Planet Technology Network Router ERT 805 User Manual

Serial WAN Router  
ERT-805  
Users Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TABLE OF CONTENTS  
Chapter 1 Introduction ............................................................................................................ 1  
1.1 CHECKLIST......................................................................................................................... 1  
1.2 ABOUT ERT-805................................................................................................................ 1  
1.3 PRODUCT FEATURE............................................................................................................ 2  
1.4 PRODUCT SPECIFICATION ................................................................................................... 2  
Chapter 2 HARDWARE INSTALLATION ................................................................................. 4  
2.1 PACKAGE CONTENTS.......................................................................................................... 4  
2.2 ERT-805 OUTLOOK............................................................................................................ 4  
2.3 INSTALLATION REQUIREMENTS & PHYSICAL INSTALLATION.................................................... 6  
2.3.1 Device placement ...................................................................................................... 6  
2.3.2 Connect to a Ethernet device .................................................................................... 6  
2.3.3 Connect to a Serial Device........................................................................................ 6  
2.3.4 Power on the device .................................................................................................. 7  
Chapter 3 Command Line Interface ....................................................................................... 8  
3.1 HELP COMMAND ................................................................................................................. 8  
3.2 REDISPLAY PREVIOUS COMMAND ........................................................................................ 9  
3.3 VERIFY CURRENT CONFIGURATION...................................................................................... 9  
3.4 CTRL-Z, CTRL-C AND EXIT................................................................................................ 10  
3.5 LOGIN FROM CONSOLE PORT ............................................................................................ 10  
3.6 VIRTUAL TERMINAL ACCESS.............................................................................................. 10  
3.7 PASSWORD ENCRYPTION.................................................................................................. 12  
Chapter 4 Router Communication Protocol........................................................................ 14  
4.1 RIP- ROUTER INFORMATION PROTOCOL............................................................................ 14  
4.1.1 Routing loops........................................................................................................... 14  
4.1.1.5 RIP Command ...................................................................................................... 15  
4.2 EIGRP ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL......................................... 17  
4.2.1 EIRGP Command.................................................................................................... 17  
4.3 OSPF- OPEN SHORTEST PATH FIRST ............................................................................... 19  
4.3.1 OSPF Command ..................................................................................................... 20  
4.4 PPP ................................................................................................................................ 22  
4.5 HDLC PROTOCOL............................................................................................................ 28  
4.6 SNA ................................................................................................................................ 30  
4.6.1 Introduction.............................................................................................................. 30  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.7 X.25 PROTOCOL .............................................................................................................. 33  
4.8 FRAME RELAY PROTOCOL................................................................................................. 37  
Chapter 5 Security ................................................................................................................. 41  
5.1 ACCESS-LIST.................................................................................................................... 41  
5.2 NAT NETWORK ADDRESS TRANSLATION ........................................................................ 44  
5.3 VPN - IPSEC ................................................................................................................... 47  
5.4 FIREWALL- CONTEXT-BASED ACCESS CONTROL (CBAC)................................................... 63  
5.5 RADIUS SECURITY (AAA).................................................................................................. 68  
Chapter 6 QOS ....................................................................................................................... 74  
6.1 CAR COMMITTED ACCESS RATE.................................................................................... 74  
6.2 POLICY-BASED ROUTING................................................................................................... 77  
6.3 CLASS-MAP AND POLICY-MAP ............................................................................................ 78  
6.4 QUEUE............................................................................................................................. 82  
6.4.1 FIFO- First IN First Out............................................................................................ 83  
6.4.2 WFQ Weighted Fair Queuing ............................................................................... 83  
6.4.3 Priority Queuing....................................................................................................... 84  
6.4.4 Custom Queuing...................................................................................................... 87  
Appendix A Upgrade firmware.............................................................................................. 92  
Appendix B Router Dialing ................................................................................................... 94  
Appendix C Cables / Pin-assignment for ERT-805 ............................................................. 96  
C.1 V.35 DTE CB-ERTV35-MT......................................................................................... 96  
C.2 V.35 DCE CB-ERTV35-FC......................................................................................... 96  
C.3 V.24 DTE CB-ERT232-MT ......................................................................................... 97  
C.4 V.24 DCE CB-ERT232-FC ......................................................................................... 98  
C.5 X.21 DTE CB-ERTX21-MT......................................................................................... 98  
C.6 X.21 DCE CB-ERTX21-FC......................................................................................... 99  
C.7 RJ-45 CONSOLE CABLE................................................................................................. 100  
C.8 DB9 TO RJ45................................................................................................................ 100  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 1 Introduction  
1.1 Checklist  
Thank you for purchasing Planets ERT-805 Enterprise Serial Router. Before continuing,  
please check the contents of your package for following parts:  
Ø
Ø
Ø
Ø
Ø
ERT-805 Serial WAN Router  
Power Cord  
DB9 adapter  
RJ-45 to RJ-45 modem cable  
Users Manual CD  
Ø
Quick installation Guide  
if any of these pieces are missing or damage please  
contact your dialer immediately.  
1.2 About ERT-805  
ERT-805 provides single WAN port, which is T1/E1 serial interface, single LAN port, and single  
console (Async) port.  
With IPSec/VPN capability, the ERT-805 not only being a standard router but also can be a  
router with feature-enhanced security. ERT-805 is supports MD5-HMAC/SHA1-HMAC and  
certificate authentication, DES-CBC and 3DES-CBC encryption.  
The other capabilities that ERT-805 provides are NAT, Access-list, AAA security, CBAC firewall  
and QOS. With these functions ERT-805 is efficiency and secure network device.  
User interface  
ERT-805 is only able to use command line interface (CLI) to configure.  
Protocol and routing  
Ø
ERT-805 supports few WAN protocols on its WAN port: PPP, HDLC, SDLC, frame-relay,  
LAPB and X.25.  
Ø
Support static and dynamic routing protocol: static route, RIP, EIGRP and OSPF  
Network Management  
Ø
Connect PC to ERT-805 through network and run Telnet to manage it through command  
line interface  
1
Download from Www.Somanuals.com. All Manuals Search And Download.  
Ø
ERT-805 supports SNMP and can be managed by using SNMP management software  
1.3 Product Feature  
Ø
Ø
Ø
Ø
Ø
Ø
Ø
Ø
Ø
Ø
Support PPP, FR, X.25, HDLC, LAPB, SDLC, SLIP and Stun  
Complies with IEEE802.3 10Base-T, IEEE 802.3u 100Base-TX Standard  
One serial WAN port, one RJ-45 10/100Mbps LAN port and one Console port  
Provide RIP, EIGRP, OSPF and Static routing protocol  
Provide Access-list, AAA, RADIUS, PAP, CHAP and CBAC for network security  
Network Address Translator (NAT) simultaneous use of one IP address  
Provide IPSec (DES/3DES), IKE and GRE for VPN  
DHCP Serve with dynamic IP assignment for LAN port  
Provide QOS to increase network efficiency  
Provide WFQ, priority queuing and custom queuing to increase network performance  
1.4 Product Specification  
Model  
ERT-805  
Device Specification  
LAN  
1 x 10/100Base-TX (RJ-45)  
WAN  
1 x Serial Port (DB-25)  
Console  
1 x RJ-45  
LED  
5; Power, LAN Speed, LAN Link/Activity, WAN and Console Link/Activity  
IEEE802.3, 10Base-T, IEEE802.3u, 100Base-TX  
Network standard  
Router OS Operation  
Communication  
Security  
PPP, frame-relay, X.25, PPPOE. HDLC, SDLC, SLIP and LAPB  
ACL, NAT, AAA RADIUS, PAP, CHAP and CBAC  
RIP V1 and V2, CDP, OSPF, EIGRP and Static  
IPSEC and IKE, GRE  
Route protocol  
VPN  
Queue/QOS  
Application  
Management  
Throughput  
WFQ, CQ, priority queuing and rate-limit. Class-map and policy-map  
DHCP server, PING, Trace Route, telnet, TFTP  
Telnet, Console  
2Mbps  
Environment / Hardware Specification  
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
Power Input  
100 ~ 240V AC (+/-10%); 50/60Hz (+/-3%) auto-sensing  
Power Consumption 10 watts / 34BTU  
Dimensions  
Weight  
217 x 135 x 43 mm (1U height)  
1 Kg  
0 to 50 degree C (operating)  
-20 to 70 degree C (storage)  
10 ~ 90% RH (non-condensing)  
FCC, CE class A  
Temperature  
Humidity  
Regulatory  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2 HARDWARE INSTALLATION  
2.1 Package Contents  
Item includes with ERT-805 serial router.  
Ø
Ø
Ø
Ø
Ø
ERT-805 Serial WAN Router  
Power Cord  
DB9 to RJ-45 changer  
Console cable  
Quick Installation Guide and CD-ROM  
Console Cable  
Black power cord  
DB-9-to-RJ-45 adapter  
CD-ROM users Guide &  
Quick Install Guide  
(e uo
(for Console Cable)  
2.2 ERT-805 outlook  
2.2.1 Front Panel  
Enterprise WAN Router  
PWR  
LAN  
SYNC ASYNC  
LNK  
ACT  
ERT-805  
100  
LED definition  
LEDs  
State  
Indication  
Green  
Lights Off  
Green  
Power on when 100~240VAC power attached  
No power  
PWR  
(Power)  
LAN  
100  
This indicator light for Fast Ethernet connection  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Green blink  
Green  
This indicator light blink when packets is transmit  
This indicator light green when port is connected  
LNK/  
ACT  
This indicator light green when port is connect with  
serial port  
Green  
Serial  
Blink  
This indicator light blink when packets is transmit  
Configuration process  
Green blink  
Lights Off  
Console  
Not in configuration  
Rear Panel  
100~240V AC  
Console  
Async.  
Fast Ethernet  
Serial  
Sync.  
50/60HZ  
LAN  
Printing  
Ports Type Description  
Asynchronies port of ERT-805. Allows the connection to a  
terminal device or PC for management or asynchronize dialing.  
Console  
RJ-45  
DB-25  
RJ-45  
Synchronies port of ERT-805. Allows the connection with a  
Synchronize/ Asynchronize device like CSU/DSU modem  
Serial  
Fast Ethernet interface of ERT-805. Allows to connect to a  
Ethernet hub/switch through Category 3 or above UTP cable.  
Fast Ethernet  
The power socket of ERT-805. The allowed power input is  
range from 100VAC to 240VAC (+/-10%), 50/60Hz (+/-3%),  
auto-sensing  
Power  
socket  
100~240VAC  
The two RJ-45 ports of ERT-805 are not a telephone port.  
Connect to a telephone wire or PSTN line to the ports may  
cause the router permanently malfunction.  
M
Warning!  
Serial cable is not bundled together with the router, please  
consult your local dealer for the available serial cable for your  
CSU/DSU modem.  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.3 Installation requirements & Physical Installation  
To install the ERT-805 serial router, the following is required:  
Ø
Ø
Ø
An Ethernet device, hub or switch with a free MDI-X RJ-45 interface  
One Category 3, 4, 5, EIA568A straight UTP cable within 100 meters  
The asynchronous modem or CSU/DSU (Channel Service Unit/Data Service Unit) that is  
planned to connect the router  
Ø
Ø
Ø
A serial cable that used to connect the router and the CSU/DSU  
Rack mount accessories, such as rack ears, screws, and screws driver  
A standalone PC or terminal device with a free COM interface  
The serial cable and rack ears do not ship with the router,  
pleas consult your local dealer for the information.  
To install ERT-805 serial router, just following the steps:  
Ø
Ø
Ø
Ø
Ø
Device placement  
Connect a Ethernet device  
Connect a Serial device  
Connect the power supply  
Connect a terminal or PC for management  
2.3.1 Device placement  
The ERT-805 is a 1-U height, 10-inch rack-mountable device that can fit to 10-inch cabinet or  
19-inch cabinet. Please consult with your local dealer for the available rack ear if you would to  
install the router into a 10-inch/19-inch shelf.  
You can also place the ERT-805 on the desktop, please install the router in a clean, dry  
environment. Avoid install the router in a place with moisture and water around/near-by.  
2.3.2 Connect to a Ethernet device  
The ERT-805 is with one Fast Ethernet MDI (media dependent Interface) port. This RJ-45  
interface an direct connect to any Ethernet or Fast Ethernet hub or switch with MDI-X port  
through Category 3 or above, 2-pair straight UTP cable. The maximum distance for the cable  
should below 100 meters.  
Connect to an Ethernet device with MDI interface, a cross-over cable is required.  
2.3.3 Connect to a Serial Device  
The ERT-805 is with one synchronize interface that can connect with CSU/DSU with up to E1  
line rate.  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
Available connection is as tables below:  
WAN Option  
RS-232  
X.21  
WAN Encapsulation  
Link control (HDLC) or ppp  
Frame-relay  
V.24  
X.25  
V.35  
2.3.4 Power on the device  
ERT-805 accepts power input from 100 to 240VAC, 50/60Hz power source. Before connect the  
power cable to the router, please be sure the AC power output from your power outlet. The  
router must connected to earth ground during normal use.  
ERT-805 is a power-required device, it means, ERT-805 will not  
work until it is powered. If your network and the router will need to  
transmit data all the time, please consider use an UPS  
(Uninterrupted Power Supply) for your router and the connected  
Ethernet Devices. It will prevent you from network data loss.  
In some area, installing a surge suppression device may also help  
to protect your router from being damaged by unregulated surge or  
current to the Switch or the power adapter  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3 Command Line Interface  
This chapter describes the basic commands to access the router through console interface or  
telnet. Be noted if you want to login to ERT-805 through the telnet, then enable password  
must be configure.  
The user can input system command configuring system protocol by command line port. When  
you first login a new router by terminal, the system will give a prompt router>. Now you are in  
user mode. After typing the command enable, the prompt will change to router#, and now you  
are in privilege mode so that you could input more commands including some privilege  
command. To enter the global configuration mode, you should type the command configure  
terminalor config T. Then the prompt will change to router(config)#, and you could input  
global configuration commands configuring the parameter of the router. If you type the  
command interface serial 0/0or int s0/0,you will notice that the prompt change to  
router(config-serial0/0)# and then you are in port configuration  
Prompt  
Mode  
Router>  
Normal User mode  
Router#  
Enable mode for privilege operation  
Configuration mode  
Rouer(config)#  
Rotuer(config-serial0/0)  
Configuration mode of object control  
Table for different configure mode  
In different configuration mode, the system will give different prompt, and every configuration  
mode has its due commands collect. From the prompt you could know what configuration  
mode you are in. The left most word of the prompt is the name of the router, from which you  
can know that which router you are configuring. You can set the hostname of the router with  
the hostname command as below:  
router# config terminal  
Enter configuration commands, one per line. End with CNTL/Z.  
router(config)# hostname ERT_805  
ERT_805(config)# exit  
ERT_805#  
3.1 Help command  
?and Tabkeys are two help keys that help user to configure ERT-805. By using a ?key in  
different operate mode, the system will display the help message that tell user what command  
they can use in different operate mode. For example:  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
ERT_805> ?  
disable  
enable  
exit  
Turn off privileged commands, enter GUEST user mode  
Turn on privileged commands  
Exit from the EXEC  
help  
logout  
pad  
Description of the interactive help system  
Exit from the EXEC  
Open a X.29 PAD connection  
ping  
ppp  
schedule  
show  
telnet  
Send echo messages  
Start IETF Point-to-Point Protocol (PPP)  
Schedule one task  
Show running system information  
Open a telnet connection  
traceroute Trace route to destination  
tty  
Print current tty information  
ERT_805>  
Tabis another help key, when user typing a word if from the letters youve typed the system  
could identify the word you want to type, press the tab key then, the system will complete the  
word for you automatically.  
3.2 Redisplay Previous command  
The system saves the inputted commands in a history table, so that you could input the  
command again by it. Just simply presskey andkey or ctrl + P or Ctrl + N.  
You could verify the commands in the history table by the command show history  
3.3 Verify Current Configuration  
The system offered two special hotkeys Ctrl-Q and Ctrl-O with which you could verify your  
configuration any time. In privilege mode, global configuration mode or port configuration  
mode, the system will display the current configuration right now if you press Ctrl-Q as if youve  
pressed show run. It means that you neednt go back to privilege mode to verify your  
configuration. The hotkey Ctrl-O is available only in port configuration mode. At anywhere even  
when typing a command, if you press the hotkey Ctrl-O, the system will show you the  
configuration message of the current port, and then you could go on with your command. This  
hotkey avoids the condition that when need verifying the configuration message you have to  
quit and enter the port configuration mode again and again. When configuring the routing  
protocol you could use the hotkey Ctrl-O as well.  
ERT_805(config-serial0/0)#  
% CONFIGURATION OF CURRENT OPERATING OBJECT  
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.1 255.255.255.192  
crypto map dynmap  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
clockrate 48000  
!
ERT_805(config-serial0/0)#  
3.4 Ctrl-Z, Ctrl-C and exit  
To exit from the configuration mode directly to privilege mode, you should type Ctrl-Z or Ctrl-C  
or type exit. Ctrl-C can be available in other occasions .For example it can stop the current  
operation that hasnt been accomplished.  
3.5 Login from Console port  
Once the terminal has connected to the device, power on the device, the terminal will display  
that it is running POST (Power on self-test) procedures.  
Then, screen as below will show up. The ERT-805 will prompt with >. This means ERT-805 is  
in operating mode now.  
Types enableto enter privilege mode. The ERT-805 will prompt with #for privilege mode.  
By default there is no password.  
Router Software Version 4.2c on Hex_1f73 (3805a)  
User Access Verification  
Password:  
ERT_805> enable  
Password:  
ERT_805#  
3.6 Virtual Terminal Access  
The router allows being accessed from network by telnet, therefore you could configure and  
maintain the router by network. Please to note, if the router hasnt set a password for entering  
privilege mode, the router will forbid the network users from entering privilege mode.  
ERT805> enable  
% Password is not set, you are not allowed to enter privileged mode.  
Before login ERT-805 by telnet you must set the password by command enable passwordin  
global configuration mode. After that router will allow youre entering the privilege mode by  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
telnet. If configures like below, the system will only ask for password when anyone access. For  
example set the password as 1234.  
ERT805> enable  
ERT805# config t  
ERT805(config)# enable password 1234  
ERT805(config)#line vty 0 4  
ERT805(config-line)# login  
ERT805(config-line)# password cisco  
ERT805(config-line)# exi  
ERT805(config)# exit  
ERT805#  
The password is set by the command passwordin vty and has no concern with what have  
been configured above by the command username. The following example shows the result  
that configure on above.  
Router Software Version 4.2c on Hex_1f73 (3805a)  
User Access Verification  
Password:  
ERT_805> enable  
Password:  
ERT_805#  
The other method is force the network user to verify his username and password. For example  
ERT805# config t  
Enter configuration commands, one per line. End with CNTL/Z.  
ERT805(config)# username rr password cisco  
ERT805(config)# line vty 0 5  
ERT805(config-line)# login local  
ERT805(config-line)# exit  
ERT805(config)# exit  
ERT805#  
The following example shows the result that configure on above:  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Router Software Version 4.2c on Hex_1f73 (3805a)  
User Access Verification  
Username: rr  
Password: (type the password cisco)  
ERT805>  
3.7 Password Encryption  
Security is a most important issue for all the company in the world because all the system is  
require password to protect important information from hacker, such as username, enable  
passwordetc. In default the system will display these password by clear. So the password is  
not very secure. The ERT-805 is offers a command that make the system display the  
password by cryptograph. For example:  
ERT_805# show run  
Building configuration ...  
description fault  
service password-encryption  
service timestamps debug  
!
hostname ERT_805  
!
enable password 7 3EDRIxtqRWCA  
!
username router password 7 65WeJR6evnrR3mP  
crypto ipsec transform-set transform-1 esp-3des esp-md5-hmac  
!
crypto map dynmap 1 ipsec-isakmp  
set transform-set transform-1  
set peer 10.0.0.2  
match address 100  
!
crypto isakmp policy 1  
authentication pre-share  
group 1  
hash md5  
!
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
crypto isakmp key 12345678 address 10.0.0.2 255.255.255.192  
!
interface fastethernet 0/0  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.1 255.255.255.192  
crypto map dynmap  
clockrate 48000  
!
interface async 0/0  
!
line vty 0 5  
login  
password 7 wAVcXxom8sGSOA  
!
ip route 0.0.0.0 0.0.0.0 10.0.0.2  
!
access-list 100 permit ip 192.168.99.0 0.0.0.255 192.168.98.0 0.0.0.255  
!
end  
ERT_805#  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4 Router Communication  
Protocol  
4.1 RIP- Router Information Protocol  
The routing information Protocol (RIP) is a distance-vector protocol that used to exchange  
routing information between routers. RIP uses broadcast User Datagram Protocol (UDP) data  
packets to exchange routing information and rip is based on distance-vector algorithm. This  
routing protocol is determines the best path through an Internet by looking at the number of  
hops between the two end nodes. The maximum hops count for RIP is 15 hops.  
4.1.1 Routing loops  
There is problem with distance-vector routing protocol, which is router cannot acquaint with the  
whole status of network. Routers have to get network reachable information depending on  
neighboring routers and RIP also comes up against slow convergence, which will introduce  
inconsistence. The following methods that used by RIP to decrease possibility of routing loop:  
spilt horizon, spilt horizon with poison reverse, Holddown timer and triggered update.  
4.1.1.1 Spilt Horizon  
The spilt horizon is a technique for preventing reverse routes between two routers. The rule of  
spilt horizon is that router never advertised the cost of a destination to neighbor if it is the  
current next-hop for the destination.  
4.1.1.2 Spilt Horizon with Poison Reverse  
The rule for split horizonis when sending updates out a particular interface, designate any  
networks that were learned from updates received on that interface as unreachable. This  
mean is when an interface is up; the router records from which interface a route comes, and  
not sends the route back to this interface.  
4.1.1.3 Holddown timer  
Holddown timer is able to prevent a router from receiving new routing information that was just  
removed from routing table. The default holddown timer is 180 seconds.  
4.1.1.4 Triggered update  
Split horizon with poisoned reverse will break any loop of two routers. However, it is still  
possible for loops of three or more routers, to occur. This loop will break only when infinity  
(presented as 16) will be reached. Triggered updates are an attempt to speed up this  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
convergence. Whenever a router changes the metric of a route, it is required to send update  
messages almost immediately  
4.1.1.5 RIP Command  
router rip enable rip in global configuration mode  
version - To specify a RIP version used globally by the router (version 1 and 2)  
auto-summary enable automatic network number summarization.  
Network Enable routing on an IP network  
Neighbor specify a neighbor router  
Bind-interface Enable RIP protocol on some interface  
Default-metric set metric of redistributed routes  
Distance define an administrative distance  
Distribute-list Filter networks in routing updates  
Offset-list To add an offset to incoming and outgoing metrics to routes learned via RIP  
Passive-interface - To disable sending routing updates on an interface.  
Redistribute - To redistribute routes from one routing domain into another routing domain.  
Timers adjust routing timers  
Validate-update-source - Perform sanity checks against source address of routing updates  
Show ip route show all routes learned through RIP  
Debug ip rip - To show RIP operation information and update messages sent or received by  
routers.  
The difference between RIPV1 and RIPV2 is RIPV2 is not a new  
protocol; rather it is RIPV1 with some extensions. The most of  
important extensions in RIPV2 is addition of a Subnet mask field to  
the routing update entries, enabling the use of VLSM.  
Example of RIP  
ERT_805# show run  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Building configuration ...  
description fault  
service password-encryption  
service timestamps debug  
!
hostname ERT_805  
!
enable password 7 3EDRIxtqRWCA  
!
username router password 7 65WeJR6evnrR3mP  
crypto ipsec transform-set transform-1 esp-3des esp-md5-hmac  
!
crypto map dynmap 1 ipsec-isakmp  
set transform-set transform-1  
set peer 10.0.0.2  
match address 100  
!
crypto isakmp policy 1  
authentication pre-share  
group 1  
hash md5  
!
crypto isakmp key 12345678 address 10.0.0.2 255.255.255.192  
!
interface fastethernet 0/0  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.1 255.255.255.192  
ip ospf network point-to-point  
crypto map dynmap  
clockrate 48000  
!
interface async 0/0  
!
router rip  
version 2  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
network 10.0.0.0  
network 192.168.99.0  
!
line vty 0 5  
login  
password 7 wAVcXxom8sGSOA  
!
ip route 0.0.0.0 0.0.0.0 10.0.0.2  
!
access-list 100 permit ip 192.168.99.0 0.0.0.255 192.168.98.0 0.0.0.255  
!
end  
ERT_805#  
ERT_805# show ip route  
Codes: A--all O--ospf S--static R--rip C--connected E--egp T--tunnel  
o--cdp D--EIGRP  
[Distance/Metric] g<Group#>  
S 0.0.0.0/0 [2/0] via 10.0.0.2 serial0/0* act  
C 10.0.0.0/26 [0/1] via 10.0.0.1 serial0/0* act  
C 10.0.0.2/32 [1/0] via 10.0.0.1 serial0/0* act  
R 192.168.98.0/24 [120/1] via 10.0.0.2 ttl=160, serial0/0* act  
C 192.168.99.0/24 [0/1] via 192.168.99.64 fastethernet0/0* act  
ERT_805#  
4.2 EIGRP Enhanced interior Gateway Routing Protocol  
EIGRP is distance-vector protocol that combines the advantage of distance-vector and link  
state protocol. The different between these two protocols is distance-vector protocol shares  
everything it knows with directly connected neighbor only. Link state protocols announce  
information with directly connected links but share the information with all routers in same area.  
Because EIGRP is distance-vector therefore its run of the Bellman Ford protocol. These  
protocols are prone to routing loops and counting to infinity. As result they must implement  
loop-avoidance such as split horizon, route poisoning and holddown timers.  
4.2.1 EIRGP Command  
router eigrp autonomous system numberenable eigrp in global configuration mode.  
Network enable routing on an IP network  
Neighbor Specify a neighbor router  
Auto-summary Enable automatic network number summarization  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Bind-interface enable EIGRP protocol on some interface  
Distance define an administrative distance  
Distribute-list filter networks in routing updates  
Metric/e modify EIREP routing metrics and parameters  
Passive-interface - To disable sending routing updates on an interface.  
Redistribute eigrp redistribute information from other routing protocol and there are some  
optional value allow user to configure which is bandwidth, delay, reliability, loading and  
mtu.  
Ip hello-interval eigrp autonomous system numberconfigure EIGRP hello interval  
Ip hold-time eigrp autonomous system number configure EIGRP hold time  
Show ip eigrp interface [detail/AS number] display interface information.  
Following is the example:  
ERT_805# show ip eigrp interface  
IP-EIGRP neighbors for process 1  
Interface  
fastethernet0/0  
Peers bandwidth delay  
state  
1000  
0
10000  
1
serial0/0  
1
1544  
20000  
1
ERT_805#  
Showipeigrpneighbor[detail/ASnumber]displayinformationofneighbor  
ERT_805# show ip eigrp neighbors  
IP-EIGRP neighbors for process 1  
H Address  
0 10.0.0.2  
RT_805#  
Interface Hold  
Uptime Seq  
(sec) (Num)  
00:45:10 4  
serial0/0 20  
ERT_805# show run  
Building configuration ...  
description fault  
service password-encryption  
service timestamps debug  
!
hostname ERT_805  
!
enable password 7 3EDRIxtqRWCA  
!
username router password 7 65WeJR6evnrR3mP  
crypto ipsec transform-set transform-1 esp-3des esp-md5-hmac  
!
crypto map dynmap 1 ipsec-isakmp  
set transform-set transform-1  
set peer 10.0.0.2  
match address 100  
!
crypto isakmp policy 1  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
authentication pre-share  
group 1  
hash md5  
!
crypto isakmp key 12345678 address 10.0.0.2 255.255.255.192  
!
interface fastethernet 0/0  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.1 255.255.255.192  
crypto map dynmap  
ip hold-time eigrp 1 20  
clockrate 48000  
!
interface async 0/0  
!
router eigrp 1  
network 192.168.99.0  
network 10.0.0.0  
!
line vty 0 5  
login  
password 7 wAVcXxom8sGSOA  
!
ip route 0.0.0.0 0.0.0.0 10.0.0.2  
!
access-list 100 permit ip 192.168.99.0 0.0.0.255 192.168.98.0 0.0.0.255  
!
end  
ERT_805#  
4.3 OSPF- Open Shortest Path First  
OSPF is a link state protocol and it uses Dijkstras Shortest Path First algorithm to run on the  
link state database. This technology is opposed to a distance-vector technology. OSPF router  
protocol is interior gateway router protocol that used to make decision on routes in  
Autonomous system. The link state protocol is use a cost metric to determine the best path to  
a destination.  
When router or networks topology start to change the routing protocol will generate a LSA and  
flood it to notify the area or network that belongs.  
Types of area  
Standard area This area can accept intra-area, inter-area and external router. This area also  
can be backbone area.  
Backbone area the backbone (transit) area always labeled area 0. Backbone area is a  
central entity that contains all other area. The backbone is responsible for distributing routing  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
information between non-backbone areas  
Stub area this area do not accept router that belong to external autonomous system (AS).  
The routers in stub area use a default route to reach outside autonomous system.  
Totally stubby area This area that does not accept routes from other intra-area and default  
routes to be propagated within the area. If the router needs to send a packet to outside of area,  
it sends it using a default route.  
Not-so-stubby-area this area allows limited number of external routes that imports into  
area.  
Types of routers  
Internal router routers that directly connected to the networks belong to the same area.  
Backbone router The router that connect with other Autonomous system bye physical or  
victual link.  
Area border router (ABR) A router that attached to multiple areas. ABR routers maintain the  
separate database for each area that connects with. Then ABR condense the topological  
information for their attached area and distribute to the backbone area.  
Autonomous System Boundary router (ASBR) This router have at least one interface  
connect to another autonomous system.  
Types of OSPF Network Topologies  
Point-to-point Two routers that directly connect each other by serial interface.  
Broadcast multiaccess Network that connects more then two routers together with  
broadcast capability. Such as Ethernet is a broadcast multiaccess.  
Nonbroadcast multiaccess (NBMA) Network support many routers but having no  
broadcast capability.  
4.3.1 OSPF Command  
router ospf <ospf ID> - enable OSPF in global configuration mode.  
Network area - address wildcard-mask area area-id  
Neighbor [poll-interval | priority] - Specify a neighbor router. For point-to-Multipoint and  
NBMA networks, neighbor must be configured. Poll-interval is for ospf dead-router polling  
interval. Priority is for ospf priority of non-broadcast neighbor.  
Area OSPF area parameters  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
area area-id authentification -specifying the authentification type is single authentification  
area area-id authentification message-digest -specifying the authentification type is  
Cryptographic authentication*/  
area area-id stub [no-summary] - specifying the area is stub area*/ /* no-summary  
emphasizes the only default summary LSA produced into the area  
area area-id default-cost cost- For stub area, default summary LSA costs value  
area area-id nssa -specifying the area is NSSA area  
area area-id range address mask [ advertise | not-advertise ] - configuring the area  
parameter of range which used to condense the network topology information */  
distance admin-distance  
redistribute [ connected | rip | static ]  
ip ospf network [ broadcast | non-broadcast | point-to-point | point-to-Multipoint ]  
ip ospf cost cost - default value is 1  
ip ospf retransmit-interval -seconds default value is 5 seconds  
ip ospf transmit-delay seconds- default value is 1 seconds  
ip ospf priority number- It is valid only for Broadcast and NBMA networks  
ip ospf hello-interval -seconds  
ip ospf dead-interval -seconds  
ip ospf authentification-key key -keys max length is 8 Bytes, it is valid when areas  
authentification type is single authentification  
ip ospf message-digest-key keyid md5 key - keys max length is 16 Bytes, it is valid when  
areas authentification type is Cryptographic authentication  
Configuration Example  
Router Software Version 4220lab-RT805 on ERT805 (4.2c )  
User Access Verification  
Password:  
ERT-805> enable  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Password:  
ERT_805# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password level 15 7 aNTUS0QSfz8T  
!
interface fastethernet 0/0  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation hdlc  
ip address 10.0.0.1 255.255.255.192  
ip ospf priority 255  
clockrate 48000  
!
interface async 0/0  
!
router ospf 2  
network 192.168.99.0 0.0.0.255 area 0  
network 10.0.0.0 0.0.0.255 area 0  
!
line vty 0 4  
login  
password 7 hd3cpRj4s14LeA  
!
ip route 0.0.0.0 0.0.0.0 10.0.0.2  
!
end  
ERT_805#  
4.4 PPP  
PPP (point-to-point) has provides a standard method for transport multi-protocol over ppp.  
PPP is comprise of three main functional components, which is:  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Ø
Ø
PPP has a method for encapsulating multi-protocol datagrams  
Link Control Protocol (LCP) establishes, configures, authenticates and testing the  
data-link connection.  
Ø
Network Control Protocol (NCP) establish and configure different network-layer protocol.  
PPP provides two authentications which is:  
Ø
Ø
Password Authentication protocol (PAP)  
Challenge Handshake Authentication protocol (CHAP)  
PPP authentication using PAP  
PAP is using two-way handshake to establish its identity. After PPP link establishment is  
complete, the authenticator repeatedly sends username and password until the authentication  
is acknowledged or the connection is terminated.  
PAP is not an authentication protocol because password is sends cross the link by clear text  
and its not protection from playback.  
PPP authentication using CHAP  
CHAP is using three way handshakes to establish it identify. After the PPP link is  
establishment is complete, the server sends challenge to the remote node. The remote note  
responds with a value calculated by using a one-way hash function (typically MD5). The server  
checks the response against its own calculation of expected hash value. If the values match,  
the authentication is acknowledged. CHAP is more secured then PAP because it is supports  
protection against playback attack through the use of a variable challenge value that is unique  
and unpredictable. The use of repeated challenges is intended to limit the time of exposure to  
any single attack. The access server is in control of the frequency and timing of the challenges.  
The following is showing a typical PPP session.  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 4-2 Networking diagram of PAP and CHAP  
authentication example  
ROUTER A  
ROUTER B  
encapsulation ppp encapsulation style to ppp style (interface command)  
ppp authentication [pap | chap - enable the PAP or CHAP authentication  
username username password password [callback-dialstring]add the username and  
password of the peer into the local user. Callback-dialstring is for callback command in global  
command  
ppp compress [predictor | stacker] configure predictor or stacker compress on the  
interface  
ip tcp header-compress configure tcp header compress on the interface.  
ppp callback [accept | initiate] configure callback on interface accept is configured in  
server and initiate is configured in client  
Configuration Example  
CHAP example  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
hostname router  
!
enable password level 15 7 aNTUS0QSfz8T  
!
username ERT-805 password 7 SBFV4NgG60tV  
!
interface fastethernet 0/0  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.1 255.255.255.192  
ppp authentication chap  
clockrate 48000  
!
interface async 0/0  
!
line vty 0 4  
login  
password 7 hd3cpRj4s14LeA  
!
ip route 192.168.98.0 255.255.255.0 10.0.0.2  
!
end  
router#  
ERT-805# show run  
Building configurati  
service password-encryption  
service timestamps debug  
!
hostname ERT-805  
!
enable password 7 5EVbxkwzBvfT  
!
username router password 7 XNDVyI32Zyje  
!
interface fastethernet 0/0  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
ppp authentication chap  
!
interface async 0/0  
!
line vty 0 4  
login  
password 7 o2EUq2a6AFiY4D  
!
ip route 192.168.99.0 255.255.255.0 10.0.0.1  
!
end  
PAP example  
outer# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password level 15 7 aNTUS0QSfz8T  
!
interface fastethernet 0/0  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.1 255.255.255.192  
ppp authentication pap  
ppp pap sent-username router password 7 wRHOiZagh-kM  
ppp compress predictor  
ip tcp hearder-compression  
!
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
interface async 0/0  
!
line vty 0 4  
login  
password 7 hd3cpRj4s14LeA  
!
ip route 192.168.98.0 255.255.255.0 10.0.0.2  
!
end  
router#  
ERT-805# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname ERT-805  
enable password 7 5EVbxkwzBvfT  
!
username router password 7 qBjbURagjK0L  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
ppp authentication pap  
ip tcp header-compression  
clockrate 48000  
!
interface async 0/0  
!
line vty 0 4  
login  
password 7 o2EUq2a6AFiY4D  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
!
ip route 192.168.99.0 255.255.255.0 10.0.0.1  
!
end  
ERT-805#  
4.5 HDLC Protocol  
Only when the interface operates in the synchronous mode, can it be encapsulated with  
HDLC.  
encapsulation hdlc encapsulation with hdlc type  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password level 15 7 aNTUS0QSfz8T  
!
username ERT-805 password 7 3hlZiJYY6pOn  
!
interface fastethernet 0/0  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation hdlc  
ip address 10.0.0.1 255.255.255.192  
!
interface async 0/0  
!
line vty 0 4  
login  
password 7 hd3cpRj4s14LeA  
!
ip route 192.168.98.0 255.255.255.0 10.0.0.2  
!
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
end  
router#  
router# debug hdlc s0/0  
router#  
03:59.544 %serial0/0 Hdlc Port debug turn on  
04:01.399 serial0/0 HDLC O(len=162):CDP 01 b4 cc 27 00 01 00 0a 72 6f  
75 74 65  
04:01.399 72 00 02 00 11 00 00 00 01 01 01 cc 00 04 0a 00 00...  
04:03.094 serial0/0 HDLC I(len=22):lmi peer_seq=155,local's=159  
04:03.753 %HDLC serial0/0 Keepalive  
04:03.753 serial0/0 HDLC O(len=22):lmi local_seq=160,peer's=155  
04:13.093 serial0/0 HDLC I(len=22):lmi peer_seq=156,local's=160  
04:13.753 %HDLC serial0/0 Keepalive  
04:13.753 serial0/0 HDLC O(len=22):lmi local_seq=161,peer's=156  
04:23.093 serial0/0 HDLC I(len=22):lmi peer_seq=157,local's=161  
04:23.753 %HDLC serial0/0 Keepalive  
04:23.753 serial0/0 HDLC O(len=22):lmi local_seq=162,peer's=157  
04:33.093 serial0/0 HDLC I(len=22):lmi peer_seq=158,local's=162  
04:33.753 %HDLC serial0/0 Keepalive  
04:33.753 serial0/0 HDLC O(len=22):lmi local_seq=163,peer's=158  
04:43.093 serial0/0 HDLC I(len=22):lmi peer_seq=159,local's=163  
04:43.753 %HDLC serial0/0 Keepalive  
04:43.753 serial0/0 HDLC O(len=22):lmi local_seq=164,peer's=159  
04:52.259 serial0/0 HDLC I(len=163):CDP 01 b4 4d 92 00 01 00 0b 45 52  
54 2d 38  
04:52.259 30 35 00 02 00 11 00 00 00 01 01 01 cc 00 04 0a 00...  
04:53.093 serial0/0 HDLC I(len=22):lmi peer_seq=160,local's=164  
04:53.753 %HDLC serial0/0 Keepalive  
04:53.753 serial0/0 HDLC O(len=22):lmi local_seq=165,peer's=160  
05:01.400 serial0/0 HDLC O(len=162):CDP 01 b4 cc 27 00 01 00 0a 72 6f  
75 74 65  
05:01.400 72 00 02 00 11 00 00 00 01 01 01 cc 00 04 0a 00 00...  
05:03.093 serial0/0 HDLC I(len=22):lmi peer_seq=161,local's=165  
05:03.753 %HDLC serial0/0 Keepalive  
05:03.753 serial0/0 HDLC O(len=22):lmi local_seq=166,peer's=161^C  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
router# no  
05:13.094 serial0/0 HDLC I(len=22):lmi peer_seq=162,local's=166de  
05:13.753 %HDLC serial0/0 Keepalive  
05:13.753 serial0/0 HDLC O(len=22):lmi local_seq=167,peer's=162  
4.6 SNA  
4.6.1 Introduction  
Switch-to-Switch Protocol (SSP) is a protocol specified in the DLSw standard that routers use  
to establish DLSw connections, locate resources, forward data, and handle flow control and  
error recovery.  
SSP provides encapsulation on TCP/IP and makes use of the reliable data transmission of  
TCP/IP between DLSw peers.  
dlsw local-peer [ biu-segment | bprder| cost | group | init-pacing-window | keepalive | lf |  
passive | peer-id | promisecuous] Define dlsw local peer  
dlsw remote-peer list tcp ip address [ backup | cost | dmac-output-list | dynamic |  
inactivity | keepalive | lf | linger | lsap-output-list | no-llc | passive | priority |  
tcp-queue-max | timeout ] Define TCP encapsulation on DLSw Remote peer  
dlsw bridge-group link DLSw to the bridge group  
dlsw timers [connect-timeout | explorer-delay-time | explorer-wait-time |  
icannotreach-block-time | local-connect-timeout | sna-cache-timeout |  
sna-explorer-timeout | sna-group-cache | sna-retry-interval | sna-verify-interval] define  
the dlsw timers  
Encapsulation sdlc encapsulation type to sdlc  
sdlc address assign the secondary stations attached to primary station  
sdlc holdq set max number of packet hold in queue  
sdlc k set the local window size  
sdlc n1 set the max size of incoming frame  
sdlc n2 - Set the number of times a Cisco IOS software will retry an operation that has timed  
out  
sdlc ip-subnet specify IP subnet  
sdlc partner - Specify the destination address with which an LLC session is established for the  
SDLC station  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
sdlc role establish role of the interface  
sdlc-largest-frame- Set the largest I-frame size that can be sent or received by the  
designated SDLC station  
sdlc simultaneous [full-datemode | half-datamode] - full-datemode is enable the primary  
station to send data to and receive data from the polled secondary station. half-datamode is  
Prohibit the primary stations from sending data to the polled secondary station.  
sdlc t1 - Control the amount of time the Cisco IOS software waits for a reply  
sdlc vmac configure a MAC for the serial interface.  
sdlc dlsw enable DLSw on an SDLC interface  
sdlc xid - Specify the XID value to be associated with the SDLC station  
sdlc poll-limit-value configure the number of times router can poll a secondary station time  
sdlc poll-pause-timer configure the time that router pause between sending each poll frame  
to secondary station  
sdlc poll-wait-timeout - specify the interval the router will wait for polls from a primary node  
before timing out that connection.  
sdlc rnr-limit configure the time that router allows its adjacent linkstation to remain in a busy  
(RNR) state before declaring it inoperative  
sdlc slow-poll enable the slow-poll capability of the router as a primary SDLC station  
sdlc t2 configure the pool time  
Figure 6-1 sna configuration example  
400.1020.1000  
Token-  
ring  
500  
IBM host  
ROUTE A  
FEP  
ROUTE B  
PU type 2.0  
sdlc address  
01  
Configuration for Router A:  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
hostname RouterA  
!
source-bridge ring-group 2000  
dlsw local-peer peer-id 150.150.10.2  
dlsw remote-peer 0 TCP 150.150.10.1  
!
interface serial 8  
IP address 150.150.10.2 255.255.255.192  
clockrate 56000  
!
interface tokening 0  
no Ip address  
ring-speed 16  
source-bridge 500 1 2000  
source-bridge spanning  
Configuration for Router B  
hostname RouterB  
!
dlsw local-peer peer-id 150.150.10.1  
dlsw remote-peer 0 TCP 150.150.10.2  
!
interface serial 1  
encapsulation hdlc  
Ip address 150.150.10.1 255.255.255.192  
no shutdown  
!
interface serial 2  
encapsulation sdlc  
clock rate 9600  
sdlc role primary  
sdlc vmac 4000.9999.0100  
sdlc address 01  
sdlc xid 01 05d20066  
sdlc partner 4000.1020.1000 01  
sdlc dlsw 01  
no shutdown  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.7 X.25 Protocol  
The X.25 protocol is defines the connection between data terminal equipment (DTE) and  
circuit-terminating equipment (DCE). X.25 is the protocol of point-to-point interaction between  
DTE and DCE equipment.  
DTE usually refers to the host or terminal at the user side and DCE usually refers to the  
synchronous modem. DTE is connected with DCE directly. DCE is connected to a port of  
packet switching exchange, and some connections are established between the packet  
switching exchanges, thus forming the paths between different DTE.  
With X.25, two DTE is able to communication to each other. Once a DTE device contacts  
another to request a communication session then it means session communication is  
established. If the request is accepted, the two systems begin full-duplex information transfer.  
The following datagram is shown the relation between entities in X.25 network  
1-1 x.25网络模型  
PSE  
DCE  
DTE  
DTE  
DTE  
DCE  
PSE  
PSE  
DCE  
PSN  
DTE 数据终端设备  
DCE 数据电路终接设备  
PSE 分组交换设备  
PSN 分组交换网  
The X.25 packet-switching protocol suits map to the lower three layers of the OSI (Open  
system Interconnection) model. X.25 layer 3 (packet-layer protocol) describes the format of  
packet used by the packet layer and the procedure of packet switching between two 3-layer  
entities. X.25 layer 2 (link-layer protocol), also called LAPB (Link Access Procedure Balanced),  
defines the format and procedure of interactive frames between DTE and DCE. X.25 layer 1  
(physical-layer protocol) defines some physical and electrical characteristics in the connection  
between DTE and DCE. The above relation is shown in the following diagram.  
VC (virtual Circuits) is logic connection between two network devices. VC is a logic and  
bi-directional path from one DTE device to another cross an X>25 network. There are two  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
types of VC, which is permanent virtual circuit (PVC) and switch virtual circuit (SVC). The  
different between PVC and SVC is PVC is permanently established connections used for  
frequent and consistent data transfers and not use call setup and call clear.  
encapsulation x25 [dce | dte] set the encapsulation style to X.25 type  
x25 address enable the X.21 address  
x25 map [Qllc] Create the mapping from the destination protocol address to X.121 address  
x25 check-called-address check incoming calls address  
x25 check-calling-address check outbound call address  
x25 compression [ predictor | stacker ] enable packet compression for x25  
x25 lic set the low incoming circuit  
x25 hic set the low incoming circuit  
x25 ltc set the low two-way circuit  
x25 htc set the high two-way circuit  
x25 loc set the low outgoing circuit  
x25 hoc set the high outgoing circuit  
x25 ips set the default maximum incoming packet size, default 128bytes  
x25 ops set the default maximum outgoing packet size. Default 128bytes  
x25 win set the default receiving window size  
x25 wout set the default sending window size  
x25 modulus setting X.25 packet number modulo. Either 8 or 128  
x25 t20 set DTE restart request retransmission timer  
x25 facility  
-
Operation  
Command  
X.25  
group-number  
facility  
facility-number  
cug  
Specify CUG (Closed User Group)  
Input the user facility number in  
hexadecimal  
X.25 facility byte-string  
Perform flow control parameter  
negotiation while initiating a call  
X.25 facility facility-number packetsize  
in-size out-size  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
X.25 facility facility-number window size  
in-size out-size  
Request reverse charging while  
initiating a call  
X.25 facility facility-number reverse  
Request throughput-level negotiation  
while initiating a call  
X.25 facility facility-number throughput  
in out  
X.25 facility facility-number throughput  
in out  
Network user ID  
x25 t21 set DTE call request retransmission timer  
x25 t22 set DTE reset request retransmission timer  
x25 t23- set DTE clear request retransmission timer  
x25 r20 set the maximum number of the timeout (restart)  
x25 r22 set the maximum number of the timeout (restore)  
x25 r23- set the Maximum number of the timeout (clear)  
x25 pvc create a permanent virtual circuit  
x25 idle specify the maximum idle time on interface  
Two routers connected with cable  
Figure 1-14 Two routers  
connecting  
Router1dce  
s1:10.1.1.1/16  
X.121 87654321  
X.121 12345678  
Router2  
dte  
s1:10.1.1.2/16  
router configuration(Use DCE cable)  
Router1:  
interface serial 1  
encapsulation x25 dce  
ip address 10.1.1.1 255.255.0.0  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
x25 address 87654321  
x25 map ip 10.1.1.2 12345678  
clockrate 9600  
Router2:  
interface serial 1  
encapsulation x25 dte  
ip address 10.1.1.2 255.255.0.0  
x25 address 12345678  
x25 map ip 10.1.1.1 87654321  
Access packet switching network  
Figure 1-16 Accessing packet switching network  
Router1  
s1:14.1.1.1/24  
x121:14111  
X25  
s1:14.1.1.2/24  
x121:14112  
s1:14.1.1.3/24  
x121:14113  
Router2  
Router3  
Router1:  
interface serial 1  
encapsulation x25  
ip address 14.1.1.1 255.255.255.0  
x25 address 14111  
x25 map ip 14.1.1.2 14112  
x25 map ip 14.1.1.3 14113  
Router2:  
interface serial 1  
encapsulation x25  
ip address 14.1.1.2 255.255.255.0  
x25 address 14112  
x25 map ip 14.1.1.1 14111  
x25 map ip 14.1.1.3 14113  
Router3:  
interface serial 1  
encapsulation x25  
ip address 14.1.1.3 255.255.255.0  
x25 address 14113  
x25 map ip 14.1.1.1 14111  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
x25 map ip 14.1.1.2 14112  
Set up network with PVC  
Router1:  
interface serial 1  
encapsulation x25  
ip address 14.1.1.1 255.255.255.0  
x25 address 14111  
x25 ltc 3  
x25 pvc 1 ip 14.1.1.2  
x25 pvc 2 ip 14.1.1.3  
Router2:  
interface serial 1  
encapsulation x25  
ip address 14.1.1.2 255.255.255.0  
x25 address 14112  
x25 ltc 3  
x25 pvc 1 ip 14.1.1.1  
x25 pvc 2 ip 14.1.1.3  
Router3:  
interface serial 1  
encapsulation x25  
ip address 14.1.1.3 255.255.255.0  
x25 address 14113  
x25 ltc 3  
x25 pvc 1 ip 14.1.1.1  
x25 pvc 2 ip 14.1.1.2  
4.8 Frame Relay Protocol  
Frame relay protocol is provides multiplexing logical data conversations over a single physical  
transmission link by assigning connection identify to each DTE devices.  
Frame relay also supports PVC and SVC for data transfer between DTE devices. The different between  
X.25 and frame relay is frame relay doesnt have the windowing and retransmission strategies. Also  
frame relay is only layer 2 protocol.  
DLCI (data-link connection identifier) identifies the logical virtual circuit between DTE and frame  
relay switch.  
Frame Relay signaling  
LMI (local management interface) is responsible for managing the connection and maintaining  
status between the CPE devices and the FR switch.  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The frame relay switch, which is responds one or more LMI types. There are three different  
LMI types: cisco, ansi and q933a.  
encapsulation frame-relay encapsulation frame relay type on serial interface  
frame-relay map ip protocol address dlci [broadcast | gateway-down | interface-down |  
payload-compression] configure static address mapping  
frame-relay dlic-group assign DLCI to some group  
frame-relay fist-dlic the number of first dlci (16-1007)  
frame-relay intf-type configure frame-relay interface type (dec, dte)  
frame-relay inverse-arp Enable/Disable inverse ARP  
frame-relay lapf set lapf parameter  
frame-relay lmi-n391 set the counter on PVC status enquiry message  
frame-relay lmi-n392 set the LMI error threshold  
frame-relay lmi-n393 set LMI monitor event counter  
frame-relay lmi-t391 set LMI T391 timer (0-4294967295)  
frame-relay lmi-t392 set DCE request confirm timer (3-30)  
frame-relay lmi-type set LMI type (ansi, cisco, q933a)  
frame-relay local-dlci set local dlci  
frame-relay num-dlci Assign the frame relay DLCI number  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 2-1 Configuration Example  
E1:142.10.2.  
Router1  
142.10.2.6/  
24  
7/24  
S1:192.1.1.1  
/24  
host_a  
S1:192.1.1.3  
17  
16  
E1:142.10.4.  
7/24  
/24  
FR  
16  
Router3  
16  
host_  
c
host_b  
S1:192.1.1.2  
/24  
Router2  
142.10.4.6/  
24  
E1:142.10.3.  
7/24  
142.10.3.6/  
24  
(1) Router1 Configuration:  
Router1>enable  
Router1#conf term  
Router1 (config)#interface s1  
Router1 (config-if)#enca fram  
Router1 (config-if)#no sh  
Router1 (config-if)#Ip addr 192.1.1.1 255.255.255.0  
Router1 (config-if)#fram first-dlci 16  
Router1 (config-if)#fram map IP 192.1.1.2 16  
Router1 (config-if)#fram map IP 192.1.1.3 17  
Router1 (config-if)# exit  
Router1 (config)#int e1  
Router1 (config-if)# no shut  
Router1 (config-if)# Ip addr 142.10.2.7 255.255.255.0  
Router1 (config-if)# exit  
Router1 (config)#IP route 142.10.3.0 255.255.255.0 192.1.1.2  
Router1 (config)#IP route 142.10.4.0 255.255.255.0 192.1.1.3  
Router1 (config)#exit  
Router1#wr  
(2) Router2 configuration:  
Router2>enable  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Router2#conf term  
Router2 (config)#interface s1  
Router2 (config-if)#enca fram  
Router2 (config-if)#no sh  
Router2 (config-if)#Ip addr 192.1.1.2 255.255.255.0  
Router2 (config-if)#fram first-dlci 16  
Router2 (config-if)#fram map IP 192.1.1.1 16  
Router2 (config-if)#exit  
Router2 (config)#int e1  
Router2 (config-if)#no shut  
Router2 (config-if)#Ip addr 142.10.3.7 255.255.255.0  
Router2 (config-if)#exit  
Router2 (config)#IP route 142.10.2.0 255.255.255.0 192.1.1.1  
Router2 (config)#exit  
Router2#wr  
(2) Router3 configuration:  
Router3>enable  
Router3#conf term  
Router3 (config)#interface s1  
Router3 (config-if)#enca fram  
Router3 (config-if)#no sh  
Router3 (config-if)#Ip addr 192.1.1.3 255.255.255.0  
Router3 (config-if)#fram first-dlci 16  
Router3 (config-if)#fram map IP 192.1.1.1 16  
Router3 (config-if)#exit  
Router3 (config)#int e1  
Router3 (config-if)#no shut  
Router3 (config-if)#Ip addr 142.10.4.7 255.255.255.0  
Router3 (config-if)#exit  
Router3 (config)#IP route 142.10.2.0 255.255.255.0 192.1.1.1  
Router3 (config)#exit  
Router3#wr  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5 Security  
5.1 Access-list  
The purpose for access-list is packet filtering to control, which packets move through the network. Such  
control can help limit network traffic and restrict network use by certain user or device.  
Access-list is use as a packet filter, this function helps to limit network traffic and restrict network.  
There are two general types of access lists:  
Ø
Standard access-lists The standard access-list is check the source address of packets.  
Access-list number is start from 1-99  
Ø
Extended access-list The extended access-list is check for both source and destination packet  
address and also check for specific protocols, port numbers and other parameters. Access-list  
number is start from 100-199  
access-list access-list number [permit | deny] set the standard access-lists rule.  
ip access-group [in | out] applies an existing access-list as an incoming or outgoing to an interface.  
Access-list access-list number [permit | deny] protocol source-address source-wildcard  
destination-address destination-wildcard [operator port] set the extended access-list rule.  
Standard access-list configuration example  
ERT-805# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname ERT-805  
!
enable password 7 5EVbxkwzBvfT  
!
username router password 7 qBjbURagjK0L  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ip address 10.0.0.2 255.255.255.192  
ip access-group 1 out  
clockrate 48000  
!
interface async 0/0  
!
router rip  
network 192.168.98.0  
network 10.0.0.0  
!
line vty 0 4  
login  
password 7 o2EUq2a6AFiY4D  
!
ip route 0.0.0.0 0.0.0.0 10.0.0.1  
!
access-list 1 permit host 192.168.98.62  
access-list 1 permit host 192.168.98.63  
access-list 1 permit host 192.168.98.64  
access-list 1 permit host 10.0.0.0  
access-list 1 deny any  
!
end  
ERT-805#  
Extended access-list configuration example  
ERT-805#  
ERT-805# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname ERT-805  
!
42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
enable password 7 5EVbxkwzBvfT  
!
username router password 7 qBjbURagjK0L  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
ip access-group 100 out  
clockrate 48000  
!
interface async 0/0  
!
router rip  
network 192.168.98.0  
network 10.0.0.0  
!
line vty 0 4  
login  
password 7 o2EUq2a6AFiY4D  
!
ip route 0.0.0.0 0.0.0.0 10.0.0.1  
!
access-list 100 deny tcp 192.168.98.66 0.0.0.0 host 192.168.99.61 eq 21  
access-list 100 permit ip any any  
!
end  
ERT-805#  
43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.2 NAT Network Address Translation  
IP address depletion is a main problem that facing in the public network. NAT (network address  
translation) is a solution that allows the IP network of an organization to appear from the outside to use  
different IP address then it own IP address.  
Because the IP address is depletion therefore not all your hosts have global unique IP addresses. NAT  
technology is translates the private IP address into public IP address before sending packets to the  
outside network. There are two different methods, which is static and dynamic NAT.  
ip nat inside source static local-ip golobal-ip configure static NAT  
ip nat [inside | outside] Enable NAT on at least one and one outside interface by interface command  
ip nat pool pool name srat-ip end-ip netmask [prefix-length | type rotary] - Define a pool of global  
addresses to be allocated as needed.  
Ip nat inside source list access-list no pool pool name [overload]- Establish dynamic source  
translation, specifying the access list defined in the prior step. [option] overload, add the overload key  
word to the command  
Access-list access-list number permit source address [source wildcard bits]  
Ip nat inside destination list access-list number pool pool name Establish dynamic inside  
destination translation,  
Ip nat outside source list access-list no pool pool name - Establish dynamic outside source  
translation, specifying the access list defined in the prior step  
Show ip nat translation display the active translations  
Show ip nat statistics display  
Debug ip nat [detailed] display a line of output for each packet that gets translated.  
Clear ip nat translation * - to clear all translated entries.  
Clear ip nat translation inside gip lip [outside <gip> <lip>] clear both of inside or outside translation  
Clear ip nat translation outside lip gip clear outside translation  
44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Static NAT Configuration  
ERT-805# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname ERT-805  
!
enable password 7 5EVbxkwzBvfT  
!
username router password 7 qBjbURagjK0L  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
ip nat inside  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
ip nat outside  
clockrate 48000  
!
interface async 0/0  
!
router rip  
network 192.168.98.0  
network 10.0.0.0  
!
line vty 0 4  
login  
password 7 o2EUq2a6AFiY4D  
!
ip nat inside source static 192.168.98.62 10.0.1.1  
!
access-list 1 permit 192.168.98.62 0.0.0.255  
access-list 1 permit 10.0.0.2 0.0.0.255  
!
end  
45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ERT-805#  
Figure of static NAT example result  
ERT-805# show ip nat translations  
Total 1 NAT translations  
Pro Inside Local  
---  
Inside Global Outside Global TTL  
192.168.98.62:0 10.0.1.1:0  
ERT-805#  
Dynamic NAT Configuration  
ERT-805# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname ERT-805  
!
enable password 7 5EVbxkwzBvfT  
username router password 7 qBjbURagjK0L  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
ip nat inside  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ip address 10.0.1.1 255.255.255.192 secondary  
ip nat outside  
ip access-group 1 out  
clockrate 48000  
!
interface async 0/0  
!
router rip  
network 192.168.98.0  
network 10.0.0.0  
!
line vty 0 4  
login  
password 7 o2EUq2a6AFiY4D  
!
ip nat pool overload 10.0.1.1 10.0.1.1 netmask 255.255.255.192  
ip nat inside source list 1 pool overload overload  
!
access-list 1 permit 192.168.98.62 0.0.0.255  
access-list 1 permit 10.0.0.2 0.0.0.255 !  
end  
5.3 VPN - IPSec  
IPSec is an implement secures the VPN (Virtual private Network). IPSec protocol includes AH  
(Authentication Header), ESP (Encapsulation Security Payload) and IKE (Internet Key Exchange),  
ISAKMP and transform.  
Ipsec security architecture provides data confidentiality, data integrality, identity authentication,  
anti-replay and DOS services. Security mechanism is implemented by AH(Authentication Header)  
protocol and ESP(Encapsulation Security Payload) protocol. Key management is implemented by IKE.  
The peers use SPI(Security Policy Index) to quote the dynamic negotiated SA(Security Association) to  
provide data security.  
crypto ipsec transform-set transform-name [transform 1] [transform 2] [transform 3]to define the  
transform set that combination of security protocols and algorithms.  
mode [ tunnel | transport] specify the mode for transform set. The default mode is tunnel.  
Initialization-vector size [4 | 8] to modify the length of the initialization-vector. The default is 8  
47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
crypto ipsec security-association lifetime [ kilobytes | seconds] to modify the time value when  
negotiating Ipsec security.  
crypto map map-name map number [ ipsec-isakmp | ipsec-manual] create a crypto map entry.  
Ipsec-isakmp is used to establish the Ipsec security for protecting the traffic. Ipsec-maunal is not using  
IKE to establish the ipsec secutiry.  
crypto map map name map number ipsec-manual  
Ø
Ø
Ø
Ø
Match address specify the extended access list for crypto map  
Transform-set - specify the transform sets that used with the crypto map entry  
set peer [hostname | ip address] specify the IPsec peer in a crypto map  
set session key [inbound | outbound] [ah| esp] spi [ciper] hex-key-data [authenticator]  
hex-key-data  
-
-
-
-
-
inbound set inbound session key  
outbound- set outbound session key  
ah set AH protocol for Ipsec session key  
ciper - Indicates that the key is to be used with the ESP encryption .  
authenticator (optional) Indicates that the key is to be used with the ESP encryption  
crypto map map name map number ipsec-isakmp  
Ø
Ø
Ø
Ø
Ø
match address specify the extended access list for crypto map  
set peer [hostname | ip address] specify the IPsec peer in a crypto map  
set Transform-set - specify the transform sets that used with the crypto map entry  
set pfs [group 1 | group 2] specify the pfs setting. Group 1 is 769-bit and group 2 is 1024 bit  
set security-association [level | lifetime]  
-
level per-host - specify the IPSec security associations should be requested for each  
source/destination host pair  
-
lifetime [seconds | kilobytes] - override the global lifetime value that is used when  
negotiating IPSec security.  
crypto map dynamic-map dynamic-map name dynamic-seq no Create dynamic-map entry.  
crypto isakmp enable enable Internet Key Exchange (IKE) at your router.  
48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
crypto isakmp key keystring address peer-address configure preshared authentication key  
crypto isakmp policy priority to define Internet Key exchange (IKE) policy  
-
-
-
-
-
hash  
encryption  
group  
authentication  
lifetime  
show crypto ipsec sa shows current connections and information regarding encrypted and  
decrypted packets.  
show crypto isakmp sa view all current IKE security association at a peer.  
clear crypto isakmp sa clears the phase 1  
clear crypto ipsec sa clears the phase 2  
debug crypto isakmp - Displays the ISAKMP negotiations of Phase 1.  
Router 1  
ERT_805# show run  
Building configuration ...  
description fault  
service password-encryption  
service timestamps debug  
!
hostname ERT_805  
!
enable password 7 3EDRIxtqRWCA  
!
username router password 7 65WeJR6evnrR3mP  
crypto ipsec transform-set transform-1 esp-3des esp-md5-hmac  
!
crypto map dynmap 1 ipsec-isakmp  
set transform-set transform-1  
set peer 10.0.0.2  
49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
match address 100  
!
crypto isakmp policy 1  
authentication pre-share  
group 1  
hash md5  
!
crypto isakmp key 12345678 address 10.0.0.2 255.255.255.192  
!
interface fastethernet 0/0  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.1 255.255.255.192  
crypto map dynmap  
clockrate 48000  
!
interface async 0/0  
!
line vty 0 5  
login  
password 7 wAVcXxom8sGSOA  
!
ip route 0.0.0.0 0.0.0.0 10.0.0.2  
!
access-list 100 permit ip 192.168.99.0 0.0.0.255 192.168.98.0 0.0.0.255  
!
end  
ERT_805#  
Router 2  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
!
hostname router  
!
enable password 7 7JDUhlA4A907  
!
username scott password 7 phTLTNmZFcwY3D  
crypto ipsec transform-set transform-1 esp-3des esp-md5-hmac  
!
crypto map dynmap 1 ipsec-isakmp  
set transform-set transfrom-1  
set peer 10.0.0.1  
match address 100  
!
crypto isakmp policy 1  
authentication pre-share  
group 1  
hash md5  
!
crypto isakmp key 12345678 address 10.0.0.1 255.255.255.192  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
crypto map dynmap  
!
interface async 0/0  
!
line vty 0 4  
login local  
!
ip route 0.0.0.0 0.0.0.0 10.0.0.1  
!
access-list 100 permit ip 192.168.98.0 0.0.0.255 192.168.99.0 0.0.0.255  
!
end  
51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
router#  
router# debug crypto isakmp  
router#  
22:34.011 Crypto ISAKMP debugging is on  
router# term  
router# terminal m  
router# terminal monitor  
router# 23:03.993 IPSEC: SEND KEEYALIVE ON PEER 10.0.0.2  
23:03.993 recv msg type=331, msg=08 0a 00 00 01 0a 00 00 02  
23:03.993 recv Ipsec Msg  
23:03.994 recv DPD req  
23:03.994 creat a DPD struct  
23:03.994 send R_U_THERE=00 00 00 20 00 00 00 01 01 10 8d 28 38 8b 12 ad e8 16  
23:03.994 7f f7 5c 1c 4b 9b 2e 25 69 1a 01 27 c6 38  
23:03.996 send msg=38 8b 12 ad e8 16 7f f7 5c 1c 4b 9b 2e 25 69 1a 08 10 05 01  
23:03.996 b4 52 6e 59 00 00 00 54 8d da 57 8a 07 85 b6 49 62 10 70 a6 a8 df f4  
23:03.996 ed d1 b7 fd e1 99 8a 60 d8 68 d8 e6 66 e8 f8 90 91 4c db 16 e6 e8 a5  
23:03.996 f4 42 26 12 c5 c5 d7 85 ec 5c 7d 60 a1 4a 98 63 57 64  
23:03.997 start IKE DPD timer conn= 17  
23:03.049 recv msg type=100, msg=29 01 f4 01 f4 0a 00 00 02 0a 00 00 01 38 8b  
1
23:03.049 2 ad e8 16 7f f7 5c 1c 4b 9b 2e 25 69 1a 08 10 05 01 b3 e7 a6 94 00  
0
23:03.049 0 00 54 ef d8 1c 37 63 4f e6 27 f2 63 bd 03 93 b0 db 66 4a c2 d5 d6  
e
23:03.049 c 01 74 ba d5 a1 88 1f 9e 6c 8a 40 5c f9 03 17 52 cd 98 c4 59 2f eb  
1
23:03.049 6 70 1b 20 0e 0d ed 30 44 95 0d 17 39  
23:03.050 recv ISAKMP:38 8b 12 ad e8 16 7f f7 5c 1c 4b 9b 2e 25 69 1a 08 10 05  
23:03.050 01 b3 e7 a6 94 00 00 00 54 ef d8 1c 37 63 4f e6 27 f2 63 bd 03 93 b0  
23:03.050 db 66 4a c2 d5 d6 ec 01 74 ba d5 a1 88 1f 9e 6c 8a 40 5c f9 03 17 52  
23:03.050 cd 98 c4 59 2f eb 16 70 1b 20 0e 0d ed 30 44 95 0d 17 39, len=84  
52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
router# show crypto ipsec sa  
interface: serial0/0  
Crypto map tag:dynmap, local addr:10.0.0.1  
Local ident (addr/mask/prot/port):192.168.99.0/255.255.255.0/0/0  
Remotel ident (addr/mask/prot/port):192.168.98.0/255.255.255.0/0/0  
PERMIT,flags={origin_is_acl,}  
Current Peer:10.0.0.2  
#pkts encaps:1160 ,pkts encrypts:1160, pkts digest:1160  
#pkts decaps:1160 ,pkts decrypts:1160, pkts verify:1160  
#pkts send errrors:0 ,pkts receive errors:0  
local crypto endpt.:10.0.0.1, remote crypto endpt.:10.0.0.2  
inbound esp sas:  
Spi: 0X103(259) sastate_mature! p_sa=259  
transform: esp-md5-hmac, esp-3des  
In use setting:{Tunnel}  
crypto map: dynmap  
sa timing: remaining key lifetime (k/sec): (313021/3345)  
IV size: 8 bytes  
replay detection support: Y  
inbound pcp sas:  
outbound esp sas:  
Spi: 0X103(259) sastate_mature! p_sa=259 in use!  
transform: esp-md5-hmac, esp-3des  
In use setting:{Tunnel}  
crypto map: dynmap  
sa timing: remaining key lifetime (k/sec): (313026/3345)  
IV size: 8 bytes  
replay detection support: Y  
outbound pcp sas:  
router#  
53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configure Ipsec Manual between routers  
Router 2  
Router 1  
Si  
Si  
s0/0 10.0.0.1 eth:192.168.99.64  
eth:192.168.98.63  
s0/0 10.0.0.2  
Router 1 configuration  
ERT-805# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname ERT-805  
!
enable password level 15 7 EJketQjD8uBh  
!
crypto ipsec transform-set test esp-des  
!
crypto map dynmap 1 ipsec-manual  
set transform-set test  
set peer 10.0.0.1  
set session-key inbound esp 256 cipher 1234567890ABCDEF  
set session-key outbound esp 256 cipher 0123456789ABCDEF  
match address 100  
!
no crypto isakmp enable  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
crypto map dynmap  
clockrate 48000  
!
interface async 0/0  
54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
!
router rip  
network 192.168.98.0  
network 10.0.0.0  
!
line vty 0 4  
login  
password 7 iFEdTlElgPbW4D  
!
!
access-list 100 permit ip 192.168.98.0 0.0.0.255 192.168.99.0 0.0.0.255  
!
end  
Router 2 configuration  
ERT-805#  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password level 15 7 aNTUS0QSfz8T  
!
crypto ipsec transform-set test esp-des  
!
crypto map dynmap 1 ipsec-manual  
set transform-set test  
set peer 10.0.0.2  
set session-key inbound esp 256 cipher 0123456789ABCDEF  
set session-key outbound esp 256 cipher 1234567890ABCDEF  
match address 100  
!
no crypto isakmp enable  
!
interface fastethernet 0/0  
55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.1 255.255.255.192  
crypto map dynmap  
!
interface async 0/0  
!
router rip  
network 192.168.99.0  
network 10.0.0.0  
!
line vty 0 4  
login  
password 7 hd3cpRj4s14LeA  
!
ip route 0.0.0.0 0.0.0.0 10.0.0.2  
!
access-list 100 permit ip 192.168.99.0 0.0.0.255 192.168.98.0 0.0.0.255  
!
end  
router#  
Dynamic example  
Router 1- central router  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password 7 St3Yuxw1NBTq  
!
crypto ipsec transform-set scott esp-des ah-md5-hmac  
!
crypto dynamic-map dy 1  
set transform-set scott  
56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
match address 100  
!
crypto map mm 1 ipsec-isakmp dynamic dy  
crypto isakmp policy 1  
authentication pre-share  
hash md5  
!
crypto isakmp key 1234 address 10.0.0.2 255.255.255.192  
!
interface fastethernet 0/0  
ip address 192.168.99.64 255.255.255.0  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.1 255.255.255.192  
crypto map mm  
clockrate 48000  
!
interface async 0/0  
!
router rip  
network 192.168.99.0  
network 10.0.0.0  
!
line vty 0 4  
login  
password 7 kdWL6UXPkdPV/B  
!
ip route 0.0.0.0 0.0.0.0 serial 0/0  
!
access-list 100 permit ip 192.168.99.0 0.0.0.255 192.168.98.0 0.0.0.255  
!
end  
router#  
Router 2 remote side  
57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname ERT-805  
!
enable password 7 uh4a5s35v9i6  
!
crypto ipsec transform-set scott esp-des ah-md5-hmac  
!
crypto map mm 1 ipsec-isakmp  
set transform-set scott  
set peer 10.0.0.1  
match address 100  
!
crypto isakmp policy 1  
authentication pre-share  
hash md5  
!
crypto isakmp key 1234 address 10.0.0.1 255.255.255.192  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
crypto map mm  
!
interface async 0/0  
!
router rip  
network 10.0.0.0  
network 192.168.98.0  
!
line vty 0 4  
login  
password 7 3Z4SNtmYpBT6BC  
58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
!
ip route 0.0.0.0 0.0.0.0 serial 0/0  
!
access-list 100 permit ip 192.168.98.0 0.0.0.255 192.168.99.0 0.0.0.255  
!
end  
ERT-805#  
router# show crypto ipsec sa  
interface: serial0/0  
Crypto map tag:dynmap, local addr:10.0.0.1  
Local ident (addr/mask/prot/port):192.168.99.0/255.255.255.0/0/0  
Remotel ident (addr/mask/prot/port):192.168.98.0/255.255.255.0/0/0  
PERMIT,flags={origin_is_acl,}  
Current Peer:10.0.0.2  
#pkts encaps:1160 ,pkts encrypts:1160, pkts digest:1160  
#pkts decaps:1160 ,pkts decrypts:1160, pkts verify:1160  
#pkts send errrors:0 ,pkts receive errors:0  
local crypto endpt.:10.0.0.1, remote crypto endpt.:10.0.0.2  
inbound esp sas:  
Spi: 0X103(256) sastate_mature! p_sa=256  
transform: esp-des  
In use setting:{Tunnel}  
crypto map: dynmap  
no sa timing:  
IV size: 8 bytes  
replay detection support: Y  
inbound pcp sas:  
outbound esp sas:  
Spi: 0X103(256) sastate_mature! p_sa=256 in use!  
transform: esp-des  
In use setting:{Tunnel}  
59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
crypto map: dynmap  
no sa timing:  
IV size: 8 bytes  
replay detection support: Y  
outbound pcp sas:  
router#  
GRE Example  
Router 1  
ERT-805> enable  
Password:  
ERT-805# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname ERT-805  
!
enable password 7 at1a2V/tbD6b  
!
crypto ipsec transform-set marc esp-3des ah-md5-hmac  
initialization-vector size 8  
!
crypto dynamic-map dy 1  
set transform-set marc  
match address 100  
!
crypto map mm 1 ipsec-isakmp dynamic dy  
crypto isakmp policy 1  
authentication pre-share  
hash sha  
!
crypto isakmp key 1234 address 0.0.0.0 0.0.0.0  
60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
!
interface fastethernet 0/0  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation hdlc  
ip address 130.0.1.2 255.255.0.0 tunnel 10.0.0.1 10.0.0.2  
ip address 10.0.0.1 255.0.0.0 secondary  
crypto map mm  
clockrate 128000  
!
interface async 0/0  
!
router rip  
version 1  
network 192.168.99.0  
network 10.0.0.0  
!
line vty 0 31  
!
access-list 100 permit ip 192.168.99.0 0.0.0.255 10.0.0.0 0.0.0.255  
!
end  
ERT-805#  
Router 2  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password 7 wonRBhc01DcE  
!
crypto ipsec transform-set marc esp-3des ah-md5-hmac  
initialization-vector size 8  
61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
!
crypto map mm 1 ipsec-isakmp  
set transform-set marc  
set peer 10.0.0.1  
match address 100  
!
crypto isakmp policy 1  
authentication pre-share  
hash sha  
!
crypto isakmp key 1234 address 10.0.0.1 255.0.0.0  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
ip nat inside  
!
interface serial 0/0  
encapsulation hdlc  
ip address 130.0.1.1 255.255.0.0 tunnel 10.0.0.2 10.0.0.1  
ip address 10.0.0.2 255.0.0.0 secondary  
ip address 10.0.0.3 255.0.0.0 secondary  
ip nat outside  
crypto map mm  
!
interface async 0/0  
!
router rip  
network 10.0.0.0  
network 192.168.98.0  
!
line vty 0 4  
login  
password 7 k2CZPVdrqEggyC  
!
ip route 0.0.0.0 0.0.0.0 serial 0/0  
ip nat pool overload 10.0.0.3 10.0.0.3 netmask 255.0.0.0  
ip nat inside source list 1 pool overload overload  
!
62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
access-list 1 permit 192.168.98.62 0.0.0.255  
access-list 100 permit ip 10.0.0.0 0.0.0.255 192.168.99.61 0.0.0.255  
!
end  
router#  
ERT-805# show ip route  
Codes: A--all O--ospf S--static R--rip C--connected E--egp T--tunnel  
o--cdp D--EIGRP, EX--EIGRP external, O--OSPF, IA--OSPF inter area  
N1--OSPF NSSA external type 1, N2--OSPF NSSA external type 2  
E1--OSPF external type 1, E2--OSPF external type 2  
[Distance/Metric] g<Group#>  
C 10.0.0.0/8 [0/1] via 10.0.0.1 serial0/0* act  
C 130.0.0.0/16 [0/1] via 130.0.1.2 Tunnel<serial0/0>* act  
192.168.98.0/24 [120/1]  
R
R
via 10.0.0.3, ttl=150, serial0/0 act  
via 10.0.0.2, ttl=150, serial0/0 act  
C 192.168.99.0/24 [0/1] via 192.168.99.64 fastethernet0/0* act  
ERT-805#  
5.4 Firewall- Context-Based Access Control (CBAC)  
Security is an important issue in IT world. Most of people may know about firewall, it is use to prevent  
unauthorized, external individuals from gaining access into your network. Context-Based Access  
Control (CBAC) is a new feature technology that turns your router into an effective and robust firewall.  
CBAC is includes the following features:  
Ø
Ø
Ø
Ø
Ø
Basic and advanced traffic filtering  
Security serer support  
Network Address translation  
Cisco encryption technology  
IPSec network security  
63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Ø
Ø
Neighbor router authentication  
Even logging  
CBAC uses timeout and thresholds to determine how long to manage information for a session and  
when to drop the session that connects is failed. CBAC is only check with TCP and UDP but not ICMP.  
The following example is showing the user how to configure CBAC.  
ip inspect alert-off disable alert  
ip audit-trail enable the logging of session information  
ip dns-timeout specify timeout for DNS  
ip hashtable-size specify size of hashtable  
ip max-incomplete [low | high] specify the number of incomplete connection before clamping  
ip one-minute [low | high] specify the rate of new unestablished TCP session that will cause the  
software to stop/start deleting half-open session  
ip inspect udp idle-time specify the idle timeout for udp  
ip inspect tcp [finwait-time | idle-time | max-incomplete | synwait-time] configure timeout value  
for tcp connections  
-
-
-
finwait-time specify timeout for TCP connections after firewall detect a FIN exchange  
idle-time specify the TCP connection idle-timeout  
max-incomplete host half-open session block-time- specify max half-open connection per  
host  
-
synwait-time specify the timeout for TCP connects after SYN  
ip inspect name name of inspect [protocol] timeout configure CBAC inspection protocol eg tcp,  
http, udp, smtp and more.  
show ip inspect all show all CBAC configuration and all existing session  
show ip inspect config show the complete CBAC inspection configuration  
show ip inspect name inspect name show a particular inspection rule  
64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
show ip inspect interface show interface configuration with inspection rule and access-list  
show ip inspect session display the current session that have been established  
debug ip inspect events display the information about CBAC events  
debug ip inspect object-creation display the message about object that create by CBAC.  
debug ip inspect object-deletion display the message about object being delete by CBAC  
debug ip inspect protocol display the information about protocol eg http, tcp, ftpetc  
Configuration Example  
Building configuration...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password 7 Pl2cGlY8liD4  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
ip access-group 100 in  
ip inspect test out  
!
interface async 0/0  
!
router rip  
network 10.0.0.0  
network 192.168.98.0  
!
line vty 0 5  
login  
password 7 tF4VZx7eRx5VcC  
!
65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ip route 0.0.0.0 0.0.0.0 10.0.0.1  
ip inspect audit-trail  
ip inspect max-incomplete low 100  
ip inspect max-incomplete high 120  
ip inspect one-minute low 100  
ip inspect one-minute high 120  
ip inspect tcp synwait-time 50  
ip inspect name test http  
ip inspect name test ftp  
ip inspect name test udp  
ip inspect name test tcp  
ip inspect name test smtp  
ip inspect name test fragment maximum 100  
!
access-list 100 permit tcp host 192.168.99.61 host 192.168.98.62  
access-list 100 deny tcp any any  
access-list 100 deny udp any any  
access-list 100 permit ip any any  
!
end  
router#  
router# show ip inspect sessions  
CBAC built 2 sessions:  
dns: 192.168.98.62(1034)=>168.95.1.1(53) state:UDP_CLIENT_SYN (0X40227)  
dns: 192.168.98.62(1034)=>139.175.55.244(53) state:UDP_CLIENT_SYN (0X40228)  
CBAC built 1 sessions:  
dns: 192.168.98.62(1034)=>168.95.1.1(53) state:UDP_CLIENT_SYN (0X40229)  
router#  
router# debug ip inspect tcp  
router# terminal monitor  
25:54.237 CBAC: RCV TCP packet 192.168.98.62:1412=>192.168.99.61:21  
fastethern  
25:54.237 et0/0  
25:54.263 CBAC:RCVTCPpacket192.168.99.61:21=>192.168.98.62:1412serial0/0  
25:54.265 CBAC: RCV TCP packet 192.168.98.62:1412=>192.168.99.61:21  
fastethern  
25:54.265 et0/0  
66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
25:54.379 CBAC:RCVTCPpacket192.168.99.61:21=>192.168.98.62:1412serial0/0  
25:54.569 CBAC: RCV TCP packet 192.168.98.62:1412=>192.168.99.61:21  
fastethern  
25:54.569 et0/0  
25:58.813 CBAC: RCV TCP packet 192.168.98.62:1412=>192.168.99.61:21  
fastethern  
25:58.813 et0/0  
25:58.850 CBAC:RCVTCPpacket192.168.99.61:21=>192.168.98.62:1412serial0/0  
25:58.975 CBAC: RCV TCP packet 192.168.98.62:1412=>192.168.99.61:21  
fastethern  
25:58.975 et0/0  
25:59.714 CBAC: RCV TCP packet 192.168.98.62:1412=>192.168.99.61:21  
fastethern  
25:59.714 et0/0  
25:59.873 CBAC:RCVTCPpacket192.168.99.61:21=>192.168.98.62:1412serial0/0  
26:00.054 CBAC:RCVTCPpacket192.168.99.61:21=>192.168.98.62:1412serial0/0  
26:00.176 CBAC: RCV TCP packet 192.168.98.62:1412=>192.168.99.61:21  
fastethern  
26:00.176 et0/0  
router# debug ip inspect object-creation  
27:05.711 INSPECT Object Creations debugging is on  
27:14.453 CBAC: creat a session table (0x40230)  
27:14.453 CBAC: building a new tcp session  
28:37.100 CBAC: creat a session table (0x40231)  
28:37.100 CBAC: building a new udp session (0x40231)  
28:41.098 CBAC: creat a session table (0x40232)  
28:41.098 CBAC: building a new udp session (0x40232)  
28:44.123 CBAC: creat a session table (0x40233)  
28:44.124 CBAC: building a new udp session (0x40233)  
28:48.127 CBAC: creat a session table (0x40234)  
28:48.128 CBAC: building a new udp session (0x40234)  
28:54.362 CBAC: creat a session table (0x40235)  
28:54.362 CBAC: building a new tcp session  
router#  
router# debug ip inspect object-deletion  
29:33.138 INSPECT Object Deletions debugging is on  
67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
29:37.201 CBAC: delete a session table (40235)  
29:40.059 CBAC: delete a session table (40232)  
29:45.059 CBAC: delete a session table (40230)  
29:58.059 CBAC: delete a host session table  
29:58.059 CBAC: delete a session table (40236)  
5.5 Radius Security (AAA)  
AAA (Authentication Authorization Accounting) is the way that allows access to the network server and what  
services they are allow using once they have access.  
radius-server host ip address of radius server [acc-port | auth-port] specify the IP address of the  
RADIUS server.  
radius-server key specify the key between the access point and RADIUS server  
radius-server retransmit specify the number of times the access point sends the request to server  
radius-server timeout specify the number of seconds that access point waits for a reply to a  
RADIUS request before resending the request.  
Radius-server deadtime specify the time that mark as deadwhen RADIUS server fail to respond to  
authentication request.  
aaa authentication ppp authentication name [local | radius] specify aaa authentication methods for  
use on serial interface and running ppp  
aaa accounting network name accounting list start-stop radius runs start-stop accounting for all  
packet service and use radius server.  
ppp pap send-username pap username password pap password enable the remote pap support  
for an interface and send the pap authentication request packets.  
ppp authentication [chap | pap] specify the chap or pap authentication on interface  
ppp chap hostname configure the chap hostname  
ppp chap password configure the chap password  
ppp compress [predictor | stacker] configure predictor or stacker compress on the interface  
Configuration Example  
PAP example  
Router 1  
68  
Download from Www.Somanuals.com. All Manuals Search And Download.  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password 7 St3Yuxw1NBTq  
!
aaa authentication ppp scott radius  
aaa accounting network scott start-stop radius  
username scott password 7 1clZ5Mnm-XEu  
!
interface fastethernet 0/0  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.1 255.255.255.192  
ppp authentication pap scott  
ppp accounting scott  
clockrate 48000  
!
interface async 0/0  
!
router rip  
network 192.168.99.0  
network 10.0.0.0  
!
line vty 0 4  
login  
password 7 kdWL6UXPkdPV/B  
!
ip route 0.0.0.0 0.0.0.0 serial 0/0  
radius-server key 7 DRjQtY26F/tc  
radius-server deadtime 2  
radius-server retransmit 4  
69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
radius-server host 192.168.99.63  
!
end  
router#  
Router 2  
ERT-805> enable  
Password:  
ERT-805# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname ERT-805  
!
enable password 7 uh4a5s35v9i6  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
ppp pap sent-username scott password 7 ZVnRE6gNg/-O  
!
interface async 0/0  
!
router rip  
network 10.0.0.0  
network 192.168.98.0  
!
line vty 0 4  
login  
password 7 3Z4SNtmYpBT6BC  
!
70  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ip route 0.0.0.0 0.0.0.0 serial 0/0  
!
end  
ERT-805#  
CHAP Example  
Router 1  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password 7 St3Yuxw1NBTq  
!
aaa authentication ppp scott radius  
aaa accounting network scott start-stop radius  
username scott password 7 1clZ5Mnm-XEu  
!
interface fastethernet 0/0  
ip address 192.168.99.64 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.1 255.255.255.192  
ppp authentication chap scott  
ppp accounting scott  
clockrate 48000  
!
interface async 0/0  
!
router rip  
network 192.168.99.0  
network 10.0.0.0  
71  
Download from Www.Somanuals.com. All Manuals Search And Download.  
!
line vty 0 4  
login  
password 7 kdWL6UXPkdPV/B  
!
ip route 0.0.0.0 0.0.0.0 serial 0/0  
radius-server key 7 DRjQtY26F/tc  
radius-server deadtime 2  
radius-server retransmit 4  
radius-server host 192.168.99.63 acct-port 1646 auth-port 1645  
!
end  
router#  
Router 2  
ERT-805> enable  
Password:  
Password:  
ERT-805# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname ERT-805  
!
enable password 7 uh4a5s35v9i6  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
ppp chap hostname scott  
ppp chap password 7 vI3c39uvvCdX  
72  
Download from Www.Somanuals.com. All Manuals Search And Download.  
!
interface async 0/0  
!
router rip  
network 10.0.0.0  
network 192.168.98.0  
!
line vty 0 4  
login  
password 7 3Z4SNtmYpBT6BC  
!
ip route 0.0.0.0 0.0.0.0 serial 0/0  
!
end  
ERT-805#  
Debug radius  
13:51.914 #Line serial0/0 Protocol Up  
13:51.921 Radius: Send to 192.168.99.63:1646, Accounting_Request, id 0xfe, len  
13:51.921 52  
13:51.922  
13:51.922  
13:51.923  
13:51.923  
13:51.923  
13:51.924  
13:51.924  
13:51.925  
13:51.925  
13:51.925  
Attribute type: ATTR_USER_NAME, len: 7  
value: 73 63 6f 74 74  
Attribute type: ATTR_CLASS, len: 6  
value: 61 14 6 ae  
Attribute type: ATTR_ACCT_STATUS_TYPE, len: 6  
value: 0 0 0 1  
Attribute type: ATTR_ACCT_SESSION_ID, len: 6  
value: 0 0 0 5  
Attribute type: ATTR_USER_NAME, len: 7  
value: 73 63 6f 74 74  
13:51.931 Radius: Received from 192.168.99.63:1646, Accounting_Response, id 0xf  
13:51.931 e, len 20  
13:51.931 Radius: No attributes in Message  
73  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6 QOS  
Quality of service (QOS) is use to improve the network efficiency. ERT-805 provides some different  
QOS, which are CAR, Policy-based Routing, Weight fair queuing and class-map  
6.1 CAR Committed Access Rate  
CAR (Committed Access Rate) is allows user to limit the output transmission rate on an interface. CAR  
provides two qualities of service functions:  
Ø
Ø
Bandwidth management through rate limit  
Packet classification through IP precedence  
The following example is shows how to configuration CAR:  
rate-limit output [access-group] access-list no bps Normal bust number Maximum bust number  
conform-action conform action exceed-action exceed action configure CAR and distributed  
policies.  
Applies this CAR traffic policy to packets sent on this output  
output  
interface.  
(Optional) Applies this CAR traffic policy to the specified access  
access-group  
list.  
bps  
Average rate, in bits per second (bps).  
Normal burst size, in bytes.  
Normal burst bytes  
Maximun bust bytes  
Excess burst size, in bytes.  
·
·
·
continueEvaluates the other rate-limit  
dropDrops the packet.  
conform-action  
conform-action  
transmitSends the packet.  
·
·
·
continueEvaluates the other rate-limit .  
dropDrops the packet.  
exceed-action exceed-action  
transmitSends the packet.  
74  
Download from Www.Somanuals.com. All Manuals Search And Download.  
·
·
·
continue Evaluates the other rate-limit  
drop Drops the packet  
Violate-action  
transmit Sends  
show interface rate-limit display information about CAR for an interface  
Configuration Example  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname ERT-805  
!
enable password 7 uh4a5s35v9i6  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
rate-limit output access-group 100 9600 24000 32000 conform-action transmit  
exceed-action drop  
rate-limit output access-group 101 8000 24000 32000 conform-action transmit  
exceed-action drop  
rate-limit output 10000 16000 24000 conform-action transmit exceed-action drop  
!
interface async 0/0  
!
router rip  
network 10.0.0.0  
network 192.168.98.0  
!
line vty 0 4  
login  
75  
Download from Www.Somanuals.com. All Manuals Search And Download.  
password 7 3Z4SNtmYpBT6BC  
!
ip route 0.0.0.0 0.0.0.0 serial 0/0  
!
access-list 100 permit tcp any any eq www  
access-list 101 permit tcp any any eq ftp  
!
end  
router#  
router# show interface s0/0 rate-limit  
Output  
matches: access-group 100  
params: 9600 bps, 24000 limit, 32000 extended limit  
conformed 3582 packets, 219373 bytes; action: transmit  
exceeded 0 packets, 0 bytes; action: drop  
last packet: 2ms ago, current burst: 23939 bytes  
conformed 2014 bps, exceeded 0 bps  
Output  
matches: access-group 101  
params: 8000 bps, 24000 limit, 32000 extended limit  
conformed 37 packets, 2489 bytes; action: transmit  
exceeded 0 packets, 0 bytes; action: drop  
last packet: 157119ms ago, current burst: 23918 bytes  
conformed 0 bps, exceeded 0 bps  
Output  
matches: all traffic  
params: 10000 bps, 16000 limit, 24000 extended limit  
conformed 2450 packets, 2322667 bytes; action: transmi  
exceeded 22 packets, 33462 bytes; action: drop  
last packet: 1ms ago, current burst: 15939 bytes  
conformed 122 bps, exceeded 0 bps  
router#  
76  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.2 Policy-based Routing  
PBR (policy-based routing) is allows user manually to defined policy that how to received packets  
should be routed and also allows user to identify packets using several attributes to specify the next  
hop to which the packet should be sent.  
route-map map-name [deny | permit] sequence-number to define the condition for policy routing  
match ip address access-list number to specify the condition by access-list  
match length min max to establish criteria based on packet length.  
set ip next-hop ip address for next hop to specify the next-hop router in path that packets should be  
forward.  
ip policy route-map map name identify a route map to use for policy routing on an interface.  
set interface type of interface specify a list of interface which the packets can be routed.  
traceroute Trace route to destination address - discovers the routes packets follow when traveling to  
their destinations  
Configuration Example  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password 7 wonRBhc01DcE  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation hdlc  
ip address 10.0.0.2 255.0.0.0  
ip policy route-map richard  
!
interface async 0/0  
!
77  
Download from Www.Somanuals.com. All Manuals Search And Download.  
router rip  
version 2  
network 10.0.0.0  
network 192.168.98.0  
!
line vty 0 4  
login  
password 7 k2CZPVdrqEggyC  
!
route-map richard  
match ip address 1  
set interface serial 0/0  
set ip next-hop 10.0.0.1  
!
access-list 1 permit 192.168.98.62 0.0.0.255  
!
end  
router#  
6.3 Class-map and policy-map  
Class-map command is a global command which is for specify a traffic class containing match criteria.  
This command is used to create traffic class only the traffic policy must use the other command that is  
policy-map to specify.  
The traffic class is associated with traffic policy when the class command is used. After entering the  
class command, you are automatically in policy-map class configuration mode, which is where the  
QoS policies for the traffic policy are defined. The following example is shows how to configure  
Class-map.  
class-map [match-all | match-any] class-map name specify the traffic class.  
-
match-all when all of the match criteria in class-map must met for traffic entering that  
specify in class-map.  
-
match-any when one of the match criteria in class-map must met for traffic entering that  
specify in class-map  
match access-group access-list no specify the access-list index  
78  
Download from Www.Somanuals.com. All Manuals Search And Download.  
any match any packets  
match input-interface specify an input interface to match  
match class-map class-map name specify the traffic class as a match criterion.  
match ip rtp lower bound of UDP destination prot configure class-map that use rtp protocol port as  
match criterion  
match protocol ip [ tcp | upd] tcp/udp port number specify the class-map that use two different  
protocol as match criterion.  
policy-map map name configure the policies for class whose match criteria for a class.  
class class-map name specify the policy criteria  
bandwidth [ percent | remaining | 8-2000000 ] specify the bandwidth for a class that belong to a  
policy map  
fair-queue specify the number of dynamic queues  
shape [average | max-buffer | peak ] specify the traffic shaping  
queue-limit packets Specify the maximum number of packets that queue for a traffic class  
priority [percent | 8-2000000 ] specify the guaranteed allow bandwidth in kilo bits or percent for  
priority traffic  
police [access-group | bps per second bps burst-normal burst-max ] conform-action action  
exceed-action action violate-action action Specify the maximum bandwidth usage by a traffic class.  
show policy-map interface interface display configuration and statistics of the policy that attached to  
an interface  
show class-map display all configuration traffic policy  
show class-map class-map name display the information of user-specific traffic policies.  
Configuration Example  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
79  
Download from Www.Somanuals.com. All Manuals Search And Download.  
enable password 7 wonRBhc01DcE  
!
class-map match-any test  
match access-group 101  
match protocol ip tcp 80  
match input-interface serial 0/0  
!
class-map match-any test1  
match access-group 102  
match protocol ip tcp 80  
match input-interface serial 0/0  
!
policy-map richard  
class test  
bandwidth percent 60  
queue-limit 2  
!
class test1  
bandwidth percent 40  
queue-limit 2  
!
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation hdlc  
ip address 10.0.0.2 255.0.0.0  
service-policy Richard  
!
interface async 0/0  
!
router rip  
version 1  
network 192.168.98.0  
network 10.0.0.0  
!
line vty 0 4  
80  
Download from Www.Somanuals.com. All Manuals Search And Download.  
login  
password 7 k2CZPVdrqEggyC  
!
ip route 192.168.99.0 255.255.255.0 10.0.0.1  
!
access-list 1 permit 192.168.98.62 0.0.0.255  
access-list 101 permit ip host 192.168.98.62 any  
access-list 102 permit ip host 192.168.98.63 any  
!
end  
router#  
router# show policy-map interface s0/0  
serial0/0  
Service-policy output: marc  
Class-map: test (match-any)  
13765 packets, 842504 bytes  
5 minute offered rate 0 bps, drop rate 0 bps  
Match: access-group 100  
Match: protocol ip tcp 80  
Match: input-interface serial0/0  
Weighted Fair Queueing  
Output Queue: Conversation  
Bandwidth 60 (%) Max Thresh 2 (packets)  
(pkts matched/bytes matched) 13765/842504  
Traffic Shaping  
Target Byte  
Rate Limit  
Sustain Excess Interval Increment Adapt  
bits/int bits/int (ms)  
154400000 154400000 1000  
(bytes) Active  
154400000 4000  
Queue  
0
no  
Packets Bytes  
Packets Bytes  
Shaping  
Depth  
Delayed Delayed Active  
no  
0
0
0
0
0
Class-map: test1 (match-any)  
0 packets, 0 bytes  
5 minute offered rate 0 bps, drop rate 0 bps  
Match: access-group 101  
Match: input-interface serial0/0  
Match: class-map test  
81  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Weighted Fair Queueing  
Output Queue: Conversation  
Bandwidth 40 (%) Max Thresh 2 (packets)  
(pkts matched/bytes matched) 0/0  
Class-map: class-default (match-all)  
137 packets, 8713 bytes  
5 minute offered rate 153 bps, drop rate 0 bps  
Match any  
router#  
router# show class-map  
Class Map match-any class-default (id 0)  
Match any  
Class Map match-any test (id 1)  
Match access-group 100  
Match protocol ip tcp 80  
Match input-interface serial0/0  
Class Map match-any test1 (id 2)  
Match access-group 101  
Match input-interface serial0/0  
Match class-map test  
router#  
6.4 Queue  
Traffic prioritization is very important for a delay-sensitive, interactive and transaction-based application.  
Traffic prioritization is most effective on WAN link that combination of busy traffic and relatively lower  
data rates can cause temporary congestion.  
Congestion management feature allow user to control traffic by determining the packets order based on  
priorities assigned to those packets. Congestion management entails the creation of queues,  
assignment of packets to those queues based on the classification of the packet, and scheduling of the  
82  
Download from Www.Somanuals.com. All Manuals Search And Download.  
packets in a queue for transmission. ERT-805 is provides four different types of queue that is FIFO  
(default in all router), WFQ (Weighed fair queuing), priority queuing and custom queuing.  
6.4.1 FIFO- First IN First Out  
The traffic for FIFO is transmitted in the order received, without regard bandwidth consumption. In FIFO  
all packets is treated equally. Packets are sent out an interface in the order. This method is default for  
all router interfaces.  
6.4.2 WFQ Weighted Fair Queuing  
WFQ is an automated method that provides fair bandwidth allocation to all network traffic. WFQ breaks  
up the train of packets within a conversation to ensure that bandwidth is shared fairly between  
individual conversations and that low-volume traffic is transferred in a timely fashion  
fair-queue congestive-discard-threshold dynamic-queue reservable-queue configuration an interface  
to use WFQ  
show queueing fair display status of fair configuration  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password 7 St3Yuxw1NBTq  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
fair-queue 64 128  
!
83  
Download from Www.Somanuals.com. All Manuals Search And Download.  
interface async 0/0  
!
router rip  
network 192.168.98.0  
network 10.0.0.0  
!
line vty 0 4  
login  
password 7 kdWL6UXPkdPV/B  
!
ip route 0.0.0.0 0.0.0.0 serial 0/0  
router# show queueing fair  
Current fair queue configuration:  
Interface  
serial0/0  
Discard  
threshold  
64  
Dynamic  
queue count  
2
Reserved  
queue count  
0
router# show queue s0/0  
Weighted Fair Queueing  
Input queue: 0/0/0 (size/max/drops); Total output drops: 0  
Queueing strategy: Weighted Fair Queueing  
Output queue: IP: 10.0.0.2  
0/1000/64/0/1559 (size/max total/threshold/drops/forwards)  
Conversations 1/128 (active/max total)  
Reserved Conversations 0/0 (allocated/max allocated)  
router#  
6.4.3 Priority Queuing  
Priority queuing allow user to define the traffic priority in the network. This technique is useful in  
environment which important traffic should not be delayed by less important traffic.  
The following example is how to configuration priority queuing:  
priority-list list number protocol ip [high | medium | normal | low] queue-keyword Establish  
84  
Download from Www.Somanuals.com. All Manuals Search And Download.  
priority queuing based on protocol type  
priority-list list number interface interface type interface no [high | medium | normal | low] –  
Establish priority queuing for all traffic entering on an incoming interface  
priority-list list number default [high | medium | normal | low] - Assign the a priority queuing for  
those packets that doesnt match any other rule in queue  
priority-list list number queue-limit specify the maximum number of packets in each queue  
Priority Queue Argument Packet Limits (default)  
High  
20  
40  
60  
80  
Medium  
Normal  
Low  
priority-group list number Assign priority into interface  
show queueing priority display the status of priority queue list  
show interface interface type interface no displays the detailed queue information  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password 7 Pl2cGlY8liD4  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
ip access-group 100 in  
priority-group 2  
!
!
85  
Download from Www.Somanuals.com. All Manuals Search And Download.  
interface async 0/0  
!
router rip  
network 10.0.0.0  
network 192.168.98.0  
!
line vty 0 5  
login  
password 7 tF4VZx7eRx5VcC  
!
ip route 0.0.0.0 0.0.0.0 10.0.0.1  
!
access-list 100 permit tcp host 192.168.99.61 host 192.168.98.62  
access-list 100 permit ip any any  
priority-list 2 protocol ip high tcp 80  
priority-list 2 protocol ip high list 100  
priority-list 2 interface fastethernet 0/0 medium  
priority-list 2 protocol ip normal  
priority-list 2 default low  
priority-list 2 queue-limit 15 20 20 30  
!
end  
router#  
router# show queueing priority  
Current priority queue configuration:  
List Queue Args  
2
2
2
2
2
2
2
2
low  
default  
high protocol ip  
high protocol ip  
tcp  
port 80  
list 100  
medium interface fastethernet0/0  
normal protocol ip  
high limit 15  
medium limit 20  
normal limit 20  
86  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2
low  
limit 30  
router#  
router# show queue s0/0  
Priority Queueing, priority-list 2  
router#  
router# show int s0/0  
serial0/0 is administratively up, line protocol is up  
Hardware is RT800-E  
Encapsulation PPP, loopback not set, keepalive set (10 sec)  
LCP Open  
IPCP Open, CCP Closed, CDP Open, MPLSCP Close  
Queueing strategy: priority-list 2  
Output queue: (priority #: size/max/drops/forwards), IP: 10.0.0.2  
high: 0/15/0/508 medium: 0/20/0/814  
normal: 0/20/0/0 low: 0/30/0/0  
5 minute input rate 54 bits/sec, 0 packets/sec  
5 minute output rate 54 bits/sec, 0 packets/sec  
1714 packets input, 1843207 bytes, 0 no buffer  
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles  
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort  
1718 packets output, 69301 bytes, 0 underruns  
0 output errors, 0 collisions, 1 interface resets  
0 output buffer failures, 0 output buffers swapped out  
1 carrier transitions, 0 internal resets, 0 switch line hook  
software flowcontrol state is none/none (in/out)  
current tx-queue: 0/0/0(nor/exp/sum)  
DCD=up DSR=up DTR=up RTS=up CTS=up  
6.4.4 Custom Queuing  
Custom queuing allows user to specify a number of bytes to each queue and each protocol. The  
following examples are showing how to configure CQ.  
PS: Please note that only one queue assign per interface.  
queue-list list number protocol ip queue-number queue-keyword - Establish custom queuing based  
on protocol type  
87  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Queue-keyword  
Fragments  
keyword-value  
NULL  
Explain  
Any fragments ip packet  
Assigns traffic priorities according  
to a specified list.  
List  
List-number  
Specifies a less-than count. The priority  
level assigned goes into effect when a  
packet size is less than the value  
Lt  
Byte-count  
entered for the byte-count argument.  
Specifies a greater-than count.  
The priority level assigned goes into  
effect when a packet size exceeds  
the value entered for the byte-count  
argument.  
Gt  
Byte-count  
Assigns the priority level defined to TCP  
segments originating from or destined  
to a specified port.  
Tcp  
Udp  
Port  
Port  
Assigns the priority level defined to  
UDP packets originating from or  
destined to a specified port.  
queue-list list number interface interface type interface number queue number Establish priority  
from a given interface  
queue-list list number default queue number Assigns the queue number for those packets that  
doesnt match any rule in custom queue.  
queue-list list number queue queue number limit limit number specify the max number of packets  
allows in each custom queue. The range is start 0 1024  
queue-list list number queue queue number byte-count byte-count number specify the size of bytes  
per queue.  
custom-queue-list list number Assign custom list to interface  
show interface interface type interface number display the current status of the custom output  
show queueing custom - display the status of custom queue list  
88  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configuration Example  
router# show run  
Building configuration ...  
service password-encryption  
service timestamps debug  
!
hostname router  
!
enable password 7 Pl2cGlY8liD4  
!
interface fastethernet 0/0  
ip address 192.168.98.63 255.255.255.0  
!
interface serial 0/0  
encapsulation ppp  
ip address 10.0.0.2 255.255.255.192  
custom-queue-list 10  
!
interface async 0/0  
!
router rip  
network 10.0.0.0  
network 192.168.98.0  
!
line vty 0 5  
login  
password 7 tF4VZx7eRx5VcC  
!
ip route 0.0.0.0 0.0.0.0 10.0.0.1  
!
access-list 1 permit 192.168.98.62 0.0.0.255  
queue-list 10 protocol ip 1 tcp 80  
queue-list 10 interface serial 0/0 2  
queue-list 10 protocol ip 3  
queue-list 10 queue 4 byte-count 115200  
queue-list 10 queue 4 limit 10  
89  
Download from Www.Somanuals.com. All Manuals Search And Download.  
queue-list 10 default 5  
queue-list 10 protocol ip 1 list 1  
!
end  
router#  
router# show int s0/0  
serial0/0 is administratively up, line protocol is up  
Hardware is RT800-E  
Encapsulation PPP, loopback not set, keepalive set (10 sec!  
IPCP Open, CCP Closed, CDP Open, MPLSCP Close  
Queueing strategy: custom-queue-list 2  
Output queues: (queue #: size/max/drops/forwards), IP: 10.0.0.2  
0:0/20/0/58 1:0/20/0/38 2:0/20/0/0 3:0/20/0/1914  
4:0/20/0/0 5:0/20/0/0 6:0/20/0/0 7:0/20/0/0  
8:0/20/0/0 9:0/20/0/0 10:0/20/0/0 11:0/20/0/0  
12:0/20/0/0 13:0/20/0/0 14:0/20/0/0  
15:0/20/0/0 16:0/20/0/0  
5 minute input rate 116 bits/sec, 0 packets/sec  
5 minute output rate 159 bits/sec, 0 packets/sec  
1180 packets input, 1132182 bytes, 0 no buffer  
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles  
0 input errors, 0 CRC, 0 fraee, 0 overrun, 0 ignored, 0 abort  
1199 packets output, 51604 bytes, 0 underruns  
0 output errors, 0 collisions, 1 interface resets  
0 output buffer failures, 0 output buffers swapped out  
1 carrier transitions, 0 internal resets, 0 switch line hook  
software flowcontrol state is none/none (in/out)  
current tx-queue: 0/0/1(nor/exp/sum)  
DCD=up DSR=up DTR=up RTS=up CTS=up  
serial port mode is V.24 DTE(0x7e)  
router#  
90  
Download from Www.Somanuals.com. All Manuals Search And Download.  
router# show queueing custom  
Current custom queue configuration:  
List Queue Args  
10  
5
1
2
3
1
4
default  
10  
protocol ip  
tcp port 80  
10  
interface serial0/0  
protocol ip  
10  
10  
protocol ip  
list 1  
10  
byte-count 115200  
limit 10  
router#  
91  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix A Upgrade firmware  
Please follow the steps to upgrade firmware:  
1.  
2.  
3.  
Find and download the latest firmware from PLANET Web site.  
Connect Console port to ERT-805 Serial WAN Router  
Change to DPS-mode and run mrcom32.exe (this program can be found in the CD-ROM menu,  
directory /utility)  
4.  
5.  
6.  
7.  
8.  
Type mrcom32 com1 115200 (default is 9600)  
Press Ctrl + Shift + 6 to get into main menu  
To change Mointor Baud is press 8  
Type in 115200 (eg Input Baud [9600] 115200) press 15 to save and then press 3 to restart  
Press Ctrl + End then type in mrcom32 com1 1152000 for example mrcom32 com1 115200  
press enter  
9.  
Then get into main menu again and type 1 press enter  
After you press 1 it will shows following screen  
92  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Then press enter still see the Input File Name, type in the files name and press enter again  
]
10. Then press 3 to restart Router  
Now, the ERT-805 is with the firmware file just downloaded.  
93  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B Router Dialing  
ERT-805 is support dial-up from modem which is allow user to remote to office from other place. And the  
commands are:  
Physical-layer async configure serial interface as an async interface  
async mode [dedicated | interactive ] specify line mode for interface use  
dialer-list list number protocol ip [ deny | list | permit ] configure DDR to control dialing by protocol  
dialer-group configures an interface belong to a specific dialing group  
dialer-inband enable DDR and V.25 bits dialing on the async interface  
dialer string specify the phone number to dial to a specific destination  
Configuration Example  
Router1  
Router2  
s1:10.1.1.1/8 s1:10.1.1.2/8  
PSTN  
Modem  
Modem  
Ethernet  
Ethernet  
e1:11.1.1.1/8  
e1:12.1.1.1/8  
Configuring router Router1  
int s1  
encap ppp  
ip address 10.1.1.1 255.0.0.0  
physical-layer async  
async mode dedicate  
line flowcontrol hardware  
line cd normal  
line speed 9600  
dialer in-band  
dialer string 2001  
dialer-group 1  
line inactive-timer 60  
94  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ip route 12.0.0.0 255.0.0.0 10.1.1.2  
dialer- list 1 protocol ip permit  
Configuring router Router2  
int s1  
encap ppp  
ip address 10.1.1.2 255.0.0.0  
physical-layer async  
async mode dedicate  
line flowcontrol hardware  
line cd normal  
line speed 9600  
dialer in-band  
line inactive-timer 60  
dialer- list 1 protocol ip permit  
95  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C Cables / Pin-assignment for  
ERT-805  
C.1 V.35 DTE CB-ERTV35-MT  
Pin to ERT-805Description  
Pin to device Description  
21  
18  
25  
1
MODE_1  
MODE_0  
GND  
MODE_DCE  
Shield  
A
F
B
R
T
P
S
D
E
C
H
V
X
U
W
Y
AA  
Shield_GND  
08  
7
B_DCD/DCD+  
GND+  
Twisted pair no. 1 <  
RLSD  
GND  
03  
16  
02  
14  
05  
06  
04  
20  
17  
09  
24  
11  
15  
12  
I_RXD/TXD+  
I_RXD/TXD–  
O_TXD/RXD+  
O_TXD/RXD–  
I_CTS/RTS+  
I_DSR/DTR+  
O_RTS/CTS  
O_DTR/DSR+  
I_RXC/TXCE+  
Twisted pair no. 9 <—  
RD+  
<—  
RD–  
Twisted pair no. 5 >  
SD+  
>  
SD–  
Twisted pair no. 2 <—  
<—  
CTS  
DSR  
Twisted pair no. 4 >  
>  
RTS  
DTR  
Twisted pair no. 8 <—  
SCR+  
I_RXC/TXCE<—  
SCR–  
O_TCXE/RXC+  
Twisted pair no. 6 >  
SCTE+ Not used  
SCTENot used  
SCT+  
0_TXCE/RXC– —>  
B_TXC/TXC+  
Twisted pair no. 7 <—  
<—  
B_TXC/TXC–  
SCT–  
C.2 V.35 DCE CB-ERTV35-FC  
Pin to ERT-805Description  
Pin to device Description  
21  
18  
25  
1
MODE_1  
MODE_0  
MODE_DCE  
Shield  
B_DCD/DCD+  
GND  
GND  
GND  
A
F
B
Shield_GND  
RLSD  
08  
7
Twisted pair no. 1 <—  
GND  
96  
Download from Www.Somanuals.com. All Manuals Search And Download.  
03  
16  
02  
14  
05  
06  
04  
20  
17  
09  
24  
11  
15  
12  
I_RXD/TXD+  
Twisted pair no. 3 <—  
P
S
SD+  
I_RXD/TXD<—  
SD–  
O_TXD/RXD+  
O_TXD/RXD–  
I_CTS/RTS+  
I_DSR/DTR+  
O_RTS/CTS  
Twisted pair no. 5 >  
R
RD+  
>  
T
RD–  
Twisted pair no. 2 <—  
C
RTS  
<—  
H
DTR  
Twisted pair no. 4 >  
D
CTS  
O_DTR/DSR+  
>  
E
DSR  
I_RXC/TXCE+ Twisted pair no. 8 <—  
I_RXC/TXCE<—  
U
SCTE+ Not used  
SCTENot used  
SCR+  
W
O_TCXE/RXC+ Twisted pair no. 6 >  
0_TXCE/RXC– —>  
V
X
SCR–  
B_TXC/TXC+  
Twisted pair no. 7 >  
Y
SCT+  
B_TXC/TXC–  
>  
AA  
SCT–  
C.3 V.24 DTE CB-ERT232-MT  
Pin to ERT-805Description  
Pin to device Description  
21  
18  
25  
1
MODE_1  
MODE_0  
MODE_DCE  
Shield  
1
8
7
3
Shield_GND  
CD  
08  
7
B_DCD/DCD+  
GND  
Twisted pair no. 1 <—  
Twisted pair no. 3 <—  
Twisted pair no. 5 >  
GND  
03  
16  
02  
14  
05  
06  
04  
20  
17  
09  
24  
11  
15  
I_RXD/TXD+  
GND  
RXD  
GND  
O_TXD/RXD+  
GND  
2
TXD  
GND  
I_CTS/RTS+  
I_DSR/DTR+  
O_RTS/CTS  
O_DTR/DSR+  
Twisted pair no. 2 <—  
5
6
CTS  
<—  
DSR  
Twisted pair no. 4 >  
4
RTS  
>  
20  
17  
DTR  
I_RXC/TXCE+ Twisted pair no. 8 <—  
GND GND  
O_TCXE/RXC+ Twisted pair no. 6 >  
RXC  
GND  
24  
15  
TXCE Not used  
GND  
GND  
>  
B_TXC/TXC+  
Twisted pair no. 7 <—  
TXC  
97  
Download from Www.Somanuals.com. All Manuals Search And Download.  
12  
GND  
GND  
C.4 V.24 DCE CB-ERT232-FC  
Pin to ERT-805Description  
Pin to device Description  
21  
18  
25  
1
MODE_1  
MODE_0  
MODE_DCE  
Shield  
GND  
1
8
7
2
Shield_GND  
CD  
08  
7
B_DCD/DCD+  
GND  
Twisted pair no. 1 >  
Twisted pair no. 3 <—  
Twisted pair no. 5 >  
GND  
03  
16  
02  
14  
05  
06  
04  
20  
17  
09  
24  
11  
15  
12  
I_RXD/TXD+  
GND  
TXD  
GND  
O_TXD/RXD+  
GND  
3
RXD  
GND  
I_CTS/RTS+  
I_DSR/DTR+  
O_RTS/CTS  
O_DTR/DSR+  
Twisted pair no. 2 <—  
4
20  
5
RTS  
<—  
DTR  
Twisted pair no. 4 >  
CTS  
>  
6
DSR  
I_RXC/TXCE+ Twisted pair no. 8 <—  
GND GND  
O_TCXE/RXC+ Twisted pair no. 6 >  
24  
TXCE Not used  
GND  
17  
15  
RXC  
GND  
>  
GND  
B_TXC/TXC+  
GND  
Twisted pair no. 7 >  
TXC  
GND  
C.5 X.21 DTE CB-ERTX21-MT  
Pin to ERT-805Description  
Pin to device Description  
21  
18  
25  
1
MODE_1  
GND  
MODE_0  
MODE_DCE  
Shield  
1
8
Shield_GND  
GND  
7
GND  
03  
16  
02  
I_RXD/TXD+  
I_RXD/TXD-  
O_TXD/RXD+  
Twisted pair no. 3 <—  
4
RXD+  
RXD-  
11  
2
Twisted pair no. 5 >  
TXD+  
98  
Download from Www.Somanuals.com. All Manuals Search And Download.  
14  
05  
06  
04  
20  
17  
09  
O_TXD/RXD-  
I_CTS/RTS+  
I_DSR/DTR+  
O_RTS/CTS  
O_DTR/DSR+  
9
5
TXD-  
Twisted pair no. 2 <—  
INDICATION+  
INDICATION-  
CONTROL+  
CONTROL-  
TIMING+  
<—  
12  
3
Twisted pair no. 4 >  
>  
10  
6
I_RXC/TXCE+ Twisted pair no. 8 <—  
I_RXC/TXCE-  
<-  
13  
TIMING-  
Twisted pair no. 6 >  
>  
Twisted pair no. 7 >  
C.6 X.21 DCE CB-ERTX21-FC  
Pin to ERT-805Description  
Pin to device Description  
21  
18  
25  
1
MODE_1  
GND  
GND  
MODE_0  
MODE_DCE  
Shield  
1
8
Shield_GND  
GND  
7
GND  
03  
16  
02  
14  
05  
06  
04  
20  
24  
11  
I_RXD/TXD+  
I_RXD/TXD-  
O_TXD/RXD+  
O_TXD/RXD-  
I_CTS/RTS+  
I_DSR/DTR+  
O_RTS/CTS  
O_DTR/DSR+  
Twisted pair no. 3 <—  
2
TXD+  
9
TXD-  
Twisted pair no. 5 >  
4
RXD+  
11  
3
RXD-  
Twisted pair no. 2 <—  
CONTROL+  
CONTROL-  
INDICATION+  
INDICATION-  
TIMING+  
TIMING-  
<—  
10  
5
Twisted pair no. 4 >  
>  
12  
6
O_TCXE/RXC+ Twisted pair no. 8 >  
0_TXCE/RXC>  
13  
Twisted pair no. 6 >  
>  
Twisted pair no. 7 >  
99  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C.7 RJ-45 Console Cable  
The ping out of the RJ-45 console cable bundled in the package is as following:  
1…………………………………..8  
2…………………………………..7  
3……………………………………6  
4…………………………………..5  
5…………………………………..4  
6…………………………………..3  
7…………………………………..2  
8…………………………………..1  
21  
3
6
6
321  
6
3
2
1
C.8 DB9 to RJ45  
The pin out of the DB9 to RJ-45 accessory bundled together with the package are as following.  
DB9  
RJ45  
1………………………………..4  
2………………………………..6  
3………………………………..3  
4………………………………..2  
5………………………………..5  
6………………………………..7  
7………………………………..1  
8………………………………..8  
8
1
100  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Peg Perego Stroller Pliko Switch User Manual
Pelco Home Security System C490M D 1 96 User Manual
Philips Clock Radio AJL305 12 User Manual
Philips Digital Camera SPC610NC User Manual
Pioneer Car Stereo System DEH P500UB User Manual
Polaroid Flat Panel Television PLA 4255BD User Manual
Poulan Lawn Mower 191641 User Manual
Powermate Portable Generator PM054500417 User Manual
Prince Castle Indoor Furnishings 918 B User Manual
ProForm Treadmill PFTL790080 User Manual