.185.210.125 Bank 4 contains load "vl/load-ver4.cfg" which uses 131084 bytes Loaded using TFTP over IP Filename CONFIG Host 0.
2. A prompt then asks you to confirm the load. Enter no to cancel the command. Enter yes to load the boot file from the remote host into RAM. Example: load remote Remote Host Address [0.0.0.0]? 128.185.210.125 Remote Pathname[]? /loads/vl.ldc First Hop Address[0.
T imedload Use the timedload command to schedule an image load on a device, cancel a scheduled load, or to view scheduled load information. This command allows you to load a software image into the device outside of peak network traff ic periods when support personnel may not be present.
Boot config> timedload activate Time Activated Load Processing... Remote host IP address or IBD load name [0.0.0.0] ibd:vl3.cce Time of day to load image (YYYYMMDDHMM) []? 199703191630 The load timer has been activated. deactivate Cancels a scheduled load.
Syntax: tftp get put get CONFIG address-remote-server path/filename Initiates a request to a TFTP server to transfer a file from the server to the device.
The console display is the same as the TFTP get command. Example: tftp put Local filename [CONFIG]? Remote host [0.0.0.0]? 128.185.163.1 Host filename [0A019947.cfg]? TFTP transfer complete, status: Timeout local filename? CONFIG is a filename that refers to the device’s nonvolatile memory .
11 0 MRS V3.2 Software User ’s Guide.
Chapter 9. Boot Options This chapter covers the boot options available. Normally , the device boots from the Integrated Boot Device (IBD). Y ou need to use this chapter only for maintenance or diagnostic operations or for software upgrades. The boot options allow you to boot the 2210 using the following methods: T able 13.
2. Enter bm and the console displays the following information and the first boot prompt: PROM Load/Dump Program * Revision: 1.0 * Copyright IBM Corp. 1994, 1997 IBD has load(s) load image names Device Slot Number or IBD Load Name: 3. Enter the load image name.
Enter @ to retry BOOTP . If the retry fails, use another method to boot the 2210. Booting from a TFTP host server using a console terminal Y ou can use a load image file on a TFTP host server to boot the 2210. Another router can act as a TFTP host server .
T able 14. Boot Options Option Name Description B Boot using stored Configuration Boots automatically using the configuration stored in TFTP or in the IBD. BC Boot to Config-only Mode using console queries Displays prompts to manually boot the 2210 and then enters Config-only mode, allowing you to begin configuring the 2210.
T able 15. Boot Option Prompts Prompt Description Device T ype The device type over which to boot the 2210; either the IBD, the T oken-ring, or Ethernet interface. IBD Loadname The IBD loadname, which can include up to 79 characters, digits, and symbols and is case-sensitive.
T able 15. Boot Option Prompts (continued) Prompt Description Cable T ype (X21/Other) Enter X21 to connect an X.21 cable to this port. Enter other to connect any other cable type to this port. B (Boot) Boots the router automatically using the configuration stored in configuration memory .
The Standalone Configuration Process. You are here because the watchdog timer timed out and/or Autoboot not selected. Config (only)> If there is no T oken-Ring link active, you receive the followin.
T o reload the current configuration, press Enter . T o load another configuration, enter the load name at the prompt. Loading using IBD Load Image "load name" If you specify an incorrect or nonexistent load name, the system issues the following message: No such load and returns you to the IBD Load Name prompt.
Note: The PPP protocol is currently the only data link layer protocol that can be used when booting over a W AN interface. BN (Boot, But Do Not Run, Using Console Queries) Do not use this boot option. This option is used by field service personnel only .
Unsuccessful BOOTP A BOOTP boot fails if the server is down, if the server cannot find the file you specified, or if TFTP fails. If BOOTP is unsuccessful, the terminal displays the message Manual BOOTP failed - enter "@" at prompt to BOOTP again.
If you try to execute one of these tests without the wrap plugs installed, you receive the following message: You have selected a test that requires external wrap plugs to be present. Remove the cable(s) from the network, and attach the appropriate wrap plug(s).
T o display this information: Enter ub at the boot prompt (>). The screen displays information similar to the example shown below . TFTP bootstrap configuration: Host ibmMRNSV1 - .191, Dumping disabled, Unique dump naming off Interface Addresses: 1: 128.
LC (Load Configuration Memory) Loads configuration memory from a host on the network. T o use this option, do the following: Enter lc at the boot prompt (>).
WAN port [2]: Timeout (secs) [20] ? Clock Source (INT/EXT) [INT]: Internal Clock Speed 1 Interface IP address: 123.175.56.119 IP mask [FFFFFF00]: Load Cfg from host: 123.175.68.219 Via gateway: 123.175.56.190 Config file name: ibmMRNS.cfg Using Serial Line at ( 0, 0).
4. Enter n to return to the OPCON prompt. Note: Refer to the documentation supplied with your ZModem software for the ZModem commands to use at your console terminal.
126 MRS V3.2 Software User ’s Guide.
Chapter 10. The Operating/Monitoring Process (GWCON - T alk 5) and Commands This chapter describes the GWCON process and includes the following sections: v “What is GWCON?” v “Entering and Exiti.
T able 16. GWCON Command Summary Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See “Getting Help” on page 10. Activate Enables a newly configured spare interface.
In the first example, the router was booted using TFTP over Ethernet. The message indicates the method of booting, the line number , the CSR (Command and Status Register) address, the IP address, the filename, the host, and the gateway . The line number distinguishes one port from another on a multiport board.
Low Low water mark (flow control). Curr Current number of buffers on this device. The value will be 0 if the device is disabled. When a packet is received, if the value of Curr is below Low , then the packet is eligible for flow control. (See the queue command for conditions.
configuration Multiprotocol Routing Services 2210-MRS Feature 3768 V3.2 Mod 0 PTF 0 RPQ 0 MRS.E00 cc4_2a Boot ROM version 1.20 Watchdog timer enabled Auto-boot enabled Time: 15:46:12 Friday September .
State Current state of the network interface. T esting Indicates that the interface is undergoing a self-test. Occurs when the router is first started, when a problem is detected on the interface, or when the test command is used.
Not Present Indicates that the interface’s adapter is not plugged in. Not Present is also used as the state for a null device. Spare interfaces are displayed as null devices until they are activated. HW Mismatch Indicates that the configured adapter type does not match the adapter type that is actually present in the slot.
The list command displays a status screen with the current temperature, the amount of time between successive temperature readings, the noted maximum and minimum seen since the last reset/clear , and alerts when the temperature threshold, high or low , has been passed, as well as the hysteresis value.
Input Unk Proto Number of packets received for an unknown protocol. Input Flow Drop Number of packets received that are flow controlled on output. Output Discards Number of packets that the router chose to discard rather than transmit due to flow control.
Syntax: feature feature# or feature-short-name Interface Use the interface command to display statistical information about the network interfaces (for example, Ethernet or T oken-Ring).
T o display the current logging level, do not enter an octal number as part of the command. T o change the logging level, enter the octal number of the new logging level as part of the command.
Reserve Minimum amount of memory needed by the currently configured protocols and features. Never Alloc Memory that has never been allocated. Perm Alloc Memory requested permanently by router tasks. T emp Alloc Memory allocated temporarily to router tasks.
+ network 3 X.25> In the example, the X.25> prompt is displayed. Y ou can then view information about the X.25 interface by entering the X.25 operating commands.
See the corresponding monitoring chapter in this manual or in the Protocol Configuration and Monitoring Reference for information on a specific protocol’s console commands. Queue Use the queue command to display statistics about the length of input and output queues on the specified interfaces.
Due to the scheduling algorithms of the router , the dynamic numbers of Curr (particularly the Input Queue Curr) may not be fully representative of typical values during packet forwarding. The console code runs only when the input queues have been drained.
Bytes T rans Number of bytes transmitted at the MAC layer . T est Use the test command to verify the state of an interface or to enable an interface that was previously disabled with the disable command.
v Whether the router was last reloaded or restarted. v T ime elapsed since the last reload. v T ime elapsed since the last restart. Syntax: uptime GWCON Process Chapter 10.
GWCON Process 144 MRS V3.2 Software User ’s Guide.
Chapter 1 1. The Messaging (MONITR - T alk 2) Process This chapter explains how to collect and display messages. (Refer to “Chapter 12. Using the Event Logging System (ELS)” on page 147 for information about ELS and message formats. Refer also to the IBM Nways Event Logging System Messages Guide for a description of each message.
T o specify a default device for MONITR, define the device in Static RAM by using the CONFIG set logging disposition command. Specifying a default device is useful if you have a terminal set up to print.
Chapter 12. Using the Event Logging System (ELS) This chapter describes the Event Logging System (ELS). The ELS continually logs all events, filtering them according to parameters that you select. A combination of operational counters and the ELS provides information for monitoring the health and activity of the system.
Entering and Exiting the ELS Configuration Environment The ELS configuration environment (available from the CONFIG process) is characterized by the ELS Config> prompt. Commands entered at this prompt create the ELS default state that takes effect after you restart the router .
Interpreting a Message This section describes how to interpret a message generated by ELS. Figure 4 shows the message contents. The information illustrated in Figure 4 as well as the ELS logging level.
T able 17. Logging Levels Logging Level T ype UI ERROR Unusual internal errors CI ERROR Common internal errors UE ERROR Unusual external errors CE ERROR Common external errors ERROR Includes all error.
T able 18. Packet Completion Codes (Error Codes) (continued) Code Meaning 1 Random, unidentified error 2 Packet not queued for output due to flow control reasons 3 Packet not queued because network .
v Use the IBM Nways Event Logging System Messages Guide to determine which messages are not normal. When initially viewing ELS from the MONITR process, you will see a considerable amount of information. Because the router cannot buffer and display every packet under moderate to heavy loads the buffers are flushed.
Y ou can also use remote logging instead of capturing ELS output on a UNIX Host. For more information about remote logging, see “Using and Configuring ELS Remote Logging” on page 155.
ELS> nodisplay subsystem all all ELS> display subsystem tkr all Ctrl-P * t2 As the messages begin to scroll by , look for ELS message tkr .031. ELS Example 2 SRB bridging is not working. 1. Check the configuration. 2. Use the GWCON bridging console to verify that the bridging interfaces are enabled.
Using and Configuring ELS Remote Logging The remotely-logged ELS message contains all of the information that is contained in ELS messages found in the monitor queue, as viewed under talk 2, and also contains additional information as shown in Figure 5.
remote workstation. However , a particular 2210 can log to one and only one remote workstation. The operating system used in this example is AIX 4.2. Y our environment may be slightly different. For more information on syslog, refer to the documentation for your operating system.
Configuring the 2210 for Remote Logging T o configure a 2210: 1. In talk 6, configure the remote-logging facility as shown in Figure 7 on page 158. The IP address specified as the source-ip-addr s.
the name server at least responds quickly with “address not found.” T o determine whether this happens, issue the host command on your workstation as follows: workstation> host 5.1.1.1 host: address 5.1.1.1 NOT FOUND workstation> If the response takes more than 1 second, select an IP address which resolves more quickly .
Remote Logging Output Figure 9 on page 160 shows a sample from the /tmp/syslog_news_info file. Notice that the first message has a sequence number of 310.
v A route from the source 2210 to the remote workstation was not in the routing table v The interface for the outbound UDP packet containing the ELS messages was not in the “Up” state Notice in 1 that messages 31 1-313 did not get remote-logged.
Y ou can use the timestamp, which appears in both the remote-logging output file and the talk 2 output, to determine when the first ELS message is successfully remote-logged. T o use the timestamp for this purpose, configure ELS such that the timestamp in the monitor queue displays the time-of-day .
3. Use the net number from the previous step to determine the associated MAC address 4. In talk 6, add an ARP entry to establish a static IP address to MAC address relationship Additional Consideratio.
Duplicate Logging If a facility value is repeated in syslog.conf , for example: user.debug /tmp/syslog_user_debug user.alert /tmp/syslog_user_alert The syslog daemon will log user .
v Specify an event that stops message buffering and what action the system takes when the event occurs. v Send a formatted version of the buffer to a file at a remote server .
Bughlt: Dump initiated by ELS Stop Action. BUGHLT+80; Dump initiated by ELS Stop Action. Note: In reality if the stop action is the SYSTEM-DUMP you will not be able to list the final status as above nor view the buffer because the router will be attempting to reload.
166 MRS V3.2 Software User ’s Guide.
Chapter 13. Configuring and Monitoring the Event Logging System (ELS) This chapter describes how to configure events logged by ELS and how to use the ELS commands.
T able 19. ELS Configuration Command Summary (continued) Command Function Delete Deletes an event number from an existing group or deletes an entire group. Display Enables message display on the console monitor . Filter Filter ELS messages based upon the net number .
Default Resets the display or trap setting of an event, group, or subsystem back to a disabled state. Syntax: default display trap remote display event OR group OR subsystem Controls the output of the display of messages to the monitoring. trap event OR group OR subsystem Controls the generation of traps to the network management station.
display range gw 19 22 Displays events gw .19, gw .20, gw .21, and gw .22. subsystem subsystemname Displays messages associated with the specified subsystem. T o find out which subsystems are on the router , type list subsystems . Note: Although ELS supports all subsystems on the router , not all devices support all subsystems.
list r Remote Logging is ON Source IP Address = 192.67.38.2 Remote Log IP Address = 192.9.200.1 Default Syslog Facility = LOG_DAEMON Default Syslog Priority Level = LOG_CRIT Number of Messages in Remo.
trace-status Displays information on the status of packet tracing, including configuration and run-time information. Example: list trace-status ------------------------- Configuration ---------------.
particular message level, “all” is assumed). Additionally , with the noremote subsystem command, you can set a syslog_facility and syslog_level for any remaining message levels that have not been turned off. Syntax: noremote even t... grou p... rang e.
Notrace Disables packet trace for the specified event/range/subsystem/group. Syntax: notrace even t... grou p... rang e... subsyste m... event subsystem.
Where first_event_number is the number of the first event in the specified event range, and last_event_number is the number of the last event of the specified event range. Suppresses the sending of messages for the events in the specified range for the specified subsystem in SNMP traps.
log_crit log_err log_warning log_notice log_info log_debug These values do NOT have any particular association with any daemons on the IBM 2210. They are merely identifiers which are used by the syslog daemon on the remote workstation.
Set Use the set command to set the maximum number of tags per second, the timestamp feature, or to set tracing options. Syntax: set p i n... remote-loggin g... timestam p... trac e... pin max_traps Use the set pin command to set the pin parameter to the maximum number of traps that can be sent on a per-second basis.
log_kern log_lpr log_mail log_news log_syslog log_user log_uucp log_local0-7 level Specifies a value that, in conjunction with the facility value, is used by the syslog daemon in the remote workstation to determine where to log messages.
included in the logged message at the remote file and can help identify which machine logged the message. timestamp [timeofday or uptime or off] Allows you to turn on message timestamping so that eit.
on Enables packet tracing. reset Clears the trace buffer and resets all associated counters. stop-event event id Stops tracing when an event (event id) occurs. Enter either an ELS event id (for example: TCP .013) or “None”. “None” is the default.
subsystem subsystemname Allows trace events associated with the specified subsystem to be displayed on the router monitoring. T rap Use the trap command to select the message to be sent to the remote SNMP network management workstation. A remote SNMP network management workstation is an IP host in the network acting as an SNMP manager .
“TRAP”, “TRACE”, or “REMOTE-LOGGING”). Finally , you specify the net number (or range of net numbers) that you want to filter . When you enable the filter , messages that have been turned on by the ELS commands are subject to filtering.
If you specify net#_start and net#_end as the same number , you are filtering on a single net number . The command create remote range ipx 19 22 3 6 filters all ipx messages beginning with IPX.019 and ending with IPX.022 for net numbers 3 through 6 for remote logging.
List Use the list command to list a specific ELS filter or all ELS filters. Syntax: list all filter filter# all Lists all currently configured filters. filter Lists the filter specified by filter#. ELS Message Buf fering Configuration Commands T able 21 describes the commands available at the ELS Config Advanced> prompt.
range subsystem event subsystem.event# Causes the specified message ( subsystem.event# ) to be logged to the message buffer . group groupname Allows messages that were previously added to the specified group to be logged to the message buffer .
Causes the messages in events gw .19, gw .20, gw .21, and gw .22 not to be logged to the message buffer . subsystem subsystemname Allows messages associated with the specified subsystem not to be logged to the message buffer . Set Use the set command to configure various ELS message buffering options.
2. Logging stops. 3. The system performs the specified “stop action.” Logging remains stopped until the next time you issue the set logging on command or reboot the router . If you do not specify the stop event when you enter the command, the system prompts you to enter the stop event.
ELS Monitoring Commands This section summarizes and then explains all the ELS monitoring commands. After accessing the ELS Monitoring environment, you can enter ELS monitoring commands at the ELS> prompt.
Syntax: clear even t... grou p... subsyste m... event subsystem. event# Resets the count of events to zero for displaying, trapping, tracing or remote logging of the specified event ( subsystem.event# ). group group.name Resets the count of events to zero for displaying, trapping, tracing or remote logging of the specified group ( group.
Syntax: files trace tftp host_IP_addr filename host_IP_addr Is the IP address of the host to which you are transferring the files. filename Is the target file name. For TFTP , the file name must be fully path specified, and the file name must already exist on the target host.
event subsystem.event# Displays the logging level, the message, and the count of the specified event. Example: list event ip.007 Level: p-TRACE Message: source_ip_address -> destination_ip_address.
subsystem all Lists all events, logging levels, and messages for every event that has occurred on the router . trace-status Displays information on the status of packettracing, including configuration and run-time information.
Where first_event_number is the number of the first event in the specified event range, and last_event_number is the number of the last event of the specified event range. Suppresses the displaying of a range of messages for the specified subsystem.
Use the list event and list active commands to verify what you set with the remote and noremote commands. Notrace Use the notrace command to stop display of selected trace events at the monitoring. Syntax: notrace even t... grou p... rang e... subsyste m.
event subsystem.event# Suppresses the sending of the specified message in an SNMP trap ( subsystem.event# ). group groupname Suppresses the sending of messages in SNMP traps that were previously added to the specified group ( groupname ).
event subsystem.event# syslog_facility syslog_level Causes the specified event to be logged remotely . Syslog facility and level values are used by the syslog daemon in the remote workstation to determine where to log the messages. This value overrides the default values that are set with the set facility and set level commands.
Example: remote range gw 19 22 log_user log_info Causes the event gw .19, gw .20, gw .21, and gw .22 to be logged remotely to the files specified by the syslog_facility value of log_user and the syslog_level value of log_info. subsystem subsystem.name message_level syslog_facility syslog_level Where subsystem.
Syntax: retrieve Save Use the save command to store the current configuration (except counters). Save does not affect the default configuration (the one you set with the configuration commands). Use save after modifying the configuration with the monitoring commands with the intention of saving this configuration over a restart.
off T urns remote logging off. All messages selected by the remote command will be prevented from being logged. facility Specifies a value that, in combination with the level value, is used by the syslog daemon in the remote workstation to determine where to log messages.
this IP address is quickly resolved to a hostname by the name server , or at least that the name server responds quickly with “address not found.” T o determine that the IP address resolves properly enter the host command on your workstation as shown: workstation> host 5.
wrap-mod e... decode [off or on] T urns packet decoding on or off. Packet decoding is not supported by all components. default-bytes-per-pkt bytes Sets the default number of bytes traced. This value is used if a value is not specified by the component doing the tracing.
TCP 60 57 2420 0 0 UDP 10 6 179 0 0 BTP 40 13 695 0 0 RIP 30 22 474 0 0 OSPF 80 73 2859 0 0 MSPF 40 17 593 0 0 TFTP 35 29 819 0 0 SNMP 30 28 821 0 0 DVM 30 21 589 0 0 DN 140 115 5842 0 0 XN 35 21 780 .
Maximum:7976 vector, 155 subsystem Memory:71784/620 vector+ 81256/217714 data+ 64 heap=371438Subsys Subsys Name of subsystem V ector Maximum size of subsystem Exist Number of events defined in this s.
T rap Use the trap command to select the message to be sent to the remote SNMP network management workstation. A remote SNMP network management workstation is an IP host in the network acting as an SNMP manager . Syntax: trap even t... grou p... rang e.
next prev search ... current Displays the current trace packet. If the current packet is not valid, the first packet in the trace buffer is displayed. first Displays the first traced packet in the trace buffer . jump n Displays the traced packet n packets ahead of or behind the current packet.
on Reset Use the reset command to clear the trace buffer and reset all associated counters. Syntax: reset Set Use the set command to configure tracing options.
Tracing event LEC.12: control frames over ATM Forum LEC: interface 1 Note that if the user DISABLEs and TESTs this LEC interface, the LEC trace settings from Talk 6 Config will take effect.
T able 24. ELS Net Filter Monitoring Commands Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See “Getting Help” on page 10. Create Creates a filter and assigns it a number .
Delete Use the delete command to delete a specific ELS filter or all ELS filters. Syntax: delete all filter filter# all Deletes all currently configured filters. filter filter# Deletes the filter specified by filter# . Use the list command to obtain the number for the filter you want to delete.
ELS Message Buf fering Monitoring Commands T able 25 describes the commands available at the ELS Config Advanced> prompt. T able 25. ELS Message Buffering Monitoring Commands Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available).
log event group range subsystem event subsystem.event# Causes the specified message ( subsystem.event# ) to be logged to the message buffer . group groupname Allows messages that were previously added to the specified group to be logged to the message buffer .
Example: log range gw 19 22 Causes the messages in events gw .19, gw .20, gw .21, and gw .22 not to be logged to the message buffer . subsystem subsystemname Allows messages associated with the specified subsystem not to be logged to the message buffer .
stop event [ subsystem.event# or none] Specifies the event ( subsystem.event# ) that stops logging. If you have specified a stop string, the text in the stop string must also match. When the stop event occurs: 1. The next five ELS messages are logged.
all scroll/noscroll Displays all of the messages in the message buffer . [scroll] Specifies that the screen pauses until you hit the spacebar . Note: If you are displaying a large number of messages, specify scroll so you do not miss any critical messages.
Chapter 14. Configuring and Monitoring Performance This chapter describes how to use the Performance configuration and monitor operating commands and includes the following sections: v “Performanc.
* talk 6 Config> After you enter the talk 6 command, the CONFIG prompt ( Config> ) displays on the terminal. If the prompt does not appear when you first enter configuration, press Return again. 2. At the CONFIG prompt, enter the perf command to get to the PERF Config> prompt.
Set Use the set command to set the reporting period. Syntax: set time time Specifies the short window time. V alid V alues: 2 - 30 seconds Default V alue: 2 Accessing the Performance Monitoring Environment Use the following procedure to access the Performance monitoring commands.
Disable Use the disable command to disable collection of CPU utilization statistics and disable the talk 2 ELS monitor output. Syntax: disable cpu statistics t2 output Enable Use the enable command to enable collection of CPU utilization statistics and enable the talk 2 ELS monitor output.
set time time Specifies the short window time. V alid V alues: 2 - 30 seconds Default V alue: 2 Performance Monitoring Commands (T alk 5) Chapter 14. Configuring and Monitoring Performance 219.
Performance Monitoring Commands (T alk 5) 220 MRS V3.2 Software User ’s Guide.
Part 3. Understanding, Configuring and Operating Interfaces © Copyright IBM Corp. 1994, 1998 221.
222 MRS V3.2 Software User ’s Guide.
Chapter 15. Getting Started with Network Interfaces The chapters of this book describe how to configure and monitor network interfaces and link layer protocols supported by the Router . The purpose of this chapter is to give you some basic configuration and monitoring guidelines.
Accessing Link Layer Protocol Configuration and Console Processes Refer to “Chapter 1. Getting Started” on page 3 for complete information on accessing the protocol configuration and console processes. Accessing these processes allows you to change and monitor configurable parameters for Link Layer protocols supported by your router .
Chapter 16. Configuring IEEE 802.5 T oken-Ring Network Interfaces This chapter describes T oken-Ring interfaces configuration and operational commands.
Note: If the MAC address is 0, the default station address is used. Syntax: list Example: list Token-Ring configuration: Packet size (INFO field): 2052 Speed: 16 Mb/sec RIF Aging Timer: 120 Source Routing: Enabled MAC Address: 000000000000 Packet size Size of the T oken-Ring packet.
T able 29. T oken-Ring 4/16 V alid Packet Sizes Network Data Speed V alues (# of bytes) 4 Mbps 516 to 4498 Note: If a value greater than 4498 is defined fo ra4M bT R then the software will set it to 4498. If the user does not specify a value, then the default is 2052.
This switch is completely independent of whether this interface is providing source routing via the SRT forwarder . The default setting is enabled. Some stations cannot properly receive frames with a Source Routing RIF on them. This is especially common among NetW are drivers.
T oken-Ring Interface Monitoring Commands This section summarizes the T oken-Ring monitoring commands. Enter commands at the TKR> monitoring prompt.
LLC Use the LLC command to access the LLC monitoring prompt. LLC commands are entered at this new prompt. See “LLC Monitoring Commands” on page 239 for an explanation of each of these commands.
Maint: Fail Number of maintenance failures The following section describes the statistics displayed that are specific to the T oken-Ring interfaces: Physical address Specifies the physical address of the T oken-Ring interface. Network speed Specifies the speed of the T oken-Ring network that connects to the interface.
frames on the ring. The interface may be transmitting the claim T oken frames. This status remains until the interface transmits a ring purge frame. Interface Restarts Specifies the number of times the T oken Ring chip timed out, or the T oken Ring driver received a bad command from the handler .
Lobe wire faults Displays the number of times the network detects an open or short circuit in the cable between the interface and the wiring concentrator . Removes received Displays the number of times the interface receives a remove ring station MAC frame request and removes itself from the network.
Using the GWCON Interface Command 234 MRS V3.2 Software User ’s Guide.
Chapter 17. Configuring and Monitoring LLC Interfaces This chapter describes how to configure specific LLC interfaces in the router by using either the interface commands or the GWCON interface command. Logical Link Level can be thought of as a “sub-protocol”.
T able 31. LLC Configuration Command Summary (continued) Command Function Exit Returns you to the previous command level. See “Exiting a Lower Level Environment” on page 1 1. List Use the list command to display the current configuration for the LLC.
Set Use the set command to configure the LLC. Attention: Changing LLC parameters from the defaults can affect how the LLC protocol works. Syntax: set n2-max-retry count n3-frames-rcvd-before-ack coun.
Example: set t1-reply-timer Reply Timer (T1) in sec. [1]? t2-receive-ack-timer This timer is used to delay sending of an acknowledgment for a received I-format frame. This timer is started when an I-frame is received. The timer is reset when an acknowledgment is sent.
LLC Monitoring Commands This section summarizes and then explains all of the LLC monitoring commands. These commands, shown in T able 32, let you monitor the LLC while passing packets over an SNA network.
Frame Xmt Rcvd UI-frames 4 5 TEST-frames 0 1 XID-frames 0 0 I-frames 291 26 RR-frames 81 291 RNR-frames 0 0 REJ-frames 0 0 SABME-frames 1 0 UA-frames 0 1 DISC-frames 0 0 DM-frames 0 0 FRMR-frames 0 0 .
I-frames refused by LLC user Counter that displays the number of I-frames discarded by the software above the LLC. For example, DLSw (Data Link Switching).
CKPT_REJ A combination of the checkpointing and rejection states. Resetting The local LLC peer has received a SABME and is reestablishing the link. Remote_Busy The state that occurs when an RNR is received from the remote LLC peer . LB_RB A combination of local_busy and remote_busy states.
RR-frames 502 403 RNR-frames 0 0 REJ-frames 0 0 I-frames discarded by LLC 0 I-frames Refused by LLC user 0 Session Id Indicates the session ID number . Interface Indicates the number of the interface over which this session is running. Remote MAC addr Indicates the MAC address of the remote LLC peer .
Current send seq (Vs) Send state variable (Ns value for the next I-frame to be transferred). Current Rcv seq (V r) Receive state variable (next in-sequence Ns to be accepted). Last ACK’d sent frame (V a) Acknowledged state variable (last valid Nr received).
t1-reply-timer seconds t2-receive-ack-timer seconds ti-inactivity-timer seconds tw-transmit-window seconds n2-max_retry The maximum number of retries by LLC protocol. For example, N2 is the maximum number of times the LLC transmits an RR without receiving an acknowledgment when the inactivity timer expires.
Monitoring LLC 246 MRS V3.2 Software User ’s Guide.
Chapter 18. Using the Ethernet Network Interface This chapter describes how to use the Ethernet interface. It includes “Displaying Ethernet Statistics through the Interface Command”.
received a bad command from the handler . For information about why a restart occurred, refer to messages Eth.043 and Eth.044 in the IBM Nways Event Logging System Messages Guide Interface type This specifies the connector type as AUI or RJ45.
the second transmission attempt. This data is exported via SNMP as the dot3StatsSingleCollisionFrames counter . multiple collisions The Multiple Collisions counter increments when a packet has multiple collisions before being successfully transmitted.
Using Ethernet Network Interfaces 250 MRS V3.2 Software User ’s Guide.
Chapter 19. Configuring and Monitoring the Ethernet Network Interface This chapter describes Ethernet interface configuration and operational commands.
T able 33. Ethernet Configuration Command Summary (continued) Command Function Physical-Address Sets the physical MAC address. Exit Returns you to the previous command level. See “Exiting a Lower Level Environment” on page 1 1. Connector-T ype Use the connector-type command to set the connector type.
Example: set physical-address MAC address in 00:00:00:00:00:00 form []? 12:15:00:FA:00:FE Accessing the Ethernet Interface Operating Process T o monitor information related to the Ethernet Network Interface, access the interface monitoring process by doing the following: 1.
Syntax: collisions Example: Eth> coll Transmitted with 1 collisions:0 Transmitted with 2 collisions:0 Transmitted with 3 collisions:0 Transmitted with 4 collisions:0 Transmitted with 5 collisions:0.
Chapter 20. Overview of LAN Emulation Note: See the glossary for definitions of the acronyms and terms used in this chapter . The IBM 2210 implements the LAN Emulation Over A TM: V ersion 1.0 Specification which is widely accepted as the industry standard for multivendor multiprotocol interoperability .
The network management benefits of emulated LANs (ELANs) come from increased flexibility in handling moves, adds, and changes. Membership in an ELAN is not based on physical location; instead, logically-related stations are grouped to form an ELAN (stations can also be members of multiple ELANs).
Broadcast and Unknown Server (BUS) A LAN emulation service component responsible for the delivery of multicast and unknown unicast frames. The LES, BUS, and LECS are collectively referred to as the LE service components. Each ELAN has a dedicated LES and BUS.
End stations obtain their Network Prefix from the switch and form their own addresses by appending an ESI and selector . These addresses must then be registered with the switch, which rejects the registration if the A TM address is not unique. ESI Each A TM interface on the router has a universally administered, or burned-in, MAC address.
explicit assignment; by default, 200 of the 256 possible selectors per ESI are reserved for explicit assignment. Run-time selector assignment is beneficial when you do not need to control the assigned selector , for example, when you are configuring clients in Classical IP that are not paired with an ARP server .
Overview of the LECS Function LE clients are not required to use the LECS, although it is recommended. If the LECS is not used, each LE client must be configured with the A TM address of the LES that serves its ELAN.
This field can specify the upper bound on the size of a data frame that can be processed by the LE client, or it can be unspecified. The LECS cannot assign a client to an ELAN with a maximum frame size larger than that specified by the client. If the ELAN allows frames too large for the client to handle, the client cannot function on that ELAN.
Sample Situations for Use of the LECS Assignment Policies The following section offers examples of various LECS assignment policies. A TM Address Policy The LECS permits two types of A TM address policy values. The first type is a variable length A TM address prefix.
This setup requires configuring the LE clients with the correct ELAN Name. v Use names for the LE clients Each LE client can be given its own name. For example, you could create the policy values (Joe, LES_A) and (Mary , LES_A). Then, the LE clients configured with these names would be directed to the same LES.
v By default, ELANs use best-effort connections to connect to the BUS. For ELANs where BUS traff ic is heavy , better performance can be obtained by using reserved bandwidth connections to the BUS. The characteristics of the Multicast Send VCC between the LE client and the BUS can be controlled with TL Vs.
Address Registration LE clients register LAN destinations with the LES to ensure uniqueness and to allow the LES to answer LE_ARP_REQUEST s, which LE clients issue to learn the A TM address associated with a particular LAN destination.
This list is provided to help you clarify the A TM connections that are established between the LE client and the BUS: Multicast Send VCC (bidirectional point-to-point) From LE client to BUS Multicast Forward VCC (point-to-multipoint) From BUS to LE client BUS Functions The BUS has two basic functions: 1.
BUS processing requirements are increased and multicast frames must be transmitted twice (once on each Multicast Forward VCC). In general, IBUS operation is recommended; however , this option should be disabled in configurations that have source route bridges that join the ELAN as non-proxies.
v LE clients that include the proxy function to provide bridging support forward the broadcast frame on to other LAN segments. v All end stations receive and process every broadcast frame.
With BCM IPX enabled, any quiet device (that is, a device that does not transmit IPX advertisements) that needs to receive IPX advertisements has to be configured as a BCM static target. An example of such a device is a station running software that discovers the IPX network topology by monitoring IPX advertisements.
Note: Broadcast Manager and Source Route Management are unavailable and cannot be enabled if bus-mode is set to adapter . LAN Emulation Reliability A perceived lack of robustness has been one of the most widely proclaimed criticisms of LAN emulation.
The LECS retains a short-term memory of all client assignments so that it can alternately direct an LE client to a primary and backup LES. This simple heuristic makes the correct assignment in the nominal case of no failure and is self-correcting. At worst, the heuristic causes the LE client to repeat the configuration phase of joining an ELAN.
1. At the LECS, use A TM addresses to assign clients to the LES. See “Overview of the LECS Function” on page 260 for more information. 2. Activate the LECS Interface on the router . 3. Activate the security option of the LESs. 4. Activate LECS Access Controls for any A TM address prefixes that should not be allowed to access the LECS.
Chapter 21. Using A TM This chapter describes how to use the A TM interface. It includes the following sections: v “A TM and LAN Emulation” v “How to Enter Addresses” v “A TM-LLC Multiplexin.
This information applies to addresses entered for A TM; LAN emulation; Classical IP and ARP over A TM; and IPX and ARP over A TM. A TM-LLC Multiplexing Protocols that run natively over an A TM interface can use A TM-LLC multiplexing to share A TM addresses and both SVC and PVC channels between users.
interfaces that can be created depends on the data packet size for the interfaces and is limited to a maximum number of 253 per router . The use of A VIs significantly improves the configuration options for protocols such as IPX that are limited to one instance or address per A TM interface.
Note: Because all resources are shared among the ARI and all its A VIs, an ESI added on an ARI is automatically available to all A VIs configured on the ARI. Y ou should not assign the same ESI and selector combination to two different protocol clients using the same ARI even though they are configured on different A VIs.
Chapter 22. Configuring and Monitoring A TM This chapter describe the A TM interface configuration and operational commands. It includes the following sections: v “Accessing the A TM Interface Con.
A TM Configuration Commands This section summarizes the A TM configuration commands. Enter the commands at the ATM config> prompt. T able 35. A TM Configuration Command Summary Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available).
T able 36. A TM INTERF ACE Configuration Command Summary (continued) Command Function Remove Removes an ESI. Set Sets parameters of the A TM network. Disable Disables an ESI. Enable Enables an ESI. Exit Returns you to the previous command level. See “Exiting a Lower Level Environment” on page 1 1.
------------------------ ------- 000000000009 YES 000000000100 YES QoS Configuration Use the qos-configuration command to display the ATM I/F 0 QOS Config> prompt from which you can configure Quality of Service as described in “QoS Configuration”.
limit. The default value should be satisfactory in most situations. An example of a situation where it is beneficial to change this value would be if the majority of the stations use 25–Mbps adapters.
Each ESI can have up to 255 associated selectors (0x00 through 0xff). The range of selectors is partitioned into two subranges, a configured selector range and an automatically assigned selector range. The A TM interface parameter max-configured-selector gives the upper bound on the configured selector range.
Example: ATM INTERFACE> set max-mp-parties 300 trace Sets the packet tracing parameters on the interface. Packet tracing can be enabled or disabled on a range of VPI/VCI values. Common VPI/VCI values to trace are: v 0/5 for signalling packets v 0/16 for ILMI packets.
Default V alue: UNI 3.0 Note: Must be compatible with the A TM switch. Example: ATM INTERFACE> set uni-version 3.0 network-id Sets the network id of the A TM interface. Multiple A TM interfaces should have the same network id if there is A TM connectivity between the interfaces.
Accessing the V irtual A TM Interface Configuration Process From the ATM Config> prompt of a selected real A TM interface, use the Virtual A TM command to enter the Virtual A TM configuration command mode. A TM Virtual Interface Configuration Commands This section summarizes the A TM virtual interface configuration commands.
Remove Use the remove command to delete an A TM virtual interface. The virtual A TM interface on the real A TM interface with the specified interface number will be removed from the SRAM configuration records. If you do not specify an interface number , the last A TM virtual interface on this real A TM interface will be deleted.
Interface Displays the ATM Interface+ prompt, described in “A TM Interface Monitoring Commands (A TM INTERF ACE+ Prompt)”. Syntax: interface A TM-LLC Displays the ATM-LLC+ prompt, described in “A TM-LLC Monitoring Commands” on page 290.
ATM INTERFACE+ list addresses ATM Address Name ---------------------------------------- ------------------------------------- 3999999999999900009999020000041347391804 LEC 1 'eth1' 3999999999.
list Displays the current packet tracing options on the A TM interface. Example: ATM Interface+ trace on | off | list []? list Packet trace is ON Range of VPIs to be traced: 0 - 0 Range of VCIs to be traced: 32 - 39 on Starts packet tracing on all active VCCs within the specified VPI/VCI range.
stop Stops the wrap procedure and displays final wrap statistics. A TM-LLC Monitoring Commands This section explains the commands for monitoring A TM LLC multiplexing.
Chapter 23. Using LAN Emulation Clients This chapter describes LAN Emulation Clients (LECs). It includes the following sections: v “LAN Emulation Client Overview” LAN Emulation Client Overview On the router , LECs serve the purpose of “ports” or “interfaces” on traditional routers and bridges.
292 MRS V3.2 Software User ’s Guide.
Chapter 24. Configuring and Monitoring LAN Emulation Clients This chapter describes how to configure LAN Emulation Clients (LECs). It includes the following sections: v “Configuring LAN Emulation.
ethernet Ethernet emulated LAN Example: add ethernet LE Client Config> add ethernet Added Emulated LAN as interface 2 Config Use the config command to get you to the LEC Config> prompt, from which you can configure the details of a specific LAN Emulation Client.
Configuring an A TM Forum-Compliant LE Client This section explains the commands for configuring an A TM Forum-compliant LAN Emulation Client. Enter the appropriate commands at either the Ethernet Forum Compliant LEC Config> prompt or the Token Ring Forum Compliant LEC Config> prompt.
T able 43. A TM LAN Emulation Client ARP Configuration Commands Summary (continued) Command Function Remove Removes an ARP cache entry . Exit Returns you to the previous command level. See “Exiting a Lower Level Environment” on page 1 1. Add Use the add command to add an ARP cache entry using the MAC address or a route descriptor .
Syntax: set max-reserved-bandwidth traff ic-type peak-cell-rate sustained-cell-rate qos-class max-burst-size Example: ARP entry 'identifier' config> set ? MAX-RESERVED-BANDWIDTH TRAFFIC-T.
This function of the device is not changed whether source routing is enabled or disabled. The default setting is enabled. Some stations cannot properly receive frames with Source Routing RIF on them. This is especially common among NetW are drivers. Disabling source routing in this situation will allow you to communicate with these stations.
set arp-aging-time arp-cache-size arp-queue-depth arp-response-time auto-config best-effort-peakrate bus-connect-retries conn-completion-time control-timeout elan-name esi-address flush-timeout forw.
V alid V alues: An integer number of seconds in the range of 10 to 300. Default V alue: 300 Example: LEC Config> set arp-aging-time 200 arp-cache-size Sets the number of entries in the ARP cache. The size of the ARP cache limits the number of simultaneous data direct VCCs.
V alid V alues: If YES, then you do not have to configure the A TM address of the LES. If NO, then you must configure the A TM address of the LES using the set les-atm-address command as described on page 303. Default V alue: NO Example: LEC Config> set auto-config yes best-effort-peakrate Sets the Best Effort Peak Rate.
Default V alue: 4 Example: LEC Config> set connection-completion-time 5 control-timeout This parameter sets the maximum cumulative control timeout of a request.
flush-timeout Sets the flush timeout. This is the time limit to wait to receive the LE_FLUSH_RESPONSE after the LE_FLUSH_REQUEST has been sent before taking recovery action. During recovery , any queued frames are dropped and a new flush request is sent.
Default V alue: If the ELAN type is token ring, the default is 4544. If the ELAN type is Ethernet, the default is 1516. Example: LEC Config> set frame-size 4544 initial-control-timeout This parameter sets the value of the initial control timeout used in the control timeout algorithm described in 302.
different MAC address. If you have two clients that are bridged together , they should use different MAC addresses. This MAC address is registered with the LES when the client joins the ELAN. V alid V alues: Any valid MAC address. Default V alue: none Example: LEC Config> set mac-address Use adapter address for MAC? [No] MAC address []: 10.
If multicast-send-avg equals multicast-send-peak, then a constant bit rate (CBR) multicast send is signalled. Otherwise, a variable bit rate (VBR) multicast send is signalled.
Example: LEC Config> set reconfig-delay-min 5 reconfig-delay-max This parameter sets the maximum delay time when LEC returns to the initial state. This value must be ≥ reconfig-delay-min . V alid V alues: 1-1 0 Default V alue: 5 Example: LEC Config> set reconfig-delay-max 9 retry-count Sets the retry count.
a specific unicast MAC address or route descriptor that may be sent to the BUS within the time specified by the unknown-time parameter . Larger values decrease the number of discarded frames while increasing the load on the BUS. V alid V alues: An integer number of frames in the range of 1 to 255.
3 : Bridge Application 5 : CHARM ATM Adapter Network number [0]? 1 LEC+ The LEC monitoring prompt ( LEC+ ), is displayed. If you know the interface number of the LEC you wish to monitor , enter the network command followed by the interface number of the LEC.
statistics vcc-table arp Lists the LEC Address Resolution T able (entries in the ARP cache). Example: LEC+ list arp LEC Address Resolution (LE ARP Cache) Table Max Table Size = 10 Free Table Entries =.
configuration Lists the LEC configuration. For Ethernet: Example: IBM LEC+ list config ATM IBM LEC Configuration Physical ATM interface number = 0 LEC interface number = 7 Primary ATM address ESI ad.
lecMulticastSendType = 1 lecMulticastSendAvgRate = 365566 lecMulticastSendPeakRate = 365566 lecConnectionCompleteTimer = 4 lecInitialControlTimeout = 5 lecControlTimeoutMultiplier = 2 V2 Capable = TRU.
MIB Use the mib command to display MIB objects. Note: Some of this information may be displayed in a different format using the list command. Syntax: mib config-table mac-arp-table rd-arp-table server-vcc-table statistics-table status-table config Displays the LEC MIB Configuration T able.
lecMaxUnknownFrameTime Period in which LEC will send a maximum of MaxUnknownFrameCount frames to the BUS for a given unicast LAN Destination, and it must also initiate the address resolution protocol to resolve that LAN Destination.
lecConfigDirectVpi VPI which identifies the above VCC if it exists lecConfigDirectVci VCI which identifies the above VCC if it exists lecControlDirectInterface The interface associated with the Co.
lecControlFramesOut No. of Control Packets sent by this LEC lecControlFramesIn No. of Control Packets received by this LEC lecSvcFailures The total number of: v Outgoing LAN Emulation SVCs which this .
Chapter 25. Configuring Serial Line Interfaces This chapter describes the interface configuration process for a serial interface and includes the following sections: v “Accessing the Interface Configuration Process” v “Network Interfaces and the GWCON Interface Command” on page 318 IMPORT ANT : T o configure Frame Relay , PPP , X.
The other router will take on the DTE role in terms of clocking and should be configured as if it were attached to a modem or CSU/DSU Note: Configuring a DTE as opposed to a DCE cable has no impact on whether or not the W AN net handler takes on the peer device.
Chapter 26. Using the X.25 Network Interface The X.25 network interface connects a router to an X.25 virtual circuit switched network. The X.25 network interface software and hardware allows the router to communicate over a public X.25 network. The X.
9. T ype add protocol protocol_name to add the protocols that will be running over the X.25 interface. Y ou will be prompted for window size, default packet size, maximum packet size, circuit idle time, and max VCs. Note: Y ou need to add the protocols only once for all X.
T able 46. Set Command (continued) Parameter Default svc low inbound=0, high inbound=0 low 2-way=1, high 2-way=64 low outbound=0, high outbound=0 throughput-class .
T able 48. National Set Parameters (continued) Paramter DDN Default GTE Default collision-timer 10 seconds 10 seconds standard-version 1984 1984 t1-timer 4 seconds 4 seconds t2-timer 00 truncate-called-addr-size 22 X.25 Support Over ISDN BRI D-Channel (X.
Configure CUG using the add address. The CUG(s) defined must be the same for each protocol defined at the same address. If the CUG is defined at the add protocol level, The CUG(s) must be the same for all peers. (This method is more restrictive). Configure CUG at the interface level.
Understanding Closed User Groups A closed user group (CUG) is a group of X.25 DTEs allowed to establish connections with other specific DTEs. CUG numbers are defined by your network provider and you can only use the CUGs the provider assigns you.
T able 49. Establishing Incoming X.25 Circuits for Closed User Groups Incoming Call Request Contains Receiving DTE CUG Definition Interface CUG Only Protocol CUG Only Address Specific CUG Interface .
Note: Y ou should only configure these CUGs if you are restricting all X.25 circuits established over the X.25 interface to DTEs belonging to this set of unique CUGs or BCUGs unless uyou override it with an address or protocol-specific CUG. Using the X.
Chapter 27. Configuring and Monitoring the X.25 Network Interface This chapter describes the X.25 configuration and operational commands and includes the following sections: v “X.25 Configuration Commands” v “Accessing the Interface Monitoring Process” on page 353 v “X.
Set Use the set command to configure local X.25 node addresses, maximum number of calls, frame and packet level window size, lowest to highest PVC and SVC channels, and the idle time for a switched circuit. Syntax: set addres s... cable calls-ou t...
V alid V alues: 1t o2 3 9 Default V alue: 4 clocking external or internal T o connect to a modem or DSU, configure clocking as external. T o connect directly to another DTE device, use a DCE cable, set the clocking to internal, and configure the line speed.
– An X.25 serial line having a packet size of 128 with a window size of 7 and a bit rate of 9600 bps – An Ethernet LAN with a packet size of 1500 In this case, you should probably set the X.25 MTU to 1500. That means that about 12 packets will be sent over the X.
svc low/high inbound or two-way or outbound value Defines the lowest to the highest switched virtual circuit channel number . When low=high=0, no VCs in this category are defined. Example: set SVC low-two-way 1 Inbound Specifies the range of logical channel numbers to be assigned to inbound SVCs.
Enable Use the enable command to enable DDN address translations, interface resets, or the incoming-calls-barred, outgoing-calls-barred, and lower-dtr features. Syntax: enable ddn—address-translations Note: Enabling ddn-address-translations is no longer allowed.
Note: If you set DDN as the national personality , DDN address translation is enabled automatically and this parameter has no effect. Syntax: disable ddn-address-translations Note: Disabling ddn-address-translations is no longer allowed.
bi-cug Enables the bilateral closed user group facility on this device. By default, this facility is disabled. Note: Y ou cannot add any bilateral CUGs unless this parameter is enabled. bi-cug-outgoing-access Enables the bilateral CUG with outgoing access facility on this device.
DDN Default off GTE Default off request-reverse-charges Requests reverse charges for all outgoing calls. DDN Default off GTE Default on suppress-calling-address Suppresses the source address in call packets. DDN Default off GTE Default off throughput-class-negotiation Enables the registration of throughput class.
flow-control-negotiation frame-ext-seq-mode packet-ext-seq-mode request-reverse-charges suppress-calling-addresses throughput-class-negotiation truncate-called-addresses National Set Use the national set command to set one or all of the default values made to the National Personality configuration.
Retries Number of clear request transmissions permitted before action is taken. In a list command output, this is displayed as the r23 retry count. DDN Default retries=1 GTE Default retries=1 Timer Number of 10–second intervals to wait before retransmitting a clear request packet.
GTE Default 20 packet-size default or maximum or window Specifies the size of the packet. default Number of bytes in the data portion of the packet. Possible options include 128, 256, 512, 1024, 2048, and 4096. This value is used in the absence of packet size negotiation.
restart retries or timer Specifies the number of restart request transmissions. retries Number of restart request transmissions permitted before the interface is recycled. The range is 0 to 255. In a list command output, this is displayed as the r20 retry count.
t1-timer Specifies the frame retransmit time in seconds. The range is 1 to 255. DDN Default 4 seconds GTE Default 4 seconds t2-timer Specifies the amount of time in seconds to delay before acknowledging an I-frame. This is an optimization parameter .
frame-ext-seq-mode frame-window-size min-collission-timer min-connect-timer min-recall-timer network-typ e... n2-timeouts packet-siz e... packet-ext-seq-mode request-reverse-charges rese t.
an X.25 remote address to dial out and an optional incoming remote address for call ID. IF only remote called address is entered, then this address will be used for outgoing calls and incoming call verification. Example: add address IP example: Protocol [IP]? IP IP Address [0.
pref cug Specifies the preferred closed user group number for this DTE. The DTE uses this CUG when placing outgoing calls. V alid values: 0 to 9999 Default value: None Note: Y ou will not be prompted for this value if you have not enabled the closed user group facility using the national enable command.
pref cug Specifies the preferred closed user group number for this DTE. This DTE uses this CUG when placing outgoing calls. V alid values: 0 to 9999 Default value: None Note: Y ou will not be prompted for this value if you have not enabled the closed user group facility using the national enable command.
Note: Y ou will not be prompted for this value if you have not enabled the bilateral closed user group facility using the national enable command. htf-address Adds a Defense Data Network (DDN) X.25 address translation. Example: add htf-address Protocol [IP] Convert HTF address Protocol Specifies the protocol that you are running over the X.
of packets that can be outstanding before requiring packet confirmation. The default is 2. The window size can be negotiated down to 1 by the called DTE. Related configuration parameters are: v Set Default Window Default Packet Size Specifies the default requested packet size for SVCs.
Request Reverse Charges Allows this protocol to override the setting of this National Personality parameter . This does not af fect the National Personality parameter .
configured for this parameter is 4096 bytes. The maximum for X.31 is 256 bytes. This value is utilized in calculating the maximum frame size for this X.25 interface. Related configuration parameters are: v Nat Set Packet Size Default v Nat Set Packet Size Maximum Change Use the change command to change an X.
Default Packet Size [128] Maximum Packet Size [256] Circuit Idle Time [30] Maximum VCs [6] QLLC example: X.25 Config> change prot Protocol [IP]? dls Idle Timer [30]? QLLC response timer (in decasec.
bi-cugs Deletes a bilateral closed user group number used by this interface. V alid values: Y Deletes the current CUG. N Does not delete the current CUG.
Example: list address IF# Prot # Active Enc Protocol -> X.25 address 1 0(IP) CC 10.1.2.3 -> 1238765742 1 7(IPX) SNAP 10 -> 12389 CUGS: 11 12 13 14 15 BI-CUGS: 21 22 all Lists all the X.25 addresses, National Personality parameters, all defined protocols and their values, and all defined PVCs.
detailed Lists the value of all the default parameters that the national set command modifies. Descriptions of the screen display are listed in the national set command described later in this chapter .
Example: list summary X.25 Configuration Summary Node Address: 313131 Max Calls Out: 4 Inter-Frame Delay: 0 Encoding: NRZ Speed: 64000 Clocking: Internal MTU: 2048 Cable: V.
T able 52. X.25 Monitoring Command Summary (continued) Monitoring Command Function List Lists individual PVC or SVC statistics and general information. Parameters Displays the current parameters for any level of the X.25 configuration. Statistics Displays the current statistics for any level of the X.
Example: parameters packet Packet Layer Parameters: Default Packet Size = 128 Maximum Packet Size = 256 Log 2 Packet size = 2 Acknowledge Delay = 0 Layer Enabled = YES Default Window Size = 2 Lowest S.
Example: statistics packet Packet Counters: Received Transmitted Call Request 0 0 Call Accepted 0 0 Clear Request 0 0 Clear Confirm 0 0 Interrupt Request 0 0 Interrupt Confirm 0 0 RR Packet 0 0 RNR Pa.
Buffers Queued 0 0 Invalid Packets Received = 0 Switched Circuits Opened = 0 Frame Layer Counters: Received Transmitted Information Frames 0 0 X.25 Physical Layer Counters: Rx Bytes 0 Tx Bytes 0 Adapter cable: Generic DTE RISC Microcode Revision: 2 V.
Invalid Packets Received Displays the number of invalid X.25 packets received from the network. Switched Circuits Open Displays the number of switched circuits currently open. Frame Layer Counters Provides statistics generated from Frame Layer counters.
Missed frame When a frame arrives at the device and there is no buffer available, the hardware drops the frame and increments the missed frame counter . L & F bits not set On serial interfaces, the hardware sets input-descriptor information for arriving frames.
Configuring the X.25 Network Interface 360 MRS V3.2 Software User ’s Guide.
Chapter 28. Using XTP This chapter describes the X.25 T ransport Protocol (XTP) for transporting X.25 traff ic over TCP/IP . Included are the following sections: v “The X.
Configuration Information X.25 recognizes an incoming call for XTP based on the node addresses configured for XTP . Therefore, in order to transport X.25 traff ic between the X.25 nodes, you must configure X.25 to map to the data terminal equipment (DTE) address and IP addresses of the routers to which the nodes are connected.
v Remote DTEs v PVCs v CUGs Local DTEs X.25 nodes connected to the X.25 interfaces on the router T o configure local DTEs, use the X.121 address that is assigned to the local DTE.
or “*”. The special case of a DTE address of “*” represents any DTE address, even a null address. The null address is useful for handling incoming calls with no calling address in the X.
This causes the search for the remote DTE to proceed to the next router in the peer router list. If a pass through the list of peer routers is completed without a successful connection through any of the peer routers, the call to the local DTE is cleared.
Configuring XTP XTP is a protocol forwarder used to transport X.25 traf fic over TCP/IP . XTP allows existing X.25 devices to communicate over a TCP/IP backbone and migrate from an X.25 network to a network of your choice. Configuration Procedures This section defines the detail for configuring the network displayed in Figure 20.
v Set the Internal IP address v Configure XTP Note: New configurations do not take effect until you restart the router . Setting the Data Link The data link defines the protocol you are using to send data packets over the network. Define the data link between the router you are configuring and each serial interface.
4. Enter set clocking followed by internal or external based on your router type. X.25 Config> set clocking internal 5. Enter set speed followed by the access rate (line speed). X.25 Config> set speed Access rate in bps [9600]? 19200 6. Enter set equipment-type and specify whether the frame and packet levels act as DCE or DTE.
Setting the National Personality Each X.25 public network has its own standard configuration. The National Personality refers to a group of 28 variables that define the characteristics of the public data network. These variables provide the router with control information for packets transferred over the link and influence the X.
Implement the following steps to configure XTP for the router: 1. T o access the XTP config> prompt, enter protocol xtp at the Config> prompt. 2.
XTP config> add remote-dte DTE address [ ]? 402 Peer router's internal IP Address [0.0.0.0]? 128.185.100.3 Peer router's internal IP Address [0.0.0.0]? XTP config> add remote-dte DTE address [ ]? 403 Peer router's internal IP Address [0.
Config> protocol xtp XTP config> add local-dte Interface number [0]? 1 Allow inbound calls without calling DTE address? (Y or N) [N]? n DTE address [ ]? 301 DTE address [ ]? XTP config> add peer-router Router's IP address? 128.185.100.1 XTP config> add remote-dte DTE address [ ]? 101 Peer router's internal IP Address ]0.
XTP Config> add peer-router Router's IP address? 128.185.100.1 XTP config> add remote-dte DTE address [ ]? 201 Peer router's internal IP Address [0.0.0.0]? 128.185.100.1 Peer router's internal IP Address [0.0.0.0]? XTP config> exit Config> Using XTP Chapter 28.
Using XTP 374 MRS V3.2 Software User ’s Guide.
Chapter 29. Configuring and Monitoring XTP This chapter describe the XTP configuring and monitoring commands. It includes the following sections: v “XTP Configuring Commands” v “XTP Monitoring Commands” on page 382 XTP Configuring Commands This section describes the XTP configuring commands.
remote-dte pvc cug Specifies the closed user group numbers for the XTP protocol. The first CUG you are prompted for is the preferred cug. V alid values: 0 to 9999 Default value: None Example: add cug Pref CUG []? 114 CUG (2) []? 314 CUG (3) []? 478 CUG (4) []? bi-cug Specifies the bilateral closed user group numbers for the XTP protocol.
Example: add peer-router Router's internal IP Address [0.0.0.0]? 128.185.100.2 Connection setup timeout [230]? remote-dte Adds remote X.25 nodes and corresponding routers. Y ou can connect remote nodes with local X.25 nodes so they can exchange data.
Remote X.25 DTE address [ ]? 108 3. A PVC range can be defined through the PVC range start and PVC range end parameters. The same number of circuits must be defined in the local PVC range as in the remote PVC range. For example, if one circuit is defined in the local PVC range, one circuit must be defined in the remote PVC range.
remote-dte pvc bi-cug Deletes a bilateral closed user group number used by this interface. V alid values: Y Deletes the current CUG. N Does not delete the current CUG.
Enable Activates the XTP forwarder . Syntax: enable-xtp Example: enable-xtp Disable Deactivates the XTP forwarder . Syntax: disable-xtp Example: disable-xtp Set Sets the XTP Keepalive Timer . Syntax: keep-alive-timer Example: set keep-alive-timer Keepalive timer in seconds [10]? 60 List Lists the interfaces, peer routers, remote DTEs, or PVCs.
4 33333 Calling DTE address is optional Pref CUG : 1 Other s:2345 Pref BI-CUG : 6 Other s:7891 0 Peer Routers Connection Timeout Remote DTEs: DTE Address Peer Router(s) PVCs: Local PVC Local DTE Remot.
XTP Monitoring Commands This section describes the XTP monitoring commands. These commands allow you to display the current active interfaces, peer routers, remote DTE, PVCs and SVCs. They also allow you to dynamically add or delete interfaces, DTEs, or peer routers.
Delete Deletes a local DTE, peer router , or remote DTE from the router configuration. Syntax: delete local-dtes peer-router remote-dtes local-dtes Deletes a local interface from the XTP configuration.
list all STATUS: XTP-ENABLED KEEP-ALIVE TIMER = 20 seconds LIST OF LOCAL DTES ------------------ Interface Local No DTE 1 101 Calling DTE address is required 2 201 Calling DTE address is required LIST OF PEER ROUTERS -------------------- Router CNN Number Received Sent State of Ckts Pkts Bytes Pkts Bytes 128.
No DTE 1 101 Calling DTE address is required 2 201 Calling DTE address is required peer-routers Displays all the peer routers configured for XTP . Example: list peer-routers LIST OF PEER ROUTERS -------------------- Router CNN Number Received Sent State of Ckts Pkts Bytes Pkts Bytes 128.
list svcs LIST OF SVCS ------------ Index Int LOG SVC Local Remote Peer No No Chan State DTE DTE Router 1 1 Active 200 401 3.3.3.3 2 1 Active 200 402 3.3.3.3 3 2 Active 200 403 3.3.3.3 4 2 Active 200 404 3.3.3.3 svc-detailed Displays information for specific SVC definitions.
Chapter 30. Using Frame Relay Interfaces This chapter describes how to use the Frame Relay interface and includes the following sections: v “Frame Relay Overview” v “Frame Relay Network Manageme.
Frame Relay Network The FR network consists of the FR backbone (consisting of FR switches provided by the FR carrier) providing the FR service. The router functions as the FR connection device. The router encapsulates FR frames and routes them through the network based on a Data Link Connection Identifier (DLCI).
v Preserves the ordering of frame transfer on individual VCs v Does not acknowledge or retransmit frames Frame Relay Switched V irtual Circuits Frame Relay Switched Virtual Circuits (SVCs) provide the ability to implement ″ cut-through ″ routing in a Frame Relay network, minimizing or eliminating intermediate router hops between DTEs.
end-to-end PVC connection is not established. Router B receives an inactive status for that PVC. When the LMI and SVCsare disabled, the FR interface is running on a serial line and a DTE cable is being used, the FR protocol asserts the DTR and RTS modem control signals.
By enabling orphan circuits, you allow the router to forward packets over circuits you did not configure. Packets that would normally be dropped are now forwarded. An orphan switched virtual circuit is an SVC that is not configured for your router but is created when a call-in is received for it.
If multiple PVCs are required and are not in a PVC group, the interface is not activated until all required PVCs are active. If a required PVC belongs to a PVC group, the Frame Relay interface becomes inactive when all PVCs in the PVC group are inactive.
Command/Response (C/R) This field’s use is not defined within the Frame-Relay standards and the field is passed transparently across the network. Extended Address This version of FR does not support extended addressing.
Frame Forwarding over the Frame Relay Network When the FR protocol receives a packet for encapsulation, it compares the packet’s network address to the entries in the Address resolution Protocol (ARP) cache.
Multicast can also be enabled or disabled for an individual SVC. Use the multicast option on add switched-virtual-circuit . Frame Relay Network Management The supplier of the FR network backbone provides FR network management.
The PVC status information element contains the following information: the local DLCI number for the particular PVC; the state of the PVC (active or inactive); and whether the PVC is new or an existing PVC that management already knows about.
switched-virtual-circuit configuration command. Y ou can also dynamically change the CIR with the set circuit console command. Y ou can also set the default CIR for all Frame Relay circuits on this interface using the set CIR-defaults command. Some Frame Relay switches allow a value of 0 to be configured for CIR.
The network delivers this excess data with a lower probability of success than committed burst size data. Set the Be to a value greater than zero only if you are willing to accept the risk of discarded data and its effect on higher-layer protocol performance.
If the CIR monitoring feature is not enabled the maximum information rate is equal to the line speed. V ariable Information Rate The variable information rate (VIR) ranges from the configured minimum IR to the calculated maximum IR when the CIR monitoring or congestion monitoring features are enabled.
monitoring. Y ou can also dynamically enable and disable CIR monitoring using the enable cir-monitor and disable cir-monitor console commands. Congestion Monitoring Congestion monitoring is an optional feature, set per interface, that allows the VIR of VCs to vary in response to network congestion.
for all VCs to relieve congestion. Enabling the throttle-transmit-on-fecn parameter , along with either the CIR or congestion monitoring options, causes the device to treat a FECN like a BECN thus reducing overall FR network congestion when any congestion notification is received.
v A long-term condition, the Frame Relay protocol will set the transmit rate for the affected PVCs to the calculated minimum information rate. v Facility or equipment failure or maintenance action, or.
v Configure FR destination addresses. If you are running a protocol such as IP or IPX over the FR interface, and are interconnecting with devices not supporting the Address Resolution Protocol (ARP) or Inverse ARP on FR, use the add protocol-address command to add the static protocol and address mapping.
Enabling Frame Relay SVC Management Frame Relay SVC management is automatically enabled when SVCs are enabled. Using Frame Relay 404 MRS V3.2 Software User ’s Guide | | |.
Chapter 31. Configuring and Monitoring Frame Relay Interfaces This chapter describes the Frame Relay configuration and operational commands and includes the following sections: v “Frame Relay Con.
Add Use the add command to add a PVC, Required PVC group, or destination protocol address supported by the Frame Relay interface. Syntax: add permanent-virtual-circui t... protocol-addres s... pvc-grou p... switched-virtual-circui t... permanent-virtual-circuit Adds a PVC to the Frame Relay interface beyond the reserved range 0 through 15.
Notes: 1. If CIR is configured as 0 then the committed burst size is set to 0 and you are not prompted for a value. For additional information, see “Committed Burst (Bc) Size” on page 397.
nor ARP is an option, or for other reasons such as security . Adding protocol name and address mappings (static ARP) is less eff icient than Inverse ARP or ARP . v Inverse ARP is the preferred, ef ficient method because of dynamic address mapping with no broadcasts.
Node Number Defines the node number of the interface attached to the remote AppleT alk host. Node address Defines the DECnet node address of the remote DECnet host. Configure the node address in the format x . y , where x is a 6-bit area address and y is a 10-bit node number .
Remote party numbering plan Specifies the format of the remote party number . The numbering plan must match that used by the FR network. V alid V alues : E.164 (ISDN) or X.121 (Data) Default V alue : E.164 Remote party number type Specifies the destination Frame Relay party number type.
Default V alue : Default value is determined according to CIR-defaults at the interface level Requested incoming CIR Specifies the requested incoming CIR.
Establish circuit to learn remote protocol addresses Specifies whether this SVC should be established when the interface comes up to learn the protocol addresses of the adjacent node.
Example: change permanent-virtual-circuit Circuit Number [16]? Committed Information Rate in bps [64000]? Committed Burst Size (Bc) in bits [64000]? Excess Burst Size (Be) in bits [0]? Assign Circuit .
switched-virtual-circuits throttle-transmit-on-fecn cir-monitor Disabling this feature allows the circuit’s information rate to exceed the maximum information rate that is calculated using the parameters configured with the add permanent-virtual-circuit or add switched-virtual-circuit command.
multicast-emulation Disables multicast emulation on each active VC. The default setting for this feature is enabled. If you disable this feature, you are required to add protocol static address maps. Some protocols, such as IPX RIP , will not function on the Frame Relay interface if multicast-emulation is disabled.
notify-fecn-source no-pvc orphan-circuits protocol-broadcast switched-virtual-circuits throttle-transmit-on-fecn cir-monitor Enables the circuit monitoring feature.
congestion-monitor Enables the congestion monitoring feature. This feature allows a circuit’ s information rate to vary in response to congestion between the minimum information rate and the line speed. Note: The circuit monitoring feature overrides the congestion monitoring feature if there is a conflict when both are enabled.
modem dials a stored number to the backup site. When the primary interface is restored, the alternate interface is disabled, DTR is lowered, and the modem hangs up the dial connection. The following cable types are supported: EIA 232 (RS-232) V .35 V .
Local party number type (Unknown or International) [International]? Are call-ins allowed on this interface [Y]? Call-out redial attempts [2]? Network emulation mode [N]? Local party number Specifies the destination’s Frame Relay address.
pvc-groups switched-virtual-circuits all Displays the Frame Relay configuration. The display is a combination of the list hdlc, the list lmi , and the list permanent virtual circuits commands. See list hdlc and list lmi for descriptions of the parameters.
LMI type = ANSI LMI Orphans OK = Yes CLLM enabled = Yes Timer Ty seconds = 10 SVC network number = 4141990 SVC Number type = International SVC Numbering plan = E.
Protocol Broadcast Indicates whether protocols such as IP RIP can function over the Frame Relay interface, yes or no. Emulate multicast Indicates whether the multicast emulation feature is enabled on each active PVC, yes or no.
LMI N2 error threshold Indicates the number of management event errors occurring within the N3 window that will cause a reset of the Frame Relay interface. LMI N3 error threshold window Indicates the number of monitored management events used to measure the N2 error threshold.
Circuit Name Indicates the ASCII designation of the configured PVC. Circuit Number Indicates the DLCI of a currently configured PVC. Circuit T ype Indicates the type of virtual circuit currently configured. This release of Frame Relay only supports permanent virtual circuits.
circ01 ILM 60 CIR: 64000 64000 Remote party number: IE12345 Min CIR: 64000 64000 Remote subaddress: None Burst: 64000 64000 Excess: 0 0 svc01 ILM 60 CIR: 64000 64000 Remote party number: IE12345 Min C.
Syntax: llc Remove Use the remove command to delete any PVC, Required PVC group, or protocol-address previously added using the add command. Syntax: remove permanent-virtual-circui t... protocol-address pvc-group switched-virtual-circuit circuit-name permanent-virtual-circuit pvc# Deletes any configured PVC in the range 16 to 1007.
Protocol name or number Defines the name or number of the protocol that you are deleting. If you try to delete an unsupported protocol the system will display the error message: Unknown protocol name, try again T o see a list of supported protocols, type ? at the Protocol name or number [IP]? prompt.
For the status of the network to be considered network up , the number of events in error within the window must be less than n2 prior to any change in status. Syntax: set cable* cir-defaults clocking* encoding* frame-size i d l e... * ir-adjustmen t.
V alid V alues: See “Committed Burst (Bc) Size” on page 397 Default V alue: 64 000 be Sets the default value of be to the value provided by a Frame Relay network provider .
APPN 58 bytes (see note) Note: Assumes worst case for APPN BAN where a T/R MAC address header and LLC header are added in addition to the FR header bytes.
If you want to use a line speed greater than 2048000, you can only do this on: v interface 1. v port 1 of a 4-port W AN concentration adapter . v ports 1 and 5 of an 8-port W AN concentration adapter . The other W AN ports must be clocked at 64 Kbps or less.
line hello packets between the lines. # is between 0 and 15 extra flags. The default is zero (0). Setting this parameter provides 0 to 15 extra flags between transmit frames. T able 59 lists the units and range values for serial interfaces. T able 59.
T able 60. Frame Relay Monitoring Commands Summary (continued) Command Function T race Enables packet tracing capability for individual circuits or for the entire interface. Exit Returns you to the previous command level. See “Exiting a Lower Level Environment” on page 1 1.
List Use the list command to display statistics specific to the data-link layer and the Frame Relay interface. Syntax: list all circui t... lmi permanent-virtual-circuits pvc-groups switched-virtual-circuit svcs virtual-circuits all Displays circuit, management, and VC statistics on the Frame Relay interface.
Frames/Bytes transmitted Indicates how many frames and bytes this VC has transmitted. Frames/Bytes received Indicates how many frames and bytes this VC has received. T otal FECNS Indicates the number of times that this VC has been notified of inbound or downstream congestion.
R-Rs received Indicates the number of Reset-Request packets sent by the peer decompressor . A peer decompressor sends a Reset-Request whenever the peer detects that it is out of synch with its peer compressor . If this number increases rapidly , packets are being lost or corrupted on this circuit.
FR. These frames are waiting for space to become available on the serial device handler transmit queue for this interface. Xmit frames dropped due to queue overflow Indicates the number of frames that could not be transmitted for this VC due to output queue overflow .
Timer T y seconds Indicates the value of the CLLM T y timer . This field is only displayed if CLLM is enabled. Last CLLM cause code Indicates the congestion cause code given in the last CLLM message received or None if no CLLM messages have been received.
LMI N2 error threshold Indicates the number of management event errors occurring within the N3 window that will cause a reset of the Frame Relay interface. LMI N3 error threshold window Indicates the number of monitored management events used to measure the N2 error threshold.
Data compression enabled Indicates whether data compression is enabled on this interface. Orphan compression Indicates whether orphan circuits on this interface will have data compression enabled. Note: Enabling compression on orphan circuits will decrease the number of available compression contexts available for the native VCs on the device.
18 Boston No &#P/A 0 0 19 Orlando No *P/A 0 0 20 Port Royal No $P/A 0 0 21 New York No @P/A 2 0 A - Active I - Inactive R - Removed P - Permanent C - Congested * - Required # - Required and belong.
-------------------------------- ----- ------ ---------- ---------- flotsam ILM 60 CIR: 0 0 Call state: Null Burst: 0 0 Call Initiated by: None DLCI: 0 Excess: 0 0 Remote party number: IE911 Remote su.
Example: notrace 16 Disables packet tracing on circuit (PVC or SVC) with DLCI 16. notrace circuit phoenix Disables packet tracing on circuit (PVC or SVC) named phoenix.
information, see “Excess Burst (Be) Size” on page 397. ir-adjustment increment-% decrement-% minimum-IR Sets the minimum information rate (IR) and the percentages for incrementing and decrementing the IR in response to network congestion. The minimum IR, expressed as a percentage of CIR, is the lower limit of the information rate.
Frame Relay Interfaces and the GWCON Interface Command While Frame Relay interfaces have a monitoring process for monitoring purposes, the router also displays complete statistics for installed interfaces when you use the interface command from the GWCON environment.
Maintenance Failed Indicates the total number of times the interface was unable to communicate with Frame Relay management. V .24 circuit, Nicknames, and State The circuits, control signals, pin assignments and their state (ON or OFF). Note: The symbo l---i n monitoring output indicates that the value or state is unknown.
Output aborts sent The number of transmissions that were aborted as requested by upper-level software. Statistics similar to the following are displayed for Frame Relay dial circuits when you execute .
Monitoring Frame Relay Interfaces 448 MRS V3.2 Software User ’s Guide.
Chapter 32. Using Point-to-Point Protocol Interfaces This chapter describes how to use the Point-to-Point Protocol for interfaces on the device. Sections in this chapter include: v “PPP Overview” .
PPP currently supports the following control protocols: v AppleT alk Control Protocol (A TCP) v DECnet Protocol Control Protocol (DNCP) v Banyan VINES Control Protocol (BVCP) v Bridging protocols (BCP.
Flag Fields The flag field begins and ends each frame with a unique pattern of 0 111111 0 . Generally a single flag ends one frame and begins the next. The receiver attached to the link continuously search for the flag sequence to synchronize the start of the next frame.
1. Before exchanging any network layer datagrams, PPP first opens the connection through an exchange of LCP configuration packets. As part of this negotiation process, the PPP processes at each end .
LCP Packets LCP packets are used to establish and manage a PPP link and can be loosely divided into three categories: v Link establishment packets that exchange configuration information and establish the link. v Link termination packets that shut down the link or signal that a link is not accepting connections at a particular time.
establishment type packets that LCP defines. They may implement some of the additional LCP packet types, and they also may define additional packet types beyond what LCP uses. Unlike LCP packets, the structure of an NCP frame may be modified according to options negotiated by LCP during the link establishment phase.
Protocol-Reject LCP packet code field is set to 8. The transmission of this packet type indicates that a PPP frame has been received that contains an unsupported or unknown protocol (the PPP “protocol” field was unrecognized for some packet).
There are different authentication protocols in use: Password Authentication Protocol (P AP) and Challenge/Handshake Authentication Protocol (CHAP). Microsoft PPP CHAP (MS-CHAP) is also available to authenticate Windows workstations and peer routers. P AP and CHAP are described in detail in RFC 1334, and briefly described later in this section.
Challenge-Handshake Authentication Protocol (CHAP) The Challenge-Handshake Authentication Protocol (CHAP) is used to periodically verify the identity of the peer using a three-way handshake. This is done upon initial link establishment, and may be repeated anytime after the link has been established.
Configuring PPP Authentication The following sections describe configuring PPP authentications for two situations: v Configuring the 2210 to authenticate a remote device. v Configuring the 2210 to be authenticated by a remote device. These two situations are independent.
Attention: Do not use the following commands unless you want the device to perform authentication as described in “Using Local or Remote Authentication” in Using and Configuring Features . v enable pap v enable chap v enable spap Note: SP AP is only available on interfaces that have IBM DIALs Dial-In circuits configured.
PPP User Name: no callback Type: Single User User IP Address: Interface Default SubNetMask: 255.255.255.255 Hostname: <undefined> Time-Alotted: Box Default Call-Back Type: Not Enabled Dial-Out: .
v APPN Intermediate Session Routing Control Protocol (APPN ISRCP) AppleT alk Control Protocol A TCP is specified in Request for Comments (RFC) 1378. IBM’ s implementation of A TCP supports the AppleT alk-Address option. The implementation supports both full router mode and half router mode.
IP Control Protocol IPCP is specified in RFC 1332. IBM’ s implementation supports the following options: v V an Jacobsen IP Header Compression as described in RFC 1 144. v IP Address The router can send its IP address, as well as accept an IP address, from a peer , or supply an IP address to a peer , if requested.
The router automatically adds a static route directed to the PPP interface for the address that is successfully negotiated, allowing data to be routed properly to the dial-in client. When the IPv6CP connection is ended for any reason, this static route is subsequently removed.
v The client configuration controls the suspension and resumption of a VC. The DIALs server cannot control that aspect of the connection. v A VC can be established through an MP bundle. v VCs cannot run over L2TP . v Suspended VCs cannot be displayed with current network management tools.
Chapter 33. Configuring and Monitoring Point-to-Point Protocol Interfaces This chapter describes Point-to-Point Protocol interface configuration and operational commands in the device.
Accessing the PPP Interface Configuration Prompt T o display the PPP config> prompt: 1. Enter list devices at the Config> prompt to display a list of interfaces. 2. If you have not already done so, set the data link protocol on one of the serial interfaces to PPP by entering set data-link ppp at the Config> prompt.
pap spap ccp Disables the use of data compression on the interface. Refer to “Using the Data Compression Subsystem” in the Using and Configuring Features for more information. chap Disables the use of the Challenge-Handshake Authentication Protocol.
1. MS-CHAP 2. SP AP 3. CHAP 4. P AP Syntax: enable ccp chap dials ecp lower-dtr mp mppe mschap pap spap ccp Enables the use of data compression on the interface. chap Enables the use of the Challenge-Handshake Authentication Protocol. Y ou are prompted for a rechallenge interval.
If Lower DTR is set to “enabled”, then the DTR signal will be dropped when the interface is disabled. This behavior may be desirable in situations where the interface has been configured as an al.
Use the set name command to configure the name of the 2210 if the peer router is configured to authenticate the 2210’s local name. Note: MS-CHAP is not supported on 4M V2L models.
ecp Displays the current Encryption Control Protocol state. Example: list ecp ECP Options ----------- Data Encryption enabled Algorithm list: DESE-CBC DESE (Data Encryption Standard Encryption Protocol) Data Encryption Enabled/Disabled Indicates whether data encryption is enabled or disabled on interface.
ipcp Lists the Internet Protocol control protocol options. Example: list ipcp IPCP Options ------------ IPCP Compression: None Send Our IP Address: Yes Remote IP Address to Offer if Requested: 10.0.0.3 IPCP compression Indicates whether the PPP handler accepts compressed IP headers.
Example: PPP 7 Config>list lcp LCP Parameters -------------- Config Request Tries: 20 Config Nak Tries: 10 Terminate Tries: 10 Retry Timer: 3000 LCP Options ----------- Max Receive Unit: 1522 Magi.
list ncp NCP Parameters --------------- Config Request Tries: 20 Config Nak Tries: 10 Terminate Tries: 10 Retry Timer: 3000 Config Request T ries: Number of times NCP sends configure-request packets to a peer station while attempting to open a PPP link.
ncp... bcp Sets the Bridging Control Protocol (BCP) parameters. Example: set bcp TINYGRAM COMPRESSION [no]: Tinygram Compression Specifies whether or not T inygram Compression is used. This option is useful for protocols that are prone to problems when bridged over low-speed (64 Kbps and below) lines.
Note: Failure to detect a bad packet can cause all subsequent data to be decompressed incorrectly . This option sets the exact form of check value used. Choose one of the following: 0 None: No check value is used. Without a check value, there is no way to determine that a packet has been lost, out-of-sequence, or corrupted.
ST AC-LZS The ST AC-LZS algorithm as described in RFC 1974 MPPC The Microsoft Point-to-Point Compression algorithm as described in RFC 21 18. Example: set ccp protocols Enter a prioritized list of enabled compressors (first is preferred), all on one single line.
hdlc speed value For internal clocking, this command specifies the speed of the transmit and receive clock lines. The range is 2400 to 2 048 000 bps. For external clocking, this command does not affect the hardware but it sets the speed of some protocols, such as IPX, used to determine the routing parameters.
ipv6cp Sets the IPv6 Control Protocol option for the link. Example: set ipv6cp Send Our IP address [no]: Send Our IP address Specifies whether or not to send the local IPv6 address to the remote end of the link. Set this option to yes if the other end of the link requires the IPv6 address.
Specify a 32-bit bit mask in hexadecimal. If a bit in position ’N’ of the mask is set, the corresponding ASCII character ’N’ must be escaped (the LSB is bit number 0, corresponding to the ASCII NUL character). The default value for this option is ’0A0000’, indicating that XON and XOFF (control-Q and control-S) need to be escaped.
PPP protocol values are all assigned such that the upper byte of the protocol is an even value and the lower byte is an odd value (a limited use of the more generalized mechanism described by the ISO 3309 extension mechanism for address fields).
Notes: 1. While the “case” that you use for names and passwords sent to the peer on the link are preserved for this product, interoperability with other vendor products is easier if all names and passwords are entered in lowercase. 2. Other implementations may not handle names with the same maximum length as supported in this product.
T erminate tries Sets the number of terminate-request packets sent by NCP to a peer station to close a PPP link. The range is 1 to 100. The default value is 10. This action indicates the desire to close an NCP connection. The retry timer is started after a terminate-request packet is transmitted.
List Use the list command to display information and counters related to the point-to-point interface and PPP parameters and options. Syntax: list all cbcp callback cp control errors interface lcp - P.
bvcp - Banyan VINES CP vines - Banyan VINES isrcp - APPN ISR CP isr - APPN ISR hprcp - APPN HPR CP hpr - APPN HPR all Lists all information and counters related to the point-to-point interface and PPP options and parameters. The output displayed for this command is a combination of the displays from all of the individual list item commands.
isrcp hprcp Examples of the List Control CCP Command Example for ST AC-LZC compression: list control ccp CCP State: Open Previous State: Ack Sent Time Since Change: 264 hours, 56 minutes and 58 seconds Compressor: STAC-LZS histories 1, check_mode SEQ Decompressor: STAC-LZS histories 1, check_mode SEQ Max size of compression dictionary: 12494.
PPP x> list control ecp ECP State: Open Previous State: Ack Sent Time Since Change: 16 minutes and 40 seconds Local (transmit) encrypter: DES Remote (receive) encrypter: DES Definitions of T erms in the List Control ECP Example ECP State: The current state of the point-to-point link.
LCP The link is in LCP negotiation. This state occurs when first bringing up an interface. The interface may be in self-test at this time. Authenticate The link is performing initial authentication. ECP The link is negotiating an ECP encryption algorithm.
Remote Username When authentication is required on the link, this field shows the name that the peer supplied. Last Identification Rx’d An optional packet type that is defined for LCP is an “Identification” packet.
list control bcp BCP State: Closed Previous State: Closed Time Since Change: 5 hours, 25 minutes and 3 seconds BCP Option Local Remote Tinygram Compression DISABLED DISABLED Source-route Info: Remote .
Remote Peer Class: 0 Remote Peer Version Major: 0 Remote Peer Version Minor: 0 Definitions of T erms in the List Control NBFCP Example The NBFCP State fields are the same as those described under the list control lcp command. Local MAC Address The Local MAC Address is the MAC Address that is used by the Win 95/NT Dial-Up Networking client.
DHCP State This is the Proxy DHCP as described in RFC 1541. Lease Server The server from which the lease was acquired. Leased IP address The address leased to the client. This address should be equivalent to the “Remote IP Address” listed above. Lease Time Length of lease from the DHCP server for this address.
The A TCP State fields are the same as those described under the list control lcp command. Common Network Number Network number of the two ends of the point-to-point link. (Y ou must statically configure both ends of the link to have the same network number .
error Lists information related to all error conditions tracked by the PPP software. Example: list error Error Type Count Last One ---------- ----- -------- Bad Address: 0 0 Bad Control: 0 0 Unknown P.
TERM ACK 0 0 ECHO REQ: 21 21 ECHO RESP: 21 21 DISC REQ: 0 0 CODE REJ: 0 0 Packets Indicates the total number of LCP packets transmitted (out) and received (in) over the current point-to-point interface. Octets For LCP frames, indicates the total number of bytes in octets transmitted and received over the current point-to-point interface.
Packets The total number of P AP packets sent or received. Octets The number of bytes of data that were sent or received in those packets. Requests The number of P AP “Request” packets sent or received. These are the packets which contain the P AP name/password pairs.
Packets T otal number of MS-CHAP packets. Octets T otal number of bytes contained in MS-CHAP packets. Challenges Number of MS-CHAP challenge packets. Responses Number of MS-CHAP response packets. Successes Number of MS-CHAP success packets. Failures Number of MS-CHAP failure packets.
Packets Indicates the total number of ECP packets transmitted (out) and received (in) over the current point-to-point interface. Octets Indicates the total number of bytes transmitted and received in the ECP packets. Reset Reqs Indicates the number of Reset requests transmitted and received on this interface.
Prot Rejects Indicates the total number of protocol reject packets transmitted and received over the current point-to-point interface. mppe Displays encryption data statistics for Microsoft PPP Encryption (MPPE) configuration.
Change Passwords The number of change password requests that sent or received on this interface. Alerts The number of SP AP banners that have been sent or received. MCCP Call Reqs Indicates that the sender requested another phone number to dial a second MP link.
Packets: 31035 46550 Octets: 1614885 2421137 Compressed Octets: 931416 1521039 Incompressible Packets: 0 0 Discarded Packets: 0 0 Copied Packets: 1 0 Prot Rejects: 0 - Compressor (transmit) statistics: Recent compression ratio: 1.7:1 Decompressor (receive) statistics: Recent compression ratio: 1.
compressed bytes, so values greater than 1 are preferable for both input and output. The higher the number , the more effective the compression. The output ratio is computed as the ratio of the number.
Example: list nbcp NBCP Statistic In Out --------------- -- --- Packets: 0 0 Octets: 0 0 Prot Rejects: 0 - nbfcp Lists NetBIOS Frame Control Protocol statistics for the point-to-point interface. These fields are the same as those described under the list ip command.
ipv6 Lists all information related to IPv6 packets over the point-to-point link. These fields are the same as those described under the list ip command. (See “ip” on page 503.) Example: list ipv6 IPv6 Statistic In Out -------------- -- --- Packets: 0 0 Octets: 0 0 Prot Rejects: 0 ipxcp Lists statistics for the IPX control protocol.
Example: list dn DN Statistic In Out ------------ -- --- Packets: 0 0 Octets: 0 0 Prot Rejects: 0 - osicp Lists statistics for the OSI control protocol. These fields are the same as those described under the list ip command. (See “ip” on page 503.
list isr APPN ISR Statistic In Out ------------- -- --- Packets: 220 219 Octets: 1266 1157 Prot Rejects: 0 - hprcp Lists statistics for APPN HPR Control Protocol packets. These fields are the same as those described under the list ip command. (See“ip” on page 503 .
Point to Point MAC/data-link on SCC Serial Line interface Adapter cable: V.35 DCE RISC Microcode Revision: 0 V.24 circuit: 105 106 107 108 109 Nicknames: RTS CTS DSR DTR DCD PUB 41450: CA CB CC CD CF .
Line speed Configured line speed or default value assumed (if line speed is configured as 0). Last port reset Length of time since the port was reset. CRC error The number of packets received that contained checksum errors and as a result were discarded.
Chapter 34. Using the Multilink PPP Protocol This chapter describes how to use the Multilink PPP Protocol (MP). It includes the following sections: v “MP Considerations” on page 510 v “Multi-Cha.
MP interfaces that do not have a dedicated link must be inbound-only interfaces. These interfaces are similar to the any inbound dial circuit. The Bandwidth Allocation Protocol (BAP) and its control protocol (BACP) allow an MP interface to increase and decrease its bandwidth by adding and dropping dial circuits.
Multi-Chassis MP An MP bundle with a Layer 2 Tunnel that contains a phone hunt group that spans multiple physical Network Access Servers is known as a multi-chassis MP . Multi-chassis MP uses rhelm or user-based tunneling (see “Using Local or Remote Authentication” in Using and Configuring Features ) to establish the MP endpoint destination.
Enabled as a Multilink PPP Link, Use as a dedicated Multilink PPP link? [No]: yes Multilink PPP net for this Multilink PPP link [1]? 9 NOTE: PPP configuration will be obtained from the Multilink PPP net. It is NOT necessary to configure PPP for this net! Note: Y ou cannot configure PPP parameters for dedicated links from this prompt.
Config> feature layer-2-tunneling Layer-2-Tunneling Config> encapsulator PPP-L2TP Config> enable mp NOTE: It IS necessary to configure PPP for this net! PPP negotiation parameters must be configured the same for all nets wishing to join the same Multilink PPP bundle.
client PPP negotiation idiosyncrasies when using dif ferent media types for each link in a bundle (for example, tunnel one link and not the other). For example, DIALs clients cannot renegotiate LCP at any point. Also, Microsoft DUN clients do not fully support LCP renegotiation.
Chapter 35. Configuring and Monitoring Multilink PPP Protocol (MP) This chapter describes how to configure specific Multilink PPP interfaces in a device.
Enable Use the enable command to enable the negotiation of BOD. Enabling BOD allows the link to allocate additional bandwidth when necessary . Syntax: enable bod Encapsulator Use the encapsulator command to access the PPP link-layer configuration for the Multilink PPP interface.
Dialout MP link net The dial circuit configured to place the first call for an outbound MP circuit. Max fragment size Specifies the largest number of bytes of data a packet can contain before the packet is fragmented to be sent over MP links.
Add bandwidth % The amount of bandwidth utilization at which the software will try to add a new link. V alid V alues: 1t o9 9 Default V alue: 90 Drop bandwidth % The amount of bandwidth utilization at which the software will remove a link from the MP bundle.
Min frag size This is the minimum size of the fragments (in bytes) the software creates when a packet exceeds Max fragment size . V alid V alues: 100 to 3 000 Default V alue: 375 Max number of active links Specifies the configured maximum number of links in the MP virtual link (also known as bundle ).
control mp mp Note: The examples that follow assume that the MP interface on this device is net number 6. bacp The list bacp command lists the statistics for bandwidth allocation control packets which have been sent or received on this MP circuit.
T ypically , the call initiator will choose a magic number of X'1' and the call receiver will choose a magic number of X'FFFFFFFF' establishing the call initiator as the favored peer .
v The bandwidth utilization across all links in the MP bundle is less than the drop percentage of the total available bandwidth for the MP bundle for the number of links minus one.
Dropped Frags (lost packets): 0 Dropped Frags (timeout or receive overflow): 0 Dropped Frags (sequence not expected): 0 PPP 11> mp The list mp command lists the statistics for packets which have been sent or received on this MP circuit.
Monitoring MP 524 MRS V3.2 Software User ’s Guide.
Chapter 36. Configuring SDLC Relay This chapter describes the Synchronous Data Link Control (SDLC) Relay configuration and operational commands. For further information on when to use DLSw SDLC vers.
SDLC Relay Configuration Commands This section summarizes the SDLC Relay configuration commands. Both the network and protocol parameters for SDLC relay are documented in this chapter . The SDLC Relay configuration commands allow you to specify router parameters for interfaces transmitting SDLC Relay frames.
Interface number The interface number of the router that designates the local port. Primary or Secondary Designates the port type, primary (P) or secondary (S). remote–port Identifies the IP address of the port directly connected to the serial line on the remote router .
Syntax: disable grou p... port group group# Suppresses transfer of SDLC Relay frames to or from a specific group (group#). Example: disable group 1 port Suppresses transfer of SDLC Relay frames to or from a specific local port.
Example: list Maximum frame size in bytes = 2048 Encoding: NRZ Idle State: Flag Clocking: External Cable Type: RS-232 DTE Speed (bps): 0 Transmit Delay Counter: 0 Maximum frame size in bytes Maximum frame size that can be sent over the link. The maximum frame size must be large enough to accommodate the largest frame and the 15 byte SRL Y header .
Net Number Indicates the device number of the local port. This number matches the number displayed using the Config list devices command. IP Address Indicates the IP address of the remote port. group group# Displays the configuration of a specified group.
A DTE cable is used when you are attaching the router to some type of DCE device (for example, a modem or a DSU/CSU). A DCE cable is used when the router is acting as the DCE and providing the clocking for direct attachment. clocking internal or external Configures the SRL Y link’s clocking.
The other W AN ports must be clocked at 64 Kbps or less. transmit-delay value Allows the insertion of a delay between transmitted packets. This command ensures a minimum delay between frames so that it is compatible with older , slower serial devices at the other end.
Clear-Port-Statistics Use the clear-port-statistics command to discard the SDLC Relay statistics for all ports. The statistics include counters for packets forwarded and packets discarded. Syntax: clear-port-statistics clear-port-statistics Clears port statistics gathered since the last time you restarted the router or cleared statistics.
group group# Allows transfer of SDLC Relay frames to or from the specified group (group#). port Allows transfer of SDLC Relay frames to or from the specified local port. Example: enable port Interface number: [0]? 2 (P)rimary or (S)econdary: [s]? P Interface number Indicates the interface number of the local port that you want to enable.
list group 1 SDLC Relay Configuration Group Port Status Net Packets IP Address Num Num fwrd disc 1 (E) Local PRMRY (D) 2 2880 57 1 (E) Remote SCNDRY (E) 4860 13 128.
536 MRS V3.2 Software User ’s Guide.
Chapter 37. Using SDLC Interfaces This chapter how to use the SDLC interface and includes the following sections: v “Basic Configuration Procedure” v “Configuring Switched SDLC Call-In Interfa.
Config> net 14 Dial circuit config> set net 2 1 Dial circuit config> encapsulator sdlc config> (configure SDLC) sdlc config> exit Dial circuit config> exit Config> 5.
Chapter 38. Configuring and Monitoring SDLC Interfaces This chapter describes the SDLC configuration and operational commands. This chapter includes the following sections: v “Accessing the SDLC C.
Refer to “Chapter 1. Getting Started” on page 3 for information related to the configuration environment. SDLC Configuration Commands The SDLC configuration commands allow you to create or modify the SDLC interface configuration.
Enter station name The name designation of the SDLC station (maximum characters is 8). Include station in group poll list Select whether or not to include this station in the group poll list for this link. The SDLC software supports the IBM 3174 group poll function for SDLC secondary station.
link Allows subsystems in the router (for example, DLSw) to use SDLC’s facilities. station name or address Allows connections to the specified secondary remote end station (link station name). List Use the list command to display configuration information on one or all SDLC link stations.
Group Poll Address used for the group poll feature for multipoint link configurations. Secondary stations having group inclusion coded as yes will respond to unnumbered polls received from this address. This address must be non-null for the group poll feature to be in effect for any secondary stations under this link.
SNRM The maximum number of times the router will send an SNRM(E) frame without receiving a response before timing out. A value of 0 indicates that the router will retry indefinitely . Poll retry The maximum number of times the router polls the station without receiving a response before timing out.
link frame-size link group poll* ... link idle *... link inactivity ... link inter-frame delay* link modul o... link name link pol l... link role *... link rts-hold link snrm link speed* link type *... link xid/test station address ... *Note: These commands are not available for SDLC dial circuit interfaces.
T able 70. V alid Values for Frame Size in Link Frame-Size Command Minimum Maximum Default 128 18000 2048 Set the link frame size greater than the maximum packet size that you configured with the set station xxx max packet command.
delay is not suff icient to allow a response from the 2210 to another device. Y ou cannot set leading flags to a non-zero value if inter-frame delay is 0.
2. For APPN point-to-point or negotiable, the broadcast address is used for the initial poll. For primary multipoint, the specific address is used. 3. For switched SDLC, the device must be primary , so link role type is not configurable for SDLC dial circuit interfaces.
remote-secondary address or link_station_name address < argument > Changes the remote station’s SDLC address in the range 02 - FE. Example: set remote-secondary SDLC_C1 address ce station address or name address Changes the station’s SDLC address in the range 01 to FE.
MOS Operator Control * talk 5 + 2. Next, enter the network # command using the number that identifies the interface that you previously configured for the SDLC device. + network 2 SDLC Console SDLC-2> Y ou enter all GWCON (Monitoring) commands at the + prompt.
Syntax: clear link station ... link name or address Clears the counters for an SDLC interface. station name or address or all Clears counters for a specific station or for all stations. Delete Use the delete command to terminate an existing SDLC connection without affecting the SDLC configuration in SRAM.
list link configuration link counters statio n... link configuration Displays information for all configured SDLC link stations on the interface. For an example and for additional information on the list command, see “List” on page 542.
Enabled Enabled, but not allocated Idle Allocated, but not in use Connected Connected Disconnected Disconnected Connecting Connection establishment in progress. Discnectng Disconnection in progress Recovering Attempting to recover from a temporary data link error .
SNRM Number of Set Normal Response Mode frames received and transmitted DISC Number of Disconnect frames received and transmitted UA Number of Unnumbered Acknowledgment frames received and transmitted.
set link modul o... link name link pol l... link role *... link rts-hold link snrm(e) link type *... link xid/test statio n... *Note: These commands are not supported on SDLC dial circuit interfaces. link modulo Dynamically changes the range of sequence numbers to be used on the data link without affecting the SRAM configuration.
When using broadcast address to negotiate the role, the link uses a default SDLC configuration. When primary is the link role, the link performs an initial poll to a specific address. 2. For APPN point-to-point or negotiable, the broadcast address is used for the initial poll.
station address or name name Name of the SDLC station. station address or name receive-window Maximum number of frames router sends before responding. station address or name transmit-window Maximum number of frames router transmits before receiving a response frame.
Note: For SDLC interfaces, the Nt’ interface number is always the same as the Nt interface number . CSR Indicates the memory location of the control status register for the SDLC interface. Self-test passed Indicates the total number of times the SDLC interface passed its self-test.
Note: It is unlikely that the L & F bits not set counter will be af fected by traff ic. Configuring SDLC Interfaces Chapter 38. Configuring and Monitoring SDLC Interfaces 559.
Configuring SDLC Interfaces 560 MRS V3.2 Software User ’s Guide.
Chapter 39. Using Binary Synchronous Relay (BRL Y) This chapter describes how to use the Binary Synchronous Relay (BRL Y) protocol. It includes the following sections: v “BRL Y Overview” v “BRL .
BSC Relay also supports a combination of virtual and physical multipoint connections. Figure 32 is a diagram of a combination of virtual and physical multipoint connections. Sample BRL Y Configuration The following examples illustrate configuring a BRL Y network similar to the network in Figure 32.
Notes: 1. The configuration for group 1 starts at 1 . 2. The configuration for group 2 starts at 2 . Config> protocol brly BSC Relay protocol user configuration BRLY config> add group 1 Local .
BRL Y Considerations When configuring BRL Y , keep the following in mind: BRLY config> add group Local group number: [1]? Point to Point connection?(Yes or [No]): BRLY config> add local Local g.
v Enabling BRL Y will result in an increase of polling in the network which will reduce the total network throughput. v BSC devices automatically disconnect if their inactivity timer expires. By default, this occurs after three seconds. An extremely busy network could result in BSC devices that disconnect frequently .
566 MRS V3.2 Software User ’s Guide.
Chapter 40. Configuring and Monitoring BSC Relay This chapter describes the binary synchronous communications (BSC) Relay configuration and operational commands.
configuration commands. T able 72 shows the commands for both the network BSC and protocol BRL Y . T able 72. BSC Relay Configuration Commands Summary Command Network BSC Protocol BRL Y Function ? (Help) yes yes Lists all of the configuration commands or lists the options associated with specific commands.
Group number The group number for the port. This number must be configured previously using the add group command. Interface number The interface number of the router that designates the local port. Primary or Secondary Designates the port type, primary (P) or secondary (S).
Delete Use the delete command to remove groups, local ports, and remote ports. Syntax: delete group group# local-port remote–port group group# Removes a group (group#). Example: delete group 1 local–port group# Removes the local port for the specified group.
Enable Use the enable command to turn on data transfer for an entire relay group or a specific relay port. Syntax: enable group group# port group group# Allows transfer of BSC Relay frames to or from the specified group. Example: enable group 1 port Allows transfer of BSC Relay frames to or from the specified local port.
Cable T ype The serial interface cable type. Speed (bps) Lists the speed of the transmit and receive clocks. Code The code type used by this device. Link EOT Specifies whether EOT transmissions are combined with poll and select transmissions when the transmissions occur back-to-back.
group group# Displays the configuration of a specified group. Set Use the set command to configure the BSC interface parameters. Syntax: set cable clocking [internal or external] code [ebcdic or as.
Example: set encoding nrz eotlink [yes or no] Specifies whether to combine EOT transmissions with poll and select transmissions when the transmissions occur back-to-back. Default value: yes frame-size Configures the maximum size of the frames that the system can transmit and receive on the data link.
* talk 5 + The system displays the GWCON prompt (+) on the console. If the prompt does not appear when you first enter GWCON, press Return again. 2. At the GWCON prompt, enter the configuration command to see the protocols and networks for which the router is configured.
Disable Use the disable command to suppress data transfer for an entire group or a specific relay port. SRAM (static read access memory) does not permanently store the effects of the disable monitoring command. Therefore when you restart the router , the effects of this command are erased.
List Use the list command to display the configuration of a specific group or of all groups. Syntax: list all group group# all Displays the statistics of all local groups. See the list group command for a sample output. group group# Displays the statistics of a specified group.
BSC Relay Interfaces and the GWCON Interface Command While BSC Relay interfaces have their own monitoring processes, the router also displays complete statistics for installed network interfaces when you use the interface command from the GWCON environment.
Chapter 41. Using the V .25bis Network Interface The V .25bis interface allows routers to establish serial connections over switched telephone lines using V .
– Colon (:) — ″ Wait T one ″ – Left-angled bracket (<) — ″ Pause ″ , used for inserting a fixed delay (dependent on modem) between digit sequences. For example, when going through a PBX or PTN. – Equal (=) — ″ Separator 3 ″ , which is ″ for national use.
v The set connect-timeout command specifies the number of seconds allowed for a call to be established. v The set duplex command specifies the duplexing mode for the call. v The set encoding command sets the encoding for the call. v When you have finished configuring the interface, you can use the list command to display your configuration.
Circuit Config> set calls outbound Circuit Config> set calls inbound Note: For W AN Restoral operations or another dial-on-demand application, you should set up the circuit for either inbound or outbound calls. 5. Specify the timeout period for the circuit.
Chapter 42. Configuring and Monitoring the V .25bis Network Interface This chapter describes the V .25bis configuration and operational commands and GWCON commands. It includes the following sections: v “Accessing the Interface Configuration Process” v “V .
T able 75. V .25bis Configuration Commands Summary Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See “Getting Help” on page 10. List Displays the V .
non-responding address, it does not attempt to establish the call until this time has expired. This timeout period begins when the router attempts the first call. Call timeouts: Number of call timeouts. Command Delay Amount of time, in milliseconds, that the router waits to initiate or answer a call after it turns on DTR (Data T erminal Ready).
takes to establish connections to various destinations. Y ou can then set this parameter to a number slightly higher than the longest connect time. Note: Normally government regulation limits modem manufacturers to a maximum length for call setup.
GWCON (+) prompt and when you enter the statistics command at the V.25bis> monitoring prompt. The range is 300 to 2 048 000 bps. Note: This command does not affect the actual line speed but it sets the speed some protocols, such as IPX, use when calculating routing cost parameters for dial circuits mapped to the V .
T able 76. V .25bis Monitoring Command Summary Monitoring Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available).
Circuits The circuits command shows the status of all dial circuits configured on the V .25bis port. Syntax: circuits Example: circuit Net Interface MAC/Data-Link State Reason Duration 2 PPP/0 Point to Point Avail Rmt Disc 1:02:25 Net Number of the dial circuit mapped to this interface Interface T ype of interface and its instance number .
parameters V.25bis port Parameters Local Network Address Name = v402 Local Network Address = 15088982402 Non-Responding addresses: Retries = 1 Timeout = 0 seconds Call timeouts: Command Delay = 0 ms Connect = 0 seconds Disconnect = 0 seconds Local Network Address Name: Network address name of the local port.
statistics V.25bis port Statistics Adapter cable: RS-232 DTE RISC Microcode Revision: 1 V.24 circuit: 105 106 107 108 109 125 141 Nicknames: RTS CTS DSR DTR DCD RI LL RS-232 CA CB CC CD CF CE State: O.
DMA/FIFO overrun The number of times the serial interface card could not send data fast enough to the system packet buffer memory to receive packets from the network. L & F bits not set On serial interfaces, the hardware sets input-descriptor information for arriving frames.
RS-232: CA CB CC CD CF CE State: OFF OFF OFF OFF OFF OFF OFF Line Speed: 14.400 Kbps Last port reset: 1 hour, 28 minutes, 25 seconds ago Input frame errors: CRC error 0 alignment (byte length) 0 misse.
CRC error Number of packets received that contained checksum errors and as a result were discarded. Alignment (byte length) Number of packets received that were not an even multiple of 8 bits in length and as a result were discarded.
Chapter 43. Using the V .34 Network Interface The V .34 interface allows routers to establish serial connections over switched telephone lines using externally attached modems that support the standard A T command set or integrated modem adapters. This chapter describes how to use a V .
– Colon (:) – ″ Wait T one ″ – Left-angled bracket (<) – ″ Pause ″ , used for inserting a fixed delay (dependent on modem) between digit sequences. For example, when going through a PBX or PTN. – Equal (=) – ″ Separator 3 ″ , which is ″ for national use.
v The set command-delay-timeout command specifies the amount of time the router waits to initiate or answer a call after it turns on DTR. v The set connect-timeout command specifies the number of seconds allowed for a call to be established. v The speed command sets the maximum DTE speed for the modem.
4. Configure the dial circuit to initiate outbound calls only , accept inbound calls only , or both initiate and accept calls. Use the set calls command.
Chapter 44. Configuring and Monitoring the V .34 Network Interface This chapter describes the V .34 configuration and operational commands and GWCON commands. It includes the following sections: v “Accessing the Interface Configuration Process” v “V .
T able 77. V .34 Configuration Commands Summary Command Function ? (Help) Displays all the commands available for this command level or lists the options for specific commands (if available). See “Getting Help” on page 10. List Displays the V .34 configuration.
set this parameter to 0, the router waits for the modem to respond to DTR with the CTS (Clear to Send) signal before it issues commands. Connect Number of seconds allowed for a call to be established. If this parameter is set to 0, the modem controls the connection establishment timeout.
takes to establish connections to various destinations. Y ou can then set this parameter to a number slightly higher than the longest connect time. Note: Normally government regulation limits modem manufacturers to a maximum length for call setup.
Where # is the number of the V .34 interface. Y ou cannot directly access the V .34 monitoring process for dial circuits, but you can monitor the dial circuits that are mapped to the serial line interface. Note: V .34 interfaces also have ELS troubleshooting messages that you can use to monitor V .
In Number of inbound connections accepted for this dial circuit. Out Number of completed connections initiated by this dial circuit. Rfsd Number of connections initiated by this dial circuit that were refused by the network or the remote destination port.
Duration Length of time that the circuit has been in the current state. Parameters Use the parameters command to display the current V .34 serial line configuration. Note that this is the same information displayed in the V.34 Config> list command.
initiates further calls. If you set this parameter to 0, the router waits for the modem to respond to the DTR drop by dropping CTS and DSR before it initiates the next call. Statistics Use the statistics command to display the current statistics for this V .
Missed Frame When a frame arrives at the device and there is no buffer available, the hardware drops the frame and increments the missed frame counter . too long (> nnnn bytes) Number of packets received that were greater than the configured frame size (nnnn) and as a result were discarded.
T o display the following statistics for a V .34 serial line interface, use the interface command followed by the interface number of the V .34 serial line interface. Example: interface 1 Self-Test Self-Test Maintenance Nt Nt' Interface CSR Vec Passed Failed Failed 1 1 V.
Nicknames Common names for the circuits. RS-232 EIA 232 (also known as RS-232) names for the circuits. State Current state of the circuits (ON or OFF). Line speed The transmit clock speed (approximate). Last port reset Length of time since the port was reset.
Configuring V .34 610 MRS V3.2 Software User ’s Guide.
Chapter 45. Using the ISDN Interface This chapter describes the Integrated Services Digital Network (ISDN) interfaces on the IBM 2210. It includes the following sections: v “ISDN Overview” v “IS.
– The PRI adapter provides T1/J1 or E1 support. - T1/J1 supports twenty-three 64-Kbps B-channels and one 64-Kbps D-channel. - E1 supports thirty 64-Kbps B-channels and one 64-Kbps D-channel. – Channelized T1/E1 - T1/J1 supports up to twenty-four 64-Kbps time slots.
Note: Y ou can assign a destination name to a connection list (add ISDN address) and assign a destination number to each line in the list. When that destination name is called, the numbers in the list are tried one by one until a connection is made or the list is exhausted.
See “Set” on page 646 for more information about priority . Cost Control Over Demand Circuits Dial-on-demand circuits always appear to be in the Up state to the protocols. Most protocols send out periodic routing information that could cause the router to dial out each time the routing information is sent over dial-on-demand circuits.
1. If cause0 is not ″ 0x5 ″ ignore the cause code. 2. If cause0 is ″ 0x5 ″ look at cause1. If the high-order (most significant) bit of cause1 is ON , set it to OFF . 3. Convert the result to decimal and look up the meaning in the following table, which is taken from ITU-T Recommendation Q.
T able 79. ISDN Q.931 Cause Codes (continued) Code Cause 82 Identified channel does not exist 83 A suspended call exists, but this call identity does not 84 Call identity in use 85 No call suspended .
W AN Restoral Configuration Figure 37 shows how you can use an ISDN connection to back up a failed dedicated W AN link (WAN restoral). In this example, Router A normally uses the W AN link to communicate with Router B. If that connection fails, the ISDN dial-up link reconnects the two routers.
Circuit config: 7> set net 6 Circuit config: 7> set timeslo t2342 4 Circuit config: 7> list Base net = 6 Idle character = 7E Bandwidth = 64 Kbps Timeslot =2342 4 Note: If this were an E1 circuit, the available timeslots would be 1 to 31.
Switch names V alid command Channelized T1/E1 CHANNELIZED ISDN Interface Restrictions v Y ou cannot boot or dump the router over an ISDN interface. v Except for BRI, which allows you to use the D-channel for X.25 packet data, you cannot use the D-channel for data traff ic.
v Network Subdial Address . Optional. This is an additional part of telephone number , such as an extension, that is interpreted once the interface connects to a PBX. Y ou can enter up to 20 numbers, as well as 1 1 additional spaces and punctuation. The router uses only the numbers.
4. For BRI only , set the ISDN interface to either point-to-point (pp) or multipoint (mp). Point-to-point is one ISDN device on an ISDN line. Multipoint is two or more ISDN devices sharing an ISDN line. With some switch variants, you must configure the line as multipoint regardless of how many devices are on it.
When you have finished configuring the ISDN interface, you can use the list command to display your configuration. Configuring the ISDN Interface T1/J1 PRI Interface Specify the following T1/J1 parameters: 1. For the T1/J1 PRI interface, line build out specifies the attenuation of the signal transmitted by the router ’s T1 port.
T o add a dial circuit, enter the add device dial-circuit command at the Config> prompt. The software assigns an interface number to each circuit. Y ou will use this number to configure the dial circuit.
Circuit Config> set idle Idle timer (seconds, 0 means always active) [0]? 0 Note: W AN restoral/reroute must be fixed. 6. Optionally , you can provide a LID name to send (instead of the default LID, which is the destination name) by specifying a lid_out_addr.
ISDN I.430 and I.431 Switch V ariants T o use the Native I.430 mode that is supported in Japan and is known as D64S in Germany , you must code the ISDN switch variant as I.430. This treats the ISDN interface like a leased line. There is no D-channel signalling traf fic in this mode.
Config> n 6 Circuit config: 6>set net 5 Circuit config: 6>list all Base net = 5 X.31 Support The ITU Standard X.31 is for transmitting X.25 packets over ISDN. This standard provides support for X.25 with Unconditional Notification on the ISDN BRI D-channel.
Chapter 46. Configuring and Monitoring the ISDN Interface This chapter describes the ISDN commands and GWCON commands. It includes the following sections: v “ISDN Configuration Commands” v “Ac.
remove Add Adds a caller ’s number to be blocked. List Lists the callers’ numbers to be blocked. Remove Removes a caller ’s number for the list to be blocked. Disable The disable command disables Power Source 1 detection. If your switch does not supply Power Source 1, you should disable PS1.
DN0 (Directory Number 0) = 5551234 DN1 (Directory Number 1) = 5553456 Service Profile ID (B1) = 91955555550100 Service Profile ID (B2) = 91955555550101 TEI for B-Channel 1 = Automatic TEI for B-Channel 2 = Automatic TEI for X.25 = Automatic PS1 detect = Disabled No circuit address accounting information being kept.
included. Y ou must set the ISDN frame size so that it is greater than or equal to the frame size configured for the dial circuits using the ISDN interface. For PPP dial circuit interfaces, you can change the PPP MRU using the set lcp options command.
esf-data-link The service subscription. This information is provided by the service provider . V alid V alues : ANSI-T1.403 ANSI-IDLE A T&T -IDLE Default V alue : ANSI-T1.
maximum number of calls the router attempts to make at one time. Setting retries-call-address to 0 causes the router to bring up all circuits at once. If you set the switch-variant to INS64, you cannot change the retries-call-address default. It is fixed at 2.
v A T&T 5ESS (North America) v A T&T 4ESS (North America) v Australia (AUSTEL) v INS-Pri (Japan, NTT) v National ISDN 2 (North America) v NET 5 (Euro-ISDN, ETSI) v Northern T elecom 250 (DMSPRI) v Native I.
v DN0, and DN1 are used to verify that the incoming call is being delivered to the correct ISDN destination. v If the destination number (Called Party Number) in the ISDN call being delivered does not match either DN0 or DN1, then the call is rejected.
Default V alue: None Syntax: cause code remove value Example: remove FF Accessing the Interface Monitoring Process T o access the interface monitoring process for ISDN, enter the following command at the GWCON (+) prompt: + network # Where # is the number of the ISDN interface.
remove Add Adds a caller ’s number to be blocked. List Lists the callers’ numbers to be blocked. Remove Removes a caller ’s number for the list to be blocked.
Circuits The circuits command shows the status of the dial circuits configured on the ISDN interface that are in the state of “Up” or “Available”.
Dial-dump Use the dial-dump command to display the operation characteristics of the specified dial circuit. Syntax: dial-dump ciruitname L2_Counters Use the L2_counters command to list the L2/L1 states along with some L2 counters. Syntax: L2_counters L3_Counters Use the L3_Counters command to list counters of set ups sent/received/accepted.
Example: parameters ISDN Port parameters: Local Address Name: vl233 Local Network Address: 20 Local Network Subaddress: Frame Size: 2048 TEI 0: Automatic TEI 1: Automatic X.
Overflow 23 Overflow 3 Underrun 0 Too Long 6 Abort 4 CRC error 8 Misaligned 3 Transmit B Channels Receive B Channels Packets 1499094 Packets 1499228 Bytes 59955660 Bytes 59951780 Overflow 0 Overflow 9.
ISDN and the GWCON Commands While ISDN has its own monitoring process for monitoring purposes, the router also displays configuration information and complete statistics for devices and circuits when you use the interface, statistics, and error commands from the GWCON environment.
Interface Interface type and its instance number . CSR Command and status register addresses of base network. Ve c Interrupt vector address. Self-T est Passed Number of self-tests that succeeded. Self-T est Failed Number of self-tests that failed. Maintenance: Failed Number of maintenance failures.
Chapter 47. Configuring and Monitoring Dial Circuits This chapter describes how to configure dial circuits on a dial circuit interface mapped to a V .
T able 83. Dial Circuit Configuration Commands Summary (continued) Command Function Set Configures the dial circuit for inbound or outbound calls, maps the dial circuit to a serial line interface, and sets addresses, idle timeout, priority , lid_out address, inbound destination, and self-test delay .
Be aware that you cannot configure HDLC parameters of the dial circuit configuration when you configure PPP or Frame Relay for ISDN. Physical layer parameters are configured on the ISDN interface. For information on configuring the PPP protocol, refer to “Chapter 25.
Bandwidth Displays the bandwidth value in Kbps. Base net Displays the name of the serial line interface to which this dial circuit is mapped. Callback Displays the setting of this option.
Notes: 1. If you are running SDLC, I.430, I.431, Channelized, or X.25 on a dial circuit, you will be unable to use the set command to change the following parameters as the software will use specific.
For Channelized: 56 or 64 Default value: 64 callback [ Ye s or No ] The callback feature uses the callers telephone number to verify the call against an authentication table and then disconnects the incoming call. Callback then makes an outgoing call to the same caller .
lid_out_addr address_name The lid_out_addr is the name of a dial circuit between two routers. When more than one circuit is configured between two routers (parallel circuits), then there needs to be a way to unambiguously know which dial circuit connects between them.
Note: Y ou can only use this parameter for Channelized T1/E1 circuits. V alid values: For Channelized T1: 1 to 24 For Channelized E1: 1 to 31 Default value: None Example: set timeslo t1458 Dial Circuit Monitoring Commands T able 84 describes the dial circuit monitoring commands.
Appendix A. Quick Configuration Reference Important If you are attempting to configure or monitor your IBM 2210 and your service terminal is unreadable, see “Service T erminal Display Unreadable” in IBM 2210 Nways Multiprotocol Router Service and Maintenance Manual.
Router Quick Configuration for the following: o Interfaces o Multilink PPP (w/o DIALs) o Dial Circuits (w/o DIALs) o Dial-in Access to LANs (DIALs) o Bridging Spanning Tree Bridge (STB) Source Routing.
Configuring Interfaces ********************************************** Interface Configuration ********************************************** Type 'Yes' to Configure Interfaces Type 'No' to skip Interface Configuration Type 'Quit' to exit Quick Config Configure Interfaces? (Yes, No, Quit): [Yes] 1.
Cable type (RS-232 DTE, RS-232 DCE, V.35 DTE, V.35 DCE, V.36 DTE, X.21 DTE, X.21 DCE: [RS-232 DTE] V.35 DCE Note: DTE cable types are used when attaching to a modem or DSU. DCE cable types are used when connecting directly to another DTE device and you want the 2210 to provide the clocking.
Intf 1 is a WAN PPP Encapsulation for WAN 1 (PPP, Frame Relay, V34): [PPP] Cable type (RS-232 DTE, RS-232 DCE, V.35 DTE, V.35 DCE, V.36 DTE, X.21 DTE, X.21 DCE: [RS-232 DTE] V.35 DCE Intf 2 is a WAN PPP Encapsulation for WAN 2 (PPP, Frame Relay, V34): [PPP] Cable type (RS-232 DTE, RS-232 DCE, V.
Enter maximum number of active links (2 - 23): [2] 3 Set Call Direction (Inbound, Outbound, Both): [Inbound] Inbound Enter Idle timer (seconds, 0 means always active) (0 - 65535): [0] 0 3. Next you are prompted to add/edit the ISDN dial-circuits that can be used by the MP interface.
Current Multilink PPP Configuration: Num Intf# Direction Max Links Link Intf# Base Intf# Destination 1 7 In 3 8 6 default_ad Save this configuration (Yes, No): [Yes] y Multilink PPP configuration saved.
Interface #: 13 Interface Type: PPP Dial Circuit Base Intferface #: 6 (ISDN Base Net) Idle timer: 0 (fixed circuit) Call Direction: Inbound only Destination Name: default_address Line ID *IN* Name: * ANY * Is this correct (Yes, No): [Yes] Yes 4. Next, you may choose to add/edit more dial-circuits in the same way as the example above.
Current Multilink PPP Configuration: Num Intf# Direction MaxLinks DIALs 1 8 In 2 No Enter the number of Multilink PPP DIALs interfaces:(0-23) 2 Enter maximum number of active links per Multilink PPP interface: 3 Next, the following prompt will be shown.
DIALs Server name - up to 30 chars: (DIALOUT_SERVER) 7. Enter the name of the DIALs server . The default is DIALOUT_SERVER. This is the name of the server that will be displayed when dial-out clients ″ discover ″ DIALs Dial-out Servers on the network when they invoke the DIALs client’s CHOOSER application.
14. The previous question enables the device to provide an IP address from a DHCP server to the client for use for the duration of the connection. DHCP gateway (giaddr) interface: [] 10.
Configuring Bridging ********************************************** Bridging Configuration ********************************************** Type 'Yes' to Configure Bridging Type 'No' to skip Bridging Configuration Type 'Quit' to exit Quick Config Configure Bridging? (Yes, No, Quit): [Yes] 1.
A unique hexadecimal value from 1 to FFF is assigned to each interface. The interfaces on each ring (segment) have the same segment number , but the segment number is unique to each ring.
v Enter n to skip protocol configuration and continue with quick configuration. v Enter q to exit quick configuration. Y ou will first configure IP , then IPX, and then DECnet.
Per-Interface IP Configuration complete Configuring IP Routing Information Enable Dynamic Routing (Yes, No): [Yes] 4. Enter y if you want the routing protocols (RIP or OSPF) to build the routing tables. Enter n to manually add IP address destinations to the routing tables (static routes).
Configure IPX? (Yes, No): [Yes] 1. Enter y to configure IPX. Enter n to skip IPX configuration and continue with quick configuration. Y ou will see messages similar to the following: Type 'r' any time at this level to restart IPX Configuration IPX Configuration is already present Configure IPX anyway? (Yes, No): [No] yes 2.
a. The following prompts are displayed: Ethernet encapsulation type? (ETHERNET_8022, ETHERNET_8023, ETHERNET_ii, ETHERNET_SNAP): [ETHERNET_8023] b. Enter the encapsulation type used by the IPX protocol on your Ethernet end stations. Ethernet_8022 Packet includes an 802.
This is the information you have entered: Per-Interface Configuration Information Cir Ifc IPX Net(hex) Encapsulation IPXWAN 1 1 10 ETHERNET_8023 Not Configured 2 3 300 Not Configured 3 5 400 Not Confi.
Highest Area This number should be at least as high as the highest area number in the overall network. Node Address Is the node ID of this router and must be unique in the network.
DNA Configuration Saved Configuring Booting ********************************************** Boot Configuration ********************************************** Type 'Yes' to Configure Booting Type 'No' to skip Booting Configuration Type 'Quit' to exit Quick Config Configure Booting? (Yes, No, Quit): [Yes] 1.
TFTP Boot Select Booting Method (TFTP Boot, BOOTP Boot, IBD Boot): [ ] 1. Enter TFTP to boot using a TFTP host server and respond to the following prompts: Interface Number ( ):[0] The number of the LAN interface over which to boot. For this version of the IBM 2210, you must use the default of 0.
IBD Boot Select Booting Method (TFTP Boot, BOOTP Boot, IBD Boot): [ ] 1. Enter IBD and the console displays a list of software loads in the IBD. The following # loads(s) exist in the IBD load.name load.name load.name load.name You may use only these loads to configure an IBD boot record IBD Load Name: ( load.
Type RESTART at the Config> prompt for the configuration to take effect Config> 3. Enter restart restart after the Config> prompt to restart the IBM 2210 with the new configuration. T o change or view the current configuration, enter qc . Appendix A.
674 MRS V3.2 Software User ’s Guide.
Appendix B. X.25 National Personalities This appendix lists the default settings for GTE-T elenet and DDN. GTE-T elenet The following parameters are the default settings for GTE-T elenet: v Callreq: 2.
– Window size: 2 v Reset – Retries: 1 – Timer: 18 v Restart – Retries: 1 – Timer: 18 v Standard: 1984 v T1-timer: 4 v T2-timer: 2 676 MRS V3.
Appendix C. Making a Router Load File from Multiple Disks If a software load arrives on multiple disks, use the procedure in the following sections to combine the loads into one load file that the router can use at the time of booting.
kopy /dev/fd0 /kew /pcfs Please insert the first diskette Copying the first load file fragment Please mount the second diskette Copying the second load file fragment Load file reassembly was successful # ls /kew gw0 gw1 gw.ldc If you can’t use the UNIX Bourne shell script, you can assemble the load manually using the following procedure: 1.
Disassembling a Load File Under UNIX T o disassemble a load under use cutup.c. Begin by compiling the program using your UNIX compiler to make a cutup executable file. Then use the following syntax: cutup < file_extension >< file_name >< cut_length > The file_extension is attached to the front of each slice needed to cut.
680 MRS V3.2 Software User ’s Guide.
List of Abbreviations AARP AppleT alk Address Resolution Protocol ABR area border router ack acknowledgment AIX Advanced Interactive Executive AMA arbitrary MAC addressing AMP active monitor present A.
BRS bandwidth reservation BSD Berkeley software distribution BTP BOOTP relay agent BTU basic transmission unit CAM content-addressable memory CCITT Consultative Committee on International T elegraph a.
DNCP DECnet Protocol Control Protocol DNIC Data Network Identifier Code DoD Department of Defense DOS Disk Operating System DR designated router DRAM Dynamic Random Access Memory DSAP destination ser.
GTE General T elephone Company GWCON Gateway Console HDLC high-level data link control HEX hexadecimal HPR high-performance routing HST TCP/IP host services HTF host table format IBD Integrated Boot D.
LRM LAN reporting mechanism LS link state LSA link state advertisement LSB least significant bit LSI LAN shortcuts interface LSreq link state request LSrxl link state retransmission list LU logical u.
NRZ non-return-to-zero NRZI non-return-to-zero inverted NSAP Network Service Access Point NSF National Science Foundation NSFNET National Science Foundation NET work NVCNFG nonvolatile configuration .
ROpcon Remote Operator Console RPS ring parameter server RTMP Routing T able Maintenance Protocol RTP RouT ing update Protocol RTS request to send Rtype route type rxmits retransmissions rxmt retransm.
SR-TB source routing-transparent bridge ST A static STB spanning tree bridge STE spanning tree explorer STP shielded twisted pair; spanning tree protocol SVC switched virtual circuit TB transparent br.
XNS Xerox Network Systems XSUM checksum ZIP AppleT alk Zone Information Protocol ZIP2 AppleT alk Zone Information Protocol 2 ZIT Zone Information T able List of Abbreviations 689.
690 MRS V3.2 Software User ’s Guide.
Glossary This glossary includes terms and definitions from: v The American National Standard Dictionary for Information Systems , ANSI X3.172-1990, copyright 1990 by the American National Standards Institute (ANSI). Copies may be purchased from the American National Standards Institute, 1 1 West 42nd Street, New Y ork, New Y ork 10036.
initiates the transmission of tokens and provides token error recovery facilities. Any active adapter on the ring has the ability to provide the active monitor function if the current active monitor fails. address. In data communication, the unique code assigned to each device, workstation, or user connected to a network.
arbitrary MAC addressing (AMA). In DECnet architecture, an addressing scheme used by DECnet Phase IV -Prime that supports universally administered addresses and locally administered addresses. area. In Internet and DECnet routing protocols, a subset of a network or gateway grouped together by definition of the network administrator .
broadcast address. In communications, a station address (eight 1’s) reserved as an address common to all stations on a link. Synonymous with all-stations address .
data and control characters. (2) A method of controlling the number of data bits sent on a telecommunication line in a given time. collision. An unwanted condition that results from concurrent transmissions on a channel.
Notes: 1. Between data switching exchanges, the data circuit may include data circuit-terminating equipment (DCE), depending on the type of interface used at the data switching exchange.
and the network. (I) (2) In TCP/IP , the basic unit of information passed across the Internet environment. A datagram contains a source and destination address along with the data. An Internet Protocol (IP) datagram consists of an IP header followed by the transport layer data.
LUs) without regenerating complete configuration tables or deactivating the affected major node. Dynamic Routing. Routing using learned routes rather than routes statically configured at initialization. E echo. In data communication, a reflected signal on a communications channel.
flash memory . A data storage device that is programmable, erasable, and does not require continuous power . The chief advantage of flash memory over other programmable and erasable data storage devices is that it can be reprogrammed without being removed from the circuit board.
host. In the Internet suite of protocols, an end system. The end system can be any workstation; it does not have to be a mainframe. hub (intelligent). A wiring concentrator , such as the IBM 8260, that provides bridging and routing functions for LANs with different cables and protocols.
protocol does not provide error recovery and flow control and does not guarantee the reliability of the physical network. interoperability . The capability to communicate, execute programs, or transfer data among various functional units in a way that requires the user to have little or no knowledge of the unique characteristics of those units.
LES. LAN Emulation Server . A LAN Emulation Service component that resolves LAN Destinations to A TM Addresses. line switching. Synonym for circuit switching . link. The combination of the link connection (the transmission medium) and two link stations, one at each end of the link connection.
shared. (T) The LLC protocol was developed by the IEEE 802 committee and is common to all LAN standards. logical link control (LLC) protocol data unit.
the functions of a modem is to enable digital data to be transmitted over analog transmission facilities. (T) (A) (2) A device that converts digital data from a computer to an analog signal that can be transmitted on a telecommunication line, and converts the analog signal received to data for the computer .
throughout the world who provide assistance, documentation, training, and other services to users. network layer . In Open Systems Interconnection (OSI) architecture, the layer that is responsible for routing, switching, and link-layer access across the OSI environment.
packet loss ratio. The probability that a packet will not reach its destination or not reach it within a specified time. packet mode operation. Synonym for packet switching . packet switching. (1) The process of routing and transferring data by means of addressed packets so that a channel is occupied only during transmission of a packet.
private branch exchange (PBX). A private telephone exchange for transmission of calls to and from the public telephone network. problem determination. The process of determining the source of a proble.
rlogin (remote login). A service, offered by Berkeley UNIX-based systems, that allows authorized users of one machine to connect to other UNIX systems across an internet and interact as if their terminals were connected directly .
segment. (1) A section of cable between components or devices. A segment may consist of a single patch cable, several patch cables that are connected, or a combination of building cable and patch cables that are connected. (2) In Internet communications, the unit of transfer between TCP functions in different machines.
focal point. An APPN end node can be a SOC node if it supports the function to exchange management services capabilities. split horizon. A technique for minimizing the time to achieve network convergence.
problem determination requests, and providing directory services and other session services for users of the network. Multiple SSCPs, cooperating as peers with one another , can divide the network into domains of control, with each SSCP having a hierarchical control relationship to the physical units and logical units within its own domain.
T ransmission Control Protocol/Internet Protocol (TCP/IP). A set of communications protocols that support peer-to-peer connectivity functions for both local and wide area networks. transmission group (TG). (1) A connection between adjacent nodes that is identified by a transmission group number .
VIrtual NEtworking System (VINES). The network operating system and network software from Banyan Systems, Inc. In a VINES network, virtual linking allows all devices and services to appear to be directly connected to each other , when they may actually be thousands of miles apart.
714 MRS V3.2 Software User ’s Guide.
Index Numerics 2210 as boot server 84 A accessing protocol configuration process 19 operating (monitor) process 19 second-level process 13, 15 accessing the mp configuration prompt 515 accessing the.
Banyan VINES Control Protocol (BVCP) for PPP 461 basing configuration on existing 12 baud rate, setting console 75 BCM 267 Support for IP 268 Support for IPX BCM IPX Server Farm 268 preventing a LEC .
BSC Relay configuration commands (continued) list 572 summary of 567 BSC Relay monitoring commands clear-port-statistics 575 disable 576 enable 576 list 577 summary of 575 buffer GWCON command 129 BU.
Config-Only mode (continued) manual entry 41 CONFIG process accessing 14 commands available from 51 description of 39 entering 14, 51 exiting 51 configuration accessing the mp prompt 515 basing on e.
dial circuits adding 580, 596, 622 configuring 581, 597, 623 configuring for MP 51 1 ISDN 612 dial-in circuit add device example 16 dial-in circuits virtual connections (VC) 463 configuring 464 con.
ELS configuration commands (continued) notrace 174 notrap 174 remote 175 set 177 summary of 167 trace 203 trap 181 ELS configuration environment entering and exiting 167 ELS console environment 2210.
environment, lower level 1 1 exiting 1 1 environment commands summary of 66 erase Boot CONFIG command 101 error GWCON command 134 ESI 257 Ethernet configuring using quick configuration 653 displayin.
Frame Relay (continued) using 387 variable information rate 399 variable information rate (VIR) 399 virtual circuits 387 Frame Relay configuration commands 413, 415 add 406 permanent-virtual-circuit .
GWCON (continued) process entering 15 GWCON commands activate 128 boot 128 buffer 129 clear 130 configuration 130 disable 133 environment 133 error 134 event 135 fault 135 features 135 interface 136,.
ISDN monitoring commands (continued) circuits 637 L2_Counters 638 L3_Counters 638 parameters 638 statistics 639 summary of 635 TEI 638 K keepalive timer , setting for XTP 380 key parameters for LAN em.
list (continued) list 551 LLC monitoring command 239 performance configuration command 216 performance monitoring command 218 Point-to-Point configuration command 470 PPP monitoring command 484 SDLC.
Modem disabling 64 enabling 64 monitoring accessing the mp commands 519 A TM 277 network interfaces 19 performance monitoring commands 217 monitoring commands LAN Emulation Client (LEC) 293 multilink .
OPCON commands (continued) reload 32 restart 32 status 32 summary of 27 talk 34 telnet 34 OPCON interface configuring 27 OPCON process accessing 27 commands available from 27 description 25 getting b.
Point-to-Point Protocol (PPP) (continued) Link Control Protocol (LCP) 451 link establishment packets 454 link maintenance packets 455 link termination packets 455 Network Control Protocols (NCP) 460 O.
remote logging (continued) additional considerations (continued) messages containing IP addresses 162 recurring sequence numbers 163 output examples 159 remote login 5 remote terminals 5 remove A TM c.
set (continued) BSC interface configuration command 573 CONFIG command 75 dial circuit configuration command 646 ELS configuration command 177 ELS monitoring command 198 Frame Relay configuration .
T oken-Ring network interfaces configuring 225 trace A TM monitoring commands 288 ELS configuration commands 203 Frame Relay monitoring commands 444 trace-status packet trace monitoring command 207 .
X.25 monitoring commands (continued) parameters 354 statistics 355 summary of 353 X.25 network interface accessing the monitoring process 353 configuring 327 national personality 320, 675 statistics 356 using 319 X.
Readers’ Comments — W e’d Like to Hear from Y ou Nways Multiprotocol Routing Services Software User ’ s Guide V ersion 3.2 Publication No. SC30-3681-08 Overall, how satisfied are you with the.
Readers’ Comments — We’d Like to Hear from Y ou SC30-3681-08 SC30-3681-08 IBMR Cut or Fold Along Line Cut or Fold Along Line Fold and T ape Please do not staple Fold and T ape Fold and T ape Please do not staple Fold and T ape NO POST AGE NECESSARY IF MAILED IN THE UNITED ST A TES BUSINESS REPL Y MAIL FIRST -CLASS MAIL PERMIT NO.
.
IBMR Printed in the United States of America on recycled paper containing 10% recovered post-consumer fiber . SC30-3681-08.
Spine information: IBM Nways Multiprotocol Routing Services MRS V3.2 Software User ’ s Guide SC30-3681-08.
An important point after buying a device IBM SC30-3681-08 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought IBM SC30-3681-08 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data IBM SC30-3681-08 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, IBM SC30-3681-08 you will learn all the available features of the product, as well as information on its operation. The information that you get IBM SC30-3681-08 will certainly help you make a decision on the purchase.
If you already are a holder of IBM SC30-3681-08, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime IBM SC30-3681-08.
However, one of the most important roles played by the user manual is to help in solving problems with IBM SC30-3681-08. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device IBM SC30-3681-08 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center