IPSO3800 VoyRefGuide - N451044003a
IPSO3800 VoyRefGuide - N451044003a
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of,
this computer software, the rights of the United States Government regarding its use,
reproduction, and disclosure are as set forth in the Commercial Computer Software-Restricted
Rights clause at FAR 52.227-19.
Nokia reserves the right to make changes without further notice to any products herein.
TRADEMARKS
Nokia is a registered trademark of Nokia Corporation. Other products mentioned in this
document are trademarks or registered trademarks of their respective holders.
050110
Telephone 1-888-477-4566 or
1-650-625-2000
Fax 1-650-691-2170
Europe, Nokia House, Summit Avenue Tel: UK: +44 161 601 8908
Middle East, Southwood, Farnborough Tel: France: +33 170 708 166
and Africa Hampshire GU14 ONG UK email: ipsecurity.emea@nokia.com
Email: tac.support@nokia.com
Americas Europe
Asia-Pacific
Voice: +65-67232999
Fax: +65-67232897
050113
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Configuring Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Ethernet Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Point-to-Point Over Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Gigabit Ethernet Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Virtual LAN Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68
FDDI Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
ISDN Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Token Ring Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
Point-to-Point Link over ATM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102
IP over ATM (IPoA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108
Serial (V.35 and X.21) Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
T 1(with Built-In CSU/DSU) Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
E1 (with Built-In CSU/DSU) Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127
HSSI Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134
Unnumbered Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139
Cisco HDLC Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .143
Point-to-Point Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145
Frame Relay Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146
Loopback Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150
GRE Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .151
DVMRP Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .158
ARP Table Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161
Configuring ARP for the ATM Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Chapter Contents
Software Overview
Interface Overview
Routing Overview
Redistributing Routes Overview
Software Overview
This section gives you an overview of the Nokia software configured and maintained by Nokia
Voyager software.
Nokia firewalls function with the help of several software components:
Operating System—Nokia firewalls run Nokia IPSO, a UNIX-like operating system based
on FreeBSD. IPSO is customized to support Nokia’s enhanced routing capabilities and
Check Point’s FireWall-1 firewall functionality, and to "harden" network security.
Unnecessary features have been removed to minimize the need for UNIX system
administration.
Ipsilon Routing Daemon (IPSRD)—IPSRD is Nokia’s routing software. The routing
policy implemented by IPSRD resides in a database. Voyager (see below) configures and
maintains the routing software and database.
Check Point FireWall-1—FireWall-1 consists of two major components: (1) the Firewall
module, which runs on the Nokia firewall and implements the security policy, and (2) the
Management module, which runs either on the Nokia firewall or on another workstation.
Use the Management Module to define and maintain the security policy.
Voyager—Voyager communicates with the routing software to configure interfaces and
routing protocols, to manage routing policy for the firewall, and to monitor network traffic
and protocol performance. Voyager also provides online documentation. Voyager itself runs
on a remote machine as a client application of the Nokia routing software and is HTML
based.
Interface Overview
This section describes how to configure network devices and assign IP addresses to them using
Voyager.
Interface Types
Nokia NAPs support the following interface types.
Note
Consult the appropriate hardware installation guide to find out what interfaces your unit
supports.
Type Prefix
Ethernet eth
FDDI fddi
ATM atm
Serial ser
T1/E1 ser
HSSI ser
ISDN isdn
<slot> is the number of the slot the device occupies in the unit.
<port> is the port number of the card. The first port on a NIC is port one. For example, a two-
port Ethernet NIC in slot 2 is represented by two physical interfaces: eth-s2p1 and eth-s2p2.
The loopback interface also has a physical interface named loop0.
Use Voyager to set the attributes of the device. For example, line speed and duplex mode are
attributes of an Ethernet physical interface. Each communications port has exactly one physical
interface.
Configuring IP Addresses
Logical interfaces are created for a device's physical interface. You assign an IP address to
logical interfaces and then route to the IP address. Ethernet, FDDI, and Token Ring devices have
one logical interface.
For ATM devices, you create a new logical interface each time you configure an RFC1483 PVC
for the device. Serial, T1/E1, and HSSI devices have one logical interface when they are running
PPP or Cisco HDLC. Serial, T1/E1 and HSSI devices running point-to-point Frame Relay have a
logical interface for each PVC configured on the port. You also have the option of configuring
an unnumbered interface for point-to-point interfaces. Tunnels, however, cannot be configured
as unnumbered interfaces.
Logical interfaces, by default, are named after the physical interface for which they are created.
If you wish, you can override this default name with a more descriptive or familiar name. You
can also associate a comment with the logical interface as a further way to define its relationship
in the network. Default logical interface names have the form:
<type>-s<slot>p<port>c<chan>
where
<type>, <slot> and <port> have the same values as the corresponding physical interface
<chan> is the channel number of the logical interface. For logical interfaces created
automatically, the channel number is always zero. For logical interfaces created manually, the
channel number is the identifier of the virtual circuit (VC) for which the interface is created (for
example, the ATM VCI or the Frame Relay DLCI).
Logical Interface
Physical
Interface Default Cisco HDLC PPP Frame Relay
For example, the logical interface of a physical interface eth-s2p1 is called eth-s2p1c0. The
logical interfaces for PVCs 17 and 24 on an ATM NIC in slot 3 are called atm-s3p1c17 and
atm-s3p1c24 respectively.
Once a logical interface exists for a device, you can assign an IP address to it. For Ethernet,
FDDI, and Token Ring, you must specify the interface's local IP address and the length (in bits)
of the subnet mask for the subnet to which the device connects.
If you are running multiple subnets on the same physical network, you can configure additional
addresses and subnet masks on the single logical interface connected to that network. You do not
need to create additional logical interfaces to run multiple subnets on a single physical network.
For point-to-point media, such as ATM, serial, or HSSI, you can either assign IP addresses or
configure an unnumbered interface. When assigning IP addresses you must specify the IP
address of the local interface and the IP address of the remote system's point-to-point interface.
You can add only one local/destination IP address pair to a point-to-point logical interface. To
assign IP addresses to multiple VCs, you must create a logical interface for each VC. IP subnets
are not supported on point-to-point interfaces.
Whenever an unnumbered interface generates a packet, it uses the address of the interface that
the user has specified as the source address of the IP packet. Thus, for a router to have an
unnumbered interface, it must have at least one IP address assigned to it. The Nokia
implementation of unnumbered interfaces does not support virtual links.
Note
The remote multicast router must support IP-in-IP encapsulation and must be configured
with a tunnel interface to the local router.
When you have created the DVMRP tunnel interface, set all other DVMRP multicast
configuration parameters from the DVMRP configuration page.
Routing Overview
This section discusses the following topics:
Nokia Routing Subsystem
Routing Protocols
Routing Protocols
Routing protocols compute the best route to each destination. Routing protocols also exchange
information with adjacent firewalls. The best route is determined by the cost or metric values.
Routing protocols can be broken up into two major categories: exterior gateway protocols
(EGPs) and interior gateway protocols (IGPs). Interior gateway protocols exchange routing
information inside an autonomous system (AS). An AS is a routing domain, such as inside an
organization, that contacts its own routing. An EGP exchanges routing information between
ASes and provides for specialized policy-bound filtering and configuration.
RIP
RIP is a commonly used IGP. There are two versions of RIP: RIP version 1, and RIP version 2.
Both versions are supported by IPSRD.
RIP uses a simple distance vector algorithm called Bellman Ford to calculate routes. In RIP, each
destination has a cost or metric value, which is based solely on the number of hops between the
calculating firewall and the given destination.
The maximum metric value is 15 hops, which means that RIP is not suited to networks within a
diameter greater than 15 firewalls. The advantage of RIP version 2 over RIP version 1 is that it
supports non-classful routes. Classful routes are old-style class A, B, C routes. You should use
RIP version 2 instead of RIP version 1 whenever possible.
Nokia also supports RIPng, the version of RIP that supports IPv6 interfaces.
RIPng
IGRP
IGRP (Interior Gateway Routing Protocol) is a distance vector protocol. IGRP has a number of
metrics for each destination. These metrics include link delay, bandwidth, reliability, load, MTU,
and hop count. A single composite metric is formed by combining metrics with a particular
weight.
Like RIP version 1, IGRP does not fully support non-classful routing.
OSPF
OSPF (Open Shortest Path First) is a modern link-state routing protocol. It fully supports non-
classful networks. OSPF has a single, 24-bit metric for each destination. You can configure this
metric to any desired value.
OSPF allows the AS to be broken up into areas. Areas allow you to increase overall network
stability and scalability. At area boundaries, routes can be aggregated to reduce the number of
routes each firewall in the AS must know about. If there are multiple paths to a single destination
with the same computed metric, OSPF can install them into the forwarding table.
OSPF RFC2328
DVMRP
DVMRP (Distance Vector Multicast Routing Protocol) is a multicast routing protocol (RIP,
OSPF, and IGRP are unicast routing protocols). Multicasting is typically used for real-time
audio and video when there is a single source of data and multiple receivers. DVMRP uses a
hop-based metric and, like RIP, a distance-vector route calculation.
BGP
BGP (Border Gateway Protocol) is an exterior gateway protocol that is used to exchange
network reachability information between BGP-speaking systems running in each AS. BGP is
unlike interior gateway protocols (IGRP or OSPF), which periodically flood an intra-domain
network with all the known routing table entries and build their own reliability on top of a
datagram service. Instead, BGP uses TCP as its underlying transport mechanism.
BGP is also a path-vector routing protocol, which limits the distribution of a firewall’s
reachability information to its peer or neighbor firewalls. BGP uses path attributes to provide
Aggregate Routes
Route aggregation allows you to take many small routes and aggregate them into one large route.
This reduces the number of routes advertised for a given protocol. These aggregate routes are
then redistributed into other protocols. The aggregates are activated by contributing routes. For
example, if a firewall has many stub interface routes subnetted from a class C and is running
RIPv2 on another interface, the interface routes may be used to create an aggregate route (of the
class C) that can then be redistributed into RIP. This reduces the number of routes advertised via
RIP. Care must be taken when aggregating if there are "holes" in the route that is aggregated.
Create an aggregate route by first specifying the network address and mask length. Second,
provide a set of contributing routes. A contributing route is defined by specifying a source (for
example, a routing protocol, a static route, an interface route) and a route filter, which is a prefix.
You can also choose to contribute all of the routes. An aggregate route can have many
contributing routes, but at least one of the routes must be present to generate an aggregate.
Aggregate routes are not actually used for packet forwarding by the originator of the aggregate
route, only by the receiver (if it wishes). A firewall receiving a packet which does not match one
of the component routes that led to the generation of an aggregate route should respond with an
ICMP network unreachable message. This message prevents packets for unknown component
routes from following a default route into another network where they would be forwarded back
to the border firewall, continually, until their TTL expires.
Static Routes
Static routes are routes that you manually configure in the routing table. Static routes cause
packets moving between a source and a destination to take a specified next hop. Static routes
allow you to add routes to destinations that are not described by dynamic routing protocols. This
can be useful if dynamic protocols cannot be used. It can also be useful in providing a default
route.
Static routes consist of the following:
Destination
Type
Next hop gateway
There are three types of static routes:
Normal
Black Hole
Reject
A normal static route is used to forward packets for a given destination in the direction indicated
by the configured firewall.
A black hole static route uses the loopback address as the next hop. This route discards packets
that match the route for a given destination.
A reject static route uses the loopback as the next hop, discards packets that match the route for
a given destination and sends an ICMP unreachable message back to the sender of the packet.
Note
If you do not specify a redistribution policy, only routes to attached interfaces are
redistributed. If you specify any policy, the defaults are overridden. You must explicitly
specify everything that should be redistributed.
RIP version 1 assumes that all subnets of the shared network have the same subnet mask, so they
are able to propagate only subnets of that network. RIP version 2 removes that restriction and is
capable of propagating all routes when not sending version 1-compatible updates.
Chapter Contents
CAMCONTROL
FTP
ID
MAIL
MTRACE
NETSTAT
PCCARDD
PING
SCP
SSH
SSHD
SSH-ADD
SSH-AGENT
SSH-KEYGEN
TCPDUMP
TELNET
TFTPD
TRACEROUTE
Chapter Contents
Navigating in Voyager
Viewing Online Help
Viewing Inline Help for the Page
Viewing Inline Help for a Section or Field
Voyager Help Conventions
Opening a Second Window to View Help
Navigating in Voyager
The following table explains the functions of the large blue buttons in Voyager. Other buttons
are described in the inline help for each page.
Note
You can press buttons to produce a result when they have a dark shadow behind them.
Buttons without shadows, such as those found in the Voyager Online Help instructions, do
not function; they are only for display.
Button Description
Apply Applies the settings on the current page (and any deferred applies
from other pages) to the current (running) configuration file in
memory.
Help Turns on contextual inline help for all elements of the page.
Button Description
Note
Avoid using your browser’s Back and Forward buttons while in Voyager. The browser
caches the HTML page information; therefore, using BACK and FORWARD may not display
the latest configuration and diagnostic information as you move from page to page. Use the
CONFIG, MONITOR, HOME, TOP, and UP buttons to get the most current data.
If the pages seem to have outdated information, you can use the RELOAD button on the browser
to update it. You can also clear memory and disk cache with the following procedure:
1. Select Network Preferences from the Options menu in Netscape.
2. Select Cache in the Preferences window.
3. Click the CLEAR MEMORY CACHE NOW button, then click the OK button.
4. Click the CLEAR DISK CACHE NOW button, then click the OK button.
5. Click the OK button or close the Preferences window.
Note
Buttons without shadows, such as those found in the Voyager online help instructions, do
not function; they are there only for illustration.
Chapter Contents
Dynamic Monitoring
Dynamic and Static Monitoring Described
Static Monitoring
Displaying Cluster Status and Members
Dynamic Monitoring
Caution
Nokia recommends that you set this option to 24 hours (the default value) on diskless
systems to avoid exhausting the available storage space.
Note
You must configure an aggregation class and associate it with an access control list for the
name to appear as a choice in the Aggregation Class list. (put link here)For more
information, see Traffic Management, "Creating an Aggregation Class" and "Creating an
Access Control List" in Voyager.
5. In the TYPE OF RATESHAPING DATA field, check the check box either next to PACKETS
DELAYED or BYTES DELAYED.
6. To select a format type for displaying the report, in the SELECT FORMAT field, click the
button next to GRAPHICAL VIEW or DELIMITED TEXT.
If you select DELIMITED TEXT, click the Delimiter drop-down list and select either SEMI-
COLON(;) COMMA(,) or TAB.
Note
The Graphical View option displays information at the bottom of the page in a table. The
Delimited Text option displays the report in a new page from which you can download the
information.
Note
Data for the previous seven days is available.
6. In the SELECT AGGREGATES field, click the name of the Aggregation class to display a
report or click on ALL AGGREGATES to display data for all configured aggregation classes.
Note
You must configure an aggregation class and associate it with an access control list for the
name to appear as a choice in the Aggregation Class list. (put link here)For more
information, see Traffic Management, "Creating an Aggregation Class" and "Creating an
Access Control List" in Voyager.
7. In the TYPE OF RATESHAPING DATA field, check either the PACKETS DELAYED or BYTES
DELAYED check box.
8. To select a format type for displaying the report, in the SELECT FORMAT field, click the
button next to GRAPHICAL VIEW or DELIMTED TEXT. If you select DELIMITED TEXT, click
on the Delimiter drop-down list and select either SEMI-COLON(;) COMMA(,) or TAB.
9. Click VIEW REPORT or APPLY to view rate-shaping bandwidth data for the period of time
selected.
Note
he Graphical View option displays information at the bottom of the page in a table. The
Delimited Text option displays the report in a new page from which you can download the
information.
4. Enter a value for the date and time in the START DATE text box.
The date defaults to the current date and time minus 10 minutes.
5. Enter a value for the date and time in the END DATE text box.
The date defaults to the current date and time.
Note
Data for the previous seven days is available.
6. Select an interface name from the SELECT INTERFACE list or select ALL LOGICAL to display
throughput data for all logical interfaces.
7. In the Type of Throughput field, click the check box next to PACKET THROUGHPUT, BYTE
THROUGHPUT, BROADCAST THROUGHPUT, or MULTICAST THROUGHPUT to select the type of
throughput data you want to view.
8. To select a format type for displaying the report, in the SELECT FORMAT field, click the
button next to GRAPHICAL VIEW or DELIMTED TEXT.
If you select DELIMITED TEXT, click on the Delimiter drop-down list and select either SEMI-
COLON(;) COMMA(,) or TAB.
Note
The Graphical View displays information at the bottom of the page in a table and graph.
Delimited Text format displays the report as text in a new page from which you can
download the information.
9. Click VIEW REPORT or APPLY to view interface throughput data for the period of time
selected.
Note
Data for the previous seven days is available.
6. Select an interface name from the SELECT INTERFACES FOR QUERY list or select ALL
LOGICAL to display link state data for all logical interfaces.
7. To select a format type for displaying the report, in the SELECT FORMAT field, click the
button next to GRAPHICAL VIEW or DELIMTED TEXT.
If you select DELIMITED TEXT, click on the Delimiter drop-down list and select either SEMI-
COLON(;) COMMA(,) or TAB.
Note
The Graphical View displays information at the bottom of the page in a table. Delimited Text
format displays the report as text in a new page from which you can download the
information.
8. Click VIEW REPORT or APPLY to view interface linkstate data for the period of time
selected.
Note
The Graphical View displays information at the bottom of the page in a table and graph.
Delimited Text format displays the report as text in a new page from which you can
download the information.
Note
Data for the previous seven days is available.
6. To select a format type for displaying the report, in the SELECT FORMAT field, click the
button next to GRAPHICAL VIEW or DELIMTED TEXT.
If you select DELIMITED TEXT, click on the Delimiter drop-down list and select either SEMI-
COLON(;) COMMA(,) or TAB.
7. Click VIEW REPORT or APPLY to view interface throughput data for the period of time
selected.
Note
The Graphical View displays information at the bottom of the page in a table and graph.
Delimited Text format displays the report as text in a new page from which you can
download the information.
Note
Data for the previous seven days is available.
6. To select a format type for displaying the report, in the SELECT FORMAT field, click the
button next to GRAPHICAL VIEW or DELIMTED TEXT.
If you select DELIMITED TEXT, click on the Delimiter drop-down list and select either SEMI-
COLON(;) COMMA(,) or TAB.
Note
The Graphical View displays information at the bottom of the page in a table and graph.
Delimited Text format displays the report as text in a new page from which you can
download the information.
7. Click VIEW REPORT or APPLY to view memory utilization data for the period of time
selected.
Note
You do not need to configure the Web Server Access log or the Web Server Error log. For
more information on configuring the System Message Log, User Login/Logout Activity, and
Management Activity Log, see the appropriate section below.
IP address from which the user logged in; and the config entry, which displays the entry changed
in the configuration database.
To activate the management activity log feature, click the System Logging link in the SYSTEM
CONFIGURATION section. For more information, see “Disabling the System Configuration
Auditlog.”
Static Monitoring
Note
If your cluster is not initialized, the Cluster Monitor page contains a link to the Cluster
Configuration page, which enables you to configure cluster parameters for this node.
iclid Commands
Command Description
Some commands might produce more output than can fit on a single screen; iclid pages the
output of such commands for you, that is, stops the output after one screen and indicates that
there is more output with a MORE prompt. You can see the next screenful of output by selecting
any key except the q key; you can abort the command and any further output by typing q at the
MORE prompt. If you do not enter anything within about 30 seconds, the system automatically
pages to the next screenful of information. You can temporarily defeat this automatic paging by
typing ctl-S, although when you resume scrolling (by selecting any key) you might lose a page
of information.
At any point in iclid, you can type ? to display possible command completions. You can also
abbreviate commands when an abbreviation is not ambiguous.
The help command takes as arguments iclid commands and top-level iclid categories; it
displays a brief summary of what the specified command displays.
The quit command returns control to the firewall shell. The exit command is the same as the
quit command.
The show command provides many kinds of information, displayed in useful formats. The
following table shows examples of the top-level iclid element that can be displayed by the
show command as applied to each parameter, along with any selected categories and
subcategories, and a description of the information the command displays.
dd OSPF dd errors.
show route bgp 127 Only BGP routes that start with 127.
Note
To perform the following procedures, use the zap or modzap utility (which you can
obtain from the Nokia Technical Assistance Center (TAC); refer to Resolution 1261).
Note
If the message indicates that you have insufficient resources to accommodate a larger
buffer size, take appropriate actions and try this procedure again. For further
information, contact Nokia Technical Assistance Center (TAC).
4. After you verify that the change is appropriate, issue the same command without the -n
option:
# ./modzap _fw_logalloc $FWDIR/boot/modules/fwmod.o 0x20000
A confirmation message is displayed, which you can safely ignore.
5. Reboot the system.
Note
If the message indicates that you have insufficient resources to accommodate a larger
buffer size, take appropriate actions and try this procedure again. For further
information, contact Nokia Technical Assistance Center (TAC).
4. After you verify that the change is appropriate, issue the same command without the -n
option:
modzap _fw_log_bufsize $FWDIR/boot/modules/fwmod.o 0x200000
A confirmation message is displayed, which you can safely ignore.
5. Reboot the system.
Because these console messages are also written to the FW-1 log message file, Nokia
recommends that you do the following to prevent depleting the disk space allocated for the
FW-1 log message file:
1. Move your log files from the system hard drive to a server.
2. Configure the relocated files by using the Check Point management client GUI (Smart
Dashboard) as follows:
a. Select the Check Point gateway object you are configuring.
b. Under Gateway Object Configuration, select the Logs and Masters section and do the
following:
Specify the amount of free disk space required for local logging.
Specify to stop logging when the free disk space drops below x MB and to start
logging to a new file.
Once a new file is being used, the previously used log files are deleted until the required
free disk space is restored.
Chapter Contents
Ethernet Interfaces
Configuring an Ethernet Interface
Ethernet Example
Configuring PPPoE
FDDI Interfaces
Configuring an FDDI Interface
FDDI Example
ISDN Interfaces
Features
ISDN Troubleshooting
Token Ring Interfaces
Configuring a Token Ring Interface
ATM Example
T1 Interface Example
E1 (with built-in CSU/DSU) Interfaces
Configuring an E1 Interface for Cisco HDLC
Unnumbered Interfaces
Unnumbered Interfaces Description
Configuring an Unnumbered Interface
Point-to-Point Protocol
Changing the Keepalive Interval in PPP
Loopback Interfaces
Adding an IP Address to a Loopback Interface
Changing the IP Address of a Loopback Interface
GRE Tunnels
Creating a GRE Tunnel
Changing the Local and/or Remote Address or Local/Remote Endpoint of a GRE Tunnel
Ethernet Interfaces
Note
This setting must be the same for all hosts on the network to which the device connects.
5. Click FULL or HALF in the PHYSICAL CONFIGURATION table DUPLEX field to select the
duplex mode.
Note
This setting must be the same for all hosts on the network to which the device connects.
Example:
eth-s2p1
4. Click 10 MBIT/SEC or 100 MBIT/SEC in the PHYSICAL CONFIGURATION table LINK SPEED
field.
Click APPLY.
Note
This setting must be the same for all hosts on the network to which the device connects.
Note
If the duplex setting of an Ethernet interface is incorrect, it might not receive data, or it might
receive duplicates of the data it sends.
Note
This setting must be the same for all hosts on the network to which the device connects.
Note
Do not change the IP address you use in your browser to access Network Voyager. If you
do, you can no longer access the IP security appliance with your Network browser.
Ethernet Example
This section describes how you might configure the interfaces of your IP security appliance in an
example network using Network Voyager.
Before you can configure the device by using Network Voyager, you must configure an IP
address on one of the interfaces. You can do this through device console port during installation
or by using the Lynx browser. This allows a graphical browser such as Microsoft Internet
Explorer or Netscape Navigator to access the device through that interface. You can use any
graphical web browser to configure the other interfaces on the device by entering the IP address
of the device in the location field of the browser.
The following figure shows the network configuration for this example.
Provider
(192.168.2.93)
ser-s1p1c0 (192.168.2.1)
FDDI fddi-s3p1c0
192.168.1.xxx Nokia Platform A
(192.168.1.1/24)
atm-s2p1c93 (192.168.3.2)
Server
ATM
Switch
atm-s1p1c52 (192.168.3.1)
Nokia Platform B
eth-s2p1c0 (192.168.4.1/24)
192.168.4.xxx
Server Server
00037
In a company main office, Nokia Platform A terminates a serial line to an Internet service
provider, running PPP with a keepalive value of 10.
Nokia Platform A also provides internet access for a FDDI ring and a remote branch office
connected through ATM PVC 93.
The branch office contains Nokia Platform B, which routes traffic between a local Fast Ethernet
network and ATM PVC 52. It provides access to the main office and the Internet. This example
configures the Ethernet interface on Nokia Platform B.
1. Click CONFIG on the home page.
2. Click the Interfaces link.
3. Click eth-s2p1 in the PHYSICAL column of the table.
4. Click 100 MBIT/SEC.
5. Click APPLY.
6. Click eth-s2p1c0 in the LOGICAL INTERFACES table to go to the Interface page.
7. Enter 192.168.4.1 in the NEW IP ADDRESS text box.
8. Enter 24 in the NEW MASK LENGTH text box.
Note
Link aggregation is not supported on the interfaces on IP2250 I/O cards. This feature is not
supported on Nokia appliances other than the IP2250.
Caution
Do not use interfaces on IP2250 I/O cards for firewall synchronization traffic. Doing so
can cause connections to be dropped in the event that there is a failover to a backup
router.
You should use the built-in Ethernet ports that you do not aggregate for your management
connections and to connect to log servers.
When you aggregate an interface, its configuration information is deleted. Be careful not to
aggregate the interface that you use for your management connection because doing so breaks
your HTTP connection to the appliance. Should this occur, you can restore HTTP connectivity
by using one of the following approaches:
Connect to another configured port and use Voyager to reconfigure the management port.
Use the IPSO CLI over a console connection to reconfigure the management port.
Because the management port is now part of an aggregation group, Voyager and the CLI
identify it using the format aexxx, in which xxx is the group ID.
Configuring in Voyager
Setting up link aggregation in Voyager comprises three processes:
1. Physically configuring the interfaces.
2. Creating the aggregation group.
3. Logically configuring the aggregation group.
Group Configuration Once the physical interfaces are configured, configure a link
aggregation group by following these steps:
1. On the Voyager home page, click Interface Configuration.
2. Click Link Aggregation.
3. In the NEW GROUP ID field, enter a numeric value that will identify the group of
aggregrated interfaces.
4. Click APPLY.
An entry for the new group appears under Existing Link Aggregation Groups.
Logical Configuration When you have completed the aggregation group, you must
configure it with an IP address and so on. Navigate to the Interfaces Configuration page and
click the logical name of the group. Voyager shows the logical name in the format aexxxc0. For
example, the logical name of a group with the ID 100 is ae100c0.
If you create a link aggregation group but do not add any interfaces to it, the logical name of the
group does not appear on the Interfaces Configuration page. You cannot configure an
aggregation group with logical information until you have added an interface to the group.
Deleting aggregation groups To delete an aggregation group, you must first remove all the
ports from the group. To remove a port from an aggregation group, simply click the DELETE
checkbox next to the appropriate port and click APPLY. Click SAVE to make the change
permanent.
You cannot remove the primary port from an aggregation group unless the other ports have been
removed, but you can remove all the ports simultaneously. You can simultaneously remove all
the ports and delete the group by clicking all the DELETE checkboxes and then clicking APPLY.
Click SAVE to make the change permanent.
Caution
If you delete a port from an aggregation group but do not delete the group itself, be sure
to delete the same port on both IP2250 systems. If you delete a port on one system
only and that port remains physically and logically enabled, the other system will
continue to send traffic to the deleted port. This traffic will not be received, and firewall
synchronization will therefore be incomplete.
Configuring PPPoE
1. Click CONFIG on the home page.
2. Click the Interfaces link.
3. Click the pppoe0 link.
This takes you to the PPPoE physical interface page.
Note
The PPPoE physical interface and the associated link trap is on by default. If you wish to
change either setting, click the appropriate setting next to the feature you wish to enable
or disable and click Apply.
Note
If you use the PEERNAME field, only the PPPoE server named in the field will be allowed
to connect to the system.
11. In the MTU text-box, enter the maximum byte size to be transmitted. The default is 1492
bytes.
Note
The PPPoE logical interface is on by default and the associated link trap is disabled by
default. If you wish to change either setting, click the appropriate setting next to the
feature you wish to enable or disable and click APPLY.
Note
You must first delete the configuration profile interface before you can delete a configuration
profile. For more information, see “Deleting PPPoE Logical Interfaces.”
Note
The link speed appears in the PHYSICAL CONFIGURATION table in the LINK SPEED
field. The speed is fixed.
Note
The duplex mode, in the PHYSICAL CONFIGURATION table, is set to full at all times.
4. (Optional) Click ON or OFF in the PHYSICAL CONFIGURATION table FLOW CONTROL field
to select the appropriate choice.
The default value is OFF.
Click APPLY.
Click the logical interface name in the INTERFACE column of the LOGICAL INTERFACES
table to go to the Interface page.
5. Enter the IP address for the device in the NEW IP ADDRESS text box.
6. Enter the IP subnet mask length in the NEW MASK LENGTH text box.
Click APPLY.
Each time you click APPLY, the configured IP address and mask length are added to the
table. The entry fields remain blank to allow you to add more IP addresses.
To enter another IP address and IP subnet mask length, repeat steps 5 through 6.
7. (Optional) Change the interface logical name to a more meaningful name by typing the
preferred name in the LOGICAL NAME text box.
Click APPLY.
8. (Optional) Add a comment to further define the logical interfaces function in the
COMMENTS text box.
Click APPLY.
9. Click UP to go to the Interface Configuration page.
10. Click ON button that corresponds to the logical interface you configured.
Click APPLY.
The gigabit Ethernet interface is now available for IP traffic and routing.
11. To make your changes permanent, click SAVE.
Note
Do not change the IP address you use in your browser to access Network Voyager. If
you do, you can no longer access the IP security appliance device with your browser.
Provider
(192.168.2.93)
ser-s1p1c0 (192.168.2.1)
FDDI fddi-s3p1c0
192.168.1.xxx Nokia Platform A
(192.168.1.1/24)
atm-s2p1c93 (192.168.3.2)
Server
ATM
Switch
atm-s1p1c52 (192.168.3.1)
Nokia Platform B
eth-s2p1c0 (192.168.4.1/24)
192.168.4.xxx
Server Server
00037
In a company main office, Nokia Platform A terminates a serial line to an Internet service
provider.
Nokia Platform A also provides internet access for an FDDI ring and a remote branch office
connected through ATM.
The branch office contains Nokia Platform B, which routes traffic between a local gigabit
Ethernet network and ATM. It provides access to the main office and the Internet. This example
configures the gigabit Ethernet interface on Nokia Platform B.
1. Click CONFIG on the home page.
2. Click the Interfaces link.
3. Click eth-s2p1 in the PHYSICAL column of the table.
4. Click ON or OFF in the FLOW CONTROL field of the PHYSICAL CONFIGURATION table.
5. Click APPLY.
6. Click eth-s2p1c0 in the LOGICAL INTERFACES table to go to the Interface page.
7. Enter 192.168.4.1 in the NEW IP ADDRESS text box.
8. Enter 24 in the NEW MASK LENGTH text box.
9. Click APPLY.
10. Click UP to go the Interface Configuration page.
Note
You can assign multiple IP addresses to each logical VLAN interface. Repeat steps 6
and 7for each IP address to assign to the same VLAN logical interface.
4. Click APPLY.
5. Click SAVE to make your change permanent.
Multiple VLANs on
single cable
gigabit gigabit
Ethernet NOK/CP Ethernet VLAN
GSR switch
FW-1 switch
00203
FDDI Interfaces
Note
Set device attached to a ring topology to half duplex. If the device is running in point-to-
point mode, set the duplex setting to full. This setting must be the same for all hosts on
the network to which the device connects.
6. Click the logical interface name in the INTERFACE column of the LOGICAL INTERFACES
table to go to the Interface page.
7. Enter the IP address for the device in the NEW IP ADDRESS text box.
8. Enter the subnet mask length in the NEW MASK LENGTH text box.
Click APPLY.
Each time you click APPLY, the configured IP address and mask length are added to the
table. The entry fields remain blank to allow you to add more IP addresses.
To enter another IP address and IP subnet mask length, repeat steps 6 through 7.
9. (Optional) Change the interface’s logical name to a more meaningful one by typing the
preferred name in the LOGICAL NAME text box.
10. Click APPLY.
11. (Optional) Add a comment to further define the logical interfaces function in the
COMMENTS text box.
Click APPLY.
12. Click UP to go the Interface Configuration page.
13. Click ON button that corresponds to the logical interface you configured.
Click APPLY.
The FDDI interface is now available for IP traffic and routing.
14. To make your changes permanent, click SAVE.
Note
If the duplex setting of an FDDI interface is incorrect, it might not receive data, or it might
receive duplicates of the data it sends.
Note
Set device attached to a ring topology to half duplex. If the device is running in point-to-
point mode, set the duplex setting to full. This setting must be the same for all hosts on
the network to which the device connects.
Note
Do not change the IP address you use in your browser to access Voyager. If you do, you
can no longer access the IP security appliance device with your browser.
FDDI Example
This section describes how you might configure the interfaces of your IP security appliance
device in an example network, by using Network Voyager.
Before you can configure the device using Voyager, you must configure an IP address on one of
the interfaces. You can do this through the console port during installation or by using the Lynx
browser. This allows a graphical browser such as Internet Explorer or Netscape Navigator to
access the device through that interface. You can use any graphical web browser to configure the
other interfaces on the device by entering the IP address of the device in the location field of the
browser.
The following figure below shows the network configuration for this example.
Provider
(192.168.2.93)
ser-s1p1c0 (192.168.2.1)
FDDI fddi-s3p1c0
192.168.1.xxx Nokia Platform A
(192.168.1.1/24)
atm-s2p1c93 (192.168.3.2)
Server
ATM
Switch
atm-s1p1c52 (192.168.3.1)
Nokia Platform B
eth-s2p1c0 (192.168.4.1/24)
192.168.4.xxx
Server Server
00037
In a company's main office, Nokia platform A terminates a serial line to an Internet service
provider, running PPP with a keepalive value of 10.
Nokia platform A also provides internet access for an FDDI ring and a remote branch office
connected through ATM PVC 93.
The branch office contains Nokia platform B, which routes traffic between a local Fast Ethernet
network and ATM PVC 52. The branch office provides access to the main office and the
Internet. This example configures the FDDI interface on Nokia platform A.
1. Click CONFIG on the home page.
2. Click the Interfaces link.
3. Click fddi-s3p1 in the PHYSICAL column of the table.
4. Click HALF to select the duplex setting.
5. Click APPLY.
6. Click fddi-s3p1c0 in the LOGICAL INTERFACES table to go to the Interface page.
7. Enter 192.168.1.1 in the NEW IP ADDRESS text box.
8. Enter 24 in the NEW MASK LENGTH text box.
9. Click APPLY.
10. Click UP to go to the Interfaces page.
11. Click ON for fddi-s3p1c0.
12. Click APPLY.
13. Click SAVE.
ISDN Interfaces
Integrated Services Digital Network (ISDN) is a system of digital phone connections that allows
voice, digital network services, and video data to be transmitted simultaneously using end-to-
end digital connectivity.
The Nokia IP Security Appliance offers support for an ISDN Basic Rate Interface (BRI)
physical interface. The ISDN BRI comprises one 16 Kbps D-channel for signalling and control,
and two 64 Kbps B-channels for information transfer. Nokia’s physical interface is certified to
conform to the European Telecommunications Standards Institute (ETSI) ISDN standard.
The physical interface is the manageable representation of the physical connection to ISDN. One
physical interface is visible in Network Voyager for every ISDN BRI card in the Nokia platform
chassis. The physical interface enables management of the parameters specific to each ISDN
connection. The physical interface permits enabling or disabling of the ISDN connection and is
the entity under which logical interfaces are created.
The logical interface is the logical communication end point. It contains all information used to
set up and maintain the ISDN call. The logical interface includes:
Data link encapsulation and addressing
Call connection information such as call direction, data rate, and the number to call
Authentication information such as names, passwords, and authentication method
Bandwidth allocation for Multilink PPP
Features
The features that the ISDN interface supports are summarized below:
Port—ISDN Basic Rate S/T interface with RJ45 connector
ISDN signaling—ETSI EURO-ISDN (ETS 300 102)
B-channel protocols—IETF PPP (RFC 1661 and 1662); IETF Multilink PPP (RFC 1990)
Security—PAP (RFC 1334), CHAP (RFC 1994), and ISDN Caller ID
Dial-on-demand routing—You can configure the ISDN interface so that only certain types
of traffic establish and maintain an ISDN connection.
Circuits are automatically removed if they are not required.
Dynamic bandwidth allocation—You can configure the ISDN interface to add or remove
additional bandwidth as the traffic requires it.
Multiple destination support-You can configure the ISDN interface to connect to two
different destinations simultaneously.
Dial-in support—You can configure the ISDN interface to accept incoming calls from
remote sites.
Note
The AUTHENTICATION table entries, which follow, allow the user to manage the
parameters used to authenticate both ends of the communication link.
16. In the TO REMOTE HOST section of the AUTHENTICATION table, in the NAME text box, enter
the name that needs to be returned to a remote host when it attempts to authenticate this host.
17. In the TO REMOTE HOST section of the AUTHENTICATION table, in the PASSWORD text box,
enter the password to be returned to the remote host for PAP authentication, or the secret
used to generate the challenge response for CHAP authentication.
Note
The TO REMOTE HOST information must be the same as the FROM REMOTE HOST
information (or its equivalent) at the remote end of the link.
18. In the FROM REMOTE HOST section of the AUTHENTICATION table select the authentication
method used to authenticate the remote host.
19. In the FROM REMOTE HOST section of the AUTHENTICATION table, in the NAME text box,
enter the name that will be returned from the remote host when this host attempts to
authenticate the remote host.
20. In the FROM REMOTE HOST section of the AUTHENTICATION table, in the PASSWORD text
box, enter a password to be returned by the remote host for PAP authentication, or the secret
used to validate the challenge response for CHAP authentication.
Note
The FROM REMOTE HOST information must be the same as the TO REMOTE HOST
information (or its equivalent) at the remote end of the link.
Note
The BANDWIDTH ALLOCATION table entries that follow allow the network administrator
to manage the parameters that are used to determine when to add or remove an
additional B-channel only when using Multilink PPP.
21. In the BANDWIDTH ALLOCATION table, in the UTILIZATION LEVEL text box, enter a
percentage bandwidth use level at which the additional B-channel is added or removed.
When the measured use of an outgoing B-channel exceeds the utilization level threshold for
a period greater than the use period, the second B-channel is brought into operation. When
the outgoing B-channel use falls below the use level for a period greater than the value of the
use period, the second B-channel is removed from operation.
A use level of zero means that the second B-channel is never brought into operation. To
bring the second B-channel into operation quickly, set the use level to a low number, such as
one.
22. In the BANDWIDTH ALLOCATION table, in the UTILIZATION PERIOD text box, enter the use
period.
This value specifies the number of seconds the outgoing B-channel use must remain above
the use level before a second channel is brought into operation. When a second B-channel
has been added, this value specifies the number of seconds that the use of the outgoing B-
channel must be below the use level before the second B-channel is removed from
operation.
A use period set to zero will cause the second B-channel to be brought into operation
immediately; the utilization level has been exceeded. It will also cause the second B-channel
to be removed from operation; immediately the measured utilization drops below the use
level.
23. Click APPLY.
24. To make your changes permanent, click SAVE.
For troubleshooting information, see “ISDN Troubleshooting.”
Note
If no incoming call numbers are configured, all incoming calls will be accepted.
11. In the TO REMOTE HOST section of the AUTHENTICATION table, in the NAME text box, enter
the name to be returned to a remote host when it attempts to authenticate this host.
12. In the TO REMOTE HOST section of the AUTHENTICATION table, in the PASSWORD text box,
enter the password to be returned to the remote host for PAP authentication, or the secret
used to generate the challenge response for CHAP authentication.
Note
The TO REMOTE HOST information must be the same as the FROM REMOTE HOST
information (or its equivalent) at the remote end of the link.
13. In the FROM REMOTE HOST section of the AUTHENTICATION table select the authentication
method used to authenticate the remote host.
14. In the FROM REMOTE HOST section of the AUTHENTICATION table, in the NAME text box,
enter the name that is returned from the remote host when this host attempts to authenticate
the remote host.
15. In the FROM REMOTE HOST section of the AUTHENTICATION table, in the PASSWORD text
box, enter a password to be returned by the remote host for PAP authentication, or the secret
used to validate the challenge response for CHAP authentication.
Note
The FROM REMOTE HOST information must be the same as the TO REMOTE HOST
information (or its equivalent) at the remote end of the link.
7. Enter the IP address of the remote end of the connection in the REMOTE ADDRESS text box.
8. Click BOTH Direction.
9. Click APPLY.
Note
Follow steps 8 through 21 in “To Configure an ISDN Logical Interface to Place Calls” to
set the information for outgoing calls.
For more information about how to set up incoming numbers see “To Add an Incoming
Number”.
Note
Setting a rule to skip effectively turns the rule off.
It is important to understand the difference between Access lists and DDR lists and how the two
interoperate. When a packet is sent over an interface, any Access list applied to that interface is
checked first. If the packet matches any rule in the Access list, the associated action is taken.
Therefore, if the packet matched a rule in the Access list that had an associated action of drop,
the packet is never sent over the ISDN interface. After the packet is checked against the Access
list, the DDR list applied to the interface (if any) is then checked.
Note
A DDR list, therefore, only affects which packets will cause a connection to be established
and maintained. If no DDR list is applied to an ISDN interface, all traffic received by the
interface is deemed interesting.
Note
When you create more rules, you can add rules before other rules. For example, if you
have four rules—rules 1, 2, 3, and 4—you can place a new rule between rules 2 and 3
by checking the ADD RULE BEFORE check box on rule 3.
Modifying a Rule
1. Click CONFIG on the home page.
2. Click the Dial on Demand Routing Configuration link under the Traffic Management
section.
3. Locate the DDR list that contains the rule to modify.
You can modify the following items:
Action
Source IP address
Source mask length
Destination IP address
Destination mask length
Source port range
You can specify the source port range only if the selected protocol is either “any,” “6,”
“TCP,” “17,” or “UDP.”
Destination port range
You can specify the destination port range only if the selected protocol is either “any,”
“6,” “TCP,” “17,” or “UDP.”
Protocol
4. Modify the values in one or more of the text boxes or drop-down window or deselect a
button.
Click APPLY.
Deleting a Rule
1. Click CONFIG on the home page.
2. Click the Dial on Demand Routing Configuration link under the Traffic Management
section.
3. Locate the DDR list that contains the rule to delete.
4. Click the DELETE check box next to the rule to delete.
Click APPLY.
5. To make your changes permanent, click SAVE.
eth-s1p1 206.226.5.2
206.226.5.1
ISDN phone isdn-s4p1
number 384020 206.226.15.1
206.226.5.3
ISDN Cloud
192.168.24.67
00067
A Nokia Security Platform IP330 at a remote branch office connects to a Nokia Security
Platform IP650 in a companys main office through ISDN by using PPP.
Considering the nature of the traffic being transmitted and the charging rates on an ISDN
network, the ISDN interface on the Nokia IP330 in this example has its minimum-call timer set
to four minutes and its idle timer set to one minute. The Nokia IP330 is configured to send a
username and password to the main office.
The Nokia IP650 is configured so that only incoming calls that originate from the Nokia IP330 is
answered. The PPP connection is in this example, the default values for the ISDN interface are
acceptable. Therefore, no configuration of the physical interface is required.
Note
To display the negotiated PPP values, run the tcpdump command with the -v switch.
The trace for connecting a call from the Nokia IP330 is:
06:23:45.186511 O > PD=8 CR=23(Orig) SETUP:Bc:88 90.
CalledNb:80 33 38 34 30 32 30.SendComp:
06:23:45.255708 I < PD=8 CR=23(Dest) CALL-PROC:ChanId:89.
06:23:45.796351 I < PD=8 CR=23(Dest) ALERT:
06:23:45.832848 I < PD=8 CR=23(Dest) CONN:DateTime:60 06 0c 05 2d.
06:23:45.833274 O B1: ppp-lcp: conf_req(mru, magicnum)
ISDN Troubleshooting
Logging
ISDN sends messages to the system message log. Whether a message is sent to the log or not
depends on the logging setting of the ISDN interface. A log message can be generated in the
following ways:
Error—an error condition occurred
Warning—a warning condition
Informational—a normal event of note
Setting a logging to a particular level means all messages of this severity and higher are sent to
the message log. For example, if you set logging to Error, all error messages are sent to the
message log.
ISDN logs messages for the following informational events:
ISDN layer 1 protocol activated or deactivated
Expiration of layer 1, layer 2, and layer 3 timers
An attempted outgoing call
An incoming call being received
A call being connected
A call being disconnected
Tracing
You can use the tcpdump utility to trace ISDN D-channel traffic (Q.921 and Q.931 protocols)
and B-channel traffic (PPP/multilink PPP and TCP/IP protocols).
When running tcpdump on an ISDN interface, if no options are given on the command line, the
following messages are decoded and displayed:
Q.931 messages
PPP messages and the fields inside them
Any IP traffic on the B-channels
If -e option is specified on the command line, in addition to the preceding messages, all Q.921
messages are also decoded and displayed.
If the -v option is used, Q.931 messages are displayed. Also the fields in all PPP messages and
their values are displayed in an extended format.
3 - Transit network
7 - International network
6 Channel unacceptable
17 User busy
18 No user responding
22 Number changed
30 Response to STATUS
ENQUIRY
31 Normal, unspecified
41 Temporary failure
42 Switching-equipment
congestion
47 Resources unavailable or
unspecified
70 Only restricted
digital-information bearer is
available
85 No call suspended
91 Invalid transit-network
selection
Notes
1. The coding of facility identification is network dependent.
2. Incompatible parameter is composed of incompatible information element identifier.
3. The format of the diagnostic field for cause 57, 58, and 65 is shown in the ITU-T Q.931
specification.
4. User-supplied diagnostic field is encoded according to the user specification, subject to the
maximum length of the cause-information element. The coding of user-supplied diagnostics
should be made in such a way that it does not conflict with the coding described in Table B-
2.
5. New destination is formatted as the called-party number information element, including
information element identifier. Transit network selection might also be included.
6. Locking and nonlocking shift procedures described in the ITU-T Q.931 specification apply.
In principle, information element identifiers are in the same order as the information
elements in the received message.
7. The following coding applies:
Bit 8, extension bit
Bits 7 through 5, spare
Bits 4 through 1, according to Table 4-15/Q.931 octet 3.2, channel type in ITU-T Q.931
specification.
8. When only the locking shift-information element is included and no variable length
information-element identifier follows, it means that the codeset in the locking shift itself is
not implemented.
9. The timer number is coded in IA5 characters.
The following coding is used in each octet:
Bit 8, Spare “0”
Value Description
Note
Changing an IP address and deleting an IP address at the same time prevents multiple
addresses from being assigned to a single interface.
8. Click APPLY.
9. Click SAVE.
Provider
(192.168.2.93)
ser-s1p1c0 (192.168.2.1)
FDDI fddi-s3p1c0
192.168.1.xxx Nokia Platform A
(192.168.1.1/24)
tok-s2p1c0 (192.168.3.2)
Server
Token Ring
192.168.3.4 MAU 192.168.3.5
Server Server
(Optional) (Optional)
tok-s1p1c0 (192.168.3.1)
Nokia Platform B
eth-s2p1c0 (192.168.4.1/24)
192.168.4.xxx
Note
This setting must be the same for all hosts on the network to which the device connects.
9. Click APPLY.
Click UP to return to the interface configuration page.
10. Click the logical interface link to configure in the LOGICAL column.
11. In the NEW IP ADDRESS field, enter the appropriate IP address.
12. In the NEW MASK LENGTH field, enter the appropriate value.
13. Click APPLY.
14. Click SAVE.
Note
An ATM interface cannot be configured with an IP address until at least one logical interface
is created for the interface.
Note
SONET and SDH settings are available only if the ATM interface card supports them.
The setting should match the type of transmission network to which the interface is
connected.
5. Select FREERUN or LOOP TIMING as the transmit clock choice in the PHYSICAL
CONFIGURATION table.
Note
The Transmit Clock settings are available only if the ATM interface card supports them.
Note
The maximum packet size must match the MTU of the link partner.
12. (Optional) Change the interfaces logical name to a more meaningful name by typing the
preferred name in the LOGICAL NAME text box.
Click APPLY.
13. (Optional) Add a comment to further define the logical interfaces function in the
COMMENTS text box.
Click APPLY.
14. To make your changes permanent, click SAVE.
Note
To move an IP address from one PVC to another, you must first delete the logical interface
for the old PVC, then create a new logical interface for the new PVC.
Note
Do not change the IP address you use in your browser to access Voyager. If you do, you
can no longer access the IP security platform (unit) with your browser.
Note
The maximum packet size must match the MTU of the link partner. Packets longer than the
length you specify are fragmented before transmission.
3. Click the physical interface link in the PHYSICAL column on the Interface Configuration
page.
Example:
atm-s2p1
4. Find the ATM logical interface to remove in the LOGICAL INTERFACES table and click the
corresponding DELETE button.
Click APPLY.
The ATM logical interface disappears from the list.
5. To make your changes permanent, click SAVE.
ATM Example
This section describes how you might configure the interfaces of your IP security platform in an
example network, using Nokia Network Voyager.
Before you can configure interfaces by using Network Voyager, you must first configure an IP
address on one of the interfaces. You can do this through the console port during installation or
by using the Lynx browser. This allows a graphical browser such as Internet Explorer or
Netscape Navigator to access the device through that interface. You can use any graphical web
browser to configure the other interfaces on the device by entering the IP address of the device in
the location field of the browser.
Provider
(192.168.2.93)
ser-s1p1c0 (192.168.2.1)
FDDI fddi-s3p1c0
192.168.1.xxx Nokia Platform A
(192.168.1.1/24)
atm-s2p1c93 (192.168.3.2)
Server
ATM
Switch
atm-s1p1c52 (192.168.3.1)
Nokia Platform B
eth-s2p1c0 (192.168.4.1/24)
192.168.4.xxx
Server Server
00037
In a companys main office, Nokia Platform A terminates a serial line to an Internet service
provider, running PPP with a keepalive value of 10.
Nokia Platform A also provides internet access for an FDDI ring and a remote branch office
connected through ATM PVC 93.
The branch office contains Nokia Platform B, which routes traffic between a local fast Ethernet
network and ATM PVC 52. It provides access to the main office and the Internet. This example
configures the ATM interface on Nokia Platform A.
1. Click CONFIG on the home page.
2. Click the Interfaces link.
3. Select atm-s2p1 in the PHYSICAL column of the table.
4. Enter 93 in the VCI text box in the Create a new LLC/SNokia Platform RFC1483 interface
section.
The channel number of the interface is no longer the VCI number but an automatically
allocated number. Therefore, the logical name of the interface in step 6 is something that
depends on what other logical ATM interfaces there are. Find the newly created interface
from the table before you continue.
Click APPLY.
5. Click atm-s2p1c93 in the LOGICAL INTERFACES table to go to the Interface page.
Note
The steps for configuring the ATM interface on Nokia Platform B are the same except that
you should set the to 52 when you create the logical interface and reverse the IP addresses
should be reversed.
Note
All hosts in the same LIS must use the same IP MTU in their interface to the LIS.
13. (Optional) Change the interfaces logical name to a more meaningful one by typing the
preferred name in the LOGICAL NAME text box.
Click APPLY.
14. (Optional) Add a comment to further define the logical interfaces function in the
COMMENTS text box.
Click APPLY.
15. To make your changes permanent, click SAVE.
Note
Do not change the VCI address of the connection you are using. If you do, you can no
longer access the IP security platform with your browser.
4. Select the VPI/VCI range in the VPI/VCI RANGE CONFIGURATION list box.
5. Find the ATM logical interface to reconfigure in the LOGICAL INTERFACES table and enter a
new set of VPI/VCIs in the VPI/VCI field.
Click APPLY.
6. To make your changes permanent, click SAVE.
Note
Do not change the IP address you use in your browser to access Voyager. If you do, you
can no longer access the IP security platform with your browser.
Note
Packets longer than the length you specify are fragmented before transmission.
IPoA Example
This section describes how you might configure the interfaces of your IP security platform
(Nokia platform) in an example network, using Voyager.
Before you can configure interfaces by using Nokia Network Voyager, you must first configure
an IP address on one of the interfaces. You can do this through the Nokia platform console port
during installation or by using the Lynx browser. This allows a graphical browser such as
Internet Explorer or Netscape Navigator to access the Nokia Platform through that interface.
You can use any graphical Web browser to configure the other interfaces on the device by
entering the IP address of the device in the location field of the browser.
The following figure shows the network configuration for this example.
eth-s1p1c0
Nokia Platform A
atm-s2p1c0 (10.0.0.1/24)
ATM
Switch
00125
A company has five ethernet networks in three separate locations. The networks are connected to
each other with three routers that belong to the same logical IP subnet over ATM. This example
configures the ATM interface on Nokia Platform A. The interface is connected to Nokia
Platform B through ATM PVC 42 and to Nokia Platform C through ATM PNC 53. Nokia
Platform B and Nokia Platform C are connected to each other through an ATM PVC; their ATM
interfaces have already configured.
1. Click CONFIG on the home page.
2. Click the Interfaces link.
3. Click the physical interface link to configure in the PHYSICAL column.
Example:
atm-s2p1
You are taken to the Physical Interface page.
4. Create a logical interface in the Create a new LLC/SNokia Platform RFC1483 interface
section by selecting LIS in the TYPE list box.
5. Enter 42,53 in the VCI(S) text box.
6. Click APPLY.
7. Click the newly created interface (atm-s2p1c0) in the LOGICAL INTERFACES table to reach
the Logical Interface page.
8. Enter 10.0.0.1 in the IP ADDRESS text box.
9. Enter 24 in the MASK LENGTH text box.
10. Click APPLY.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
9. Click the logical interface name in the INTERFACE column of the LOGICAL INTERFACES
table to go to the Interface page.
10. Enter the IP address for the local end of the link in the LOCAL ADDRESS text box.
11. Enter the IP address of the remote end of the link in the REMOTE ADDRESS text box.
Click APPLY.
12. (Optional) Change the interfaces logical name to a more meaningful name by typing the
preferred name in the LOGICAL NAME text box.
Click APPLY.
13. (Optional) Add a comment to further define the logical interfaces function in the
COMMENTS text box.
Click APPLY.
To make your changes permanent, click SAVE.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
12. From the Frame Relay Advanced Options page, click UP to return to the Physical Interface
page.
13. Enter the DLCI number in the CREATE A NEW INTERFACE DLCI text box.
Click APPLY.
A new logical interface appears in the INTERFACE column. The DLCI number appears as the
channel number in the logical interface name. The new interface is on by default.
14. (Optional) Enter another DLCI number in the DLCI text box to configure another frame
relay PVC.
Click APPLY.
Each time you click APPLY after you enter a DLCI, a new logical interface appears in the
INTERFACE column. The DLCI entry field remains blank to allow you to add more frame
relay logical interfaces.
15. Click the logical interface name in the INTERFACE column of the LOGICAL INTERFACES
table to go the Interface page.
16. Enter the IP address for the local end of the PVC in the LOCAL ADDRESS text box.
17. Enter the IP address of the remote end of the PVC in the REMOTE ADDRESS text box.
Click APPLY.
18. (Optional) Change the interfaces logical name to a more meaningful name by typing the
preferred name in the LOGICAL NAME text box.
Click APPLY.
To make your changes permanent, click SAVE.
The following figure shows the network configuration for this example.
Provider
(192.168.2.93)
ser-s1p1c0 (192.168.2.1)
FDDI fddi-s3p1c0
192.168.1.xxx Nokia Platform A
(192.168.1.1/24)
atm-s2p1c93 (192.168.3.2)
Server
ATM
Switch
atm-s1p1c52 (192.168.3.1)
Nokia Platform B
eth-s2p1c0 (192.168.4.1/24)
192.168.4.xxx
Server Server
00037
In a companys main office, Nokia Platform A terminates a serial line to an Internet service
provider, running PPP with a keepalive value of 10.
Nokia Platform A also provides internet access for a FDDI ring and a remote branch office
connected through ATM PVC 93.
The branch office contains Nokia Platform B, which routes traffic between a local Fast Ethernet
network and ATM PVC 52. It provides access to the main office and the Internet. This example
configures the serial interface on Nokia Platform A.
1. Click CONFIG on the home page.
2. Click the Interfaces link.
3. Select ser-s1p1 in the PHYSICAL column of the table.
4. Click PPP in the ENCAPSULATION field.
5. Click APPLY.
6. Enter 10 in the KEEPALIVE text box.
7. Click APPLY.
8. Click ser-s1p1c0 in the LOGICAL INTERFACES table to go to the Interface page.
9. Enter 192.168.2.1 in the LOCAL ADDRESS text box.
10. Enter 192.168.2.93 in the REMOTE ADDRESS text box.
Click APPLY.
Use T1 framing to divide the data stream into 64 Kbps channels and to synchronize with the
remote CSU/DSU. This setting must match the frame format that the CSU/DSU uses at the
other end of the point-to-point link.
8. Click 64BPS or 56BPS in the T1 CHANNEL SPEED field to select the DS0 channel speed for
the T1 line.
Some older trunk lines use the least-significant bit of each DS0 channel in a T1 frame for
switching-equipment signaling. T1 frames designed for data transfer can be set to not use the
least-significant bit of each DS0 channel. This setting allows data to be sent over these trunk
lines without corruption but at a reduced throughput. This mode is called the 56 Kbps mode
because each DS0 channel now has an effective throughput of 56 Kbps instead of 64 Kbps.
All T1 functions still work in the 56 Kbps mode, including all framing modes and fractional
T1 configurations.
9. If you selected Extended SF as the T1 Framing format, click ANSI or NONE in the FDL
TYPE field to select the FDL type.
10. Click CISCO HDLC in the ENCAPSULATION field.
Click APPLY.
A logical interface appears in the LOGICAL INTERFACES table.
11. Enter a number in the KEEPALIVE text box to configure the Cisco HDLC keepalive interval.
Click APPLY.
This value sets the interval, in seconds, between keepalive protocol message transmissions.
These messages are used periodically to test for an active remote system.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
12. (Optional) Click the Advanced T1 CSU/DSU Options link to select advanced T1 options.
The T1 CSU/DSU Advanced Options page allows you to configure fractional T1 channels,
line build-out values and other advanced settings for the T1 device. The values you enter on
this page are dependent on the subscription provided by your service provider.
13. From the Advanced T1 CSU/DSU Options page, click UP to return to the physical interface
page.
14. Click the logical interface name in the INTERFACE column of the LOGICAL INTERFACES
table to go to the Interface page.
15. Enter the IP address for the local end of the link in the LOCAL ADDRESS text box.
16. Enter the IP address of the remote end of the link in the REMOTE ADDRESS text box.
Click APPLY.
17. (Optional) Change the interfaces logical name to a more meaningful name by typing the
preferred name in the LOGICAL NAME text box.
All T1 functions still work in the 56 Kbps mode, including all framing modes and fractional
T1 configurations.
9. If you selected Extended SF as the T1 Framing format, click ANSI or NONE in the FDL
TYPE field to select the FDL type.
10. Click the PPP in the ENCAPSULATION field.
Click APPLY.
A logical interface appears in the LOGICAL INTERFACES table.
11. Enter a number in the KEEPALIVE text box to configure the PPP keepalive interval.
Click APPLY.
This value sets the interval, in seconds, between keepalive protocol message transmissions.
These messages are used periodically to test for an active remote system.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
7. Click 64BPS or 56BPS in the T1 CHANNEL SPEED field to select the DS0 channel speed for
the T1 line.
Some older trunk lines use the least-significant bit of each DS0 channel in a T1 frame for
switching-equipment signaling. T1 frames designed for data transfer can be set to not use the
least-significant bit of each DS0 channel. This setting allows data to be sent over these trunk
lines without corruption but at a reduced throughput. This mode is called the 56 Kbps mode
because each DS0 channel now has an effective throughput of 56 Kbps instead of 64 Kbps.
All T1 functions still work in the 56 Kbps mode, including all framing modes and fractional
T1 configurations.
8. If you selected Extended SF as the T1 Framing format, click ANSI or NONE in the FDL
TYPE field to select the FDL type.
9. Click FRAME RELAY in the ENCAPSULATION field.
Click APPLY.
10. Enter a number in the KEEPALIVE text box to configure the frame relay keepalive interval.
Click APPLY.
This value sets the interval, in seconds, between keepalive protocol message transmissions.
These messages are used periodically to test for an active remote system.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
16. From the Frame Relay Advanced Options page, click UP to return to the Physical Interface
page.
17. Enter the DLCI number in the CREATE A NEW INTERFACE DLCI text box.
Click APPLY.
A new logical interface appears in the INTERFACE column. The DLCI number appears as the
channel number in the logical interface name. The new interface is on by default.
18. (Optional) Enter another DLCI number in the DLCI text box to configure another frame
relay PVC.
Click APPLY.
Each time you click APPLY after entering a DLCI, a new logical interface appears in the
INTERFACE column. The DLCI entry field remains blank to allow you to add more frame
relay logical interfaces.
19. Click the logical interface name in the INTERFACE column of the LOGICAL INTERFACES
table to go to the Interface page.
20. Enter the IP address for the local end of the PVC in the LOCAL ADDRESS text box.
21. Enter the IP address of the remote end of the PVC in the REMOTE ADDRESS text box.
Click APPLY.
22. (Optional) Change the interface’s logical name to a more meaningful one by typing the
preferred name in the LOGICAL NAME text box.
Click APPLY.
23. (Optional) Add a comment to further define the logical interfaces function in the
COMMENTS text box.
Click APPLY.
24. To make your changes permanent, click SAVE.
T1 Interface Example
This section describes how you might use Voyager to configure the interfaces of your IP security
platform in an example network.
Before you can configure the device by using Nokia Network Voyager, you must first configure
an IP address on one of the interfaces. You can do this through the console port during
installation or by using the Lynx browser. This procedure allows a graphical browser such as
Internet Explorer or Netscape Navigator to access the device through that interface. You can use
any graphical web browser to configure the other interfaces on the device by entering the IP
address of the device in the location field of the browser.
The following figure shows the network configuration for this example.
Provider
(192.168.2.93)
ser-s1p1c0 (192.168.2.1)
FDDI fddi-s3p1c0
192.168.1.xxx Nokia Platform A
(192.168.1.1/24)
atm-s2p1c93 (192.168.3.2)
Server
ATM
Switch
atm-s1p1c52 (192.168.3.1)
Nokia Platform B
eth-s2p1c0 (192.168.4.1/24)
192.168.4.xxx
Server Server
00037
This setting must match the line encoding of the CSU/DSU at the other end of the point-to-
point link.
7. Click E1 (channel 0 framing) or NO FRAMING in the E1 FRAMING field to select the E1
framing format.
Use E1 framing to select whether timeslot-0 is used for exchanging signaling data.
8. Click ON or OFF for the E1 CRC-4 FRAMING field.
Note
This option appears only if you set the E1 FRAMING field to E1 (CHANNEL 0 FRAMING).
This option chooses the framing format for timeslot-0. ON means that CRC-multiframe
format is used; the information is protected by CRC-4. OFF means that double-frame format
is used. This setting must match the setting of the CSU/DSU at the other end of the link.
9. Click ON or OFF for the E1 TIMESLOT-16 FRAMING.
Click APPLY.
Note
This option appears only if you set the E1 FRAMING field to E1 (CHANNEL 0 FRAMING).
This option controls whether timeslot-16 is used in channel associated signaling (CAS).
Setting this value to ON means that timeslot-16 cannot be used as a data channel. See
fractional settings on the Advanced E1 CSU/DSU Options page.
10. Click CISCO HDLC in the ENCAPSULATION field.
Click APPLY.
A logical interface appears in the LOGICAL INTERFACES table.
11. Enter a number in the KEEPALIVE text box to configure the Cisco HDLC keepalive interval.
Click APPLY.
This value sets the interval, in seconds, between keepalive protocol message transmissions.
These messages are used periodically to test for an active remote system. The range is 0-
255. The default is 10.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
12. (Optional) Click the Advanced E1 CSU/DSU Options link to select advanced E1 options.
The E1 CSU/DSU Advanced Options page allows you to configure fractional E1 channels
and other advanced settings for the E1 device. The values you enter on this page depend on
the subscription provided by your service provider.
Note
Try to ping the remote system from the command prompt. If the remote system does not
work, contact your service provider to confirm the configuration.
This setting must match the line encoding of the CSU/DSU at the other end of the point-to-
point link.
7. Click E1 (channel 0 framing) or NO FRAMING in the E1 FRAMING field to select the E1
Framing format.
Use E1 framing to select whether timeslot-0 is used for exchanging signaling data.
8. Click ON or OFF for the E1 CRC-4 FRAMING field.
Note
This option appears only if you have set the E1 FRAMING field to E1 (CHANNEL 0
FRAMING).
This button chooses the framing format for timeslot-0. ON means that CRC-multiframe
format is used; the information is protected by CRC-4. OFF means that double-frame format
is used. This setting must match the setting of the CSU/DSU at the other end of the link.
9. Click ON or OFF for the E1 TIMESLOT-16 FRAMING.
Click APPLY.
Note
This option appears only if you set the E1 FRAMING field to E1 (CHANNEL 0 FRAMING).
This value controls whether timeslot-16 is used in channel associated signaling (CAS).
Setting this value to ON means that timeslot-16 cannot be used as a data channel. See
fractional settings on the Advanced E1 CSU/DSU Options page.
10. Click PPP in the ENCAPSULATION field.
Click APPLY.
A logical interface appears in the LOGICAL INTERFACES table.
11. Enter a number in the KEEPALIVE text box to configure the PPP keepalive interval.
Click APPLY.
This value sets the interval, in seconds, between keepalive protocol message transmissions.
These messages are used periodically to test for an active remote system. The range is 0-
255. The default is 5.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
Note
Try to ping the remote system from the command prompt. If the remote system does not
work, contact your service provider to confirm the configuration.
Note
This option appears only if you have set the E1 FRAMING field to E1 (CHANNEL 0
FRAMING).
This button chooses the framing format for timeslot-0. ON means that CRC-multiframe
format is used; the information is protected by CRC-4. OFF means that doubleframe format
is used. This setting must match the setting of the CSU/DSU at the other end of the link.
9. Click ON or OFF for the E1 TIMESLOT-16 FRAMING.
Click APPLY.
Note
This option appears only if you set the E1 FRAMING field to E1 (CHANNEL 0 FRAMING).
This value controls whether timeslot-16 is used in channel associated signaling (CAS).
Setting this value to ON means that timeslot-16 cannot be used as a data channel. See
fractional settings on the Advanced E1 CSU/DSU Options page.
10. Click FRAME RELAY in the ENCAPSULATION field.
Click APPLY.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
Note
The values you enter depend on the settings of the frame relay switch to which you are
connected or to the subscription that your service provider provides.
17. From the Frame Relay Advanced Options page, click UP to return to the Physical Interface
page.
18. Enter the DLCI number in the CREATE A NEW INTERFACE DLCI text box.
Click APPLY.
A new logical interface appears in the INTERFACE column. The DLCI number appears as the
channel number in the logical interface name. The new interface is turned on by default.
19. (Optional) Enter another DLCI number in the DLCI text box to configure another frame
relay PVC.
Click APPLY.
Each time you click APPLY after you enter a DLCI, a new logical interface appears in the
INTERFACE column. The DLCI entry field remains blank to allow you to add more frame
relay logical interfaces.
20. Click the logical interface name in the INTERFACE column of the LOGICAL INTERFACES
table to go to the Interface page.
21. Enter the IP address for the local end of the PVC in the LOCAL ADDRESS text box.
22. Enter the IP address of the remote end of the PVC in the REMOTE ADDRESS text box.
Click APPLY.
23. (Optional) Change the interface’s logical name to a more meaningful one by typing the
preferred name in the LOGICAL NAME text box.
Click APPLY.
24. (Optional) Add a comment to further define the logical interfaces function in the
COMMENTS text box.
Click APPLY.
25. To make your changes permanent, click SAVE.
Note
Try to ping the remote system from the command prompt. If the remote system does not
work, contact your service provider to confirm the configuration.
HSSI Interfaces
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
9. Click the logical interface name in the INTERFACE column of the LOGICAL INTERFACES
table to go to the Interface page.
10. Enter the IP address for the local end of the link in the LOCAL ADDRESS text box.
11. Enter the IP address of the remote end of the link in the REMOTE ADDRESS text box.
Click APPLY.
12. (Optional) Change the interface’s logical name to a more meaningful one by typing the
preferred name in the LOGICAL NAME text box.
Click APPLY.
13. (Optional) Add a comment to further define the logical interfaces function in the
COMMENTS text box.
Click APPLY.
14. To make your changes permanent, click SAVE.
Click APPLY.
Set the internal clock to ON when you are connecting to a device or system that does not
provide a clock source. Otherwise, set the internal clock to OFF.
5. If you turned the internal clock on, enter a value in the INTERNAL CLOCK SPEED text box.
If the device can generate only certain line rates, and the configured line rate is not one of
these values, the device selects the next highest available line rate.
6. Click FULL DUPLEX or LOOPBACK in the CHANNEL MODE field.
Full duplex is the normal mode of operation.
7. Click the PPP in the ENCAPSULATION field.
Click APPLY.
A logical interface appears in the LOGICAL INTERFACES table.
8. Enter a number in the KEEPALIVE text box to configure the PPP keepalive interval.
Click APPLY.
This value sets the interval, in seconds, between keepalive protocol message transmissions.
These messages are used periodically to test for an active remote system.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
9. Enter a number in the KEEPALIVE MAXIMUM FAILURES text box to configure the PPP
keepalive maximum failures.
This value sets the number of times a remote system may fail to send a keepalive protocol
message within a keepalive interval before the systems considers the link down.
Click APPLY.
10. Click the Advanced PPP Options link.
The PPP Advanced Options page appears.
11. Click YES or NO in the NEGOTIATE MAGIC NUMBER field.
Clicking YES enables the interface to send a request to negotiate a magic number with a
peer.
12. Click YES or NO in the NEGOTIATE MAXIMUM RECEIVE UNIT field.
Clicking YES enables the interface to send a request to negotiate an MRU with a peer.
Click APPLY.
13. Click UP to return to the Physical Interface page.
14. Click the logical interface name in the INTERFACE column of the LOGICAL INTERFACES
table to go to the Interface page.
15. Enter the IP address for the local end of the link in the LOCAL ADDRESS text box.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
Note
The values you enter depend on the settings of the frame relay switch to which you are
connected or to the subscription that your service provider provides.
12. From the Frame Relay Advanced Options page, click UP to return to the Physical Interface
page.
13. Enter the DLCI number in the CREATE A NEW INTERFACE DLCI text box.
Click APPLY.
A new logical interface appears in the INTERFACE column. The DLCI number appears as the
channel number in the logical interface name. The new interface is on by default.
14. (Optional) Enter another DLCI number in the DLCI text box to configure another frame
relay PVC.
Click APPLY.
Each time you click APPLY after entering a DLCI, a new logical interface appears in the
INTERFACE column. The DLCI entry field remains blank to allow you to add more frame
relay logical interfaces.
15. Click the logical interface name in the INTERFACE column of the LOGICAL INTERFACES
table to go to the Interface page.
16. Enter the IP address for the local end of the PVC in the LOCAL ADDRESS text box.
17. Enter the IP address of the remote end of the PVC in the REMOTE ADDRESS text box.
Click APPLY.
18. (Optional) Change the interface’s logical name to a more meaningful one by typing the
preferred name in the LOGICAL NAME text box.
Click APPLY.
19. (Optional) Add a comment to further define the logical interfaces function in the
COMMENTS text box.
Click APPLY.
20. To make your changes permanent, click SAVE.
Note
Only point-to-point interfaces can be configured as unnumbered interfaces. Tunnels
cannot be configured as unnumbered interfaces.
Note
If that interface was associated with either a local or remote address or both, they are
automatically deleted.
Note
You do not see local and remote address configuration fields for unnumbered
interfaces. The proxy interface field replaces those fields.
Note
The interface must not be used by a tunnel, and OSPF is the only protocol that the
interface can be running.
Note
The PROXY INTERFACE drop-down window shows only those interfaces that have been
assigned addresses.
7. Click APPLY.
Note
You must choose a proxy interface for the unnumbered interface to function.
Note
You cannot delete the only IP address of the proxy interface. First, select another proxy
interface and then delete the IP address of the original proxy interface. If the proxy
interface has multiple IP addresses associated with it, you can delete or add addresses.
A proxy interface must have at least one IP address associated with it.
Note
Only point-to-point interfaces can be configured as unnumbered interfaces. Tunnels
cannot be configured as unnumbered interfaces.
Note
This interface must not be the next hop of a static route.
Note
You must now configure a numbered logical interface.
Note
You select an unnumbered logical interface as the next-hop gateway when you do not
know the IP address of the next-hop gateway.
Click APPLY.
8. Click on the GATEWAY LOGICAL drop-down window to view the list of unnumbered
interfaces that are configured. Select the unnumbered logical interface to use as a next-hop
gateway to the destination network.
9. Click APPLY, and then click SAVE to make your change permanent.
Area 2 Area 1
Nokia Nokia
Platform A Platform B
Unnumbered Serial Link
Backbone
00043
1. Configure the interfaces on Nokia Platform A and Nokia Platform B as in “Configuring an
Unnumbered Interface.”
2. For each Nokia Platform, configure an OSPF area as in “Configuring OSPF.”
3. In the Interfaces section, click on the AREA drop-down window next to the configured
unnumbered interface and select BACKBONE.
4. Click APPLY.
5. Click SAVE to make your change permanent.
Note
Because the unnumbered interface uses the IP address of the selected proxy interfaces
whenever you change this proxy interface, OSPF adjacencies are re-established.
Note
Whenever you change the underlying encapsulation of the unnumbered serial
interfaces, for example from Cisco HDLC to PPP or from PPP to Frame Relay, OSPF
adjacencies are re-established.
Area 1
Host PC Host PC
Nokia
Virtual Link Platform A
Nokia
Platform C
Unnumbered
Backbone Area 3
Serial Link
10.10.10.1
Virtual Link
10.10.10.2
Nokia
Platform B
Host PC Host PC
Area 2
00044
The interfaces that comprise the virtual link between Nokia Platform A and Nokia Platform C
are both configured as unnumbered. This link will fail because OSPF does not support a virtual
link that uses an unnumbered interface on either end of the link. underlying encapsulation. For
more information see RFC 2328 . Any virtual link that uses OSPF must have an IP address
configured on both ends. The virtual link between Nokia Platform B and Nokia Platform C
functions because each Nokia Platform is configured with an IP address.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
Note
Do not change the IP address you use in your browser to access Voyager. If you do, you
can no longer access the IP security platform with your browser.
Note
This value must be identical to the keepalive value configured on the system at the other
end of a point-to-point link, or the link state fluctuates.
Note
Do not change the IP address you use in your browser to access Voyager. If you do, you
can no longer access the IP security platform with your browser.
Note
The values you enter are dependent on the settings of the frame relay switch to which
you are connected or to the subscription provided by your service provider.
5. From the Frame Relay Advanced Options page, click UP to return to the Physical Interface
page.
6. To make your changes permanent, click SAVE.
Note
Do not change the IP address you use in your browser to accessNokia Network Voyager. If
you do, you can no longer access the IP security platform with your browser.
Loopback Interfaces
Note
The loopback interface always has a logical interface created and enabled.
GRE Tunnels
5. Click APPLY.
Each time you select a tunnel encapsulation and click APPLY, the new tunnel appears in the
logical interfaces table.
6. Click the logical interface name in the INTERFACE column of the Logical interfaces table to
go to the Interface page for the specified tunnel.
Example:
tun0c1
7. Enter the IP address of the local end of the GRE tunnel in the LOCAL ADDRESS text box.
The local address cannot be one of the system’s interface addresses and must be the remote
address configured for the GRE tunnel at the remote router.
8. Enter the IP address of the remote end of the GRE tunnel in the REMOTE ADDRESS text box.
The remote address cannot be one of the systems interface addresses and must be the local
address configured for the GRE tunnel at the remote router.
9. Enter the IP address of the local interface the GRE tunnel is bound to in the LOCAL
ENDPOINT text box.
The local endpoint must be one of the systems interface addresses and must be the remote
endpoint configured for the GRE tunnel at the remote router.
10. Enter the IP address of the remote interface the GRE tunnel is bound to in the REMOTE
ENDPOINT text box.
The remote endpoint must not be one of the systems interface addresses and must be the
local endpoint configured for the GRE tunnel at the remote router.
11. (Optional) Select a value from the TOS VALUE drop-down window.
Click APPLY.
On GRE tunnels, it is desirable to copy or specify the TOS bits when the router encapsulates
the packet. After you select the TOS feature, intermediate routers between the tunnel
endpoints may take advantage of the QoS features and possibly improve the routing of
important packets. By default, the TOS bits are copied from the inner IP header to the
encapsulating IP header.
If the desired TOS value is not displayed in the drop-down window, select CUSTOM VALUE
from the menu.
Click APPLY. An entry field appears.
12. (Optional) If you selected a custom value from the TOS VALUE drop-down window, enter a
value in the range of 0-255.
Click APPLY.
13. (Optional) Change the interface’s logical name to a more meaningful one by typing the
preferred name in the LOGICAL NAME text box.
Click APPLY.
14. (Optional) Add a comment to further define the logical interfaces function in the
COMMENTS text box.
Click APPLY.
15. To make your changes permanent, click SAVE.
The remote address cannot be one of the systems interface addresses and must be the local
address configured for the GRE tunnel at the remote router.
6. (Optional) Enter the IP address of the local interface the GRE tunnel is bound to in the
LOCAL ENDPOINT text box.
The local endpoint must be one of the systems interface addresses and must be the remote
endpoint configured for the GRE tunnel at the remote router.
7. (Optional) Enter the IP address of the local interface the GRE tunnel is bound to in the
REMOTE ENDPOINT text box.
The remote endpoint must not be one of the systems interface addresses and must be the
local endpoint configured for the GRE tunnel at the remote router.
Click APPLY.
8. To make your changes permanent, click SAVE.
Click APPLY.
6. To make your changes permanent, click SAVE.
Internet
192.68.26.65/30 192.68.26.74/30
5. Click APPLY.
6. From the INTERFACE column on the Logical interfaces table, select tun01.
7. Enter 10.0.0.1 in the LOCAL ADDRESS textbox.
8. Enter 10.0.0.2 in the REMOTE ADDRESS text box.
9. Enter 192.68.26.65 in the LOCAL ENDPOINT text box.
10. Enter 192.68.26.74 in the REMOTE ENDPOINT text box.
11. (Optional) Select a value from the TOS VALUE drop-down window.
Click APPLY.
On GRE tunnels, it is desirable to copy or specify the TOS bits when the router encapsulates
the packet. After you select the TOS feature, intermediate routers between the tunnel
endpoints may take advantage of the QoS features and possibly improve the routing of
important packets. By default, the TOS bits are copied from the inner IP header to the
encapsulating IP header.
If the desired TOS value is not displayed in the drop-down window, select CUSTOM VALUE
from the menu.
Click APPLY. An entry field appears.
12. (Optional) If you selected custom value from the TOS VALUE drop-down window, enter a
value in the range of 0-255.
13. Click APPLY.
14. (Optional) Change the interface’s logical name to a more meaningful one by typing the
preferred name in the LOGICAL NAME text box.
Click APPLY.
15. (Optional) Add a comment to further define the logical interfaces function in the
COMMENTS text box.
Click APPLY.
16. To make changes permanent, click SAVE.
of this reference guide, they are not individually repeated here. The following figure shows the
network configuration for this example.
Remote PCs
Site A
192.168.0.X/24
192.168.0.1 192.168.0.2
Nokia Nokia
Platform 1 170.0.0.1 170.0.1.1 Platform 3
10.0.0.1 11.0.0.1
10.0.0.2 11.0.0.2
Nokia 171.0.0.1 171.0.1.1 Nokia
Platform 2 Platform 4
192.168.1.1 192.168.1.2
192.168.1.X/24
Remote PCs
Site B
00002
Note
You must complete step 1 in the following procedure before you continue to other steps.
You can complete steps 2 through 4 in any order.
1. Perform the steps as presented in the Creating a GRE Tunnel and GRE Tunnel Example
sections. Since this example shows you how to create an HA GRE tunnel, we need to create
multiple tunnels and in two directions. This example requires repeating steps 7 through 10 of
the GRE Tunnel example four times as follows:
a. Configuring from IP Unit 1 to IP Unit 2:
Enter 10.0.0.1 in the LOCAL ADDRESS text box.
Enter 10.0.0.2 in the REMOTE ADDRESS text box.
DVMRP Tunnels
5. Click APPLY.
Each time you select a tunnel encapsulation and click APPLY, a new tunnel appears in the
table.
6. Click the logical interface name in the INTERFACE column of the Logical interfaces table;
this takes you to the interface page for the specified tunnel.
Example:
tun0c1
7. Enter the IP address of the local end of the DVMRP tunnel in the LOCAL ADDRESS text box.
The local address must be one of the systems interface IP addresses and must also be the
remote address configured on the DVMRP tunnel on the remote router.
8. Enter the IP address of the remote end of the DVMRP tunnel in the REMOTE ADDRESS text
box.
The remote address must be the IP address of the multicast router at the remote end of the
DVMRP tunnel. It cannot be one of the system’s interface addresses.
9. (Optional) Change the interface’s logical name to a more meaningful name by typing the
preferred name in the LOGICAL NAME text box.
Click APPLY.
10. (Optional) Add a comment to further define the logical interfaces function in the
COMMENTS text box.
Click APPLY.
11. To make your changes permanent, click SAVE to make changes permanent.
Note
When the DVMRP tunnel interface is created, set all other DVMRP configuration parameters
from the DVMRP page.
The local address must be one of the systems interface IP addresses and must also be the
remote address configured on the DVMRP tunnel on the remote router.
5. (Optional) Enter the IP address of the remote end of the DVMRP tunnel in the REMOTE
ADDRESS text box.
The remote address must be the IP address of the multicast router at the remote end of the
DVMRP tunnel. It cannot be one of the systems interface addresses.
6. Click APPLY.
7. To make your changes permanent, click SAVE.
Note
When the tunnel interface has been created, set all other DVMRP configuration parameters
from the DVMRP page.
space above 224.0.0.0 and below 238.0.0.0. Multicast traffic is different from unicast (point-to-
point) traffic in that is in one-to-many traffic forwarded by routers.
A router forwards Multicast traffic to an adjacent router only if that router has a client that
accepts multicast traffic. Nokia IP security platforms require Distance Vector Multicast Routing
Protocol (DVMRP) to be enabled on the interfaces to which you forward multicast traffic.
Nokia Nokia
Platform B Platform C
26.66/30 26.69/30 26.70/30 26.73/30
26.65/30 26.74/30
Nokia Platform A Nokia Platform D
22.1/24 24.0/24
Internet
Remote PCs using
Multicast Applications
00039
In the preceding example, a DVMRP tunnel originates from the ISP at 22.254/24. This tunnel
has a present endpoint of 22.1/24. A DVMRP tunnel set up on Nokia Platform A points to
22.254/24.
1. Initiate a Nokia Network Voyager session to Nokia Platform A. In this example, we use
Nokia Platform A as the starting point.
2. Click CONFIG on the home page.
3. Click the Interfaces link.
4. Click TUNNELS in the PHYSICAL column.
5. From the pulldown menu in the CREATE A NEW TUNNEL INTERFACE WITH
ENCAPSULATION, select DVMRP.
6. Click APPLY.
Each time you select a tunnel encapsulation and click APPLY, a new tunnel appears in the
table.
7. Click the logical interface name in the INTERFACE column of the Logical interfaces table;
this takes you to the interface page for the specified tunnel.
Example:
tun0c1
Note
Steps 17 through 21 require that you use the Routing Configuration page by first completing
steps 13 through 16.
3. Enter the keep time (in seconds) in the KEEP TIME field in the Global ARP Settings section.
Keep time specifies the time, in seconds, to keep resolved dynamic ARP entries. If the entry
is not referenced and not used by traffic after the given time elapses, the entry is removed.
Otherwise, a request is sent again to verify the MAC address. The range of the Keep Time
value is 1 to 86400 seconds with a default of 14400 seconds (4 hours).
4. Enter the retry limit in the RETRY LIMIT field in the Global ARP Settings section.
The Retry Limit specifies the number of times to retry ARP requests until holding off
requests for the holdoff time, which is 20 seconds. Retry requests occur at a rate of up to
once per second. The range of retry limit is 1 to 100 and the default value is 3.
5. If your network configuration requires it, click the button to enable the appliance to accept
multicast ARP replies.
Enable this feature if this system is connected to an IPSO cluster. Because all the nodes of an
IPSO cluster share a single multicast MAC address, routers that connect to a cluster (either
directly or through a switch or hub) must be able to accept ARP replies that contain a
multicast MAC address.
6. Click APPLY.
7. To make your changes permanent, click SAVE.
6. Click APPLY.
The newly created static ATM ARP entry appears in the STATIC ATM ARP ENTRIES table.
The IP datagrams destined to the IP address of the entry are sent to the PVC specified in the
entry.
7. To make your changes permanent, click SAVE.
Note
Deleting a dynamic entry triggers a transmission of an InATMARP request on the PVC. If the
remote end responds and its IP address is not changed, a new dynamic ATM ARP entry
identical to the deleted one appears in the table immediately.
Chapter Contents
OSPF
OSPF Description
Configuring OSPF
Configuring OSPF Example
RIP
RIP Description
Configuring RIP
Configuring Auto-Summarization
RIP Example
PIM
PIM Description
Disabling PIM
Debugging PIM
IGRP (Inter-Gateway Routing Protocol)
IGRP Description
Configuring IGRP
IGRP Example
Configuring DVMRP
Configuring DVMRP Timers
IGMP
IGMP Description
Configuring IGMP
Static Routes
Static Routes Description
Route Aggregation
Route Aggregation Description
Route Rank
Route Rank Description
BGP
BGP Description
Redistributing Routes
BGP Route Redistribution Example
OSPF
OSPF Description
Open Shortest Path First (OSPF) is a link-state routing protocol based on the Dijkstra (or
shortest path first) algorithm. OSPF is an interior gateway protocol (IGP) that distributes routing
information between routers in a single autonomous system. OSPF chooses the least-cost path as
the best path. Suitable for complex networks with a large number of routers, OSPF provides
equal-cost multipath routing where packets to a single destination can be sent using more than
one interface.
OSPF groups networks into areas. Routing information passed between areas is summarized and
allows significant potential reduction in routing traffic. OSPF uses four different types of routes:
Intra-area
Interarea
Type 1 external
Type 2 external
Intra-area paths have destinations within the same area; interarea paths have destinations in other
OSPF areas; and autonomous system external (ASE) routes are routes to destinations external to
the autonomous system (AS). Routes imported into OSPF as Type 1 routes are supposed to be
from IGPs whose metrics are directly comparable to OSPF metrics. When a routing decision is
being made, OSPF adds the internal cost to the AS border router to the external metric. Type 2
ASEs are used for routes whose metrics are not comparable to OSPF internal metrics. In this
case, only the external OSPF cost is used. In the event of ties, the least cost to an AS border
router is used.
OSPF areas are connected by the backbone area, the area with identifier 0.0.0.0. All areas must
be logically contiguous, with the backbone being no exception. To permit maximum flexibility,
OSPF allows the configuration of virtual links, enabling the backbone area to appear contiguous
despite the physical reality.
All routers on a link must agree on the configuration parameters of the link. All routers in an
area must agree on the configuration parameters of the area. A separate copy of the SPF
algorithm is run for each area. Misconfigurations prevent adjacencies from forming between
neighbors, and routing black holes or loops can form.
Authentication
The OSPF protocol exchanges can be authenticated. Authentication guarantees that routing
information is accepted only from trusted routers. A variety of authentication schemes can be
used, but a single scheme must be configured for each interface. This enables some links to use
much stricter authentication than others.
The currently supported authentication schemes are: null, simple password, and MD5. Null
authentication does not authenticate packets. Simple password authentication uses a key of up to
eight characters. MD5 algorithm uses a key of up to 16 characters. The simple password scheme
provides little protection because the key is sent in the clear, and it is possible to capture packets
from the network and learn the authentication key. The MD5 algorithm provides much stronger
protection, as it does not include the authentication key in the packet. Instead, it provides a
cryptographic hash based on the configured key.
The MD5 algorithm creates a crypto checksum of an OSPF packet and an authentication key of
up to 16 characters. The transmitted packet does not contain the authentication key itself; instead
it contains a crypto-checksum called the digest. The receiving router performs a calculation
using the correct authentication key and discards the packet if the digest does not match. In
addition, a sequence number is maintained to prevent the replay of older packets. This method
provides stronger assurance that routing data originated from a router with a valid authentication
key.
Note
Nokia also provides support for BGP and PIM, both sparsemode and densemode, to
advertise the virtual IP address of the VRRP virtual router, beginning with IPSO 3.8.
IP Clustering Support
Beginning with IPSO 3.8, Nokia supports OSPF in a cluster. With previous version of IPSO,
clusters did not support dynamic routing. Each member of a cluster runs OSPF tasks, but only
the master changes the state and sends OSPF messages to the external routers. For more
information on IP Clustering, see “IP Clustering Description.”
Configuring OSPF
1. Complete “Configuring an Ethernet Interface” for the interface.
2. Assign an IP address to the interface.
3. Click CONFIG on the home page.
4. Click the OSPF link in the Routing Configuration section.
5. (Optional) This step is encouraged so that the ID is not tied to an address. Enter the router ID
in the ROUTER ID text box.
6. (Optional) If you have new OSPF areas to enter, enter the new OSPF area name in the ADD
NEW OSPF AREA text box; then click APPLY.
Repeat this step for each new area. Area 0.0.0.0 is already defined as the backbone area.
c. Click APPLY.
This is not an option for the backbone area.
8. (Optional) If some of the stub areas are totally stubby areas:
a. Click YES in the TOTALLY STUBBY AREA field for each stub area.
b. Click APPLY.
This disallows the stub area entry point from advertising interarea routes and summaries.
9. (Optional) For each summary to define:
a. Enter the network prefix summary in the ADD NEW ADDRESS RANGE: PREFIX text box,
and enter the length of the subnet mask (in bits) in the MASK LENGTH text box.
b. Click APPLY.
This procedure is useful for decreasing the number of prefixes advertised into the backbone.
10. (Optional) For each summary you do not want to define, click OFF in the Restrict section
where the network prefix summary is defined
11. Click APPLY.
12. (Optional) To add a new stub network:
a. Enter the prefix in the ADD NEW STUB NETWORK: PREFIX text box.
b. Enter the mask length in the MASK LENGTH text box.
c. Click APPLY.
13. Assign the appropriate area to each interface:
a. Click the appropriate area in the drop-down list for each interface; then click APPLY.
This completes configuring an interface with the default parameters.
14. (Optional) For the configuration parameters for each interface to change:
a. Enter a new hello interval (in seconds) in the HELLO INTERVAL text box; then click
APPLY. The hello interval must be the same for all routers on the link for them to become
adjacent.
b. Enter a new dead interval (in seconds) in the DEAD INTERVAL edit box; then click
APPLY. The router dead interval must be the same for all routers on the link for them to
become adjacent.
c. Enter a new cost metric in the OSPF COST text box for each interface; then click
APPLY.
d. Enter a new designated router priority (0-255) in the ELECTION PRIORITY text box; then
click APPLY
e. Click ON to make the interface operate in PASSIVE mode; then click APPLY.
The routes in Area 0 are learned by Nokia Platform D when the ABR (Nokia Platform C) injects
summary link state advertisements (LSAs) into Area 1.
Area 0 Area 1
24.58/30
Nokia
24.57/30 Platform C
24.46/30
24.49/30 24.50/30 24.53/30
Nokia e1
Platform B e2
24.54/30
24.45/30 e3
Nokia Nokia
Platform A Platform D
00340
RIP Description
The Routing Information Protocol (RIP) is one of the most widely used interior gateway
protocols (IGP). RIP is an implementation of a distance-vector, or Bellman-Ford, routing
protocol for local networks. Routers advertise their routes (reachability information) to other
neighboring routers.
When it has information to send, a router running RIP sends updates on each configured
interface at set intervals. Each update contains paired values, where each pair consists of an IP
network address and a distance (expressed as an integer) to that network. RIP uses a hop count
metric to measure the distance to a destination. In the RIP metric, a router advertises directly
connected networks as a metric of 1. Networks that are reachable through one other router are
two hops, and so on. Thus, the number of hops, or hop count, along a path from a given source to
a given destination refers to the number of gateways that a datagram would encounter along that
path. The maximum number of hops in a RIP network is 15 as the protocol treats anything equal
to or greater than 16 as unreachable.
RIP 2
The RIP version 2 protocol adds capabilities to RIP. Some of the most notable RIP 2
enhancements follow.
Network Mask
The RIP 1 protocol assumes that all subnetworks of a given network have the same network
mask. It uses this assumption to calculate the network masks for all routes received. This
assumption prevents subnets with different network masks from being included in RIP packets.
RIP 2 adds the ability to explicitly specify the network mask for each network in a packet.
Authentication
RIP 2 packets also can contain one of two types of authentication methods that can be used to
verify the validity of the supplied routing data.
The first method is a simple password in which an authentication key of up to 16 characters is
included in the packet. If this password does not match what is expected, the packet is discarded.
This method provides very little security, as it is possible to learn the authentication key by
watching RIP packets.
The second method uses the MD5 algorithm to create a crypto checksum of a RIP packet and an
authentication key of up to 16 characters. The transmitted packet does not contain the
authentication key itself; instead, it contains a crypto-checksum called the digest. The receiving
router performs a calculation using the correct authentication key and discards the packet if the
digest does not match. In addition, a sequence number is maintained to prevent the replay of
older packets. This method provides stronger assurance that routing data originated from a router
with a valid authentication key.
RIP 1
Network Mask
RIP 1 derives the network mask of received networks and hosts from the network mask of the
interface from which the packet was received. If a received network or host is on the same
natural network as the interface over which it was received, and that network is subnetted (the
specified mask is more specific than the natural network mask), then the subnet mask is applied
to the destination. If bits outside the mask are set, it is assumed to be a host; otherwise, it is
assumed to be a subnet.
Auto Summarization
The Nokia implementation of RIP 1 supports auto summarization; this allows the router to
aggregate and redistribute nonclassful routes in RIP 1.
Voyager Interface
Using Voyager, you can configure the following options:
Version:
You an use either RIP 1or RIP 2.
RIP interfaces:
You can specify the interfaces on which to run RIP.
Metric:
You can set the cost to use a given interface.
Accept updates.
You can configure whether or not to accept updates from other routers speaking RIP.
Accepting updates specifies whether RIP packets received from a specified interface is
accepted or ignored. Ignoring an update can result in suboptimal routing. Therefore, Nokia
recommends that you retain the default setting for accepting updates.
Transport:
You can set this option only for RIP 2. You can set either broadcast or multicast. The RIP 2
option should always be set to multicast unless RIP 1 neighbors exist on the same link and it
is desired that they hear the routing updates.
Auto summarization:
You should set auto summarization to aggregate and redistribute nonclassful routes in RIP 1.
9. (Optional) If you selected RIP 2 for an interface, make sure that MULTICAST is turned on for
that interface; then click APPLY.
Note
When you use RIP 2, always select the multicast option. Nokia recommends that you not
operate RIP 1 and RIP 2 together.
10. (Optional) If you selected RIP 2 for an interface, select the type of authentication scheme to
use from the AUTHTYPE drop-down list; then click APPLY.
For simple authentication, select SIMPLE from the AUTHTYPE drop-down window. Enter the
password in the PASSWORD edit box; then click APPLY.
The password must be from 1 to 16 characters long.
For MD5 authentication, select MD5 from the AUTHTYPE drop-down list. Enter the
password in the MD5 KEY text box; then click APPLY.
11. (Optional) If you selected MD5 as your authentication type and want to ensure
interoperability with Cisco routers running RIP MD5 authentication, click YES in the Cisco
Interoperability field. The default is NO, which means that RIP MD5 is set to conform to
Nokia platforms. Click APPLY.
12. To make your changes permanent, click SAVE.
Note
By default, the update interval is set to 30 seconds and the expire interval is set to 180
seconds.
Configuring Auto-Summarization
Auto-summarization allows you to aggregate and redistribute non-classful routes in RIP 1.
Note
Auto-summarization applies only to RIP 1.
Note
By default, auto-summarization is enabled.
Protocol-Independent Multicast
PIM Description
Protocol-Independent Multicast (PIM) gets its name from the fact that it can work with any
existing unicast protocol to perform multicast forwarding. It supports two different types of
multipoint traffic distribution patterns: dense and sparse.
Note
Nokia also provides support for BGP and OSPF to advertise the virtual IP address of the
VRRP virtual router, beginning with IPSO 3.8.
Note
The number of interfaces on which you can run PIM is unlimited.
4. Click APPLY, and then click SAVE to make your changes permanent.
5. (Optional) To configure this interface to use the VRRP virtual IP address, in the VIRTUAL
ADDRESS field, click ON.
6. Click APPLY.
7. (Optional) For each interface that is running PIM, enter the specified local address in the
LOCAL ADDRESS text box. PIM uses this address to send advertisements on the interface.
Note
If neighboring routers choose advertisement addresses that do not appear to be on a shared
subnet, all messages from the neighbor are rejected. A PIM router on a shared LAN must
have at least one interface address with a subnet prefix that all neighboring PIM routers
share.
8. (Optional) For each interface that is running PIM, enter a new designated router priority in
the DR ELECTION PRIORITY text box. The router with the highest priority and the highest IP
address is elected as the designated router. The default is 1, and the range is 0 to 4294967295
(2^32 - 1).
Note
Although you can configure this option, PIM-DM does not use DR Election Priority. On a
LAN with more than one router, data forwarding is implemented on the basis of PIM Assert
messages. The router with the lowest cost (based on unicast routing) to reach the source of
data traffic is elected as the router that forwards traffic. In the case of a tie, the router with
the highest IP address is elected to forward traffic.
9. Click APPLY, and then click SAVE to make your change permanent.
Disabling PIM
You can disable PIM on one or more interfaces youconfigured on each Nokia platform.
1. Click CONFIG on the home page.
2. Click the PIM link in the Routing Configuration section.
3. In the Interfaces section, click OFF for each interface on which to disable PIM. To disable
PIM entirely, click OFFnext to each interface that is currently running PIM.
4. Click APPLY; then click SAVE to make your change permanent.
Note
The number of interfaces on which you can run PIM is unlimited.
4. Click APPLY, and then click SAVE to make your changes permanent.
5. (Optional) For each interface that is running PIM, enter the specified local address in the
LOCAL ADDRESS text box. PIM uses this address to send advertisements on the interface.
Note
If neighboring routers choose advertisement addresses that do not appear to be on a shared
subnet, all messages from the neighbor are rejected. A PIM router on a shared LAN must
have at least one interface address with a subnet prefix that all neighboring PIM routers
share.
6. (Optional) For each interface that is running PIM, enter a new designated router priority in
the DR ELECTION PRIORITY text box. The router with the highest priority and the highest IP
address is elected as the designated router. The default is 1, and the range is 0 to 4294967295
(2^32 - 1).
7. Click APPLY, and then click SAVE to make your changes permanent.
8. Clickthe Advanced PIM Options link. In the General Timers section, enter a value for the
hello interval (in seconds) in the HELLO INTERVAL text box. The router uses this interval to
send periodic Hello messages on the LAN.
9. In the General Timers section, enter a value for the data interval (in seconds) in the DATA
INTERVAL text box.
This value represents the interval after which the multicast (S, G) state for a silent source is
deleted.
10. In the General Timers section, enter a value for the assert interval (in seconds) in the
ASSERT INTERVAL text box.
This value represents the interval between the last time an assert is received and when the
assert is timed out.
11. In the General Timers section, enter a value for the assert rate limit in the ASSERT RATE
LIMIT text box.
The value represents the number of times per second at which the designated router sends
assert messages. The upper limit is 10,000 assert messages per second.
12. In the General Timers section, enter a value (in seconds) for the interval between sending
join or prune messages in the JOIN/PRUNE INTERVAL text box.
Note
The join/prune suppression interval should be set at 1.25 times the join/prune interval.
15. In the Assert Ranks section, in the appopriate text box, enter a value for the routing
protocol(s) you are using.Assert Rank values are used to compare protocols and determine
which router forwards multicast packets on a multiaccess LAN. Assert messages include
these values when more than one router can forwarding the multicast packets.
Note
Assert rank values must be the same for all routers on a multiaccess LAN that are running
the same protocol.
Note
The number of interfaces on which you can run PIM is unlimited.
6. Click APPLY.
7. (Optional) To configure this interface to use the VRRP virtual IP address, in the VIRTUAL
ADDRESS field, click ON.
8. Click APPLY.
9. (Optional) For each interface that is running PIM, enter the specified local address in the
LOCAL ADDRESS text box. PIM uses this address to send advertisements on the interface.
This option is useful only when multiple addresses are configured on the interface.
Note
If neighboring routers choose advertisement addresses that do not appear to be on a shared
subnet, then all messages from the neighbor are rejected. A PIM router on a shared LAN
must have at least one interface address with a subnet prefix that all neighboring PIM
routers share.
10. (Optional) For each interface that is running PIM, enter a new designated router priority in
the DR ELECTION PRIORITY text box. The router with the highest priority and the highest IP
address is elected as the designated router. To break a tie, the designated router with the
highest IP address is chosen. If even one router does not advertise a DR election priority
value in its hello messages, DR election is based on the IP addresses. The default is 1, and
the range is 0 to 4294967295 (2^32 - 1).
Note
To verify whether a PIM neighbor supports DR Election Priority, use the following command,
which you can executed from iclid and CLI:
show pim neighbor <ip_address>
For neighbors that advertise a DR election priority value, the following message appears in
the summary:
DRPriorityCapable Yes.
Note
The HA mode applies only to sparse-mode PIM. The HA mode feature does not affect the
functioning of dense-mode PIM.
Note
The number of interfaces on which you can run PIM is unlimited
8. Click APPLY.
9. (Optional) For each interface that is running PIM, enter the specified local address in the
LOCAL ADDRESS edit box. PIM uses this address to send advertisements on the interface.
This option is useful only when multiple addresses are configured on the interface.
10. (Optional) To configure this interface to use the VRRP virtual IP address, in the VIRTUAL
ADDRESS field, click ON.
Note
If neighboring routers choose advertisement addresses that do not appear to be on a shared
subnet, then all messages from the neighbor are rejected. A PIM router on a shared LAN
must have at least one interface address with a subnet prefix that all neighboring PIM
routers share.
11. (Optional) For each interface that is running PIM, enter a new designated router priority in
the DR ELECTION PRIORITY text box. The router with the highest priority and the highest IP
address is elected as the designated router. To break a tie, the designated router with the
highest IP address is chosen. If even one router does not advertise a DR election priority
value in its hello messages, DR election is based on the IP addresses. The default is 1, and
the range is 0 to 4294967295 (2^32 - 1).
Note
To verify whether a PIM neighbor supports DR Election Priority, use the following command,
which you can executed from iclid and CLI:
show pim neighbor <ip_address>
For neighbors that advertise a DR election priority value, the following message appears in
the summary:
DRPriorityCapable Yes.
Note
The number of interfaces on which you can run PIM is unlimited.
6. Click APPLY.
7. In the Sparse Mode Rendezvous Point (RP) Configuration section, to enable this router as a
candidate bootstrap router:
a. Click ON in the BOOTSTRAP ROUTER field.
b. (Optional) Enter the address of the bootstrap router in the LOCAL ADDRESS text box.
Configure an address for the candidate bootstrap router to help specify the local address
used as the identifier in the bootstrap messages. By default, the router chooses an address
from one of the interfaces on which PIM is enabled.
c. (Optional) Enter the bootstrap router priority (0 to 255) in the PRIORITY text box.
Use the priority option to help specify the priority to advertise in bootstrap messages.
The default priority value is 0.
Note
The domain automatically elects a bootstrap router, based on the assert rank preference
values configured. The candidate bootstrap router with the highest preference value is
elected the bootstrap router. To break a tie, the bootstrap candidate router with the highest
IP address is elected the bootstrap router.
8. In the Sparse Mode Rendezvous Point (RP) Configuration section, to enable this router as a
Candidate Rendezvous Point:
a. Click ON in the CANDIDATE RP ROUTER field.
b. (Optional) Enter the local address of the Candidate Rendezvous Point router in the
LOCAL ADDRESS field. This router sends Candidate Rendezvous Point messages.
Configure an address for the Candidate Rendezvous Point to select the local address used
in candidate-RP-advertisements sent to the elected bootstrap router. By default, the router
chooses an address from one of the interfaces on which PIM is enabled.
c. (Optional) Enter the Candidate Rendezvous Point priority (0 to 255) in the PRIORITY text
box.
Note
If you do not configure a multicast address for the router, it advertises as able to function as
the rendezvous point for all multicast groups (224/4)
Note
The number of interfaces on which you can run PIM is unlimited.
6. Click APPLY.
7. In the Sparse Mode Rendezvous Point (RP) Configuration section, to enable a Static
Rendezvous Point router, click ON in the STATIC RP ROUTER field.
Note
Static Rendezvous Point configuration overrides rendezvous point (RP) information received
from other RP-dissemination mechanisms, such as bootstrap routers.
8. Enter the IP address of the router to configure as the static rendezvous point in the RP
ADDRESS text box. Click APPLY.
9. (Optional) Enter the multicast group address and prefix length in the MULTICAST GROUP
ADDRESS and MASK LENGTH text boxes. Click APPLY.
Note
If you do not configure a multicast group address and prefix length for this Static
Rendezvous Point , it functions by default as the rendezvous point for all multicast groups
(224.0.0.0/4).
Note
The number of interfaces on which you can run PIM is unlimited.
6. Click APPLY.
7. Click the Advanced PIM Options link.
In the Sparse Mode Timers section, enter a value for the register suppression interval (in
seconds) in the REGISTER-SUPPRESSION INTERVAL text box.
This value represents the mean interval between receiving a Register-Stop message and
allowing Register messages to be sent again.
8. In the Sparse Mode Timers section, enter a value for the bootstrap interval for candidate
bootstrap routers (in seconds) in the BOOTSTRAP INTERVAL text box.
This value represents the interval between which bootstrap advertisement messages are sent.
9. In the Sparse Mode Timers section, enter a value for the candidate rendezvous point
advertisement interval (in seconds) in the CANDIDATE RP-ADVERTISEMENT INTERVAL text
box.
This value represents the interval between which Candidate Rendezvous Point routers send
Candidate-RP-Advertisement messages.
10. In the Sparse Mode Timers section, enter a value for the shortest path tree threshold (in
kilobits per second) in the THRESHOLD (KPBS) text box.
Enter an IP address for the multicast group to which the SPT threshold applies in the
MULTICAST GROUP ID text box. Enter the mask length for the group multicast address in
the MASK LENGTH edit box. When the data rate for a sparse-mode group exceeds the
shortest-path-tree threshold at the last-hop router, an (S,G) entry is created and a join/prune
message is sent toward the source. Setting this option builds a shortest-path tree from the
source S to the last-hop router.
Note
The join/prune suppression interval should be set at 1.25 times the join/prune interval.
19. (Optional) In the Assert Ranks section, enter a value for the routing protocol(s) you are using
in the appropriate text box. Assert Rank values are used to compare protocols and determine
which router forwards multicast packets on a multiaccess LAN. Assert messages include
these values when more than one router can forwarding the multicast packets.
Note
Assert rank values must be the same for all routers on a multiaccess LAN that are running
the same protocol.
Debugging PIM
The following iclid commands can assist you in debugging PIM:
Command Shows
show pim interface which interfaces are running PIM, their status, and the mode they
are running. This command also displays the interface and its DR
priority and the number of PIM neighbors on the interface.
show pim neighbors the IP address of each PIM neighbor and the interface on which
the neighbor is present. This command also displays the
neighbor’s DR priority, generation ID, holdtime and the time the
neighbor is set to expire based on the holdtime received in the
most recent hello message.
show pim statistics the number of different types of PIM packets received and
transmitted and any associated errors.
show mfc cache multicast source and group forwarding state by prefix.
show mfc interfaces shows multicast source and group forwarding state by interface.
The following iclid commands can assist you in debugging sparse-mode PIM (PIM-SM):
Command Shows
show pim bootstrap the IP address and state of the Bootstrap router.
show pim candidate-rp the state of the Candidate Rendezvous Point state machine.
show pim joins PIM’s view of the join-prune (*, G and S, G) state, including RP for
the group, incoming, and outgoing interface(s), interaction with the
multicast forwarding cache and the presence of local members. To
view the equivalent information for dense-mode PIM, use the
show mfc cache command.
show pim rps the active RP-set, including the RP addresses, their type (or
source of information about them) and the groups for which they
are configured to act as RP.
show pim group-rp- the RP selected for a particular group based on information from
mapping <group- the active RP-set.
address>
show pim sparse-mode error statistics for multicast forwarding cache (MFC); Bootstrap
statistics Router (BSR) messages; Candidate Rendezvous Point (CRP)
advertisements; and the Internet Group Management Protocol
(IGMP).
Use the Trace Options feature to log information about errors and events.
1. Click CONFIG on the home page.
2. Click the Routing Options link in the Routing Configuration section.
3. In the Trace Options section, click on the ADD OPTION drop-down window in the PIM field.
Select each option for which you want to log information. You must select each option one
at a time and click APPLY after you select each option. For each option you select, its name
and ON and OFF radio buttons appear just above the drop-down window. To disable any of
the options you have selected, click the OFF radio button, and then click APPLY.
4. Click SAVE to make your changes permanent.
The following trace options apply both to dense-mode and sparse-mode implementations:
Assert: traces PIM assert messages.
Hello: traces PIM router hello messages.
Join: traces PIM join/prune messages
MFC: traces calls to or from the multicast forwarding cache
MRT: traces PIM multicast routing table events.
Packets: traces all PIM packets.
Trap: Trace PIM trap messages.
All: traces all PIM events and packets.
The following trace options apply to sparse-mode implementations only:
Bootstrap: traces bootstrap messages.
CRP: traces candidate-RP-advertisements.
RP: traces RP-specific events, including both RP set-specific and bootstrap-specific events.
IGRP
IGRP Description
The Inter-Gateway Routing Protocol (IGRP) is a widely used interior gateway protocol (IGP).
Like RIP, IGRP is an implementation of a distance-vector, or Bellman-Ford, routing protocol for
local networks. As specified, IGRP modifies the basic Bellman-Ford algorithm in three ways:
Uses a vector of metrics.
Allows for multiple paths to a single destination, thus allowing for load sharing.
Provides stability during topology changes because new features.
This document provides background information and cites differences with other IGRP
implementations.
A router running IGRP broadcasts routing updates at periodic intervals, in addition to updates
that are sent immediately in response to some type of topology change. An update message
includes the following information:
Configured autonomous system number
Current edition number of the routing table
Checksum of the update message
Count of the number of routes included
List of route entries
An IGRP update packet contains three types of routine entries.
Interior
System
Exterior
Each entry includes three bytes of an IP address. The fourth byte is determined by the type of the
route entry. Interior routes are passed between links that are subnetted from the same class IP
address. System routes are classful IP routes exchanged within an autonomous system. Exterior
routes are like system routes, but also are used for installing a default route. In addition, the
following metrics are included for each entry:
Delay
Bandwidth
Math MTU
Reliability
Load
Validity Checks—packets that are malformed (that is, those that have trailing data on a
request packet, have nonzero data in a field that must be zero, or have route counts in an
update packet that do not agree with the actual packet size) are rejected. Other
implementations allow such packets. You can disable some of these checks for request
packets, but not for the update packets.
Valid Neighbors— packets that have a source address from a non-local network are
ignored. You cannot disable this behavior.
Duplicate Entries in an Update—if an update message contains duplicate new paths,
holddowns are enabled, and if each of the duplicate composite metrics differ by more than
10 percent, the route is not put in holddown. The path with the best metric is installed. Other
implementations treat each duplicate path as if it arrived in separate update messages. In this
case, place the route into holddown.
Triggered Update on Route Expiration—when a route expires, a triggered update
message is generated at the moment of expiration, marking the route as unreachable. Other
implementations wait until the next scheduled update message to mark the route as
unreachable. In this latter case, the route is actually not marked as unreachable until the next
scheduled update cycle (although this seems somewhat contradictory).
Specific Split Horizon—does not implement specific split horizon. Split horizon processing
means that routes learned from an interface are not advertised back out that same interface.
Specific split horizon occurs when a request is made. In this case, only routes that use the
requestor as the next hop are omitted from the response.
Poison Reverse—uses simple split horizon; that is, poison reverse is not performed. Other
implementations use a form of poison reverse in which at least a single update advertises an
expired route as being unreachable on the interface from which the route was learned.
Forwarding to Unreachable Routes—when a route expires or is marked as unreachable
from the originator, the route is removed from the forwarding table. In the absence of a
default or more general route, packets destined for this address are dropped. Other
implementations continue to forward packets to routes marked as unreachable until a route is
flushed from the table.
Note
For a detailed explanation of the different route types, see the IGRP specification
An exterior route is conceptually the same as a system route, with the added feature that an
exterior route can be used as a default route. Exterior routes are always propagated as exterior.
When it is necessary to locally generate an exterior default route, redistribute the default route
Aliased Interfaces
When an interface has multiple addresses configured, each address is treated as a distinct
interface since it represents a logical subnet. Such a configuration implies that an update is sent
for each IGRP-configured address. In the configuration syntax, you can specify a particular
address of an interface on which to run IGRP as opposed to the complete interface (all addresses
of the interface).
IGRP Aggregation
Most routing aggregation occurs only if explicitly configured; therefore, it is worth noting some
of the implicit aggregation that occurs in IGRP. By definition, no mask information is included
in the IGRP route entry. System and exterior routes have an implied mask of the natural classful
mask. Interior routes are propagated from one interface to another only if the two interfaces are
subnetted from the same IP class address and have the same subnet mask. Otherwise, an interior
route is converted (an aggregation occurs) to a system route. Any supernetted routes
redistributed into IGRP are ignored. In sum, any route redistributed into IGRP that is marked as
a system or exterior route has the natural class mask applied to the route to determine what route
should be advertised in an update.
Configuring IGRP
Note
IGRP configuration of an interface is available only if you are licensed for IGRP on your IP
router. (See the Licenses link on the Configuration page.)
The bandwidth is entered in bits per second scaled by a factor of 10,000,000 (10,000,000/x
Kbps), where x is the actual bandwidth of the interface.
8. (Optional) In the Protocol section, enter a new bandwidth multiplier in the K1 (BANDWIDTH
MULTIPLIER) text box; then click APPLY.
This number determines how often route updates are sent out on all of the interfaces.
13. (Optional) In the Protocol section, enter the new invalid interval metric in the INVALID
INTERVAL text box; then click APPLY.
14. (Optional) In the Protocol section, enter the new hold interval metric in the HOLD INTERVAL
text box; then click APPLY.
15. (Optional) In the Protocol section, enter the new flush interval metric in the FLUSH
INTERVAL text box; then click APPLY.
16. (Optional) In the Protocol section, click YES in the NO CHECK ZERO field; then click
APPLY.
Leave this field set to NO to interoperate with Cisco equipment.
17. To make your changes permanent, click SAVE.
IGRP Example
Note
You must have an IGRP license and the option selected on the Licenses page to use this
feature.
DVMRP
DVMRP Description
The Distance Vector Multicast Routing Protocol (DVMRP) is a distance vector protocol that
calculates a source-rooted multicast distribution tree and provides routing of IP multicast
datagrams over an IP internetwork. DVMRP uses the Bellman-Ford routing protocol to maintain
topological knowledge. DVMRP uses this information to implement Reverse Path Forwarding
(RPF) a multicast forwarding algorithm.
RPF forwards a multicast datagram to members of the destination group along a shortest
(reverse) path tree that is rooted at the subnet on which the datagram originates. Truncated
Reverse Path Broadcasting (TRPB) uses the IGMP-collected group membership state to avoid
forwarding on leaf networks that do not contain group members.
TRPB calculates a distribution tree across all multicast routers and only saves packet
transmissions on the leaf networks that do not contain group members. Reverse Path Multicast
(RPM) allows the leaf routers to prune the distribution tree to the minimum multicast
distribution tree. RPM minimizes packet transmissions by not forwarding datagrams along
branches that do not lead to any group members.
Multicast capabilities are not always present in current Internet-based networks. Multicast
packets must sometimes pass through a router that does not support IP multicasting to reach their
destination. This behavior is allowed because DVMRP defines a virtual tunnel interface between
two multicast-capable routers that might be connected by multiple nonmulticast capable IP hops.
DVMRP encapsulates IP multicast packets for transmission through tunnels so that they look
like normal unicast datagrams to intervening routers and subnets. DVMRP adds the
encapsulation when a packet enters a tunnel and removes it when the packet exits from a tunnel.
The packets are encapsulated with the IP-in-IP protocol (IP protocol number 4). This tunneling
mechanism allows you to establish a virtual internet that is independent from the physical
internet.
Features
Supports DVMRP v.3
Prune and graft messages
Generation ID
Capability flags
Supports interface metric and threshold configuration.
Supports nterface administrative scoping on the 239.X.X.X addresses.
Supports interfaces with secondary addresses.
Supports iclid wizards.
Supports the Monitoring template.
Correctly tracks the number of subordinate routers per route.
Voyager Interface
Using Voyager, you can configure the following options:
DVMRP interfaces
New minimum time to live (TTL) threshold for each interface
New cost metric for sending multicast packets for each interface
Configuring DVMRP
1. Complete “Configuring an Ethernet Interface” for the interface.
2. Click CONFIG on the home page.
3. Click the DVMRP link in the Routing Configuration section.
4. For each interface you want to configure for DVMRP, Click ON for the interface; then click
APPLY.
5. (Optional) Enter a new minimum IP time to live (TTL) threshold in the THRESHOLD text
box for each interface; then click APPLY.
6. (Optional) Enter a new cost metric for sending multicast packets in the METRIC text box for
each interface; then click APPLY.
7. To make your changes permanent, click SAVE.
IGMP
IGMP Description
Internet Group Management Protocol (IGMP) allows hosts on multiaccess networks to inform
locally attached routers of their group membership information. Hosts share their group
membership information by multicasting IGMP host membership reports. Multicast routers
listen for these host membership reports, and then exchange this information with other
multicast routers.
The group membership reporting protocol includes two types of messages: host membership
query and host membership report. IGMP messages are encapsulated in IP datagrams, with an IP
protocol number of 2. Protocol operation requires that a designated querier router be elected on
each subnet and that it periodically multicast a host membership query to the all-hosts group.
Hosts respond to a query by generating host membership reports for each multicast group to
which they belong. These reports are sent to the group being reported, which allows other active
members on the subnet to cancel their reports. This behavior limits the number of reports
generated to one for each active group on the subnet. This exchange allows the multicast routers
to maintain a database of all active host groups on each of their attached subnets. A group is
declared inactive (expired) when no report is received for several query intervals.
The IGMPv.2 protocol adds a leave group message and uses an unused field in the IGMPv.1 host
membership query message to specify a maximum response time. The leave group message
allows a host to report when its membership in a multicast group terminates. Then, the IGMP
querier router can send a group-directed query with a very small maximum response time to
probe for any remaining active group members. This accelerated leave extension can reduce the
time required to expire a group and prune the multicast distribution tree from minutes, down to
several seconds
The unicast traceroute program allows the tracing of a path from one device to another, using
mechanisms that already exist in IP. Unfortunately, you cannot apply such mechanisms to IP
multicast packets. The key mechanism for unicast traceroute is the ICMP TTL exceeded
message that is specifically precluded as a response to multicast packets. The traceroute facility
implemented within IPSRD conforms to the traceroute facility for IP multicast draft
specification.
Features
Complete IGMPv.2 functionality
Multicast traceroute
Complete configurability of protocol timers
Administratively-blocked groups
Support for interfaces with secondary addresses
iclid wizards
Monitoring template
Configuring IGMP
1. Complete “Configuring an Ethernet Interface” for the interface.
2. Configure a multicast routing protocol, such as PIM or DVMRP.
The IGMP feature supports IP multicast groups on a network and functions only in
conjunction with a multicast routing protocol to calculate a multicast distribution tree. For
more information on multicast routing protocols supported by IPSO, see “PIM Description”
or “DVMRP Description.”
3. Click CONFIG on the home page.
4. Click the IGMP link in the Routing Configuration section.
5. Complete the following steps for each interface on which you enabled a multicast routing
protocol.
6. Click the appropriate VERSION button to enable either version 1 or 2; then click APPLY.
The default is version 2
Note
A router configured for IGMP version 2 can interoperate with hosts running either IGMP
version 1 or version 2. Nokia recommends that you use version 1 only on networks that
include multicast routers that are not upgraded to IGMP version 2.
7. (Optional) Enter the loss robustness value in the LOSS ROBUSTNESS text box; then click
APPLY.
The range is 1 to 255, and the default is 2.
8. (Optional) Enter the query interval in the QUERY INTERVAL text box; then click APPLY. This
value specifies the interval, in seconds, that the querier router sends IGMP general queries.
The default is 125, and the range is 1 to 3600.
9. (Optional) Enter the query response interval in the QUERY RESPONSE INTERVAL text box;
then click APPLY.
This value specifies the maximum response time, in seconds, inserted into the periodic
IGMP general queries. The higher the value the longer the interval between host IGMP
reports, which reduces burstiness. This value must be lower than that of the query interval.
The default is 10, and the range is 1 to 25.
10. (Optional) Enter the last member query interval in the LAST MEMBER QUERY INTERVAL text
box,; then click APPLY.
This value specifies the maximum response time, in seconds, inserted into IGMP group-
specific queries. A lower value results in less time to detect the loss of the last member of a
multicast group. This value must be lower than that of the query interval.
The default is 1, and the range is 1 to 25.
11. (Optional) Click ON in the DISABLE ROUTER ALERT field to actively disable the insertion of
the IP router alert typically included in IGMP messages.
Disabling this option is useful when interoperating with broken IP implementations that
might otherwise discard packets from the specified interface. The default is OFF, meaning
that the IGMP messages include the IP router alert. Click APPLY.
12. To make your changes permanent, click SAVE.
Static Routes
Note
Gateway Address specifies the IP address of the gateway to which forwarding packets for
each static route are sent. This must be the address of a router that is directly connected to
the system you are configuring.
Note
Gateway Logical Name is valid only if the next-hop gateway is an unnumbered interface and
you do not know the IP address of the gateway.
6. Click APPLY.
7. Enter the IP address of the default router in the GATEWAY text box; then click APPLY.
8. To disable a default route, click OFF in the DEFAULT field; then click APPLY.
9. To make your changes permanent, click SAVE.
Note
Gateway Address specifies the IP address of the gateway to which forwarding packets for
each static route are sent. This must be the address of a router that is directly connected to
the system you are configuring.
Note
Gateway Logical Name is valid only if the next-hop gateway is an unnumbered interface and
you do not know the IP address of the gateway.
7. Click APPLY.
8. Enter the IP address of the next hop router in the GATEWAY edit box; then click APPLY.
9. To make your changes permanent, click SAVE.
Note
You cannot configure a logical interface through the quick-add static routes option.
6. Click APPLY.
The newly configured additional static routes appear in the STATIC ROUTE field at the top of
the Static Routes page.
Note
The text box displays any entries that contain errors. Error messages appear at the top of
the page.
Nokia Nokia
Platform B Platform C
Corporate WAN
26.69/30 26.70/30
26.66/30 26.73/30
Static Routes
OSPF OSPF
24.45/30 26.74/30
Nokia Platform A Nokia Platform D
26.2/24 24.0/24
Internet
Remote PCs
00345
In this example, Nokia Platform A is connected to the Internet, with no routing occurring on the
interface connected to the Internet (no OSPF or BGP). A corporate WAN is between Nokia
platform B and Nokia platform C, and no routing occurs on this link. Use static routes so that the
remote PC LAN can have Internet access.
Static routes apply in many areas, such as connections to the Internet, across corporate WANs,
and creating routing boundaries between two routing domains.
Note
This example assumes that a static route has already been configured and the task is to add
backup gateways.
3. Enter the IP address of the gateway in the ADDITIONAL GATEWAY text box.
4. Enter the priority value in the PRIORITY text box; then click APPLY.
The IP address of the additional gateway that you entered appears in the Gateway column,
and new ADDITIONAL GATEWAY and PRIORITY edit boxes are displayed.
To add more backup static routes, repeat steps 3 and 4.
5. To make your changes permanent, click SAVE.
Route Aggregation
using RIP. You must take care must be taken when aggregating if the route that is aggregated
contains holes.
An aggregate route is created by first specifying the network address and mask length. Second, a
set of contributing routes must be provided. A contributing route is defined when a source (for
example, a routing protocol, a static route, an interface route) and a route filter (a prefix) are
specified. An aggregate route can have many contributing routes, but at least one of the routes
must be present to generate an aggregate.
Aggregate routes are not used for packet forwarding by the originator of the aggregate route,
only by the receiver. A router receiving a packet that does not match one of the component
routes that led to the generation of an aggregate route responds with an ICMP network
unreachable message. This message prevents packets for unknown component routes from
following a default route into another network where they would be continually forwarded back
to the border router until their TTL expires.
Nokia Nokia
Platform B Platform C
24.46/30 24.49/30 24.50/30 24.53/30
In the preceding figure Nokia Platform B, Nokia Platform C, and Nokia Platform D are running
OSPF with the backbone area. Nokia Platform A is running OSPF on one interface and RIP 1 on
the backbone side interface.
Assume that all the interfaces are configured with the addresses and the routing protocol as
shown in the figure. Configure route aggregation of 192.168.24.0/24 from the OSPF side to the
RIP side.
1. Initiate a Voyager session to Nokia Platform A.
2. Click CONFIG on the home page.
3. Click the Route Aggregation link in the Routing Configuration section.
4. Enter 192.168.24.0 in the PREFIX FOR NEW AGGREGATE text box.
5. Enter 24 in the MASK LENGTH edit box; then click APPLY.
6. Click OSPF2 in the NEW CONTRIBUTING PROTOCOL drop-down list; then click APPLY.
7. Click ON in the CONTRIBUTE ALL MATCHING ROUTES FROM OSPF2 field; then click
APPLY.
8. Click DIRECT in the NEW CONTRIBUTING PROTOCOL drop-down list; then click APPLY.
9. Click ON in the CONTRIBUTE ALL MATCHING ROUTES FROM DIRECT field; then click
APPLY.
10. Click TOP.
11. Click the Route Redistribution link in the Routing Configuration section.
12. Click the Aggregates Routes link in the Redistribute to RIP section.
13. Click ON radio button in the EXPORT ALL AGGREGATES INTO RIP field; then click APPLY.
Note
If the backbone is running OSPF as well, you can enable aggregation only by configuring
the 192.168.24.0 network in a different OSPF Area.
Route Rank
Rank Assignments
A default rank is assigned to each protocol. Rank values range from 0 to 255, with the lowest
number indicating the most preferred route.
The table below summarizes the default rank values.
Preference of Default
Interface routes 0
OSPF routes 10
Static routes 60
IGRP routes 80
Nokia Nokia
Platform B Platform C
26.66/30 26.69/30 26.70/30 26.73/30
26.65/30 26.74/30
Nokia Nokia
Platform A Nokia OSPF Backbone Platform D
26.61/24 26.77/28
RIP to OSPF Border
26.78/28
Hub
26.1/24
0.0.0.0/0
24.0/24 RIP Network UNIX Hosts with
22.0/24 Routed Enabled
Corporate Net
26.79/28 26.80/28
00337
In the preceding figure, the top part of the network is running OSPF and the bottom part of the
network is running RIP. Nokia Platform D learns network 192.168.22.0 from two routing
protocols: RIP from the bottom of the network, and OSPF from the top of the network. When
other hosts want to go to 192.168.22.0 through Nokia Platform D, Nokia Platform D can select
one protocol route, such as an OSPF route first, to reach the destination. If that route is broken,
then Nokia Platform D uses another available route to reach the destination.
To configure the routing preferences:
1. Click CONFIG on the home page.
2. Click the Routing Options link in the Routing Configuration section.
3. Enter 10 in the OSPF edit box.
4. Enter 40 in the RIP edit box; then click APPLY.
This configuration makes the OSPF route the preferred route. To make the RIP route be the
preferred route, enter 40 for OSPF and 10 for RIP.
BGP
BGP Description
Border Gateway Protocol (BGP) is an inter-AS protocol, meaning that it can be deployed within
and between autonomous systems (ASes). An autonomous system is a set of routers under a
single technical administration. An AS uses an interior gateway protocol and common metrics to
route packets within an AS; it uses an exterior routing protocol to route packets to other ASes.
Note
This implementation supports only BGP version 4.
BGP sends update messages that consist of network number-AS path pairs. The AS path
contains the string of ASes through which the specified network can be reached. An AS path has
some structure in order to represent the results of aggregating dissimilar routes. These update
messages are sent over TCP transport mechanism to ensure reliable delivery. BGP contrasts with
IGPs, which build their own reliability on top of a datagram service.
Note
This feature might cause a busy peer connection to block other protocols for prolonged
intervals.
The following table displays the path attributes and their definitions
All unreachable messages are collected into a single message and are sent before reachable
routes during a flash update. For these unreachable announcements, the next hop is set to the
local address on the connection, no metric is sent, and the path origin is set to incomplete. On
external connections, the AS path in unreachable announcements is set to the local AS. On
internal connections, the AS path length is set to zero.
Routing information shared between peers in BGP has two formats: announcements and
withdrawals. A route announcement indicates that a router either learned of a new network
attachment or made a policy decision to prefer another route to a network destination. Route
withdrawals are sent when a router makes a new local decision that a network is no longer
reachable.
Note
A BGP session does not accept MEDs from an external peer unless the Accept MED field is
set for an external peer.
BGP stores rejected routes in the routing table with a negative preference. A negative preference
prevents a route from becoming active and prevents it from being installed in the forwarding
table or being redistributed to other protocols. This behavior eliminates the need to break and
re-establish a session upon reconfiguration if importation policy is changed.
The only attribute that can add or modify when you import from BGP is the local preference.
The local preference parameter assigns a BGP local preference to the imported route. The local
preference is a 32-bit unsigned value, with larger values preferred. This is the preferred way to
bias a routing subsystem preference for BGP routes.
BGP Redistribution
When redistributing routes to BGP, you can modify the community, local preference, and MED
attributes. Redistribution to BGP is controlled on an AS or AS path basis.
BGP 4 metrics (MED) are 32-bit unsigned quantities; they range from 0 to 4294967295
inclusive, with 0 being the most desirable. If the metric is specified as IGP, any existing metric
on the route is sent as the MED. For example, this allows OSPF costs to be redistributed as BGP
MEDs. If this capability is used, any change in the metric causes the route to be redistributed
with the new MED, or to flap, so use it with care.
The BGP local preference is significant only when used with internal BGP. It is a 32-bit
unsigned quantity and larger values are preferred. The local preference should normally be
specified within the redistribution list unless no BGP sources are present in the redistribution
list.
Note
If BGP routes are being redistributed into IBGP, the local preference cannot be overridden,
and this parameter is ignored for IBGP sources. The same is true for confederation peers
(CBGP).
Communities
BGP communities allow you to group a set of IP addresses and apply routing decisions based on
the identity of the group or community.
To implement this feature, map a set of communities to certain BGP local preference values.
Then you can apply a uniform BGP configuration to the community as a whole as opposed to
each router within the community. The routers in the community can capture routes that match
their community values.
Use community attributes to can configure your BGP speaker to set, append, or modify the
community of a route that controls which routing information is accepted, preferred, or
distributed to other neighbors. The following table displays some special community attributes
that a BGP speaker can apply.
For further details, refer to the communities documents, RFCs 1997 and 1998 .
Route Reflection
Generally, all border routers in a single AS need to be internal peers of each other; all nonborder
routers frequently need to be internal peers of all border routers. While this configuration is
usually acceptable in small networks, it can lead to unacceptably large internal peer groups in
large networks. To help address this problem, BGP supports route reflection for internal and
routing peer groups (BGP version 4).
When using route reflection, the rule that specifies that a router can not readvertise routes from
internal peers to other internal peers is relaxed for some routers called route reflectors. A typical
use of route reflection might involve a core backbone of fully meshed routers. This means that
all the routers in the fully meshed group peer directly with all other routers in the group. Some of
these routers act as route reflectors for routers that are not part of the core group.
Two types of route reflection are supported. By default, all routes received by the route reflector
that originate from a client are sent to all internal peers (including the client group but not the
client). If the no-client reflect option is enabled, routes received from a route reflection client are
sent only to internal peers that are not members of the client group. In this case, the client group
must be fully meshed. In either case, all routes received from a non-client internal peer are sent
to all route reflection clients.
Typically, a single router acts as the reflector for a set, or cluster, of clients; for redundancy, two
or more routers can also be configured to be reflectors for the same cluster. In this case, a cluster
ID should be selected to identify all reflectors serving the cluster, using the cluster ID keyword.
Note
Nokia recommends that you not use multiple redundant reflectors unncessarily as it
increases the memory required to store routes on the peers of redundant reflectors.
No special configuration is required on the route reflection clients. From a client perspective, a
route reflector is a normal IBGP peer. Any BGP version 4 speaker should be able to be a
reflector client.
for further details, refer to the route reflection specification document (RFC 1966 as of this
writing) .
AS1
Non-client Non-client
Nokia IBGP Nokia
Platform A Platform D
IBGP IBGP AS676
Nokia
Cluster Platform F
Nokia EBGP
Platform B
route reflector IBGP
Nokia Nokia
Platform C Platform E Nokia
Client Client Platform G
00328
AS1 has five BGP-speaking routers. With Router B working as a route reflector, there is no need
to have all the routers connected in a full mesh.
Confederations
An alternative to route reflection is BGP confederations. As with route reflectors, you can
partition BGP speakers into clusters where each cluster is typically a topologically close set of
routers. With confederations, this is accomplished by subdividing the autonomous system into
multiple, smaller ASes that communicate among themselves. The internal topology is hidden
from the outside world, which perceives the confederation to be one large AS.
Each distinct sub-AS within a confederation is referred to as a routing domain (RD). Routing
domains are identified by using a routing domain identifier (RDI). The RDI has the same syntax
as an AS number, but as it is not visible outside of the confederation, it does not need to be
globally unique, although it does need to be unique within the confederation. Many
confederations find it convenient to select their RDIs from the reserved AS space (ASes 64512
through 65535 (see RFC 1930)). RDIs are used as the ASes in BGP sessions between peers
within the confederation.
The confederation as a whole, is referred to by a confederation identifier. This identifier is used
as the AS in external BGP sessions. As far as the outside world is concerned, the confederation
ID is the AS number of the single, large AS. For this reason, the confederation ID must be a
globally unique, normally assigned AS number.
Note
Do not nest confederations.
AS1 AS2
RDI A RDI B
CBGP EBGP
CBGP
RDI C
00329
AS1 has seven BGP-speaking routers grouped under different routing domains: RDI A, RDI B,
and RDI C. Instead of having a full-mesh connection among all seven routers, you can have a
full-meshed connection within just one routing domain.
Caution
Enabling multihop BGP connections is dangerous because BGP speakers might
establish a BGP connection through a third-party AS. This can violate policy
considerations and introduce forwarding loops.
AS1 AS2
Nokia Nokia
Platform A EBGP Platform B
Loopback
Loopback
Address
Address
00330
Router A and Router B are connected by two parallel serial links. To provide fault tolerance and
enable load-balance, enable EBGP multihop and using addresses on the loopback interface for
the EBGP peering sessions.
Route Dampening
Route dampening lessens the propagation of flapping routes. A flapping route is a route that
repeatedly becomes available then unavailable. Without route dampening, autonomous systems
continually send advertisement and withdrawal messages each time the flapping route becomes
available or unavailable. As the Internet has grown, the number of announcements per second
has grown as well and caused performance problems within the routers.
Route dampening enables routers to keep a history of the routes that are flapping and prevent
them from consuming significant network bandwidth. This is achieved by measuring how often
a given route becomes available and then unavailable. When a set threshold is reached, that route
is no longer considered valid, and is no longer propagated for a given period of time, usually
about 30 minutes. If a route continues to flap even after the threshold is reached, the time out
period for that route grows in proportion to each additional flap. Once the threshold is reached,
the route is dampened or suppressed. Suppressed routes are added back into the routing table
once the penalty value is decreased and falls below the reuse threshold.
Route dampening can cause connectivity to appear to be lost to the outside world but maintained
on your own network because route dampening is only applied to BGP routes. Because of
increasing load on the backbone network routers, most NSPs (MCI, Sprint, UUNet etc.) have set
up route suppression.
Note
Nokia also provides support for BGP and PIM, both sparse mode and dense mode, to
advertise the virtual IP address of the VRRP virtual router, beginning with IPSO 3.8.
Perform the following procedure to configure an a peer autonomous system, corresponding local
address, and to enable support for virtual IP for VRRP.
1. Click CONFIG on the home page of Voyager.
2. Click the BGP link in the Routing Configuration section.
3. Enter a value between 1 and 65535 in the PEER AUTONOMOUS SYSTEM NUMBER edit box.
4. Click the SELECT THE PEER GROUP TYPE drop-down list and click either INTERNAL or
EXTERNAL.
If the peer autonomous system number is different from the local autonomous system of this
router, click EXTERNAL.
If the peer autonomous system number is the same as that of the local autonomous system of
this router, click INTERNAL. You must also select Internal if the local autonomous system is
part of a confederation. For more information on confederations, see “Confederations.”
5. Click APPLY.
6. Click the Advanced BGP Options link on the BGP page.
7. For the specific external or routing group, enter an IP address in the LOCAL ADDRESS text
box.
Note
You must configure a local IP address for the specific external or routing group for virtual IP
for VRRP support to function.
8. Click ON in the VIRTUAL ADDRESS field to enable virtual IP for VRRP support.
9. Click APPLY, and then click SAVE to make your changes permanent.
Memory Size
Base IPSRD is approximately 2 MB
Route entry in the local route table is 76 bytes
Inbound route entry in the BGP table is 20 bytes
Outbound route entry in the BGP table is 24 bytes
To calculate the amount of memory overhead on the routing daemon because of BGP peers,
calculate the memory required for all of the RIBs according to the following procedures. Add
the result to the base IPSRD size.
Inbound RIB: Multiply the number of peers by the number of routes accepted. Multiply the
result by the size of each inbound route entry.
Local RIB: Multiply the number of routes accepted by a local policy by the size of each local
route entry.
Outbound RIB: Multiply the number of peers by the number of routes advertised. Multiply the
result by the size of each BGP outbound route entry.
Example
Assume that a customer is peering with two ISPs that are dual homed and is accepting full
routing tables from these two ISPs. Each routing table contains 50,000 routes. The customer is
only advertising its local routes (2,000) to each ISP. With these figures, you can compute the
total memory requirements:
Note
Make sure that IPSRD is not swapping memory. Look at the memory sizes occupied by
user-level daemons like Check Point, ifm , xpand , etc.
To find out how much memory IPSRD occupies, run the following command:
ps -auxww | grep ipsrd
The fourth column labeled, %MEM, displays the percentage of memory that IPSRD occupies.
In the diagram below, AS100 is running IBGP, and AS200 and AS300 are running external BGP.
AS100
Nokia Nokia Nokia
Platform A Platform B Platform C
IBGP IBGP
.1 .1 10.50.10 .2 .2 170.20.1 .1 .1
.2 .2
Nokia Nokia
Platform D Platform E
AS200 AS300
00331
3. Enter 170.20.1.1 in the ADD REMOTE PEER IP ADDRESS text box; then click APPLY.
Verification
To verify that you configured BGP neighbors correctly, run the following command in iclid:
show bgp neighbor
For more information about this command, see to “Displaying Routing Protocol Information.”
Note
To filter BGP updates based on peer AS numbers, see “Configuring Route Inbound Policy
on Nokia Platform D Based on an Autonomous System Number.”
AS100 AS200
Nokia Nokia Nokia
Platform A Platform B Platform C
EBGP
AS4
EBGP
Nokia
Platform D
00339
In the above diagram, MED values are being propagated with BGP updates. This diagram shows
four different configurations.
Configuring Default MED for Nokia Platform D
Configuring MED Values for all Peers of AS200
Configuring MED Values for each External BGP Peer for Nokia Platform D
Configuring MED Values and a Route Redistribution Policy on Nokia Platform D
Note
Setting an MED value for all peers under the local AS overwrites the default MED setting of
the respective internal peers.
Configuring MED Values for each External BGP Peer for Nokia
Platform D
1. Click CONFIG on the home page.
2. Click the BGP link in the Routing Configuration section.
3. Configure EBGP peers in AS100 and AS200 according to the “BGP Neighbors Example.”
4. Click the link for the peer IP address for Nokia Platform A under AS100.
5. Enter 100 in the MED SENT OUT text box.
6. Click ON in the ACCEPT MED FROM EXTERNAL PEER FIELD; then click APPLY.
7. Click the link for the peer IP address for Nokia Platform B under AS100.
8. Enter 200 in the MED SENT OUT text box.
9. Click ON in the ACCEPT MED FROM EXTERNAL PEER FIELD; then click APPLY.
10. Click the link for the peer IP address for Nokia Platform C under AS200.
11. Enter 50 in the MED SENT OUT text box.
12. Click ON in the ACCEPT MED FROM EXTERNAL PEER FIELD; then click APPLY.
13. Click SAVE to make your changes permanent.
This configuration allows Nokia Platform D to prefer Nokia Platform A (with the lower
MED value of 100) over Nokia Platform B (with the higher MED value of 200) as the entry
point to AS100 while it propagates routes to AS100. Similarly, this configuration propagates
routes with an MED value of 50 to AS200, although no multiple entry points exist to AS200.
Note
Setting an MED value along with route redistribution overwrites the MED value for the
external BGP peer for Nokia Platform D.
Verification
To verify that you configured BGP MED values correctly, run the following commands in iclid.
show route
show bgp neighbor <peerid> advertised
show route bgp metrics
For more information on these commands, see “Displaying Routing Protocol Information.”
AS100 AS676
Nokia Nokia
Platform A 20.10.5.1/24 Platform C
EBGP 20.10.5.2/24
20.10.10.2/24
IBGP
AS342
20.10.10.1/24
This example shows how to set up two IBGP peers, and how to configure routes learned using
Nokia Platform A to have a higher local preference value over Nokia Platform B (which has a
default local preference value of 100).
1. Configure the interface as in “Configuring an Ethernet Interface.”
2. Click the BGP link in the Routing Configuration section.
AS65525
AS65527 AS65528
Confed 65525 Confed 65525
Nokia Nokia
Platform A Platform D
.1 .1
192.168.35 192.168.35
.2 .2
.2 .2
Nokia Nokia
Platform B Platform C
192.168.30
AS65524
Confed 65525
.1 .1
Nokia
Platform E
To external AS
00333
In the above diagram, all the routers belong to the same Confederation 65525. Nokia Platform A
and Nokia Platform B belong to routing domain ID 65527, Nokia Platform C and Nokia
Platform D belong to routing domain ID 65528 and Nokia Platform E belong to routing domain
ID 65524. The following configuration is done on Nokia Platform C.
1. Set up the confederation and the routing domain identifier.
a. Click CONFIG on the home page.
b. Click the BGP link in the Routing Configuration section.
c. Click the Advanced BGP Options link.
d. Enter 65525 in the CONFEDERATION text box.
e. Enter 65528 in the ROUTING DOMAIN IDENTIFIER text box; then click APPLY.
2. Create confederation group 65524.
a. Click CONFIG on the home page.
b. Click the BGP link in the Routing Configuration section.
c. Click the Advanced BGP Options link.
d. Enter 65524 in the PEER AUTONOMOUS SYSTEM NUMBER text box.
e. Click CONFEDERATION in the PEER GROUP TYPE drop-down list; then click APPLY.
Define properties for the above group.
f. Click ON in the ALL field.
g. Click ON in the ALL INTERFACES field; then click APPLY.
AS65525 AS65526
Nokia Nokia
Platform A 192.168.10 Platform B
Route reflector
.2 EBGP .1 .1 .1
192.168.20 192.168.30
IBGP
.2 Client Client .2
Nokia Nokia
Platform C Platform D
00334
In the above diagram, router Nokia Platform A is on AS 65525, and routers Nokia Platform B,
Nokia Platform C, and Nokia Platform D are in AS 65526.
To configure Nokia Platform B to act as a route reflector for clients Nokia Platform C and Nokia
Platform D:
1. Assign an AS number for this router.
a. Click CONFIG on the home page.
b. Click the BGP link in the Routing Configuration section.
c. Enter 65526 in the AS NUMBER text box; then click APPLY.
2. Create an external peer group.
a. Click CONFIG on the home page.
b. Click the BGP link in the Routing Configuration section.
c. Click the Advanced BGP Options link.
d. Enter 65525 in the PEER AUTONOMOUS SYSTEM NUMBER text box.
e. Click EXTERNAL in the PEER GROUP TYPE drop-down list; then click APPLY.
3. Enter the peer information.
a. Click CONFIG on the home page.
b. Click the BGP link in the Routing Configuration section.
c. Click the Advanced BGP Options link.
d. Enter 192.168.10.2 in the ADD REMOTE PEER IP ADDRESS text box under the
AS65525 external group; then click APPLY.
4. Create an internal group.
a. Click CONFIG on the home page.
b. Click the BGP link in the Routing Configuration section.
Note
Specify the community ID and the AS number in order to generate a unique AS number-
community ID combination.
To restrict incoming routes based on their community values, see “Path Filtering Based on
Communities Example.”
To redistribute routes that match a specified community attribute, append a community attribute
value to an existing community attribute value, or both.
Note
The examples that follows is valid only for redistributing routes from any of the specified
routing protocols to BGP. For example, configuring community-based route redistribution
policy from OSPF to BGP automatically enables the same community-based redistribution
Note
Matching an AS with the no export option only matches those routes that have all of the
preceding AS number and community ID values.
Note
Matching an AS with the no advertise option appends the community attribute with the
values described in step 2. Thus, all of the routes with the community attributes set to 4:1,
5:2, and no export are redistributed with the appended community attributes 4:1, 5:2, no
export, 6:23, and no advertise.
Nokia Platform A has a loopback address of 1.2.3.4, and Nokia Platform B has a loopback
address of 5.6.7.8.
AS100 AS200
Nokia Nokia
Platform A 129.10.1.1 129.10.1.2 Platform B
Loopback 129.10.2.1 129.10.2.2 Loopback
1.2.3.4 5.6.7.8
00335
Verification
To verify that you have configured load balancing correctly, run the following commands in
iclid:
show bgp neighbor
show route bgp
For more information on these commands, see Displaying Routing Protocol Information.
00336
5. Enter any changes in the text boxes that correspond to the appropriate fields, then click
APPLY.
Verification
To verify that you have configured route dampening correctly, run the following command in
iclid.:
show route bgp suppressed
For more information on this command, see Displaying Routing Protocol Information.
If the path specifies a next hop that is inaccessible, drop the update.
Prefer the path with the lowest weight. A route whose weight value is not specified is always
less preferred than the path with the highest set weight value. Normally, the route with the
highest set weight value is the least preferred.
Note
The Nokia implementation of weight value differs from that of other vendors.
If the weights are the same, prefer the path with the largest local preference.
If the local preferences are the same, prefer the route that has the shortest AS_path.
If all paths have the same AS_path length, prefer the path with the lowest origin type (Origin
IGP < EGP < Incomplete).
If the origin codes are the same, prefer the path with the lowest MED attribute (if MED is
not ignored).
If the paths have the same MED, prefer the external path over the internal path.
If the paths are still the same, prefer the path through the closest IGP neighbor.
Prefer the path with the lowest IP address, as specified by the BGP router ID.
Route Redistribution
Route redistribution allows routes learned from one routing protocol to be propagated to another
routing protocol. This is necessary when routes from one protocol such as RIP, IGRP, OSPF, or
BGP need to be advertised into another protocol (when two or more routing protocols are
configured on the same router). Route redistribution is also useful for advertising static routes
(for example, the default route) or aggregates into a protocol.
Note
Route metrics are not translated between different routing protocols.
When you leak routes between protocols, specify routes that are to be injected and routes that are
to be excluded. In the case where the prefix is redistributed, you can the metric to advertise.
For each prefix that is to be redistributed or excluded, the prefix is matched against a filter. The
filter is composed of a single IP prefix and one of the following modifiers: normal, exact,
refines, and range. The default modifier is normal.
Normal matches any route that is equal to or more specific than the given prefix.
Exact matches a route only if it equals the IP address and mask length of the given prefix.
Refines matches a route only if it is more specific than the given prefix.
Range matches any route whose IP address equals the given prefix’s IP address and whose
mask length falls within the specified mask length range.
A sample route redistribution examples follow.
AS100 AS200
Nokia Nokia Nokia
Platform A Platform B Platform C
EBGP
AS4
EBGP
Nokia
Platform D
00339
Note
routed is a utility that runs by default on most Unix workstations. This utility listens to RIP
network updates and chooses a default route based on what is advertised. This process
eliminates the need for static routes and provides route redundancy. Because routed does
not send route updates, it is called a passive RIP listener. This subnet (192.168.26.64/28) is
categorized as a stub network, meaning that a particular subnet does not send RIP routing
updates.
Nokia Nokia
Platform B Platform C
26.66/30 26.69/30 26.70/30 26.73/30
26.65/30 26.74/30
Nokia Nokia
Platform A Nokia OSPF Backbone Platform D
26.61/24 26.77/28
RIP to OSPF Border
26.78/28
Hub
26.1/24
0.0.0.0/0
24.0/24 RIP Network UNIX Hosts with
22.0/24 Routed Enabled
Corporate Net
26.79/28 26.80/28
00337
Note
Make sure that the Corporate net RIP router is advertising RIP on the interface connected to
the Nokia network. It must be receiving and transmitting RIP updates. Nokia does not
currently support the notion of trusted hosts for authentication of RIP routes.
6. If you do not want to export all OSPF routes into RIP, click RESTRICT and define a route
filter to advertise only certain OSPF routes into RIP.
7. Assume that Nokia Platform B has another interface not shown in the diagram and that it has
two additional OSPF routes: 10.0.0.0/8 and 10.1.0.0/16. To exclude all routes that are
strictly more specific than 10.0.0.0/8; that is, you want to propagate 10.0.0.0/8 itself, but
you do not want to propagate the more specific route.
a. To configure this filter, enter 10.0.0.0 in NEW IP PREFIX TO IMPORT text box, and 8 in
MASK LENGTH text box; Click APPLY.
b. Select REFINES in the MATCH TYPE drop-down list.
This specifies that you want routes that are strictly more specific than 10.0.0.0/8.
c. Finally, click RESTRICT in the ACTION field. This specifies that we want to discard the
routes that match this prefix.
d. Click APPLY.
The filter is fully configured.
AS4
Nokia Nokia
Platform B Platform C
26.66/30 26.69/30 26.70/30 26.73/30
26.65/30 26.74/30
Nokia Nokia
Platform A Nokia OSPF Backbone Platform D
26.61/24 26.77/28
EBGP EBGP
AS100 AS200
26.1/24 26.77/28
Nokia Nokia
Platform E Platform F
00338
Nokia Platform A
1. Click CONFIG on the home page.
2. Click the Route Redistribution link in the Routing Configuration section.
3. Click the OSPF link in the Redistribute to BGP section.
Description
Inbound route filters allow a network administrator to restrict or constrain the set of routes that a
given routing protocol accepts. The filters let an operator to include or exclude ranges of
prefixes from the routes that are accepted into RIP, IGRP, OSPF and BGP. These filters are
configured in the same way as the filters for route redistribution.
An administrator can specify two possible actions for each prefix. These actions are either to
accept the address into the routing protocol (with a specified rank), or to exclude the prefix.
You can specify the type of prefix matching that should be done for filter entries in the following
ways:.
1. Routes that exactly match the given prefix; that is, have the same network portion and prefix
length.
2. Routes that match more specific prefixes but do not include the given prefix. For example, if
the filter is 10/8, then any network 10 route with a prefix length greater than 8 matches, but
those with a prefix length of 8 do not match.
3. Routes that match more specific prefixes and include the given prefix. For example, if the
filter is 10/8, then any network 10 route with a prefix length greater than or equal to 8
matches.
4. Routes that match a given prefix with a prefix length between a given range of prefix
lengths. For example, the filter could specify that it match any route in network 10 with a
prefix length between 8 and 16.
Note
All other IGPs are configured in exactly the same way.
AS100 AS200
Nokia Nokia Nokia
Platform A Platform B Platform C
EBGP
AS4
EBGP
Nokia
Platform D
00339
Note
By default, all routes originating from the configures ASes are accepted.
You can accept or reject all routes from a particular AS by enabling the ACCEPT or RESTRICT
option next to the ALL BGP ROUTES FROM AS field.
1. You also can accept or reject particular routes from AS 100 by specifying a route filter.
Route filters are specified as shown in the Route Redistribution section. Assume that you
want to filter all routes that are strictly more specific than 10.0.0.0/8. In other words,
allow all routes whose prefix is not 10.0.0.0/8 except for 10.0.0.0/8 itself, but exclude
all routes that are more specific, such as 10.0.0.0/9 and 10.128.0.0/9.
2. To configure this filter, enter 10.0.0.0 in NEW IP PREFIX TO IMPORT text box, and 8 in
MASK LENGTH text box; click APPLY.
3. Select REFINES in the MATCH TYPE drop-down list .
This specifies routes that are strictly more specific than 10.0.0.0/8.
4. Finally, click RESTRICT in the ACTION field.
This specifies discard the routes that match this prefix.
5. Click APPLY.
The filter is fully configured.
6. Select one of the origin options from the ORIGIN drop-down list; then click APPLY.
These options detail the completeness of AS path information. An origin of IGP indicates
that an interior routing protocol-learned route was learned from an interior routing protocol
and is most likely complete. An origin of EGP indicates the route was learned from an
exterior routing protocol that does not support AS paths, and the path is most likely
incomplete. When the path information is incomplete, an origin of incomplete is used.
7. Enter a new route filter. In this example assume that you want to filter all routes that are
strictly more specific than 10.0.0.0/8. In other words, allow all routes whose prefix is not
10.0.0.0/8 except for 10.0.0.0/8 itself, but exclude all routes that are more specific,
such as 10.0.0.0/9 and 10.128.0.0/9.
8. To configure this filter, enter 10.0.0.0 in NEW IP PREFIX TO IMPORT edit box, and 8 in
MASK LENGTH edit box; then click APPLY.
9. Select REFINES in the MATCH TYPE drop-down list.
This specifiesroutes that are strictly more specific than 10.0.0.0/8.
10. Finally, click RESTRICT in the ACTION field.
This specifies to discard the routes that match this prefix.
11. Click APPLY.
The filter is fully configured.
Chapter Contents
Bootp Relay
Bootp Relay Description
IP Broadcast Helper
IP Broadcast Helper Description
Router Discovery
Router Discovery Overview
VRRP
VRRP Description
Sample Configurations
NTP
NTP Description
Configuring NTP
Bootp Relay
Note
When you disable Bootp relay on an interface, the WAIT TIME, PRIMARY IP, and NEW
SERVER fields disappear, but the parameters are still stored in the system.
IP Broadcast Helper
Note
For further information, see RFC1542 section 4.
Note
The default is disabled, which requires that packets be generated by a source directly on the
receiving interface to be eligible for relay.
5. To disable the Forward Nonlocal feature if you have enabled it, click DISABLED in the
FORWARD NONLOCAL field.
6. Click APPLY, and then click SAVE to make your change permanent.
Router Discovery
Note
Only the server portion of the Router Discovery Protocol is supported.
Note
This option applies to each address on the interface and not to the interface itself.
8. (Optional) You can specify the preferability of an IP address as a default router address,
relative to other addresses on the same subnet. You can also make an IP address ineligible as
a default router address.
Click INELIGIBLE to remove an IP address as a possible default router address.
The default is ELIGIBLE. Enter a value to indicate the level of preference for the IP address
as a default router address in the text box below the ELIGIBLE button. The default is 0.
Click APPLY.
Note
This option applies to each address on the interface and not to the interface itself.
VRRP
VRRP Description
The Virtual Router Redundancy Protocol (VRRP) provides dynamic failover of IP addresses
from one router to another in the event of failure. It is used on shared media where end hosts are
configured with a static default route. In this environment, normally the loss of the default router
results in a catastrophic event, isolating all end hosts that are unable to detect any alternate path
that may be available. Using VRRP, a router can automatically assume responsibility for
forwarding IP traffic sent to the address of the default router, should the default router fail. The
use of VRRP allows a higher availability default path without requiring configuration of
dynamic routing or router discovery protocols on every end host.
Virtual Routers
To back up a default router by using VRRP, a Virtual Router must be created for it. A virtual
router consists of a unique virtual router ID (VRID), and the default router IP addresses on the
shared LAN.
The Virtual Router is created on the default router by specifying the router interface to the shared
LAN and by specifying the VRID by which the addresses of this router are identified in the
LAN. The default router IP addresses are added to the virtual router automatically.
Once a virtual router is created on the default router, other routers can be configured as backup
routers. This is done by configuring the virtual router information of the default router, that is, its
VRID and IP address, on each of the backup routers. These backup routers then use VRRP to
take over the default router addresses, should it fail.
Note
If you are running Check Point, you must configure the default and backup routers of a
VRRP group to have the same system times and time zones, otherwise failback might not
occur. Nokia recommends that you enable NTP on all nodes of the group to ensure that
system times are coordinated. You can also manually change the time and time zone on
each node so that it matches the other nodes of the cluster to within a few seconds. The
Check Point management station should also be configured for the same time and time
zone as the cluster nodes.
Priority
Priority provides a way to prefer one router in favor of another during contention for the
addresses of the failed router. If more than one backup router is configured for a virtual router,
Note
The range of priority values you can specify is 1 to 254. When you specify priority values for
backup routers, it is better to specify high priority values, for example 254, 253, and so on.
The higher values can decrease the time it takes for a backup router to take over for a failed
router by up to one second.
Hello Interval
The Hello Interval is the time interval (in seconds) between VRRP Advertisements. It also
determines the fail-over interval; that is, how long it takes a backup router to take over from a
failed default router.
VRRP Advertisements are broadcast on the LAN by the current master of each virtual router.
Backup routers listen for these Advertisements and assume failure if they have not received an
Advertisement within three Hello Intervals. They then elect a new master of the virtual router,
based on their relative priorities.
Authentication Methods
VRRP is designed for a range of internetworking environments that can employ different
security policies. The protocol includes several authentication methods to protect against attacks
from remote and local networks.
Independent of any authentication type, VRRP includes a mechanism (setting TTL=255,
checking on receipt) that protects against remote networks injecting VRRP packets. This
mechanism limits vulnerability to local attacks.
The supported authentication methods include the following:
No Authentication
This authentication type means that VRRP protocol exchanges are not authenticated. This
method should be used only in environments where there is minimal security risk and little
chance for configuration errors (for example, two VRRP routers on a LAN).
Monitored Circuit
Running VRRP in a static routed environment can lead to a black hole failure scenario. If a link
on the VRRP master fails, it might accept packets from an end host but be unable to forward
them to destinations reached through the failed link. This situation creates an unnecessary black
hole for those destinations if an alternate path available via the VRRP backup.
The VRRP monitored circuit feature allows the virtual router master election priority to be made
dependent on the current state of the access link. With proper selection of base priority and
dynamic priority update based on interface status, the virtual router forwarding responsibility
can be made to gracefully failover due to interface failure on the master router.
In order to utilize the monitored circuit feature, you must select a virtual router address that does
not match an interface address or any IP address allocated to a host. The ICMP redirect
messages must be disabled as well.
You can select either monitored circuit mode or VRRP v.2.
Note
The firewall synchronization network should have bandwidth of 100 mbps or greater.
The interfaces that you configure for state synchronization should not be part of VLAN or
have more than one IP address assigned to them.
You then set the 3rd party configuration tab as follows:
In the specify clustering mode field, check High Availability.
In the third-party solution drop-down list, select Nokia VRRP.
Check all the available check boxes.
Click Ok to save your configuration changes.
Caution
The VRRP rule constructions used in Check Point FireWall-1 4.1 and earlier does not
work with Check Point NG, and using these constructions could result in VRRP packets
being dropped by the cleanup rule.
For information about how to configure VRRP rules for Check Point FireWall-1 4.1, contact the
Nokia Technical Assistance Center (TAC).
Note
The object for VRRP is not the same as the gateway cluster object for HA. Accordingly, in
the example below, the gateway cluster object is designated fwcluster-object.
fwcluster-object vrrp
cluster-all-ips Accept
mcast-224.0.0.18 igmp
Where:
cluster-all-ips is the Workstation object you created with all IPs
Firewalls
vrrp_ip_1 mcast-224.0.0.18 vrrp
Accept
vrrp_ip_2 igmp
vrrp_ip_3
Where:
Firewalls is a Simple Group object containing the firewall objects
vrrp_ip_1, vrrp_ip_2, and vrrp_ip_3 are Node objects of type Host created for each
internal and external VRRP IP address supported by the firewalls
mcast-224.0.0.18 is a Node Host object with the IP address 224.0.0.18
vrrp
fwcluster-object igmp
cluster-all-ips Accept
MCAST.NET ospf
dvmrp
Sample Configurations
Sample Configuration 1
The following figure shows a simple network with two routers implementing one virtual router,
to back up a single default router.
IP address A IP address B
Ethernet
or
FDDI
The above configuration shows a very simple VRRP scenario. In this configuration, the end
hosts install a default route to the IP address of virtual router 1 (IP A) and both routers run
VRRP.
The router on the left has its address configured as Virtual Router 1 (VRID=1) and the router on
the right is the backup for Virtual Router 1.
If the router on the left fails, the other router takes over Virtual Router 1 and its IP addresses and
provides uninterrupted service for the hosts.
In this example, IP B is not backed up by the router on the left. IP B is only used by the router on
the right as its interface address. To backup IP B, a second virtual router must be configured. See
“Sample Configuration 3” for more information regarding this scenario.
Priority=4 Priority=5
Nokia Platform Nokia Platform Nokia Platform
(default) (backup) (backup)
VRID=1
In this configuration, the end hosts install a default route to the IP address of virtual router 1 (IP
A) and all routers run VRRP. The address of the router on the left is configured as virtual router
1 (VRID=1) and the other two routers are backup routers for virtual router 1, configured with
different priorities. If the router on the left fails, the other routers use VRRP to determine which
of them will take over virtual router 1 and its IP addresses. In this example, the router on the
right takes over Virtual Router 1, as it has the higher priority. If it also fails at some later time,
the center router takes over Virtual Router 1. Default router service to the hosts is uninterrupted
throughout.
In this example, IP B and IP C are not backed up by virtual router 1. These addresses are only
used by the routers as their interface addresses. To back up IP B and IP C, additional virtual
routers must be configured.
Sample Configuration 3
The following figure shows a configuration with two virtual routers with the hosts splitting their
traffic between them. This example is common in actual practice.
IP address A IP address B
Ethernet
or
FDDI
In this configuration, half of the hosts install a default route to the IP address (IP A) of virtual
router 1, and the other half of the hosts install a default route to the IP address (IP B) of virtual
router 2.
The router on the left has its address configured as virtual router (VRID=1), and the router on the
right has its address configured as virtual router 2. Each router is also configured as a backup
router of the other. If either router fails, the other router takes over its virtual router and IP
addresses and provides uninterrupted service to both default IP addresses for the hosts. This has
the effect of load balancing the outgoing traffic, while also providing full redundancy.
Note
Other routers on the LAN use this value back up the addresses of this router. No other router
on the LAN can use this value to configure VRRP for their own addresses.
Note
The value in this field must be the same for all routers running VRRP on the LAN for this
interface.
8. If you selected SIMPLE, enter the authentication password string in the PASSWORD text box.
Click APPLY.
Note
The value in this field must be the same for all routers running VRRP on the LAN for this
interface.
Note
Do not turn on the VRRP backup router before the VRRP master router is configured. This
leads to a service outage because the VRRP backup router takes over the IP address while
the master is still active with that IP address. To configure the master router, see “Creating a
Virtual Router for an Interface's Addresses in VRRPv2”.
To configure virtual routers to back up the addresses of other routers on a shared media network.
1. Click CONFIG on the home page.
2. Click the VRRP link in the Router Services section.
3. Click the Legacy VRRP Configuration link.
4. Click VRRPV2 next to the interface for which to enable VRRP.
Click APPLY.
5. Enter the remote router VRID in the BACK UP ROUTER WITH VRID text box. Click APPLY.
Note
This value must be the same VRID as that on the virtual router created on the remote router
to back up its addresses.
After you click APPLY, additional fields appear in the table, allowing you to enter
information about the remote router.
6. (Optional) Enter a number in the PRIORITY text box. Click APPLY.
This number indicates the preference of this router relative to the other routers configured to
back up the virtual router. The higher the number, the higher the preference.
7. (Optional) Enter a number in the HELLO INTERVAL text box. Click APPLY.
8. Enter an IP address in the BACK UP ADDRESS text box. Click APPLY.
Note
The IP address is the address of the default router this system will back up. It must be in the
same IP subnet as one of the addresses on this interface.
9. (Optional) If the router you are backing up has more than one IP address, repeat step 7.
10. (Optional) Click NONE or SIMPLE to select the authentication method used by VRRP on this
LAN.
Click APPLY.
Note
The authentication type and the simple password must be the same for all VRRP routers on
a LAN.
11. If you selected SIMPLE, enter the authentication password string in the PASSWORD text box.
Click APPLY.
The value in this field must be the same for all routers running VRRP on the LAN for this
interface.
12. Click APPLY, and then click SAVE to make your changes permanent.
Note
Beginning with IPSO 3.8, the Enabling Coldstart Delay option is no longer available. This
option is superseded by the Monitoring the Firewall State option.
Note
The IP address(es) associated with the monitored circuit virtual router must not match the
real IP address of any host or router on the interface’s network.
4. To set a VMAC address, click the VMAC MODE drop-down window and select either
INTERFACE, STATIC, or EXTENDED. VRRP is the default. If you select STATIC, you must
enter the VMAC address that you want to use in the STATIC VMAC edit box. Click APPLY,
and then click SAVE to make your changes permanent.
Note
If you set the vmac mode to interface or static, you will get syslog error messages when you
reboot, or at failover, indicating duplicate IP addresses for the master router and backup
router. This is expected behavior since both the master router and the backup router will be
using the same virtual IP address temporarily until they resolve into master and backup.
a. To locate a virtual router used to back up the IP address of an interface, find the matching
VRID displayed in the OWN VRID field.
b. To locate a virtual router used to back up the IP address of another router, find the
matching VRID displayed in the ROUTER WITH VRID field.
5. Click OFF in the ROUTER WITH VRID field to remove the virtual router.
Click APPLY.
All the information about the virtual router will disappear from the table.
6. To make your changes permanent, click SAVE.
Note
The IP address is the address of the default router this system backs up. It must be in the
same IP subnet as one of the addresses on this interface.
Note
You cannot convert existing monitored-circuit virtual routers into this type of configuration. To
use this method, you must delete existing monitored-circuit configurations. See “Deleting
Existing Monitored Circuit Configurations (Simplified Configuration).”
Note
Once you use the simplified method of creating a monitored circuit, you cannot alter the
monitored-circuit configuration by using the Legacy Configuration method.To use the Legacy
Configuration method, you must delete the existing monitored-circuit configurations, and
then create new monitored-circuit virtual routers with the Legacy Configuration. For more
information, see “Creating a Virtual Router in Monitored Circuit Mode (Simplified
Configuration).”
Note
The Backup Addresses associated with the monitored circuit virtual router must not match
the real IP address of any host or router on the interface network.
Note
All configured backup addresses must be associated with the same VRID. If you do not
associate all backup addresses with the same VRID when you configure monitored circuit
mode using simplified configuration, monitoring of VRRP network interfaces is not enabled.
If you want to configure a different MAC address for each backup address, select Static for
VMAC mode and enter the specific MAC address for each backup address. See “Setting a
Virtual MAC Address for a Virtual Router” for more information on configuring VMAC mode.
Because of the way effective priority is calculated, the value of delta priority cannot exceed
the value of Priority divided by the number of Backup Addresses configured for the virtual
router. If the value exceeds this, an error is displayed that indicates the maximum value, as
well as a "preferred" value that can make the virtual router perform better.
Note
The IP address is the address of the default router this system will back up. It must be in the
same IP subnet as one of the addresses on this interface.
4. Click NONE or SIMPLE to select the authentication method used by VRRP on this interface’s
LAN.
Click APPLY.
The value in this field must be the same for all routers running VRRP on the LAN for this
interface.
5. If you selected SIMPLE, enter the authentication password string in the PASSWORD edit box.
Click APPLY.
The value in this field must be the same for all routers running VRRP on this interface's
LAN.
6. Click SAVE to make your changes permanent.
Note
The IP addresses associated with the monitored circuit virtual router must not match the real
IP address of any host or router on the interface network.
Note
You must select the interface you want to monitor and enter a priority delta value in order to
monitor interfaces. If you do not, Network Voyager displays an error message.
11. (Optional) Repeat steps 8 and 9 to add more monitored interface dependencies.
12. (Optional) Click ENABLED in the AUTO-DEACTIVATION field to set the minimum value for
the effective priority of the virtual router to zero (0). The default is DISABLED, which sets
the lowest value for the effective priority of the virtual router to one (1). A VRRP virtual
router with an effective priority of 0 does not become the master even if there are not other
VRRP routers with a higher priority for this virtual router.
Click APPLY.
13. To remove a specific monitored interface dependency, click OFF next to the name of the
interface you want to remove from the monitored list. Click APPLY.
The name of the interface disappears from the list of monitored interfaces
14. (Optional) To specify a virtual MAC (VMAC) address for the virtual router, see “Setting a
Virtual MAC Address for a Virtual Router.”
15. Click SAVE to make your changes permanent.
NTP
NTP Description
NTP is a protocol that allows you to synchronize to UTC time by querying a server with an
accurate clock. This method is ideal for distributed applications that require time
synchronization, such as Check Point FireWall-1 Sync, or analyzing event logs from a different
device.
Servers
If you configure devices as servers, you use them to set your clock. In server mode, you are
synchronizing to the server for accurate time; it does not synchronize with you. Configure
several servers for redundancy.
Peers
If you configure devices as peers, they listen to each other and move toward a common time.
Peers are considered equal with each other as opposed to servers, which are considered masters.
It is important that you configure several peers so that they can decide on the right time.
Note
The time server begins to provide time information 5 minutes after it is configured.
Features
Setting the time manually.
Running NTP daemon in client mode by using a specified set.
Do not include non-exportable encryption components of servers.
Configuring NTP
Configuring Network Time Protocol determines whether the time service should be active or
inactive. When NTP is active, the local clock is synchronized as configured, and hosts can set
their time through this machine. To set the time manually, see “Setting the System Time.”
1. Click CONFIG on the home page.
2. Click the NTP link in the Router Services section.
3. Click YES in the ENABLE NTP field.
Click APPLY.
The NTP configuration page will display.
4. Enter the new server IP address in the ADD NEW SERVER: ADDRESS: edit box.
Click APPLY.
The new server IP address now appears in the NTP SERVERS field. By default, this new
server is enabled, v3 is selected, and PREFER YES is selected. As you add other servers, you
might prefer them over the initial server you configured.
Note
Nokia recommends that you use the default setting of v3.
The STRATUM edit box and CLOCK SOURCE drop-down list appear. By default, the Stratum
value is 1, and the Clock source is set to Local Clock. Nokia recommends that you keep
these defaults.
8. To configure a new peer, enter the new peer IP address in the ADD NEW PEER: ADDRESS:
edit box.
Click APPLY.
The new peer IP address appears in the NTP PEERS field. By default, this new peer is
enabled, v3 is selected, and PREFER YES is selected. As you add other peers, you might
prefer them over the initial peer you configured.
Note
Nokia recommends that you use the default setting of v3.
Note
Only enable the NTP reference clock if you cannot reach an NTP server.
The STRATUM edit box and CLOCK SOURCE drop-down list appear. By default, the Stratum
value is 1, and the Clock source is set to Local Clock. Nokia recommends that you keep
these defaults.
12. Click SAVE to make your changes permanent.
Chapter Contents
Password Procedures
Changing Passwords
Adding Users
Removing a User
Configuring S/Key
Using S/Key
Disabling S/Key
Group Procedures
Managing Groups
FTP Access
Telnet Access
COM2 Login
COM3 Login
Discard Service
Chargen Service
Daytime Service
Time Service
Configuring RADIUS
Configuring TACACS+
Cryptographic Acceleration
Cryptographic Acceleration Description
IPSec Tunnels
Introduction
Using PKI
IPSec Parameters
Creating an IPSec Policy
Transport Rule
IPSec Tunnel Rule Example
Password Procedures
Changing Passwords
This procedure describes how to change passwords.
1. Click CONFIG on the home page.
2. Click the Users link in the Security and Access Configuration section.
3. Enter the current user password in the OLD PASSWORD text box.
4. Enter a new user password in the NEW PASSWORD text box.
5. Enter the new user password again in the NEW PASSWORD (VERIFY) text box.
6. Click APPLY.
To make your changes permanent, click SAVE.
Adding Users
To add users:
1. Click CONFIG on the home page.
2. Click the Users link in the Security and Access Configuration section.
3. In the ADD NEW USER: USERNAME: text box, enter the name (eight or fewer characters) of
the new user.
4. In the ADD NEW USER: UID text box, enter the numeric user ID.
An admin account allows read/write access privileges. To create a new user with admin
account privileges, enter 0 for the Uid. The monitor account allows read-only access. To
create a new user with monitor account privileges, enter 10 for the Uid.
5. In the ADD NEW USER: HOME DIRECTORY: text box, enter the full UNIX path name of a
directory where the user will log in. For example, if the name of the new user is tester, you
could enter the path to /var/tester for the home directory.
6. Click APPLY.
The new user information appears on the page.
7. Enter a password in the NEW PASSWORD text box. Leave the OLD PASSWORD text box
empty.
8. Enter the same new password in the NEW PASSWORD (VERIFY) text box.
9. Click APPLY.
10. You can modify GID and SHELL.
11. To make your changes permanent, click SAVE.
Removing a User
To remove a user:
1. Click CONFIG on the home page.
2. Click the Users link in the Security and Access Configuration section.
3. In the ADD NEW USER field, click OFF next to the user name to remove.
4. Click APPLY.
Note
When you remove, that user can no longer log in even though the user’s home directory
remains on the system. To remove the user’s directory, you must use the command line.
Configuring S/Key
The following procedure describes how to enable S/Key-based authentication for admin and
monitor accounts. S/Key is a one-time password (OTP) system that you can enable to protect the
password of admin or monitor accounts when users connect through Telnet or FTP.
1. Click CONFIG on the home page.
2. Click the Users link in the Security and Access Configuration section.
3. To enable the Admin S/Key, click either ALLOWED or REQUIRED in the S/KEY PASSWORD
field.
4. Click APPLY.
The CURRENT STANDARD PASSWORD, S/KEY SECRET PASSWORD, and S/KEY SECRET
PASSWORD (VERIFY) text boxes appear.
5. Enter the current standard password in the CURRENT STANDARD password text box.
6. Pick a secret password for S/Key that is between four and eight alphanumeric characters
long, and enter it in the S/KEY SECRET PASSWORD text box.
Using S/Key
Note
You need an S/Key calculator on your platform to generate the S/Key one-time password
(OTP). Many UNIX-derived and UNIX-like systems include the S/Key calculator command
key. Many GUI calculators include support for MD4 (S/Key) algorithms and MD5 (OPIE)
algorithms. Be sure to configure such calculators to use MD4 algorithms.
Note
For more help on how to enter S/Key information, see your S/Key calculator documentation.
Note
The OTP is typically a string, or strings, that contain a series of words, for example, NASH
TINE LISA HEY WORE DISC. You must enter all the words in the valid string at the
password prompt.
Disabling S/Key
1. To disable S/Key, click DISABLED in the S/KEY PASSWORD field.
2. Click APPLY.
The sequence number and seed disappear.
3. Click SAVE to make your changes permanent.
Group Procedures
Managing Groups
To managing a group:
1. Click CONFIG on the home page.
2. Click the Groups link in the Security and Access Configuration section.
3. In the ADD NEW GROUP: GROUP NAME text box, enter the name (eight or fewer characters)
of the new group.
4. In the GID field, enter a numeric ID.
Note
The number must be unique. Suggested values are between 100 and 65000.
5. Click APPLY.
The new group information appears on the page.
6. To add a new member to a group, enter the user name in the ADD NEW MEMBER text box.
7. Click APPLY.
Note
If you click NO, you have to use the Voyager command line to access your IP security
platform (Nokia Platform).
3. Enter the number of the port to activate in the VOYAGER PORT NUMBER text box.
4. Click APPLY.
5. Click SAVE to make your changes permanent.
FTP Access
To enable FTP access:
1. Click CONFIG on the home page.
2. Click the Network Access and Services link in the Security and Access Configuration
section.
3. Click YES in the ALLOW FTP ACCESS field.
4. Click APPLY.
5. Enter the number of the port where you want to receive FTP requests in the FTP PORT
NUMBER text box (defaults to port 21).
Telnet Access
To enable Telnet access:
1. Click CONFIG on the home page.
2. Click the Network Access and Services link in the Security and Access Configuration
section.
3. Click YES in the ALLOW TELNET ACCESS field.
4. Click APPLY.
5. Click SAVE to make your changes permanent.
COM2 Login
To login from the COM2 port:
1. Click CONFIG on the home page.
2. Click the Network Access and Services link in the Security and Access Configuration
section.
3. Click YES in the ALLOW COM2 LOGIN field.
4. Click APPLY.
5. Click SAVE to make your changes permanent.
COM3 Login
To login from the COM3 port:
1. Click CONFIG on the home page.
2. Click the Network Access and Services link in the Security and Access Configuration
section.
3. Click YES in the ALLOW COM3 LOGIN field.
4. Click APPLY.
5. Click SAVE to make your changes permanent.
7. Enter a value, in minutes, in the STATUS POLL INTERVAL field to configure the Modem
Status monitor.
This value is the length of time, in minutes, between modem-line status tests. Once every
interval, the system tests that the modem is present and online. If the modem is not detected
or is offline, a message is logged using syslog. Setting the value to 0 disables the Modem
Status monitor.
8. Click YES in the ENABLE DIALBACK LOGIN field to enable modem dialback.
When set to Yes, an incoming call on the modem is dropped after you log in, and the modem
automatically calls the DIALBACK NUMBER and connects a login process to the line.
9. If you enabled modem dialback, enter a value in the DIALBACK NUMBER field.
The dialback feature uses this number to back an authenticated user (for example, 408 555
0093). If dialback is disabled, ignore this value.
10. Click APPLY.
11. Click SAVE to make your changes permanent.
Note
When you dial into a Nokia appliance that has an Ositech Five of Clubs III modem installed,
be sure to set the connection rate to 9600 BPS. If you do not, the text you receive from the
appliance will be unreadable.
4. Click APPLY.
5. Click the Modem Configuration link for the modem card.
The modem status field should read Modem Detected.
6. In the INACTIVITY TIMEOUT text box, enter the time, in minutes, that an active call on the
modem can remain inactive.
The default is 0, which disables the time and means that the call will never be disconnected
because of inactivity.
7. (Optional) To enable the Dialback feature, click YES in the ENABLE DIALBACK field.
When you enable this feature, an incoming call to the modem is dropped after the user logs
in, and the modem automatically calls the dialback number and connects a login process to
the line.
8. (Optional) In the DIALBACK NUMBER text box, enter the dialback number that the Dialback
feature uses when calling back an authenticated user.
9. In the STATUS POLL INTERVAL text box, enter the time, in minutes, between the modem line
status tests.
If the modem is not detected or is offline, a message appears in syslog. The default is 0,
which disables the modem line status test.
10. Enter the correct number in COUNTRY CODE text box to select your country. To determine
the correct number, see the two tables below. The first table refers to the Ositech Five of
Clubs PCMCIA modem card, and the second table refers to the Ositech Five of Clubs II and
III PCMCIA modem cards.
22 USA 17 Greece
20 Canada 99 Iceland
1 Australia 7 Ireland
2 Belgium 8 Italy
3 Denmark 9 Luxembourg
5 France 11 Norway
6 Germany 12 Portugal
13 Spain 14 Sweden
B5 USA 59 Italy
20 Canada 69 Luxembourg
0F Belgium 82 Norway
31 Denmark B8 Portugal
3C Finland A0 Spain
3D France A5 Sweden
42 Germany A6 Switzerland
57 Iceland
Note
Configuring a modem on COM4 is available on the IP500 series and IP700 series platforms
only.
Services
Echo Service
Echo service sends any data it receives back to the originating source.
To enable echo service:
1. Click CONFIG on the home page.
2. Click the Network Access and Services link in the Security and Access Configuration
section.
3. Click YES in the ENABLE ‘ECHO’ SERVICE field.
4. Click APPLY.
5. Click SAVE to make your changes permanent.
Discard Service
Discard service discards any data it receives.
To enable discard service:
1. Click CONFIG on the home page.
2. Click the Network Access and Services link in the Security and Access Configuration
section.
3. Click YES in the ENABLE ‘DISCARD’ SERVICE field.
4. Click APPLY.
5. Click SAVE to make your changes permanent.
Chargen Service
Chargen service sends data without regard to input. The data sent is a repeating sequence of
printable characters.
To enable chargen service:
1. Click CONFIG on the home page.
2. Click the Network Access and Services link in the Security and Access Configuration
section.
3. Click YES in the ENABLE ‘CHARGEN’ SERVICE field.
4. Click APPLY.
5. Click SAVE to make your changes permanent.
Daytime Service
Daytime service sends the current date and time as a character string without regard to the input.
To enable daytime service:
1. Click CONFIG on the home page.
2. Click the Network Access and Services link in the Security and Access Configuration
section.
3. Click YES in the ENABLE ‘DAYTIME’ SERVICE field.
4. Click APPLY.
5. Click Save to make your changes permanent.
Time Service
The time service sends back to the originating source a 32-bit number, which is the time in
seconds since midnight on January 1, 1900.
To enable time service:
1. Click CONFIG on the home page.
2. Click the Network Access and Services link in the Security and Access Configuration
section.
3. Click YES in the ENABLE ‘TIME’ SERVICE field.
4. Click APPLY.
5. Click SAVE to make your changes permanent.
Configuring SSH
The following procedure allows you to configure the Secure Shell (SSH) feature. To use SSH,
enable it in the ENABLE/DISABLE SSH SERVICE field, You do not need to configure other
options or advanced options.
To enable SSH and configure SSH options:
1. Click CONFIG on the home page.
2. Click the Secure Shell (SSH) link in the Security and Access Configuration section.
3. Click YES in the ENABLE/DISABLE SSH SERVICE field.
Note
The first time you enable SSH it generates both RSA v1, RSA v2, and DSA host keys. This
process will take a few minutes.
4. Click APPLY.
5. (Optional) In the Configure Server Access Control table, click the choice in the PERMIT
ADMIN USER TO LOGIN field.
The default is Yes, which allows the user to log in as admin by using SSH.
6. Click APPLY.
7. (Optional) In the Configure Server Authentication of Users table, click YES for each type of
authentication to be used.
Note
You can authenticate SSH connections by using public keys (for RSA and DSA SSHv2),
standard user and password information, rhosts files, and RSA keys (for SSHv1). You can
permit any combination of these methods. In all cases the default is Yes, except for rhost
and rhost with RSA authentication. The rhost authentication is insecure and Nokia does not
recommended using it.
8. Click APPLY
9. (Optional) In the CONFIGURE SERVER PROTOCOL DETAILS field, click the version of SSH
to be used. The default is both 1 and 2.
10. (Optional) To generate an RSA v1 host key (use with SSHv1), select the key size, listed in
bits, from the GENERATE NEW RSA V1 HOST KEY drop-down list.
11. Click APPLY.
12. (Optional) To generate an RSA v2 host key (use with SSHv2), select the key size, listed in
bits, from the GENERATE NEW RSA V2 HOST KEY drop-down list.
13. Click APPLY.
14. (Optional) To generate a DSA host key (use with SSHv2), select the key size, listed in bits,
from the GENERATE NEW DSA HOST KEY drop-down list.
The recommend value is 1024 bits.
15. Click APPLY.
16. Click SAVE to make your changes permanent.
Note
When you generate new keys, you might need to change the configurations of each client,
or the clients might return errors. For more information, see your SSH client documentation.
Note
The first time you enable SSH it generates both RSA and DSA host keys. This process
takes a few minutes.
5. Click APPLY.
6. (Optional) In the Configure Server Access Control table, enter the group and user names in
the appropriate text boxes.
Note
If you specify users or groups, only those users and groups are allowed or forbidden. Group
settings only apply to a user’s primary group—the Gid setting in the Voyager Password
page. For more information on how to configure users and groups, see Adding Users and
Managing Groups.
Note
You can use wild card characters when you specify multiple group or user names separated
by spaces.
7. Click APPLY.
8. Click the option to use in the PERMIT ADMIN USER TO LOG IN FIELD.
The default is Yes, which allows the user to log in as admin using SSH.
9. Click APPLY
10. In the Configure Server Authentication of Users table, click YES for each authentication
option to be used.
Note
You can authenticate SSH connections by using public keys (for RSA and DSA SSHv2),
standard user and password information, rhosts files, RSA keys (for SSHv1), or any
combination of these methods. In all cases the default is Yes, except for rhost and rhost with
RSA authentication. The rhost utility is insecure and Nokia does not recommend using it.
The default is Yes in the PRINT MESSAGE OF THE DAY ON LOGIN field. The default is No in
the USE LOGIN(1) PROGRAM FOR INTERACTIVE LOGINS field.
13. Click APPLY
14. (Optional) In the Configure Server Protocol Details table, select the method of encryption
(SSHv2), enter appropriate values in the text boxes, and click the choice to use in the SEND
KEEPALIVES TO THE OTHER SIDE and PROTOCOL VERSION(S) fields.
The default settings are Yes and Both 1 and 2 in these fields respectively.
Note
The default setting in the CIPHER TO USE field is all ciphers on. If you deselect all choices in
the this field, the setting reverts to the default setting.
Note
If you previously configured authorized keys for user accounts, the information appears in
the View/Delete Per-User Authorized Keys table. To delete the authorized key for each user
click the DELETE check box. Click APPLY and then SAVE to make your changes permanent.
Note
The most secure value is 1024 bits. Values over 1024 bits cause problems for some clients,
including those based on RSAREF.
5. Click APPLY.
6. (Optional) To generate an RSA host key (to use with SSHv2), select the key size, listed in
bits, from the GENERATE NEW RSA V2 HOST KEY drop-down list.
7. Click APPLY.
8. (Optional) To generate a DSA host key (to use with SSHv2), select the key size, listed in
bits, from the GENERATE NEW DSA HOST KEY drop-down list.
The recommend value is 1024 bits.
9. Click APPLY.
10. Click SAVE to make your changes permanent.
Note
Re-creating keys might cause problems with some clients, because the server use a key
different from the one it used before. You can reconfigure the client to accept the new key.
SSL Description
The secure socket layer (SSL) protocol gives you a secure way to connect to network appliances
by using IPSO. SSL protocol is the industry standard for secure Web connections because the
protocol uses a pair of asymmetric keys to establish Web sessions. Each pair of keys consists of
a public key and a private key. Keeping the private key secret is critical to your security. When
you use SSL, you reduce the risk of unauthorized parties tampering with your Network Voyager
internet sessions.
Voyager lets you do the following:
Enable SSL
Generate certificate and private-key requests
Install certificates and private keys
Note
When you enter the encryption level, you are entering the minimum level of encryption you
require. You get stronger encryption by default if your Web browser supports it.
6. Click APPLY.
Note
You must replace http://... with https://... in your browser window before you click SAVE
because you are enabling a secured connection.
Note
If you use a passphrase, you have to enter the phrase later when you install your new key.
6. Enter the two-letter code of the country in which you are located in the COUNTRY NAME text
box.
7. (Optional) Enter the name of your city in the LOCALITY NAME text box.
8. Enter the name of your state in the STATE OR PROVINCE NAME text box.
9. Enter the name of your organization in the ORGANIZATION NAME text box.
If you are requesting a certificate from a certificate authority, the certificate authority might
require the official, legal name of your organization.
10. (Optional) Enter the name of your department in the ORGANIZATIONAL UNIT NAME text
box.
11. Enter the fully qualified domain name of your host in the COMMON NAME text box, for
example www.ship.wwwidgets.dom.
12. (Optional) Enter your email address in the EMAIL ADDRESS text box.
13. Click GENERATE AN X.509 CERTIFICATE SIGNING REQUEST (CSR) if you are requesting a
certificate from a certification authority.
or
Click GENERATE A SELF-SIGNED X.509 CERTIFICATE to create a certificate which you can
use immediately, but that is not validated by a certification authority.
14. Click GENERATE.
If you generated a certificate signing request, a screen appears that contains a certificate
request—New X.509 certificate signing request—and its associated private key—New
private key.
Send the New X.509 certificate signing request to your certification authority. Be sure to
include the lines -----BEGIN CERTIFICATE REQUEST----- and
-----END CERTIFICATE REQUEST-----. Store the New private key securely. You need to
install the private key and the certificate you will receive from your certification authority.
(See “Installing a Certificate and Private Key”.)
If you generated a self-signed certificate, a screen appears containing the certificate—New
X.509 certificate—and its associated private key—New private key.
You must perform a cut-and-paste operation to move the certificate and the private key to
the Voyager SSL Certificate page. (See “Installing a Certificate and Private Key”.)
3. Create an AAA Configuration entry using one or more of the following elements:
a. “Creating a Service Module Entry”
b. “Creating a Service Profile”
c. “Creating an Authentication Profile”
d. “Creating an Accounting Profile”
e. “Creating a Session Profile”
Which element to create depends on the needs of the service that uses AAA; at a minimum, a.
and b. and one of c., d. or e. is needed before APPLY is selected. If any items are to be configured
individually, configure them in the following order:
e
d or c
b
a
The steps for configuring each of these elements is described in the following subsections.
Note
You can add an Authorization, Accounting, or Session profile without using any of them in a
Service Profile.
4. Click APPLY.
5. Click SAVE to make your changes permanent.
Note
The Server/File field is unused.
Note
Modules in the MODULE column reside in the /usr/lib directory.
Note
The Server/File field is unused.
Note
Modules in the MODULE column reside in the /usr/lib directory.
Note
Modules in the MODULE column reside in the /usr/lib directory.
Profile Controls
CONTROL values determine how the results of multiple authentication, accounting, or session
algorithms are handled and when additional algorithms in a list are invoked. Specifies lists of
algorithms by defining multiple entries under the AUTH. PROFILE, ACCT. PROFILE, and
SESSION PROFILE columns of a SERVICE PROFILE.
The following table describes these effects for algorithm invocation not at the end of the list.
Control Description
The following table describes these effects for algorithm invocation for a single item or an item
at the end of the list.
Control Description
required The result is combined with the results of previous algorithms such that
any failure result causes failure to be reported.
Control Description
ip_source: NONE
Configuring RADIUS
RADIUS, or remote authentication dial-in user service, is a client and server-based
authentication software system that supports remote-access applications. This service allows an
organization to maintain user profiles in a centralized database that resides on an authentication
server that can be shared by multiple remote access servers. A host contacts a RADIUS server,
which determines who has access to that service. Beginning with IPSO 3.5, Nokia provides
RADIUS client support only.
Note
You can configure multiple servers for a profile. The priority value determines which server
to try first. A smaller number indicates a higher priority.
9. Enter the IP address of the RADIUS server in the HOST ADDRESS text box.
RADIUS supports only IPv4 addresses.
10. Enter the port number of the UDP port to contact on the server host in the PORT # text box.
The default is 1812, which is specified by the RADIUS standard. The range is 1 to 65535.
Caution
Firewall software often blocks traffic on port 1812. To ensure that RADIUS packets are
not dropped, make sure that any firewalls between the RADIUS server and IPSO
devices are configured to allow traffic on UDP port 1812.
11. Enter the shared secret used to authenticate the authorization profile between the RADIUS
server and the local client in the SECRET text box.
You must also configure this same value on your RADIUS server. Enter a text string without
a backslash.
For more information see RFC 2865. The RFC recommends that the shared secret be at least
16 characters long. Some RADIUS servers limit the shared secret to 15 or 16 characters.
Consult the documentation for your RADIUS server.
12. (Optional) Enter the number of seconds to wait for a response after contacting the server in
the TIMEOUT text box.
Depending on your client configuration, if the client does not receive a response, it retries
the same server or attempts to contact another server. The default value is 3.
13. (Optional) Enter the maximum number of times to attempt to contact the server in the MAX
TRIES text box.
If all the attempts do not make a reliable connection within the timeout period, the client
stops trying to contact the RADIUS server. The default is 3.
Note
The maximum tries value includes the first attempt. For example, a value of 3 means the
client makes two additional attempts to contact the RADIUS server after the first attempt.
14. Click APPLY, and then click SAVE to make your changes permanent.
Note
Repeat steps 1 through 14 to configure additional RADIUS authentication profiles. You must
configure a RADIUS authentication server for each profile even if you associate the new
profile with a server that you previously configured for an existing RADIUS authentication
profile.
Note
Repeat steps 8 through 14 of this procedure to configure additional AAA RADIUS
authentication servers only.
Configuring TACACS+
The TACACS+ authentication mechanism allows a remote server that is not part of IPSO to
authenticate users (checks passwords) on behalf of the IPSO system. TACACS+ encrypts
transmitted passwords and other data for security.
In the IPSO 3.6 release, TACACS+ is supported for authentication only, and not for accounting.
Challenge-response authentication, such as S/Key, over TACACS+ is not supported by IPSO at
this time.
You can configure TACACS+ support separately for various services. The Voyager service is
one of those for which TACACS+ is supported and is configured as the httpd service. When
TACACS+ is configured for use with a service, IPSO contacts the TACACS+ server each time it
needs to check a user password. For the Voyager service this occurs for each HTTP request
(every page view). If the server fails or is unreachable, the password is not recognized and you
are not allowed access. In Voyager, this denial is effective immediately. Before you change the
Voyager configuration, confirm any new configuration.
Note
You can configure multiple servers for a profile. The priority value determines which server
to try first. A smaller number indicates a higher priority.
9. Enter the IP address of the TACACS+ Server in the HOST ADDRESS text box. TACACS+
supports only IPv4 addresses.
10. Enter the port number of the TCP port to contact on the server host in the PORT # text box.
The default is 49, which is specified by the TACACS+ standard. The range is 1 to 65535.
11. Enter the shared secret used to authenticate the authorization profile between the TACACS+
server and the local client in the SECRET text box.
You must also configure this same value on your TACACS+ server. Enter a text string
without a backslash.
12. (Optional) Enter the number of seconds to wait for a response after contacting the server in
the TIMEOUT text box. Depending on your client configuration, if the client does not receive
a response, it retries the same server or attempts to contact another server. The default value
is 3.
13. Click APPLY, and then click SAVE to make your changes permanent.
Note
Repeat steps 1 through 13 to configure additional TACACS+ authentication profiles. You
must configure a TACACS+ authentication server for each profile even if you associate the
new profile with a server that you previously configured for an existing TACACS+
authentication profile.
Note
Repeat steps 8 through 13 of this procedure to configure additional AAA TACACS+
authentication servers only.
Note
You must have at least one RADIUS or TACACS+ server configured to maintain RADIUS or
TACACS+ service.
5. Click APPLY, and then click SAVE to make your changes permanent.
Note
The algorithm is added to the end of the list. The order of algorithms in the list is the order
that they are invoked. To change the order, delete the algorithms which are out of order by
using “Deleting an Item in a Service Profile Entry,” and add them in the desired order using
this procedure.
required: SECURETTY
The following graphic screens below show an example of how to create a service which has the
requirement for multiple authentication algorithms. Only the portion of the page that has
changes is shown here.
Note
The algorithm is added to the end of the list. The order of algorithms in the list is the order
that they are invoked. To change the order, delete the algorithms which are out of order,
using Deleting an Item in a Service Profile Entry, and add them in the desired order using
this procedure.
Note
The algorithm is added to the end of the list. The order of algorithms in the list is the order
that they are invoked. To change the order, delete the algorithms which are out of order,
using “Deleting an Item in a Service Profile Entry,” and add them in the desired order using
this procedure.
Note
The Server/File field is unused.
Note
The Server/File field is unused.
4. Click APPLY.
5. Click SAVE to make your changes permanent.
You cannot delete the following services:
httpd
snmpd
login
sshd
other
Cryptographic Acceleration
If you have a Nokia encryption accelerator card installed, IPSO supports IKE acceleration for
Check Point VPN-1/FireWall-1.
The Nokia Encryption Accelerator I supports 1024-bit groups (keys)
The Nokia Encryption Accelerator I supports 1524 bit groups (keys)
The Voyager-based version of the Check Point cpconfig program makes it easier for you to
enable IKE acceleration—you choose the option for registering the PKCS #11 module.To use
IKE acceleration, use the Voyager-based version of cpconfig (instead of running cpconfig at a
command prompt) to perform the initial configuration of VPN-1/FireWall-1.
For more information on phase 1 and phase 2 negotiations, and other related information about
how to establish secure connections by using IPSec, click Introduction.
Note
You cannot enable the accelerator card before you install it. The options in Voyager for
enabling the card do not appear until it is installed.
The way you enable the card depends on whether you use Check Point software to create and
manage VPN tunnels or use Nokia Network Voyager to create and manage tunnels (in IPSO).
If you use Check Point software to create VPN tunnels, see “Enabling the accelerator card for a
Check Point VPN.” If you use Voyager to create VPN tunnels, see “Enabling the accelerator
card for an IPSO VPN.”
IPSec Tunnels
Introduction
Developed by the Internet Engineering Task Force (IETF), IPSec is the industry standard that
ensures the construction of secure virtual private networks (VPNs). A VPN is a private and
secure network implemented on a public and insecure network. Secure VPNs are as safe as
isolated office LANs running entirely over private lines and much more cost effective.
The IPSec protocol suite provides three new protocols for IP:
An authentication header (AH) that provides connectionless integrity and data origin
authentication. The IP header is included in the authenticated data. It does not offer
encryption services.
An encapsulation security payload (ESP) that provides authentication and confidentiality
through symmetric encryption, and an optional anti-replay service. ESP does not include the
IP header in the authentication/confidentiality.
A protocol negotiation and key exchange protocol (IKE) for easier administration and
automatic secure connections. IKE introduces two negotiations. Phase 1 negotiation
authenticates both peers and sets up the security for the Phase 2 negotiation. IPSec traffic
parameters are negotiated in Phase 2.
IP header AH Payload
Authenticated
00126
If ESP is used, no protection is offered to the IP header, but data payload is authenticated
and can be encrypted.
Authenticated
Encrypted
00127
In tunnel mode, the original IP datagram is placed inside a new datagram, and AH or ESP are
inserted between the IP header of the new packet and the original IP datagram. The new header
points to the tunnel endpoint, and the original header points to the final destination of the
datagram. Tunnel mode offers the advantage of complete protection of the encapsulated
datagram and the possibility to use private or public address space. Tunnel mode is meant to be
used by routers—gateways. Hosts can operate in tunnel mode too.
With IPSec tunnel mode:
If AH is used, the outer header is authenticated as well as the tunneled packet:
Authenticated
00128
If ESP is used, the protection is offered only to the tunneled packet, not to the new outer IP
header. By default, ESP, providing the highest level of confidentiality, is used in this release.
New IP header ESP header Old IP Payload ESP trailer ESP auth
header
New IP header ESP header Old IP header Payload ESP trailer ESP auth
Authenticated
Encrypted 00129
Using PKI
For Phase 1 negotiation of IKE, the IPSec systems can use X.509 certificates for authentication.
X.509 certificates are issued by Certificate Authorities (CA). IPSO IPSec implementation
supports Entrust VPN connector and Verisign IPSec on site services. Contact any of the listed
CA vendors for certificate signing services.
To use the X.509 certificates, the IPSec system should follow these steps:
1. Install the trusted CA certificates (all, including yours) of all the peer IPSec systems.
2. Make a certificate request with all the information required to identify the system such as
your IP address, a fully qualified domain name, organization, organization unit, city, state,
country, and contact email address.
3. Forward the certificate request to the CA or corresponding RA (Registration Authority)
using the Web interface or another file transfer mechanism.
CA or RA verifies the identity of the IPSec system and generates the approved certificate. A
certificate is valid only for a certain period of time.
4. Download and install the approved device certificate and the CA certificate on the IPSec
system.
5. Link the certificate to an IPSec policy.
Note
The IPSO Web-based Voyager interface provides the mechanism you need to complete all
the above steps.
Note
The IP2250 appliance does not support IPSO’s implementation of IPSec.
The IPSO operating system provides a native IPSec implementation supporting ESP in tunnel
mode. This implementation is compliant with the following RFCs:
RFC 2401—Security Architecture for the Internet Protocol
RFC 2402—IP authentication header
RFC 2406—IP Encapsulating Security Payload (ESP)
Supports algorithms: 3DES, DES, and Blowfish for encryption and SHA-1 and MD5 for
authentication.
RFC 2407—The Internet IP Security Domain of Interpretation for ISAKMP
RFC 2408—Internet Security Association and Key Management Protocol (ISAKMP)
RFC 2409—The Internet Key Exchange (IKE)
RFC 2411—IP Security Document Roadmap
RFC 2412—The OAKLEY Key Determination Protocol
RFC 2451—ESP CBC-Mode Cipher Algorithms
The IPSec configuration in Voyager is based on three different IPSec objects: proposals, filters,
and policies.
Proposals define the combination of encryption and authentication algorithms that secure
phase 1 negotiation (Main Mode) as well as phase 2 negotiations (Quick Mode) and IPSec
packets.
Filters determine which packets relate to certain proposals. The filters are matched against
the source or destination fields in the packet header depending on whether the filters are
used as source or destination filters. If applicable, PROTOCOL and PORT fields are also used.
Policies link the type of IPSec security that proposals with traffic define. The traffic is
defined by a list of filters specified for the source address and a second list specified for the
destination address. If the source address of a packet matches a filter from the source filter
list and the destination address matches a filter from the destination filter list, IPSec is
applied to the traffic. Protocols and ports are used in the matching process, if applicable.
Phase 1 Configuration
For IPSO, the Phase 1 encryption and authentication algorithms are the same as those used in
Phase 2. However, if Phase 2 encryption is NULL, such as with an AH proposal or NULL-
encryption-ESP proposal, IPSO uses 3DES as Phase 1 for the encryption algorithm.
The values set in the LIFETIME table are used as the hard lifetime of the Phase 2 SA. Phase 1
lifetimes are calculated as Hard Phase 1 lifetime (seconds) = 5* Hard Phase 2 lifetime (seconds).
The soft limit value is approximately 80-90 percent of the hard-limit value, depending on
whether the device is working as a session initiator or responder.
If you create tunnels between an IPSO platform and non-IPSO systems, configure the non-IPSO
system so that the Phase 1 lifetime is five times the Phase 2 lifetime. Set the encryption to 3DES,
and set the authentication so that it is the same as the Phase 2 algorithm.
Platform Support
IPSec is supported across all Nokia security appliances.
IPSec Parameters
The two IPSec peers should agree on authentication and encryption methods, exchange keys,
and be able to verify each other’s identities. While you configuring the peer IPSec devices,
consider the following:
At least one proposal (encryption algorithm and hash function) should match on the peer
devices. See “Proposal and Filters” in “Creating an IPSec Policy” for more information.
Authentication method:
If you are using Shared Secret, both devices should have the same shared secret. See
“Putting It All Together” in “Creating an IPSec Policy” for more information.
If you are using X.509 certificates, both devices should install all the trusted CA
certificates in the trust hierarchy. See “Trusted CA Certificates” in “Creating an IPSec
Policy” for more information.
Some IPSec systems require that the SA lifetimes (seconds, as well as megabytes) match on
both devices. See “Putting It All Together” in “Creating an IPSec Policy” for more
information.
IKE and PFS groups should match on both devices. See “Putting It All Together” in
“Creating an IPSec Policy” for more information.
The Diffie-Hellman key exchange uses the IKE group during the establishment of Phase 1
ISAKMP SA. Value options are 1, 2, or 5; 2 is the default value.
The Diffie-Hellman key exchange uses the PFS group in Phase 2 to construct key material
for IPSec SAs. The value options are 1, 2, 5, or none; 2 is the default. Setting the value to
none disables PFS.
Note
When IPSO is acting as the responder of the Phase 2 negotiation, it always accepts the PFS
group proposed by the initiator.
Note
If you click AH, the ENCRYPTION ALG (algorithm) must always be set to NONE. If this is not
done, an error message appears when you click APPLY.
2. From the drop-down list in the AUTHENTICATION ALG and ENCRYPTION ALG fields, select
the necessary algorithms. Click APPLY.
3. Under the FILTERS table, enter a new filter name in the NEW FILTER text box for the
subnetwork that you want to control.
4. Enter the subnet address and the mask length in the ADDRESS and MASK LENGTH text
boxes. Click APPLY.
Note
Destination filters across multiple rules (tunnel or transport) should not overlap, although
source filters can overlap.
After you click APPLY, the new filter information is added to the Filters list. If needed, you
can then define a protocol or a port. Defaults are assumed. Repeat this operation for as many
networks you need.
Note
Each Voyager page displays a maximum of 10 proposals or 10 filters. If you create more
than 10, they are continued on new pages. Access these pages by clicking the link directly
below the appropriate section. The link to more pages appears only after you create more
than 10 proposals or filters.
Skip to “Putting It All Together” if you do not plan to use a X.509 certificate and want to use
shared secret for authentication.
Trusted CA Certificates
To select a trusted CA certificate:
Trusted CA certificates are the publicly available certificates of the CAs.
1. Under the TRUSTED CA CERTIFICATES table, enter a name in the NEW CA text box. Click
APPLY.
2. An Apply Successful message appears and the name of the CA you just entered appears in
the Trusted CA Certificates table.
3. Click on the new link with the same name that you entered in Step 1. This action takes you
to the IPSec Certificate Addition page for that specific certificate.
4. On the Certificate Addition page, you have two choices:
If you have the PEM (base64) encoded certificate, select the PASTE THE PEM
CERTIFICATE option.
If you know the URL to the certificate (including the local file), select the ENTER URL
TO THE CERTIFICATE option.
5. Click APPLY.
Note
This action takes you to the next page that asks for the PEM encoded certificate or the URL
information of the certificate. If you have the PEM encoded certificate, proceed to step 5; if
you reach the URL to the certificate, skip to step 6.
6. If you are asked to enter the PEM coded certificate, use the copy and paste function of your
browser to copy the PEM text of the certificate into the text box titled PASTE THE PEM
ENCODED CERTIFICATE; click APPLY. This action should print a Success message. Click on
the link titled IPSec General Configuration page to return to the main IPSec configuration
page.
7. If you are asked to enter URL information of the certificate, enter the URL to the certificate.
Examples are:
http://test.acme.com/dev1.cert
ftp://test.acme.com/dev1.cert
file://tmp/dev1.cert
1dap://test.acme.com/cn=dev1.acme.com?pem_x509?sub
Enter the HTTP realm information (only for the HTTP protocol); enter the user name and
password if needed to connect to the FTP/HTTP server.
8. Click APPLY. This action should print a Success message. Click on the link titled IPSec
General Configuration page to return to the main IPSec Configuration page.
Repeat the steps in this procedure for every trusted CA certificate that needs to be installed.
Device Certificates
A device certificate is used to identify a particular IPSec system. Follow the steps below.
To enroll and install a device certificate:
1. Under the DEVICE CERTIFICATES table, enter a name in the NEW CERTIFICATE text box,
then click APPLY.
2. An Apply Successful message appears and the name of the CA you just entered appears in
the Device Certificates table.
3. Click on the new link with the same name that you entered in step 1.
This action takes you to the IPSec Certificate Enrollment page for that named item.
4. Enter all the fields on the page that identifies the IPSec system and click APPLY.
This action should take you to the page where a PEM-encoded certificate request is shown.
Note
Remember the passphrase that you entered for future reference.
Note
Some CAs do not expect the header (----BEGIN CERTIFICATE REQUEST----) and the
footer (----END CERTIFICATE REQUEST----) lines in the text.
Alternatively, you can copy the text in a file and send the file to the CA/RA by FTP or some
other file transfer mechanism that is supported. Contact the CA for details.
7. If you could successfully make the certificate request select COMPLETED THE CERTIFICATE
REQUEST AT THE CA SITE option; otherwise, select the WILL DO IT LATER option.
8. Click APPLY.
If you chose COMPLETED THE CERTIFICATE REQUEST AT THE CA SITE, proceed to step 8.
If you chose the WILL DO IT LATER OPTION, skip to step 10.
9. If you chose the COMPLETED THE REQUEST AT THE CA SITE, a new link Click here to
install the Certificate appears towards the bottom of the page.
To install the certificate, click the link to go to the page described in steps 3–6 under
“Trusted CA Certificates.”
Note
Before you install the certificate, ensure that CA approved the certificate and that you know
how to access the approved certificate. If you need to wait for the CA’s approval, you can
click on the link with the Certificate name in the IPSec General Configuration page to install
the certificate.
10. If you chose WILL DO IT LATER to make the certificate request, the link on the main IPSec
General Configuration still points to the certificate request page.
You can repeat steps 5 through 8 to install the certificate.
11. If you finished all the steps, two green buttons appear.
You can click on the button under the CERTIFICATE column to view the certificate.
Advanced IPSec
The following options are available through the IPSec Advanced Configuration page; the link is
at the bottom of the IPSec General Configuration Page:
Log Level—IPSO IPSec provides three levels of message logging through the syslog
subsystem:
Error (default value)—only error messages or audit messages are logged.
Note
In any of the log level options, confidential information (such as secrets or session keys) are
not shown.
LDAP servers
IPSO IPSec implementation supports automatic CRL retrieval following the LDAPv2/3
protocol specification (RFC 2251). To retrieve CRL automatically from the centralized
directory enter the URL of the directory server.
Because of different implementations, the internal configuration of the directory server
might not be compatible with IPSO that has implemented LDAP query formats.
Note
Only one method can be active at a time.
5. If you chose Pre-Shared Secret, enter the shared secret in the ENTER SHARED SECRET text
box. Enter the secret again, in the SHARED SECRET (VERIFY) text box, for verification.
6. Click APPLY.
If the secret has been entered correctly the red light of the SECRET STATUS field turns green
after you click APPLY.
7. If you chose X.509 CERTIFICATES, select the certificate name from the list of device
certificates that identifies this machine.
8. In the LIFETIME table, if the default lifetime values are not appropriate, modify them in the
SECONDS and MEGABYTES text boxes.
Note
Lifetimes must be set to the same value between peers when negotiation is initiated. If they
are not set the same, IPSO IPSec might deny the negotiation.
9. In the Diffie-Hellman Groups table, if the default values in the IKE Group and PFS Group
text boxes are not appropriate, modify them, then click APPLY.
Note
Each Voyager page displays a maximum of 10 policies. If you create more than 10 policies,
they are continued on new pages. Access these pages by clicking the link directly below the
policy section. The link to more pages appears only after you create more than 10 policies.
Note
IPSO can support up to 1500 rules. However, each Voyager page displays a maximum of
10. If you create more than 10 rules, they are continued on new pages. Access these pages
by clicking the link directly below the rule section. The link to more pages appears only after
you create more than 10 rules.
8. Click on the new link with the name that you entered in the IPSec Tunnel Rules table.
Note
This and the following two steps are not applicable for tunnels without logical interface
parameters.
The hello protocol determines the connectivity of an end-to-end logical tunnel. As a result,
the hello protocol modifies the link status of the logical interface. If the connectivity of an
unavailable tunnel is restored, the hello protocol brings up the link.
10. (Optional) If the hello protocol is active, enter a value for the HELLO INTERVAL and DEAD
INTERVAL text boxes, then click APPLY.
The HELLO INTERVAL text box specifies the interval (number of seconds) between the Hello
packets being sent through the tunnel. The DEAD INTERVAL text box determines the interval
(number of seconds) in which you do not receive an Hello packet before the link status
changes to unavailable.
11. (Optional) Change the logical name of the interface to a more meaningful one by entering
the preferred name in the LOGICAL NAME text box, then click APPLY.
12. From the drop-down list in the SELECT POLICY field, select the policy name that is needed,
then click APPLY.
This action displays a new table, LINKED POLICY.
13. From the drop-down list in the SOURCE FILTERS column, select a filter name that
corresponds to the source of the traffic that this policy will protect, then click APPLY.
Repeat this operation to add as many filters as necessary. Click APPLY after each selection.
Note
If there are 40 or more source or destination filters, they do not appear as a list on the
Voyager page. To view a filter that is not displayed, type the name of the filter in the
appropriate field.
14. From the drop-down list in the DESTINATION FILTERS column, select a filter name that
corresponds to the destination of the traffic that will be protected by this policy. Click
APPLY.
Repeat this operation to add as many filters as necessary. Click APPLY after each selection.
15. ((Optional) In the OPTIONS table, select the option INCLUDE END-POINTS IN THE FILTERS,
then click APPLY.
16. Click SAVE to make your changes permanent.
Transport Rule
To create a transport rule:
1. Click CONFIG on the home page.
2. Click IPSec.
3. Click the IPSec Transport Rules Configuration link at the bottom of the page.
The IPSec Transport Rules page appears. The structure of this page is common to both IPv4
and IPv6.
4. Enter the name of the new rule in the NEW TRANSPORT RULE field.
In the SELECT A POLICY field select the desired option from the drop-down list, the click
APPLY.
The new entry appears in the IPSec Transport Rules table.
5. (Optional) To change the policy entry without changing the name of the associated transport
rule, perform the following steps:
a. Click in the blank square next to the current policy entry. Click APPLY. The policy name
is removed.
b. Under the Policy column, select a policy option from the drop-down list and click
APPLY. The new policy is entered without changing the associated transport rule.
6. From the drop-down list in the SOURCE FILTERS column, select a filter name that
corresponds to the source of the traffic that will be protected by this policy. Click APPLY.
Repeat this operation to add as many filters as necessary.
7. Click APPLY after each selection.
Note
Select as source filters only filters that present a single host but no subnet.
Note
If you have 40 or more source or destination filters, they are not displayed as a list on the
Voyager page. To view a filter that is not displayed, type the name of the filter in the
appropriate field.
8. From the drop-down list in the DESTINATION FILTERS column, select a filter name that
corresponds to the destination of the traffic to be protected by this policy.
9. Click APPLY and then click SAVE to make your changes permanent.
10. To delete any entries, check the DELETE check box and click APPLY.
Click SAVE to make delete permanent.
Internet
6. In the FILTERS table, enter site_A as a new filter name in the NEW FILTER text box. Enter
192.68.22.0 in the ADDRESS text box and 24 in the MASK LENGTH text box. Click
APPLY.
The new entry appears in the Filters table.
7. In the FILTERS table, enter site_B as a new filter name in the NEW FILTER text box. Enter
192.68.23.0 in the ADDRESS text box and 24 in the MASK LENGTH text box. Click
APPLY.
Note
In this example, the authentication method is a preshared secret, so you don’t need to select
a certificate.
Nokia Platform 1
(IPSO)
PC 1
eth-s1p3c0 192.68.26.74/30
192.68.26.65/30
Internet
00130
5. Select MD5 from the AUTHENTICATION ALG drop-down list and NONE from the
ENCRYPTION ALG drop-down list.
Click APPLY.
6. In the FILTERS table, enter local as a new filter name in the NEW FILTER text box.
Enter 192.68.26.65 in the ADDRESS text box and 32 in the MASK LENGTH text box.
Click APPLY.
The new entry appears in the Filters table.
7. In the FILTERS table, enter remote as a new filter name in the NEW FILTER text box.
Enter 192.68.26.74 in the ADDRESS text box and 32 in the MASK LENGTH text box.
Click APPLY.
Note
In this example, the authentication method is a preshared secret, so you do not need to
select a certificate.
Configure PC1
You now need to set up PC1. Perform the same steps that you performed to configure Nokia
Platform 1 (IPSO), with the following changes.
1. Step 6; for the local filter, enter 192.68.26.74 in the ADDRESS text box.
2. Step 7; for the remote filter, enter 192.68.26.65 in the ADDRESS text box.
Note
Voyager uses cookies to keep track of HTTP sessions. Voyager cookie based session
management does not store user names or passwords in any form in the cookies. You
should continue to access voyager from a secure workstation.
If you acquire a configuration lock and then close your browser without logging out, the lock
remains in effect. The lock does not expire until the session timeout elapses or someone
manually overrides the lock.
If you acquire a lock while using Voyager, CLI users are also prevented from making changes
(as well as other Voyager users). The reverse is also true—a lock acquired by a CLI user
prevents Voyager users (and other CLI users) from making configuration changes on the
appliance.
For instructions about how to override a configuration lock, see “Overriding Configuration
Locks.”
Note
Your browser must be configured to accept cookies.
Voyager session management is enabled by default. To enable the feature if Voyager session
management is disabled follow the procedure below.
1. Click CONFIG on the home page.
2. Click the Voyager Web Access link in the Security and Access Configuration section.
3. Click YES in the ENABLE COOKIE BASED SESSION MANAGEMENT Field.
4. Click APPLY.
A new login window opens. See “Logging In with Exclusive Configuration Lock” and “Logging
In without Exclusive Configuration Lock.”
Note
Enabling exclusive configuration lock in Voyager prevents you from using the IPSO
command line interface to configure the system while the session is in progress.
Note
Only users with read/write access privileges are allowed to override an exclusive
configuration lock (users with Uid 0 and Gid 0).
Chapter Contents
Configuring IP Clustering in IPSO
Overview
IP Clustering Description
Upgrading IPSO in a Cluster
Managing a Cluster
Modifying a Rule
Deleting a Rule
Configuring Aggregation Classes
Aggregation Class Description
Deleting a Client ID
Overview
This section describes IPSO’s clustering feature and provides instructions for configuring
clusters. It includes information about upgrading from IPSO 3.6 to IPSO 3.7 or later if you have
a cluster configured with IPSO 3.6, and it also presents information about how to configure
Check Point’s VPN-1 NG to work with an IPSO cluster.
IP Clustering Description
IPSO 3.6 and later lets you create firewall/VPN clusters that provide fault tolerance and dynamic
load balancing. A cluster consists of multiple appliances (nodes) that share common IP
addresses, and it appears as a single system to the networks connected to it.
A cluster continues to function if a node fails or is taken out of service for maintenance
purposes. The connections being handled by the failed node are transferred to one of the
remaining nodes.
IPSO clusters are also scalable with regard to VPN performance—as you add nodes to a cluster,
the VPN throughput improves.
IPSO clusters support a variety of Check Point VPN-1 NG NG AI features, including:
Synchronizing state information between firewalls
Firewall flows
Network address translation
VPN encryption
Note
All cluster nodes must run the same versions of IPSO and VPN-1 NG.
Note
The IP2250 appliance does not support IP clustering.
Example Cluster
The following diagram shows a cluster with two nodes, firewall A and firewall B. The cluster
balances inbound and outbound network traffic between the nodes. If an internal or external
interface on one of the nodes fails, or if a node itself fails, the existing connections handled by
the failed node are not dropped—the other node processes them. The other node continues to
function and handle all of the traffic for the cluster.
Internal
Network
Internal
Primary Cluster Protocol
Router
Network:192.168.3.0
Cluster IP: 192.168.3.10
192.168.1.0
192.168.1.10 192.168.1.10
192.168.2.10 192.168.2.10
192.168.2.0
Secondary Cluster Protocol
VPN-1/FireWall-1
Network: 192.168.4.0
Synchronization Network
External Cluster IP: 192.168.4.10
(Secured Network)
Router
Internet
Routers connected to an IPSO cluster must have appropriate static routes to pass traffic to the
cluster. In this example:
The external router needs a static route to the internal network (192.168.1.0) with
192.168.2.10 as the gateway address.
The internal router needs a static route to the external network (192.168.2.0) with
192.168.1.10 as the gateway address.
The IP addresses shown in boldface are cluster IP addresses, addresses shared by multiple
interfaces in the cluster.
IPSO uses the cluster protocol networks shown in the diagram for cluster synchronization and
cluster management traffic. If a primary cluster protocol interface fails on a node, the node uses
its secondary cluster protocol interface, and service is not interrupted. Nokia recommends that
these networks be separate networks that are dedicated to this purpose (as shown here).
IPSO’s cluster management features allow you to configure firewall A and B as a single virtual
device, and IPSO also lets you easily set up automatic configuration of cluster nodes.
In this and similar diagrams, switches and hubs are not shown for the sake of simplicity.
Firewall A Firewall B
Any changes you make in Voyager or Cluster Voyager are immediately reflected in the CLI and
CCLI. The reverse is also true—settings made in the CLI or CCLI are immediately reflected in
Voyager or Cluster Voyager.
Cluster Terminology
This section explains the terms used in IPSO clustering.When applicable, it references the
example cluster.
CCLI: Cluster CLI—A feature that lets you centrally manage all the nodes in a cluster as a
single virtual system using one command-line session.
Cluster administrator: When you log into a Nokia appliance with the user name cadmin, you
log in as a cluster administrator.
If you are using a browser, the system displays Cluster Voyager.
If you are using the command shell and enter clish, the system starts the CCLI.
Cluster ID: A user-specified number that uniquely identifies the cluster within the broadcast
domain. Every node shares this ID number. The range is 0 to 65535.
If there is more than one cluster in the same network, each cluster must have a unique ID. In the
example cluster, the ID is 10.
Cluster IP address: A unicast IP address that every node in the cluster shares. Each interface
participating in a cluster must have an associated cluster IP address.
The example cluster has four cluster IP addresses:
192.168.1.10 is the cluster IP address of the internal interfaces.
192.168.2.10 is the cluster IP address of the external interfaces.
192.168.3.10 is the cluster IP address of the primary cluster interface.
192.168.4.10 is the cluster IP address of the secondary cluster interface.
Cluster MAC address: A MAC address that the cluster protocol installs on all nodes. Only the
cluster master responds to ARP requests that routers send to cluster IP addresses. The cluster
MAC address makes the cluster appear as a single device at the OSI layer two level.
Cluster master: The master node plays a central role in balancing the traffic among the cluster
nodes.The cluster determines which node is the master according to the following criteria.
In forwarding mode the master receives all the incoming packets and may forward them to
the other nodes for processing.
In this mode the master is the active node with the highest performance rating. If
performance ratings are equal on all nodes, the master is the first node of the cluster.
In the multicast modes, all the nodes receive all the incoming packets. The master
determines which nodes should process each packet and provides that information to the
other nodes. Nodes simply drop packets that they should not process.
In these modes, the master is the node that joins the cluster first.
Note
See “Clustering Modes”for more information about this feature.
Note
These interfaces should be internal, and Nokia also recommends that the cluster protocol
networks be dedicated networks—that is, you should not use a network that carries
The cluster protocol interfaces can also be used for VPN-1 NG synchronization traffic. For more
information about how to configure VPN-1 NG for clustering, see “Configuring VPN-1 NG for
Clustering.”
The following list explains the roles of primary and secondary cluster interfaces:
Primary cluster protocol network/interface: Each node must be connected to the primary
cluster protocol network. The interface a node uses to connect to this network is its primary
cluster protocol interface. In the example cluster, the primary interface is eth-s3p1.
If you do not use a dedicated network as the primary network—that is, if the primary
network all carries data traffic, see “Configuring VPN-1 NG for Clustering” for
configuration information.
If the primary interface fails on a node and you have not configured a secondary network,
the node is removed from the cluster. If it is the master, one of the remaining nodes becomes
the new master.
Secondary cluster protocol network/interface: Each node may also be connected to an
(optional) secondary cluster protocol network. The interface a node uses to connect to this
network is its secondary cluster protocol interface. In the example cluster, the secondary
interface is eth-s4p1.
If a primary interface fails on a member, the cluster synchronization and management traffic
fails over to the secondary interface. In this event, the other nodes are not affected—they
continue to use their primary interfaces to communicate with the master. If a primary
interface fails on the master, all the other nodes must use the secondary protocol network to
communicate with the master.
If the primary and secondary cluster protocol interface fails on a node, the node is removed
from the cluster. If it is the master, one of the remaining nodes becomes the new master.
Cluster Voyager: A feature that lets you centrally manage all the nodes in a cluster as a single
virtual system using one browser session.
Joining: When becoming part of a cluster, a system can copy a variety of configuration settings
from another cluster node (so you don’t have to configure these settings manually). This is called
joining. When a system joins a cluster, it copies the configuration settings of the join-time shared
features. Joining saves you time by allowing you to configure one node and then have the other
nodes copy the appropriate configuration settings when they join the cluster.
Join-time shared features: You may want to have many configuration settings be identical on
each cluster node. Voyager makes this easy for you by letting you specify which features will be
configured the same on all cluster nodes. The features that can be configured this way are called
join-time shared features, meaning that their configurations can be shared across cluster nodes
during the joining process.
Clustering Modes
IPSO clusters have three modes of operation. Nokia provides this choice so that IPSO clusters
can work in any network environment:
In multicast mode each cluster node receives every packet sent to the cluster and decides
whether to process it based on information it receives from the master node. If the node
decides not to process the packet (because another node is processing it), it drops the packet.
This mode usually offers better throughput because it uses the bandwidth of the production
networks more efficiently.
Multicast mode uses multicast MAC addresses for each of the nodes. If you use this mode,
routers and servers adjacent to the cluster (either connected directly or through a switch or
hub) must be able to accept ARP replies that contain a multicast MAC address. Switches
connected directly to the cluster must be able to forward packets destined for a single
(multicast) MAC address out multiple switch ports. See “Considerations for Clustering” for
more information about the requirements for routers and switches when using multicast
mode.
Multicast mode with IGMP offers the benefits of multicast mode with an additional
improvement. When you use multicast mode (without IGMP), the switches connected to the
cluster broadcast the data frames sent to the multicast MAC addresses of the cluster (unless
they are configured not to do so). This means that any other devices attached to the same
switches as the cluster also receive the traffic that is sent to the cluster. If the switches
perform IGMP snooping (elicit or listen for IGMP messages), you can prevent this from
happening by using multicast mode with IGMP.
When you use this mode, each cluster interface joins an IP multicast group, and IPSO bases
the cluster multicast MAC addresses on the IP multicast group addresses. You can change
the default IP multicast group addresses assigned by IPSO. If you do so, the new addresses
must be in the range 239.0.0.0 to 239.255.255.255. (See RFC 2365 for information about
this range of addresses.)
In forwarding mode the master cluster node initially receives all the packets sent to the
cluster and decides which node should process the packet. If it decides that another node
should handle the packet, it forwards the packet to that node. Otherwise, the master
processes the packet itself.
Use forwarding mode if the routers and switches on either side of the cluster do not support
multicast MAC addresses.
Note
All cluster nodes must use the same mode.
Caution
Avoid changing the cluster mode while a cluster is in service. If you change the cluster
mode of a single node, the node leaves the cluster. If you change the mode on all the
Note
For information about the requirements for using VPN-1 NG in an IPSO cluster, see
“Configuring VPN-1 NG for Clustering.”
When you configure an IPSO cluster, take into account the considerations explained in the
following sections.
Network Environment
You can use static routing, OSPF, or BGP to forward traffic through a cluster.
If you use static routing, devices that need to send traffic through a cluster must have a
static route that uses the appropriate cluster IP address (internal or external) for the
route’s gateway address. For example, a router on the internal side of a cluster should use
an internal cluster IP address as the gateway address.
If you use OSPF, only the master exchanges OSPF messages with the external routers.
If you use BGP, it runs only on the master. If a failover occurs, BGP stops running on the
failed master and establishes its peering relationships on the new master. You must
configure a cluster IP address as a local address when you run BGP in clustered mode.
A cluster cannot use OSPF or BGP to forward traffic over VPN tunnels.
If you use a multicast mode, adjacent devices (either connected directly or through a switch
or hub) must be able to accept ARP replies that contain a multicast MAC address. See
“Changing ARP Global Parameters” in the information about configuring interfaces for
instructions about how to configure a Nokia appliance to accept these replies.
Note
If there is no router between the cluster and host systems (PCs or workstations), the
hosts must be able to accept ARP replies with multicast MAC addresses. You can avoid
this requirement by adding a static ARP entry to each host that includes the cluster IP
address and multicast MAC address of the internal cluster interface.
If you use a multicast mode, the switches connected to the cluster nodes must be able to
forward packets destined for a single (multicast) MAC address out multiple switch ports
simultaneously. Many switches do this by default.
If you use a two-node cluster, use switches (recommended) or hubs to connect the cluster
protocol networks. This will ensure proper failover in the event that one of the nodes drops
out of the cluster. Do not directly connect the cluster protocol interfaces using a crossover
cable.
For performance purposes, Nokia recommends that you do not use hubs to connect a cluster
to user data networks. If possible, use switches for these connections. (If you need to
troubleshoot a cluster that uses a multicast mode, you might want to temporarily replace
switches with hubs to simplify your configuration.)
You can create multiple clusters in the same LAN or VLAN (broadcast domain). The
clusters are distinguished by their cluster IDs.
Other Considerations
If a cluster will be in service as soon as it is activated, you should configure and enable
VPN-1 NG on each node before they become part of the cluster. Add nodes to the Check
Point cluster (using Check Point software) after they have successfully joined the IPSO
cluster.
Transparent mode is not supported on cluster nodes.
Router services are not supported, with the exception of NTP.
An IPSO system cannot participate in more than one cluster at one time.
IPSO clusters support:
Multiple internal and external network connections
The primary and secondary cluster protocol networks should have bandwidth of at least 100
mbps.
IPSO clusters do not support network types other than Ethernet.
All of the interfaces on a cluster node do not have to participate in the cluster. Interfaces that
do not participate in the cluster can be network types other than Ethernet.
All the nodes must have the same number of interfaces participating in the cluster, and the
cluster interfaces must be connected to the same networks.
Note
Nokia recommends that you use dedicated networks as the cluster protocol networks—that
is, the cluster protocol networks should not carry production traffic. If you configure a cluster
Note
Make sure that you use a version of VPN-1 NG that is compatible with the IPSO version that
you upgrade the cluster to. If you are using an incompatible version of VPN-1 NG, upgrade
to a compatible version after you upgrade to the later version of IPSO. See the IPSO
Release Notes and Getting Started Guide to find out which versions of VPN-1 NG are
compatible with the version of IPSO you are installing.
A cluster functions if its master runs IPSO 3.6 and one or more nodes run IPSO 3.7 or later, but
Nokia strongly recommends that you upgrade all the nodes of your IPSO 3.6 clusters. IPSO
supports a 3.6 master with 3.7 or later members to allow a cluster to remain in service during an
upgrade.
To upgrade IPSO on cluster nodes and ensure that there are the minimum number of master
transitions, follow the steps below. This procedure assumes that you are upgrading a three-node
cluster in which node C is the master. Under this procedure, two cluster nodes are in service at
all times.
Note
You should upgrade the master last.
Note
Performing this steps ensures that there will be no interruption in service when node C
restarts.
Creating a Cluster
1. Click CONFIG on the home page.
2. Click Clustering Setup in the Traffic Management section. The Clustering Setup
Configuration page appears.
3. Enter a cluster ID (0-65535).
4. Enter a password for the user cadmin.
The password must have at least six characters. You must use the same password on each
node that you add to the cluster. This is also the password that you use to log into Cluster
Voyager.
5. Enter the password for cadmin again (for verification).
6. Click APPLY.
7. Click Manually Configure IPSO Cluster.
Configure the cluster as explained in the following sections.
Configuring an Interface
To activate the cluster protocol, you must select at least two Ethernet interfaces. One of the two
must be an internal or external interface (not a primary or secondary cluster interface). The other
interface must be the primary interface.
Note
Nokia recommends that you select another interface as a secondary cluster protocol
interface. Remember that the primary and secondary cluster protocol networks should not
carry any production traffic.
The Interfaces Configuration table lists all the Ethernet interfaces on the system that are
configured with IP addresses. The table displays the status and IP address of each interface. To
add Ethernet interfaces to this list or to activate inactive interfaces, go to the Interface
Configuration page.
To include an interface in the cluster:
1. In the Select column, select YES.
2. Enter the cluster IP address.
The address must be in the same network as the IP address of the interface you are
configuring. This is a common IP address that each node will share.
3. Repeat the above steps for the rest of the interfaces that will participate in the cluster.
4. For the interface that will serve as the primary cluster protocol interface for the node, click
the YES button in the Primary Interface column.
The primary interfaces of all the cluster nodes must belong to the same network. This
network should not carry any other traffic.
5. For the interface that will serve as the secondary cluster protocol interface for the node, click
the YES button in the Secondary Interface column.
The secondary interfaces of all the cluster nodes must belong to the same subnet. This
subnet should not carry any other traffic unless you use it to carry firewall synchronization
traffic. (See “Configuring VPN-1 NG for Clustering” for information about selecting the
firewall synchronization network.) Secondary interfaces are optional.
6. If you are using multicast with IGMP mode and do not want to use the default IP multicast
group address, enter a new address in the range 239.0.0.0 to 239.255.255.255.
7. Click APPLY.
Note
Be sure to enable firewall monitoring before you put the cluster into service (assuming that
you are using VPN-1 NG).
Note
If you want to support VPNs with remote non-Check Point gateways, do not check the
“Support non-sticky connections” option for these connections in Check Point’s Smart
Dashboard.
Note
See “Clustering Example With Non-Check Point VPN” for an example of configuring a
cluster to support a VPN with a non-Check Point gateway.
Using IP Pools
IPSO clusters support the use of IP pools (address ranges), which are useful for solving certain
routing problems. For example, you might want to use an IPSO cluster (and VPN-1 NG) to
create a VPN but not want to route unencrypted traffic through the cluster.For this purpose, you
can use a configuration similar to the one shown in the following diagram:
Internal
Router
Primary Cluster Protocol
Network 192.168.3.0
Internal Cluster IP
Address
192.168.1.0
192.168.1.10 192.168.1.10
192.168.1.2 192.168.3.1 192.168.1.3 192.168.3.2 192.168.1.1
IP Pool: 10.1.2.0/24 IP Pool: 10.1.3.0/24 Default Gateway
Firewall A Firewall B
The purpose of this configuration would be to route the outgoing unencrypted traffic through the
default gateway and route the outgoing encrypted traffic through the cluster. Traffic that passes
through the cluster is NATed so that the source address of a packet is translated to one of the
addresses in the IP pool of the cluster node that handles the connection.
How you configure IP pools depends on whether a non-Check Point gateway participates in the
VPN:
If the other end of the tunnel is also a Check Point gateway, you do not need to configure the
IP pools in IPSO. Simply follow the instructions in “Using IP pools when only Check Point
gateways are involved.”
If the other end of the tunnel is not a Check Point gateway, you must follow the instructions
in “Using IP pools when only Check Point gateways are involved” and also configure the IP
pools in IPSO, as explained in “Configuring IP Pools In Cluster Voyager.”
Using IP pools when only Check Point gateways are involved To set up the
configuration shown in the previous diagram, you would:
Configure the IP pools in VPN-1 NG.
On the internal router:
create a default route to the Internet with 192.168.1.1 (the default gateway) as the
gateway address.
create static routes to the IP pool networks with the internal cluster IP address
(192.168.1.10) as the gateway address. Do not use the real IP addresses of the internal
cluster interfaces (192.168.1.2 and 192.168.1.3) as gateway addresses. In the example
network, the internal router has the following static routes:
route: 10.1.2.0/24, gateway: 192.168.1.10
Configuring IP Pools In Cluster Voyager If you want to use IP pools with a VPN in
which a non-Check Point gateway participates, you must configure the pools in IPSO as well as
in VPN-1 NG. You must configure all the pools on all the nodes, so it is easiest and less error
prone to use Cluster Voyager (or the CCLI) for this task. To configure IP pools in Cluster
Voyager, follow this procedure after you enable support for non-Check Point gateways:
1. In the NETWORK ADDRESS field under ADD NEW IP POOL, enter the network that the IP
pool addresses will be assigned from.
If you were configuring firewall A in the cluster shown in the previous diagram, you would
enter 10.1.2.0.
Note
To ensure routing symmetry, the IP pool networks must be different on different cluster
nodes.
What is Sharable?
Join-time shared features are not directly related to clustering itself. They are features used on an
IPSO system regardless of whether it is part of a cluster.
For example, if you want each cluster node to have the same static routes, you configure the
static routes on the first cluster node and make sure that static routes are selected as a sharable
feature. When other nodes become part of the cluster, those routes are configured on them also.
If the system that is joining the cluster already has static routes configured, they are retained.
The routes copied as a result of the joining process are added to the list of static routes.
If there is a conflict between configuration settings on the existing node and the joining system,
the settings on the joining system are changed to those of the master node. For example, assume
that you have a cluster with nodes A (the master) and B in which DNS is a shared feature and the
domain name on node A is company-name.com. If a third node (C) joins the cluster and its
domain name is foobar.com before it joins, foobar.com is replaced by company-name.com
during the joining process.
If you change the domain name on node C back to foobar.com, the domain name remains
foobar.com unless any of the following occurs:
node C leaves and rejoins the cluster
node B becomes the master
a cadmin user changes the domain name (while logged into any node)
In the first two situations, node C will once again copy the settings for all the join-time shared
features, and company-name.com will replace foobar.com as the domain name. In the third
situation, the domain name is changed on all the nodes.
If you want to be able to easily reset the configuration of node C to what you had configured
manually, simply save the desired configuration on C. If the active configuration changes
because of join-time sharing, you can reload the desired configuration on C from the saved
configuration file. See “Managing Configuration Sets” for information about saving and loading
configuration files.
If node C becomes the master in the previous example, then its settings for join-time shared
features are copied to the other nodes. For example, foobar.com would replace company-
name.com on nodes A and B.
Caution
Be aware that if node C becomes the master in this scenario, its settings override
conflicting settings on the other nodes, which could result in configuration issues. The
best practice is to avoid conflicts in the configurations of join-time shared features.
If a feature on a joining system has a setting and the feature is not configured on the master, the
joining system retains its setting. For example, assume that you have a two node cluster in which
DNS is a shared feature but no domain name is configured on the master. If a third system joins
the cluster and its domain name is foobar.com before it joins, it retains that domain name after it
joins.
Caution
After you click APPLY (the next step), you cannot conveniently make features sharable
again if you make them unshared in this step. Make sure that the settings are correct
before you proceed.
3. Click APPLY.
Note
If you do not configure a firewall on the node before you activate the cluster, you must click
DISABLE next to ENABLE MONITORING OF FW-1/VPN-1 NG? before you activate the
cluster. After the cluster is active, change this setting to ENABLE. When this is set to
ENABLE, the cluster monitors the firewall. If the firewall fails on a node, that node drops out
of the cluster and stops forwarding traffic.
Before you activate the cluster, click SAVE to store all the cluster configuration settings in the
configuration database on the hard disk.
To make the cluster active, click UP in the CLUSTER STATE field of the Cluster Status table.
You can make the cluster active only if the node has:
No dynamic routing
No VRRP or router services
At least two configured interfaces participating in the cluster, including one primary
interface
You receive error messages if the node does not meet these requirements.
Caution
For security reasons, you should never add a system that is not running VPN-1 NG to a
cluster that is in service. This should only be done in a test environment.
Recommended Procedure
Nokia recommends that you follow this general procedure when building a cluster:
1. Fully configure the first cluster node and make sure that all the appropriate features are
cluster sharable.
2. Make sure that all of the join-time shared features are configured appropriately on the first
node.
Remember that joining nodes inherit the configuration settings for each cluster sharable
feature.
3. Create a cluster on another system.
4. Join the other system to the cluster.
Note
This must be the same password that you entered for cadmin when you created the
cluster on the first node.
7. Click APPLY
8. In the CLUSTER NODE ADDRESS field, enter an IP address that meets the following criteria:
You should use an address of an interface on the cluster node that you configured first.
Note
Using an interface on the first system that you configured for clustering each time
you join another system will make sure that all nodes are configured appropriately.
Managing a Cluster
You can choose between two different approaches to making configuration changes on cluster
nodes:
You can make changes that are implemented on all the nodes simultaneously. To make
changes in this way, you use Cluster Voyager or the CCLI. (See the IPSO CLI Reference
Guide for information about using the CCLI.)
Note
Nokia recommends that you use Cluster Voyager or the CCLI to change cluster settings or
to make changes to join-time shared features.
You can make configuration changes on individual nodes. If you want to make the same
changes on other nodes, you must log into them (as admin) and make the same changes.
There are some features that can be modified only by logging into individual nodes as
admin. These are explained in “Removing a Node from a Cluster,” “Changing Cluster
Interface Configurations,” and “Deleting a Cluster Configuration.”
Caution
If a feature has been specified as cluster sharable and you change its configuration
while logged into a node as admin, the change is implemented on that node only.
Making changes this way can lead to confusing or inconsistent configurations.
Note
If you forget the cadmin password, follow the instructions in “If you forget the cadmin
password.”
If either of the following conditions are true, you can log into Cluster Voyager, but you
cannot make configuration changes unless you break the configuration lock:
Someone else is logged into one of the cluster nodes as admin (using Voyager or the CLI)
and has acquired an exclusive configuration lock
If you forget the cadmin password If you forget the password for the cadmin user, you
are not able to start Cluster Voyager. To recover from this situation, follow these steps:
1. Log into one of the cluster nodes as admin using a command line session.
2. Start the CLI by entering
clish
3. Enter
set user cadmin oldpass “” newpass new_password
The new password must have at least six characters.
4. Log out of the CLI by entering
exit
5. Repeat step 1 through step 4 on the other cluster nodes.
6. Log into Cluster Voyager using the new password.
Monitoring a cluster
If you click MONITOR on the Cluster Voyager home page, you see a number of links to pages
that you can use to monitor the status of the cluster. These pages present status information for
all the nodes. For example, the IPSO Cluster Process Utilization page shows the status of
processes on each node.
In forwarding mode, cluster members use the performance rating to elect the best performing
system as the master. The cluster master receives all the packets for the cluster first, so the
performance of the master affects the performance of the whole cluster. If a joining system has a
higher rating than the other nodes, it becomes the master. If more than one system have the same
performance rating, the first system to join the cluster is the master.
The cluster master takes the performance rating of the members into account when assigning
workload (in all modes). Nodes with higher performance ratings receive a larger share of the
workload than lower performing nodes.
The default performance rating for a system reflects its performance relative to that of other
Nokia platforms. You can adjust the performance rating to change the amount of work a system
is assigned relative to other members. If a cluster uses forwarding mode, you can adjust the
performance rating to force a particular node to be the master (which will also have the effect of
giving that node a larger share of work).
To change the performance rating, enter a number in the PERFORMANCE RATING field (the
range of values is 0 through 65535), then click APPLY and SAVE.
If you change the master by adjusting the performance rating, or if the master changes because a
joining system has a higher rating than the other nodes, the settings of join-time shared features
are propagated across the cluster at that point. The settings on the new master are replicated on
the other nodes.
Note
Do not change the performance rating of the master to 0. This will cause the traffic load to be
distributed unequally across the cluster.
Note
After you click APPLY, you might see a message that reads Joining in progress. If so,
refresh your browser. The message disappears and you can proceed by clicking click
APPLY and then SAVE.
Note
Nokia recommends that you do not make changes to cluster settings or join-time shared
features on individual nodes—use Cluster Voyager or the CCLI to make these changes.
This will help you ensure that all the nodes are configured consistently.
When you log in as cadmin and change a setting of a join-time shared feature, the change is
made across the cluster even if you did not share the feature when you created the cluster.
However, systems that join the cluster later do not copy the configuration settings for that
feature.
When you make changes to features that you removed from the list of join-time shared features,
you see the following message:
This feature is not associated with cluster xxx.
Any changes made would be propagated to all the cluster nodes.
This message is alerting you to the fact that the change will be implemented on all the current
nodes but systems that join later will not implement the change.
Note
Some settings of cluster shareable features cannot be configured as cadmin. For example,
you cannot use Cluster Voyager to set SSH host and identity keys. To configure these
settings, you must log into the individual cluster nodes as admin.
Note
You cannot upgrade a cluster directly from IPSO 3.6 to IPSO 3.8 or later. You must upgrade
from IPSO 3.6 to IPSO 3.7 and then upgrade to 3.8 or later.
If you want to upgrade a cluster from IPSO 3.7 or later to a later version of IPSO (or revert to the
earlier version), Nokia recommends that you use Cluster Voyager to change the IPSO image on
all the cluster nodes. To download and install an image in a cluster, follow these steps:
1. On the Cluster Configuration page, click Install New IPSO Image (Upgrade).
2. Use the Cluster New Image Installation (Upgrade) page to download the new IPSO image.
3. After the new image has been successfully installed on all the nodes, you need to reboot the
nodes so that they will run the new image. When the system prompts you to reboot the
cluster, click Manage IPSO images (including REBOOT).
4. On the IPSO Cluster Image Management page, click the REBOOT button at the bottom of the
page.
Note
Clicking this button allows you to perform a cluster safe reboot, which ensures that no
traffic is dropped while the cluster reboots (see “Rebooting a cluster”). If you manually
reboot each node by clicking the REBOOT buttons associated with the individual nodes,
there might be a period in which all the nodes are out of service.
Rebooting a cluster
When you click Reboot, Shut Down System on the main configuration page in Cluster Voyager,
you see the Cluster Reboot, Shut Down System page. At the bottom of this page is the Cluster
Traffic Safe Reboot link. If you click this link and then click APPLY, the cluster nodes are
rebooted in a staggered manner. The process is managed so that only one node is out of service
at a time. For example, if you reboot a three-node cluster, one of the nodes controls the rebooting
of the other nodes. This node is called the originating node.
The originating node reboots each of the other nodes in order. It waits until each node has
successfully rebooted and rejoined the cluster before rebooting the next node. Once all the other
nodes have rebooted and rejoined, the originating node reboots itself.
Note
The originating node is the node that you are logged into. It might not be the cluster master.
The following is an illustration of this process in a three node cluster with nodes A, B, and C, in
which C is the originating node.
1. If the node A restarts successfully and rejoins the cluster, node B restarts.
If node A does not reboot and rejoin the cluster successfully, the cluster reboot process is
halted and the remaining two nodes continue functioning. You should investigate and
resolve the problem that prevented node A from restarting and rejoining the cluster.
2. If node A successfully restarts and rejoins the cluster but node B does not complete the
process, the cluster reboot process stops and nodes A and C continue functioning as a
cluster.
3. If the nodes A and B complete the process, the node C restarts. As soon as it does, one of the
other nodes becomes the originating node and the cluster continues to function.
If the node C restarts successfully, it rejoins the cluster.
If the node C does not restart successfully, the other two nodes continue to function as a
cluster.
Caution
Do not log out of Cluster Voyager, end your browser session, or otherwise break your
connection with the cluster while a cluster safe reboot is in progress. Doing so causes
the nodes that you are not logged into to leave the cluster. (If you logged into Cluster
Voyager using a cluster IP address, you are logged into the master.) If this occurs,
manually rejoin the systems to the cluster.
You can also reboot all the cluster nodes simultaneously. In this case, your Cluster Voyager
session does not stay active throughout the reboot process. To reboot all the nodes
simultaneously:
1. On the main configuration page in Cluster Voyager, click Reboot, Shut Down System.
2. Click REBOOT (do not click Cluster Traffic Safe Reboot).
Note
Any time you make a change to the cluster interface configuration, the node leaves and
attempts to rejoin the cluster.
You can select only one primary interface for each node, and the interface you select should
be on a dedicated or internal network. Click APPLY and SAVE.
5. To change the cluster IP address for an interface, enter a new IP address in the CLUSTER IP
ADDRESS field for that interface, then click APPLY and SAVE.
Configuring NTP
There are two approaches to configuring NTP in a cluster:
Using a device outside the cluster as the NTP server.
In this case you use the IP address of the server when configuring NTP on the cluster nodes.
Using the cluster master node as the NTP server.
In this case you use one of the cluster IP addresses when configuring NTP on the cluster
nodes. If the master node fails and another node becomes the master, the new master
becomes the time server.
Caution
Do not assign a specific node to be the time server for the cluster. If you configure NTP
this way and the master node fails, the other nodes will not get their time from another
server. This situation could lead to problems with firewall synchronization.
Note
Nokia recommends that you keep NTP as a cluster sharable feature (the default setting) so
that if a node leaves and rejoins the cluster it will automatically obtain the proper NTP
settings.
Set the gateway cluster object address to the external cluster IP address (that is, the
cluster IP address of the interface facing the Internet).
Add a gateway object for each Nokia appliance to the gateway cluster object.
In the General Properties dialog box for the gateway cluster object, do not check
CLUSTERXL.
Configure state synchronization:
Enable state synchronization and configure interfaces for it.
The interfaces that you configure for state synchronization should not be part of a VLAN
or have more than one IP address assigned to them.
Enable antispoofing on all the interfaces in the cluster, including those used for firewall
synchronization and cluster synchronization.
Set the options the 3rd Party Configuration tab as follows:
If you want to use NAT, VPN, or SecuRemote, Set the Availability Mode of the gateway
cluster object to Load Sharing. Do not set it to High Availability.
In the pull-down menu, select Nokia IP Clustering.
Note
The firewall synchronization network should have bandwidth of 100 mbps or greater.
Connection synchronization is CPU intensive, and Nokia recommends that you carefully
choose which traffic should have its connections synchronized. For example, you might
choose to not synchronize HTTP traffic.
If a cluster can no longer synchronize new connections because it has reached its limit, it can
fail. If you see a large number of firewall synchronization error messages (indicating that the
cluster has reached the limit of connections it can synchronize), you can configure VPN-1 to
drop connections that exceed the limit by entering the following commands at the console:
fw ctl set int fw_sync_block_new_conns 0
fw ctl set int fw_sync_ack_seq_gap 128
Entering these commands configures the cluster to give preference to maintaining the
synchronization state of the existing connections over establishing new connections.
The following sections explain the steps you would perform to configure this cluster.
Internal
Router
Primary Cluster Protocol
192.168.1.5 Network:192.168.3.0
Cluster IP: 192.168.3.10
192.168.1.0
Internal
192.168.1.10 192.168.1.10 192.168.1.10
Cluster IP
.1 .1 .2 .2 .3 .3
eth-s1p1 eth-s3p1 eth-s1p1 eth-s3p1 eth-s1p1 eth-s3p1
Cluster Firewall A Firewall B Firewall C
(ID 10)
eth-s2p1 eth-s4p1 eth-s2p1 eth-s4p1 eth-s2p1 eth-s4p1
.1 .1 .2 .2 .3 .3
External 192.168.2.10
192.168.2.10 192.168.2.10
Cluster IP
192.168.2.0
Secondary Cluster Protocol
VPN-1/FireWall-1 Network: 192.168.4.0
192.168.2.5 Cluster IP: 192.168.4.10
Synchronization Network
External
Router
Note
The cluster IP address must be in the same subnet as the real IP address of the interface.
12. In the Primary Interface column, click YES for eth-s3p1 to make it the primary cluster
protocol interface for the node.
13. In the Secondary Interface column, click YES for eth-s4p1 to make it the secondary cluster
protocol interface for the node.
14. Under FireWall Related Configuration, set the firewall check so that IPSO does not check to
see if Firewall-1 is running before it activates the cluster.
This example assumes that you have not enabled Firewall-1 before configuring the cluster.
15. Make sure that are selected to be shared across the cluster.
16. Change the cluster state to ON.
17. Click APPLY.
18. Click SAVE.
19. Configure static routes from this node to the internal and external networks using
192.168.1.5 and 192.168.2.5 as gateway addresses (next hops).
20. On nodes B and C, configure interfaces with real IP addresses in each of the four networks
shown in the example.
21. Join nodes B and C to the cluster.
These nodes will copy the configuration information you entered on node A, including the
static routes to the internal and external networks.
Internal
Router
Primary Cluster Protocol
192.168.1.5 Network:192.168.3.0
Cluster IP: 192.168.3.10
192.168.1.0
.1 .1 .2 .2 .3 .3
eth-s1p1 eth-s3p1 eth-s1p1 eth-s3p1 eth-s1p1 eth-s3p1
Cluster Firewall A Firewall B Firewall C
(ID 10)
eth-s2p1 eth-s4p1 eth-s2p1 eth-s4p1 eth-s2p1 eth-s4p1
.1 .1 .2 .2 .3 .3
VPN Tunnel
Internet
Tunnel Endpoint:
10.1.2.5
Non-Check
10.1.1.0
Point VPN
Network
Gateway
This example cluster is very similar to the previous example. The additional elements are:
Hosts in the 10.1.1.0 network (the remote encryption domain) use a VPN tunnel to access
the 192.168.1.x network (connected to the internal router).
The VPN tunnel end points are the external cluster IP address and the external address of the
remote non-Check Point VPN gateway.
Here are the steps you would perform to configure the tunnel:
1. Follow the steps under “Configuring the Cluster in Voyager.”
2. Log into the cluster using Cluster Voyager.
3. Click the option for enabling non-Check Point gateway and client support on the Clustering
Setup Configuration page.
4. In the Add New VPN Tunnel section, enter 10.1.1.0 in the NETWORK ADDRESS field.
5. In the MASK field, enter 24.
6. In the TUNNEL END POINT field, enter 10.1.2.5.
7. Click APPLY.
8. Click SAVE.
9. Configure the same tunnel in VPN-1 NG.
For more information, see “Configuring VPN-1 NG for Clustering” and the Check Point
documentation.
supplied IP TOS as an output queue lookup. Use the Bypass option to circumvent the classifier
and policer for selected interfaces.
1. Click CONFIG on the home page.
2. IPSO supports both the IPv4 and IPv6 protocols.
a. For IPv4 ACLs, click the Access List Configuration link under the TRAFFIC
MANAGEMENT section.
b. For IPv6 ACLs, click the IPv6 link. This takes you to the IPv6 page. Click the Access
List Configuration link under the TRAFFIC MANAGEMENT section.
3. Enter a name for the ACL in the CREATE A NEW ACCESS LIST edit box. Click APPLY.
The Access Control List name, DELETE check box, and BYPASS THIS ACCESS LIST field
appear.
4. To make your changes permanent, click SAVE.
Note
Selecting the "input" direction for a Access Control List with a rule whose action is set to
"prioritize" is equivalent to setting the action to "skip."
Note
Only the default rule appears in the Access Control List until you create your own rule.
fashion. When a match is found, the action associated with that rule is taken, with no further
scanning done for that packet.
The following actions can be associated with a rule that is configured to perform packet filtering:
Accept
Drop
Reject
The following additional actions can also be associated with a rule:
Skip—skip this rule and proceed to the next rule
Prioritize—give this traffic stream preferential scheduling on output
Shape—coerce this traffic’s throughput according to the set of parameters given by an
aggregation class
Rules can be set up to match any of these properties:
IP source address
IP destination address
IP protocol
UDP/TCP source port
UDP/TCP destination port
TCP establishment flags—When selected, traffic matches this rule when it is part of the
initial TCP handshake.
Type of Service (TOS) for IPv4; Traffic Class for IPv6
The following values can be used to mark traffic:
DiffServ codepoint (DSfield)
Queue Specifier (QueueSpec)
Note
The DSfield and QueueSpec field are used to mark and select the priority level.
Masks can be applied to most of these properties to allow wildcarding. The source and
destination port properties can be edited only when the IP protocol is UDP, TCP, or the keyword
"any."
All of these properties are used to match traffic. The packets that match a rule whose action is set
to "prioritize" are marked with the corresponding DSfield and sent to the queue set by
QueueSpec field. The DSfield and QueueSpec field can only be edited when the Action field is
set to "prioritize."
Modifying a Rule
1. Click CONFIG on the home page.
2. IPSO supports both the IPv4 and IPv6 protocols.
a. For IPv4 ACLs, click the Access List Configuration link under the TRAFFIC
MANAGEMENT section.
b. For IPv6 ACLs, click the IPv6 link. This takes you to the IPv6 page. Click the Access
List Configuration link under the TRAFFIC MANAGEMENT section.
3. Click the link for the appropriate Access Control List in the ACL NAME field.
This takes you to the page for that Access Control List.
The following items can be modified:
Action
Aggregation Class
Bypass this Access List
Source IP Address
Source Mask Length
Destination IP Address
Destination Mask Length
Source Port Range
Note
You can specify the Source Port Range only if the selected protocol is either “any,” 6, TCP,
17, or UDP.
Note
You can specify the Destination Port Range only if the selected protocol is either "any," 6,
TCP, 17, or UDP.
Protocol
TCP-Establishment flag—When it is selected, traffic matches this rule when it is part of the
initial TCP handshake. This option applies only to IPv4 ACLs.
Note
You can specify the TCP Establishment flag only if the selected protocol is TCP, 6, or "any."
Note
RFC 791 states that the least significant two bits of the DiffServ codepoint are unused. Thus,
the least significant two bits for any value of the DSfield that you enter in the ACL rule will be
reset to 0. For example, if you enter 0xA3, it will be reset to 0xA0 and the corresponding
packets will be marked as 0xA0 and not 0xA3.
Note
The DSfield and QueueSpec field can be configured only when the rule’s action is set to
"prioritize."
the IPv6 link and then click the Aggregation Class Configuration link under the TRAFFIC
MANAGEMENT section.
3. Enter the name of the aggregation class in the NAME edit box in the CREATE A NEW
AGGREGATION CLASS section.
4. Enter the bandwidth in the MEAN RATE (KBPS) edit box.
5. Enter the burstsize in the BURSTSIZE (BYTES) edit box.
6. Click APPLY.
The aggregation class you have just created appears in the EXISTING AGGREGATION
CLASSES section.
7. To make your changes permanent, click SAVE.
Note
A rule treats traffic as if it were configured for "skip," if the traffic matches a rule whose action
has been set to "prioritize" or "shape" and no Aggregation Class is configured.
Internetwork 0 0xc0 7
Control
Expedited 1 0xb8 6
Forwarding
Best Effort 7 0 0
When you configure an ACL rule to use the priority action, you must configure an Aggregation
Class (AGC). This AGC will function as a policer, that is, non-conforming traffic will be
dropped. You should configure the AGCs so that the aggregate of the NC and EF flows
consumes no more than 50% of the output link bandwidth. This action prevents lower-priority
traffic from being starved. See RFC 2598 for more information. The other policers should also
be configured to prevent the lower-priority queue from being starved.
Internetwork Control traffic, such as routing messages and keepalives, should be configured to
use the IC queue so that it receives precedence over regular IP traffic. Note that locally
originated internetwork control traffic is automatically sent through this queue. See RFC 791 for
more information about Internetwork Control traffic.
A queue class can be configured to maximize device throughput or to minimize prioritized
traffic latency. The QoS functionality is not achieved without a cost. The choice of QoS with
minimal latency is the most costly in terms of forwarding performance, but it allows the least
amount of head-of-line blocking for high priority traffic.
Note
Choose a name (with no spaces) that will allow you to identify the queue’s purpose.
Note
Each queue class can have up to eight queues. Three queues are reserved for internetwork
control, expedited forwarding, and best effort traffic.
5. Enter an integer for the logical identifier used to address each queue you configure within a
queue class in the QUEUE SPECIFIER edit box.
6. For each queue, enter a value for the maximum number of packets that can be queued before
packets are dropped in the MAX QUEUE LENGTH edit box. A value of zero (0) is used to
disable a queue. Neither the network control nor the best effort queue can be disabled.
7. Click APPLY, and then click SAVE to make your changes permanent.
8. To change the name of any of the queue levels 3-7, enter the new name in the LOGICAL
NAME edit box. This name appears in the queue monitoring page.
Note
Choose a name (with no spaces) that will allow you to identify the queue’s purpose.
9. Click APPLY, and then click SAVE to make your changes permanent.
6. Select the configured queue class you want to associate with the interface from the QUEUE
CLASS drop-down window in the QUEUE CONFIGURATION field.
Note
If you do not select a queue class, the default class will be used. The default queue class
has two queues, Internetwork Control and Best Effort.
7. Click APPLY.
8. Click SAVE to make your changes permanent.
Note
The default ATM QoS Descriptor is set to unspecified bit rate; this descriptor cannot be
modified.
Note
You can configure no more than 100 CBR channels per interface. The sum of the Peak Cell
Rate of all the CBR channels on an interface cannot exceed 146Mbs.
5. Click APPLY.
The new ATM QoS Descriptor appears in the EXISTING ATM QOS DESCRIPTORS field.
6. Click SAVE to make your changes permanent.
Note
You can delete an existing ATM QoS Descriptor only after you dissociate it from an existing
permanent virtual channel (PVC). See the steps below.
4. Click APPLY.
5. The ATM QoS Descriptor disappears from the EXISTING QOS DESCRIPTORS field.
6. Click SAVE to make your changes permanent.
If the ATM QoS Descriptor that you want to delete is associated with an existing PVC complete
the steps below.
1. Click CONFIG on the home page.
2. Click Interfaces link.
3. Click the appropriate ATM interface link in the PHYSICAL field.
4. You are now in the physical interface page for the interface you selected. Click the ATM
QoS Configuration link. You are now in the ATM QoS Configuration page for the physical
interface you selected. In the QOS CONFIGURED PVCS field, click the QOS DESCRIPTOR
drop-down window and select DEFAULT (UBR).
5. Click APPLY, and then click SAVE to make your changes permanent.
6. Click the ATM QoS Descriptors link.
7. In the EXISTING ATM QOS DESCRIPTORS field, click the DELETE check box next to the
name of the ATM QoS Descriptor that you want to delete.
8. Click APPLY.
9. The ATM QoS Descriptor disappears from the EXISTING QOS DESCRIPTORS field.
10. Click SAVE to make your changes permanent.
Note
You cannot delete or modify a QoS Descriptor that has been associated with a permanent
virtual channel (PVC). You must first disassociate the PVC from the QoS descriptor. See
“Deleting an ATM QoS Descriptor” for more information.
Note
You can change the QoS configuration of a PVC while it is being used. However, doing so
results in a short break in traffic because the PVC is closed while QoS configuration values
change. Afterward, the system reopens the PVC.
6. Click APPLY.
The name of the new PVC and ATM QoS Descriptor with which you associated the PVC
appear in QOS CONFIGURED PVCS field.
7. Click SAVE to make your changes permanent.
Note
You can configure multiple client IDs. Only one client ID can be active at a time.
5. To configure a COPS client, click on the CLIENT ID drop-down window and select a client
name. Click APPLY.
6. Enter either the IP address or domain name the server to act as the Policy Decision Point
(PDP) in the PRIMARY PDP edit box.
7. (Optional) Enter the IP address or domain name of the server to act as the secondary Policy
Decision Point (PDP) in the SECONDARY PDP edit box. Click APPLY.
8. Click SAVE to make your changes permanent.
Note
You can configure up to 5 receive key IDs.
Note
You can assign multiple roles to each interface.
Note
You can assign different roles to different interfaces on the same system.
Note
A list of all existing Client IDs appears in the COPS SECURITY CONFIGURATION section.
Deleting a Client ID
Before you delete a Client ID, make sure that it is not active. Perform the following steps to
deactivate a client ID before you delete it.
1. Click either CONFIG on the Voyager home page or the Traffic Management link on the
home page.
2. Click the COPS link in the Traffic Management section.
3. Click the Diffserv PIB link in the CONFIGURED COPS MODULE section. This action takes
you to the COPS Diffserv specific configuration page.
4. Click the CLIENT ID drop-down window in the DIFFSERV PIB SPECIFIC CONFIGURATION
section and select either another existing client ID name or NONE.
5. Click APPLY.
You can now delete the client ID you disabled.
1. Click either CONFIG on the Voyager home page or the Traffic Management link on the
home page.
2. Click the COPS link in the TRAFFIC MANAGEMENT section.
3. Click the Diffserv PIB link in the CONFIGURED COPS MODULE section. This action takes
you to the COPS Diffserv specific configuration page.
4. In the COPS SECURITY CONFIGURATION section, click the DELETE check box next to the
name of the client ID you want to delete.
Server
Client
1. Save the current configuration on each Nokia Platform before you set up QoS. Doing so
allows you to compare the relative performance of the QoS and non-QoS configurations.
a. Click on CONFIG on the home page.
b. Click on the Manage Configuration Sets link under the SYSTEM CONFIGURATION
section.
c. Enter pre-QoS in the SAVE CURRENT STATE TO NEW CONFIGURATION DATABASE
edit box.
d. Click APPLY, and then click SAVE to make your change permanent.
2. Create an Aggregation Class
a. Click CONFIG on the home page.
b. Click on the Aggregation Class Configuration link under the TRAFFIC MANAGEMENT
section.
c. Enter wan_1_ef in the NAME edit box in the CREATE A NEW AGGREGATION CLASS
section.
d. Enter 100 in the MEAN RATE (KBPS) edit box.
e. Enter 5000 in the BURSTSIZE (BYTES) edit box.
f. Click APPLY, and then click SAVE to make your Changes permanent.
Note
The queue specifier associated with expedited forwarding queue is 6.
l. For Nokia Platform A, enter 23 in the DESTINATION PORT RANGE edit box, and for
Nokia Platform B, enter 23 in the SOURCE PORT RANGE edit box.
Note
The telnet port number is 23.
m. Enter tcp in the Protocol edit box; enter 0xB8 in the DSFIELD edit box; and enter 6 in
the QUEUESPEC edit box.
Note
0xB8 is the IETF differentiated-services codepoint (in hexadecimal) for expedited forwarding
traffic.
n. Click APPLY, and then click SAVE to make your changes permanent.
To test the configuration:
1. Start a telnet session between the client and server.
2. Check the statistics on Nokia Platform A and Nokia Platform B
a. Click CONFIG on the home page.
b. Click on the Interfaces link.
c. Click on the link for SER-S3P1 in the PHYSICAL column.
d. Click on the Interface Statistics link.
e. Scroll down to view statistics for Queue Class wan_1_ef.
You should see values other than zero on both Nokia Platform A and Nokia Platform B
for the PACKETS PASSED and BYTES PASSED counters in the EXPEDITED
FORWARDING row.
3. Use the telnet session to generate traffic, and then check each Nokia Platform’s interface
statistics.
a. Click CONFIG on the home page.
b. Click on the Interfaces link.
c. Click on the link for SER-S3P1 in the PHYSICAL column.
d. Click on the Interface Statistics link.
e. Examine the statistics for input and output traffic and compare them to the statistics for
Expedited Forwarding traffic.
4. Start an ftp session to create heavy (non-telnet) background traffic over the WAN. Note that
the telnet session remains responsive. Use a text editor to examine a file.
5. Save the QoS routing configuration (See Step 1 in the instructions for how to configure this
example), and restore the non-QoS configuration. Compare the difference in responsiveness
when there is heavy WAN traffic both with and without QoS routing.
Note
Transparent mode does not provide full-fledged bridging functionality such as loop detection
or spanning tree.
Note
You cannot use transparent mode on a system that participates in an IPSO cluster.
Note
The IP2250 appliance does not support transparent mode.
When configured, transparent mode is added to the IPSO kernel as a module sitting between the
layer 2 and the upper protocol layers. Transparent mode functionality consists of the following
elements:
Group configuration
Receive processing
Transmit processing
Neighbor learning (address learning)
Firewall support
VRRP support
Group Configuration
You create a transparent mode group by first creating the group then adding the interfaces to the
group. When interfaces are in the same transparent mode group, then they are, logically
speaking, in the same subnet. By default, a transparent mode group stays disabled unless
explicitly enabled. In the disabled mode, the transparent mode group will drop all packets
received on or destined to the interfaces in that group.
Note
A transparent mode group is disabled by default. For that reason, do not associate
interfaces to a transparent mode group which are in use. If you do, you will lose connectivity
to those interfaces.
If your have more than one transparent mode group on the same platform, the groups must be
visible to each other on the routing layer (Layer 3). If you need routing, then at least one
interface in each group should have an IP address.
Receive Processing
When a logical interface is configured for the transparent mode, transparent mode address
resolution protocols (ARP) and IP receive handlers replace the common ARP and IP receive
handlers. This enables the transparent mode operation to essentially intercept all packets
between the link layer (layer 2) and IPv4 and IPv6 network layer (layer 3).
Transmit Processing
Besides transmitting packets that are bridged from one interface to another based on MAC
addresses, the transparent mode module also transmits packets that originate locally or are
forwarded based on routing.
Locally originated ARP packets are broadcast on all interfaces of the transparent mode group.
Locally originated IP packets are also broadcast on all interfaces of the transparent mode group
if the egress interface is not found in the forwarding table.
If there are any VLAN interfaces among the interfaces in the transparent mode group, the link
header of a bridged packet is modified to have the proper format for the egress interface.
Neighbor Learning
Neighbor learning is the process of associating a MAC address with an interface whenever a
packet is received with an unknown source MAC address. This association is called a neighbor
control block. The neighbor control block is deleted from the address table after a period of
inactivity (age time out). The age time-out is reset to this initial value for the neighbor control
block on receiving any packet from that neighbor.
Firewall Support
Packet processing for a firewall consists of ingress and egress processing. This applies only to IP
packets; ARP packets are never delivered to the firewall.
Egress processing occurs when a packet returns from the firewall’s ingress filtering, the packet is
delivered to the firewall again for egress filtering. The packet is delivered with the interface
index of the egress interface. If it is a link multicast packet, a copy of the packet is made for each
interface of the transparent mode group, except the received interface. It is then delivered to the
firewall with the associated interface index.
Note
Network Address Translation (NAT) is not supported in transparent mode. Transparent
mode does support implicit “NATing” of the packet’s destination IP address to a local IP
address to deliver packets to the security server on the local protocol stack. It does this by
performing a route lookup for the packet’s destination IP address to determine whether the
packet destination is local after the packet returns from the firewall’s ingress filtering. If the
packets destination is local, the packet is delivered to the IP layer for local processing.
Note
Transport Mode Support is not supported in a cluster environment. For more information on
cluster configuration, see Configuring IP Clustering in IPSO.
VPN Support
When you configure transparent mode in a virtual private network environment, you must create
a range or group of addresses that will be protected behind the IP address on the bridge. This
must be done because addresses cannot be learned dynamically behind a firewall.
Network A
X Y Z
Group M
Switch
Nokia Platform
with Firewall
Switch
ISP
Internet
Firewall B
Network B
00327
In the above example, the network administrator of Network A wants Network B to have access
to certain addresses behind the Nokia Platform with Firewall, which is in transparent mode. To
do this, the network administrator would to the following in the firewall software.
1. Create a group of addresses on Firewall A. In this case, the network administrator has
grouped together addresses x, y, and z into group M.
2. Create an object for the remote Firewall B.
3. Create a rule, for example, Group M; Network B; Encrypt
The network administrator on Network B would also create a rule for encrypted traffic through
Firewall B.
ISP 1.5.3.2/24
1.5.2.1/24
00293
Below, the network administrator wants to protect the LAN with a firewall. Installing a
conventional firewall requires the network administrator to obtain another IP address from the
ISP, IP 1.5.4.0/24.
1.5.3.3/24
00294
Nokia’s transparent mode solution provides firewall protection for the LAN without having to
obtain new IP addresses or reconfigure addresses on the LAN. Packet traffic continues to run at
Layer 2, rather than at Layer 3 with a conventional firewall solution.
To configure transparent mode in the preceding network configuration, you would do the
following in Voyager.
1. Click CONFIG on the home page.
2. Click Transparent Mode in the Interface section
3. Enter any positive integer (an integer greater than 0) in the edit box, for example 100.
4. Click APPLY.
5. Click the link of the transparent mode group you created. It will appear as XMG with the
number you entered in step 3, for example XMG 100.
6. In the ADD INTERFACE drop-down box, select an interface to associate with the transparent
mode group. In this case, you would select the logical interfaces associated with IP address
1.5.3.3/24.
Note
A transparent mode group is disabled by default. For that reason, do not associate
interfaces to a transparent mode group which are in use. If you do, you will lose connectivity
to those interfaces.
Note
An interface can be in at most one group. Once you have associated an interface to a group,
you will not have the option to associate it with another group.
7. Click APPLY.
8. In the ADD INTERFACE drop-down box, select the logical interfaces associated with IP
address 1.5.3.4/24.
Note
For more information on configuring Ethernet interfaces, see “Configuring an Ethernet
Interface.”
9. Click APPLY.
Note
When you make changes to a transparent mode group, you must stop and restart the
firewall.
Once you have enabled transparent mode and restarted your firewall, packets destined for your
LAN are sent at Layer 2. Packets destined for an IP address are sent at Layer 3.
Note
When you make changes to a transparent mode group, you must stop and restart the
firewall.
Note
When you make changes to a transparent mode group, you must stop and restart the
firewall.
Note
A transparent mode group is disabled by default. For that reason, do not associate
interfaces to a transparent mode group which are in use. If you do, you will lose connectivity
to those interfaces.
Note
An interface can be in at most one group. Once you have associated an interface to a group,
you will not have the option to associate it with another group.
5. Click APPLY.
6. (Optional) Repeat steps 4 and 5 if you would like to add other interfaces to the transparent
mode group.
7. Click SAVE to make your changes permanent
Note
When you make changes to a transparent mode group, you must stop and restart the
firewall.
Note
A transparent mode group must have at least one interface associated with it for you to
enable the group.
Note
Transparent Mode supports VRRP only with hubs or switches that support port mirroring.
This procedure describes how to enable VRRP for a transparent mode group.
1. Click CONFIG on the home page.
2. Click Transparent Mode in the Interface section
3. Click the link of the transparent mode group to which you would like to enable VRRP.
4. Click the YES radio button in the VRRP ENABLED table.
5. Click APPLY.
6. Click SAVE to make your changes permanent
Chapter Contents
Configuring DHCP
Introduction to DHCP
System-Failure Notification
Setting System-Failure Notification
Configuring DHCP
Introduction to DHCP
Dynamic Host Configuration Protocol (DHCP) for Nokia IPSO provides complete DHCP client
and DHCP server capabilities for your Nokia appliance. DHCP gives you the ability to provide
network configuration parameters, through a server, to clients which need the parameters to
operate on a network. DHCP eliminates the need for you to configure each client manually and
thus reduces configuration errors.
DHCP for Nokia IPSO support includes the following:
Enabling the DHCP client
Configuring the DHCP client interface
Dynamic and fixed IP address allocation from the DHCP server.
Automatic Domain Name System (DNS) server updates from the DHCP server.
The ability to specifies various client parameters including which servers are available for
services such as DNS, NTP, TFTP, and SMTP. You can also configure NetBIOS over TCP/
IP which includes identifying WINS and Datagram Distribution servers available to clients.
Support for VLAN clients.
Note
If you enable the IPSO DHCP server, the appliance receives and accepts DHCP requests
even if there is a firewall rule blocking DHCP requests. Although requests are shown as
blocked in the firewall logs, the IPSO DHCP server still provides addresses to clients that
request them. If you don’t need the DHCP server, leave it disabled (the default option). If you
enable the DHCP server but do not want DHCP requests from the outside to be accepted,
enable it only on internal interfaces.
3. Click Client next to the logical interface link to be configured as a DHCP client in the
DHCP INTERFACE CONFIGURATION table.
4. In the DHCP CLIENT CONFIGURATION table, click enable.
Note
The Ethernet interface must be enabled before you enable the client. For more information
on how to configure Ethernet interfaces see Configuring an Ethernet Interface.
Note
The logical interface must be enabled. It is enabled if the link-state indicator is green. For
more information on how to configure Ethernet interfaces see Configuring an Ethernet
Interface.
4. (Optional) Enter a unique name in the CLIENT ID text box. The name will be used in request
packets instead of the MAC address of the interface.
5. Enter a value, in seconds, in the TIMEOUT text box. If you do not enter a value, the
configuration will default to 60 seconds.
6. Enter a value, in seconds, in the RETRY text box. If you do not enter a value, the
configuration will default to 300 seconds.
7. Enter a value, in seconds, in the LEASE text box for the length of time the IP address will be
leased to the interface.
8. Enter a value, in seconds, in the REBOOT text box for the client to reacquire an expired lease
address before it attempts to discover a new address
9. Click APPLY.
10. Click SAVE to make your changes permanent.
Note
You must configure an Ethernet interface and enter the subnet address and the subnet
mask length on which the interface is listening in the SUBNET text box (see steps 6 and 7)
before you enable the DHCP Server Process. For more information on how to configure
Ethernet interfaces see Configuring an Ethernet Interface.
Note
Make sure that Enabled is selected in the STATE field. This is the default selection.
Note
If you are configuring a large number of VLANs, you might experience a delay in having IP
addresses assigned to VLAN interfaces.
11. (Optional) Enter the Trivial File Transfer Protocol (TFTP) server clients will use in the
TFTP text box.
12. (Optional) Enter the file name where diskless clients will find the boot file in the FILE NAME
text box.
13. (Optional) Enter a path for clients to get additional configuration options in the EXTENSIONS
PATH text box.
Note
You must configure the TFTP option to use the Extension Path option since clients will use
TFTP to transfer the configuration options from the server.
14. (Optional) Enter the root path where diskless clients mount a network file system (NFS) in
the ROOT FILENAME text box.
15. Enter the IP address of the default router clients will use in the ROUTER text box.
16. (Optional) Enter the domain name you want clients to use in the DOMAIN text box.
17. (Optional) Enter the time offset for clients in the TIME OFFSET text box.
18. (Optional) Enter the IP address or the name of the swap server diskless clients will use in the
SWAP SERVER text box.
19. Enter the Domain Name System (DNS) server clients will use to resolve domain names in
the DNS SERVERS text box.
20. Enter the Network Time Protocol (NTP) servers clients will use in the NTP SERVERS text
box. Enter the servers you want clients to use in the order of preference separated by
commas.
21. Enter the Simple Mail Transfer Protocol (SMTP) servers available to clients, separated by
commas, in the SMTP SERVERS text box.
22. If you configure NetBIOS, enter the Windows Internet Naming Servers (WINS) available to
clients in the WINS text box.
23. If you configure NetBIOS, enter the Datagram Distribution (DD) servers available to clients,
separated by commas, in the DD SERVERS text box.
24. If you configure NetBIOS, enter the node type that the client will configure itself as in the
NODE TYPE text box.
25. If you configure NetBIOS, enter the scope for the client in the SCOPE text box.
26. Click APPLE.
27. Click SAVE to make your changes permanent.
3. Click the IP address link for which you would like to add additional address ranges in the
DHCP SERVER SUBNET CONFIGURATION box.
4. Enter the range of IP addresses the server will assign to clients in the START and END text
boxes respectively in the NEW POOL field.
Note
Make sure that Enabled is selected in the STATE field. This is the default selection.
Note
If you are configuring a large number of VLANs, you might experience a delay in having IP
addresses assigned to VLAN interfaces.
5. Click APPLY.
6. Click SAVE to maker you changes permanent.
Note
Check the State field to make sure that Enabled is selected. Enabled is the default.
5. Enter a client identification in the CLIENT ID text box or enter the MAC address of the client
in the CLIENT MAC ADDRESS text box.
6. Enter the IP address you want to assign the client in the IP ADDRESS text box.
7. (Optional) Enter the Trivial File Transfer Protocol (TFTP) server clients will use in the
TFTP text box.
8. (Optional) Enter the file name where diskless clients will find the boot file in the FILE NAME
text box.
9. (Optional) Enter a path for clients to get additional configuration options in the EXTENSIONS
PATH text box.
Note
You must configure the TFTP option to use the Extension Path option since clients will use
TFTP to transfer the configuration options from the server.
10. (Optional) Enter the root path where diskless clients mount a network file system (NFS) in
the ROOT FILENAME text box.
11. Enter the IP address of the default router clients will use in the ROUTER text box.
12. (Optional) Enter the domain name you want clients to use in the DOMAIN text box.
13. (Optional) Enter the time offset for clients in the TIME OFFSET text box.
14. (Optional) Enter the IP address or the name of the swap server diskless clients will use in the
SWAP SERVER text box.
15. Enter the Domain Name System (DNS) server clients will use to resolve domain names in
the DNS SERVERS text box.
16. Enter the Network Time Protocol (NTP) servers clients will use in the NTP SERVERS text
box. Enter the servers you want clients to use in the order of preference separated by
commas.
17. Enter the Simple Mail Transfer Protocol (SMTP) servers, separated by commas, available to
clients in the SMTP SERVERS text box.
18. If you configure NetBIOS, enter the Windows Internet Naming Servers (WINS), separated
by commas, available to clients in the WINS text box.
19. If you configure NetBIOS, enter the Datagram Distribution (DD) servers, separated by
commas, available to clients in the DD SERVERS text box.
20. If you configure NetBIOS, enter the node type that the client will identify itself as in the
NODE TYPE text box.
21. If you configure NetBIOS, enter the scope for the client in the SCOPE text box.
22. Click APPLY.
23. Click SAVE to make your changes permanent.
Note
You must configure the TFTP option to use the Extension Path option since clients will use
TFTP to transfer the configuration options from the server.
6. (Optional) Enter the root path where diskless clients mount a network file system (NFS) in
the ROOT FILENAME text box.
7. (Optional) Enter the file name where diskless clients will find the boot file in the FILE NAME
text box.
8. (Optional) Enter the domain name you want clients to use in the DOMAIN text box.
9. (Optional) Enter the time offset for clients in the TIME OFFSET text box.
10. (Optional) Enter the IP address or the name of the swap server diskless clients will use in the
SWAP SERVER text box.
Note
Before you can configure DDNS zones, you must have created DDNS keys. See
“Configuring Dynamic Domain Name System Service.”
Note
See Important Information Regarding Disk Mirroring for information on creating a mirror set
when you install IPSO.
Note
The source hard disk drive and the mirror hard disk drive should have identical geometries.
You can view hard-disk drive geometry in the Drivers Information table.
4. Click APPLY. Text at the top of the Network Voyager window with a message indicates a
mirror set was created, numbers indicates which hard disk drive is the source and which hard
disk drive is the mirror, and that mirror syncronization is in progress.
Note
The syncronization percent value in the Mirror Set table indicates the percentage of
syncronization zones that are copied from the source disk to the mirror disk. A sync zone is
equivalent to contiguous disk sectors. When all syncronization zones are copied to the
mirror disk, the syncronization percent value reads 100 percent and your platform is
protected from a disk failure. Syncronization time is approximately 20-30 minutes for a 20
GB disk. No mirror set is created if the syncronization operation is not successful.
Note
You can only delete a mirror set that is 100-percent synchronized.
Note
PC card memory smaller than 512 megabytes are not recognized by the IP2250. Use a card
that has at least this much storage capacity.
Mail Relay
Features Supported
Presence of a mail client or Mail User Agent (MUA) that can be used interactively or from a
script
Presence of a sendmail-like replacement that relays mail to a mail hub by using SMTP
Ability to specify the default recipient on the mail hub
Sending Mail
This procedure describes how to send mail from the firewall.
1. Log in to the firewall by using either your admin or monitor account.
2. At the prompt, type the mail command, followed by a space, and the username of the
recipient:
mail username@hostname
3. Type the subject of your message at the subject prompt; then press enter.
4. Type your message; then press enter.
5. When you finish typing your message, type a period on an empty line; then press enter.
Your message is sent.
Note
You must select at least one severity level for this option to function. The system will not
send syslog messages to the remote host if you do not configure at least one severity level.
6. Click APPLY.
The name of each severity level appears in LOG AT OR ABOVE SEVERITY field.
7. To disable any of the severity levels, click NO next to the name of the severity level you
want to delete.
8. Click APPLY.
9. To make your changes permanent, click SAVE.
Most log messages are stored in /tmp/tmessages (in memory) and also in /var/log/messages
when PC card flash memory is installed. (Messages stored in http_error_log or
httpd_access_log on other platforms are stored in the messages files on diskless systems.)
Messages about shell logins and logouts are stored in /var/log/wtmp. When PC card flash
memory is installed, /var/log/wtmp is automatically stored on the drive.
All Systems
Setting the System Configuration Auditlog
Use this feature to set the system to log transient and permanent configuration changes. You can
view the syslog messages to determine whether authorized users only are making configuration
changes to the system.
1. Click CONFIG on the home page.
2. Click the System Logging link in the System Configuration section.
3. To log transient configuration changes only, click the LOGGING OF TRANSIENT CHANGES
button in the SYSTEM CONFIGURATION AUDITLOG field.
Transient changes refer to changes that apply only to the currently running system. Transient
changes are equivalent to clicking the APPLY button only in Network Voyager. Reboot the
system to restore the previous configuration.
4. Click APPLY.
5. To log both transient and permanent configuration changes, click the LOGGING OF
TRANSIENT AND PERMANENT changes button in the SYSTEM CONFIGURATION AUDITLOG
field.
Permanent changes remain active after the system is rebooted. These changes are equivalent
to clicking the SAVE button in Network Voyager after you apply a configuration change.
6. Click APPLY.
7. If you are using a system with a hard disk, a DESTINATION LOG FILENAME text box appears
after you enable the system configuration auditlog. The box contains the name of the file to
which syslog messages for this feature are sent. The default is /var/log/messages. To
change the file, enter the new file name in the DESTINATION LOG FILENAME text box. (On
diskless systems, you cannot save the messages to another file.)
Note
You must enter a destination file name to view log messages in the Management Activity
Log. The default destination file logs messages in the standard system log file.
To access the Management Activity Log page, click MONITOR on the Home page in Network
Voyager and then click the Management Activity Log link in the System Logs section. For more
information, see “Monitoring System Logs.”
8. Click APPLY
9. CLICK SAVE to make your changes permanent.
Note
For Nokia Network Voyager configuration pages, such as image.tcl, that do not include
Apply and Save buttons, the log records the relevant action, such as when you press the
Reboot button.
Note
The Voyager AuditLog feature does not record any operations performed using the
command-line interface (CLI).
Note
This feature does not apply to Nokia IPSO kernel core files. To transfer these files to a
remote system, you must use the command
savecore -r ftp://user:passwd@host-ip-address/directory/
Diskless systems store kernel core files on the internal compact flash memory card and can
store a maximum of two at a time. If necessary, older core files are deleted to make room for
newer files. If a kernel core file is created, this is indicated in the log file the next time the
system boots.
Application core files are stored in memory in the directory /var/tmp/. When the file system is 95
percent filled, diskless systems delete older core files to make room for newer ones. You can
configure diskless systems to transfer the core files to a remote server so that older files can be
retained. After application core files are tranferred to a remote server, they are deleted from
memory. The core files are transferred on a predetermined schedule that is not configurable by
users.
Note
You must also configure the remote system (FTP or TFTP server) appropriately.
To configure a diskless system to transfer application core files to a remote server, follow these
steps:
1. On the Core-Dump Server Configuration page, enter the IP address of the remote server.
2. Choose whether to use FTP or TFTP for the transfer protocol.
Caution
The TFTP option does not work with TFTP servers running on many Unix-based
operating systems. Nokia recommends that you use FTP unless you are sure that your
TFTP server accepts writes to files that do not already exist on the server.
If you choose FTP, make sure that your server accepts anonymous FTP logins. You cannot
use nonanonymous FTP logins to transfer application core files.
3. Indicate where the core files should be stored on the remote server by entering the
appropriate path and directory.
4. Click APPLY.
5. Click SAVE to make your changes permanent.
Hostname Procedure
Note
Host address assignments must match an IP address.
4. Click APPLY.
The current configuration is saved in the new file, and the file appears in the list of database files
on this page. Subsequent configuration changes are saved in the new file.
4. Click APPLY.
The new file appears in the list of database files on this page, but it is not selected as the current
configuration database. The factory default configuration has not been loaded.
Note
Loading this configuration set will cause all system configurations to be deleted from the
system. You cannot configure the system through Network Voyager until you configure an IP
address through the system console.
Note
If you do not enter a name, the backup file is not created.
4. (Optional) Click the YES button in the BACKUP HOME DIRECTORIES field to include home
directories in the backup file.
5. (Optional) Click the YES button in the BACKUP LOG FILES field to include your log files in
the backup file.
6. (Optional) To include package files in your backup file, click Yes next to the name of each
package to back up in the BACKUP /OPT fields.
7. Click APPLY.
8. To make your changes permanent, click SAVE.
Note
If you do not enter a name, the backup file is not created.
9. (Optional) Click YES in the BACKUP HOME DIRECTORIES field to include home directories
in the backup file.
10. (Optional) Click YES in the BACKUP LOG FILES field to include your log files in the backup
file.
11. (Optional) To include package files in your backup file, click YES next to the name of each
package to back up in the BACKUP/OPT fields.
12. Click APPLY.
13. To make your changes permanent, click SAVE.
Note
If you choose FTP, make sure that your server accepts anonymous FTP logins. You
cannot use nonanonymous FTP logins to automatically transfer backup files.
Caution
The TFTP option does not work with TFTP servers running on many Unix-based
operating systems if there is not a file in the target directory on the remote server that
has the same name as the backup file that is being transferred. Nokia recommends that
you use FTP unless you are sure that your TFTP server accepts writes to files that do
not already exist on the server.
5. If you chose FTP as the transfer protocol, indicate where the core files should be stored on
the remote server by entering the appropriate path and directory.
6. Click APPLY.
7. To make your changes permanent, click SAVE.
Note
You must change the password if you change the FTP server, FTP directory, or FTP user.
Note
The password is not stored in the database. Enter the password each time you want to
transfer files to remote server even if you are using the same FTP server.
7. (Optional) Click YES in the BACKUP HOME DIRECTORIES field to include home directories
in the backup file.
8. (Optional) Click YES in the BACKUP LOG FILES field to include your log files in the backup
file.
9. (Optional) To include package files in your backup file, Click YES next to the name of each
package you want to back up in the BACKUP/OPT field.
10. Click either the MANUAL BACKUP FILE drop-down list or the SCHEDULED BACKUP FILE
drop-down list to select the backup files you want to transfer to the FTP server.
11. Click APPLY.
12. To make your changes permanent, click SAVE.
Caution
Restoring from a backup file overwrites your existing files.
Caution
Make sure that you have enough disk space available on your Nokia appliance before
restoring files. If you try to restore files and you do not have enough disk space, you risk
damaging the operating system.
Note
The system must be running the same version of the operating system and the same
packages as those of the backup file(s) from which you restore file(s).
3. In the RESTORE FROM LOCAL field, click either the Manual backup file drop-down window
or the Scheduled backup file window to select the name of the backup file from which to
restore. Manually backed-up files are in the /var/backup directory, and scheduled backup
files are in the /var/backup/sched directory.
The drop-down windows contain lists of all the files in the var/backup or /bar/backup/sched
directory but some of the files might not be backup files.
4. Click APPLY.
Repeat the previous two steps for each file you want to restore.
5. Do not click SAVE. Ignore any Unsaved changes will be lost messages.
6. Click the Reboot link near the bottom of the page and wait for the system to reboot.
Note
You must reboot your system after restoring from backup files.
store backup files on a remote server, see “Manually Transferring Backup Files to a Remote
Server”.
1. Click CONFIG on the home page.
2. Click the Backup and Restore link in the System Configuration section.
Warning
Restoring from a backup file overwrites your existing files.
Note
The system must be running the same version of the operating system and the same
packages as those of the backup file(s) from which you restore file(s).
Warning
Make sure that you have enough disk space available on your Nokia appliance before
restoring files. If you try to restore files and you do not have enough disk space, you risk
damaging the operating system.
3. In the RESTORE FROM REMOTE FIELD, enter the IP address of the FTP server on which the
backup files are stored in the FTP SITE text box.
4. In the RESTORE FROM REMOTE field, enter the path to the directory on which the backup
files are stored in the FTP DIR text box.
5. In the RESTORE FROM REMOTE field, enter the user name for connecting to the FTP server
in the FTP USER text box.
6. In the RESTORE FROM REMOTE field, enter the password for connecting to the FTP server
in the FTP PASSWORD text box.
7. Click APPLY.
8. A list of available files in the directory you specify appears. Select the backup files you want
to restore.
9. Click APPLY.
10. Do not click SAVE. Ignore any Unsaved changes will be lost messages.
11. Click the Reboot link at the bottom of the page and wait for the system to reboot.
Note
You must reboot your system after restoring from backup files.
Note
The test image will run for five minutes and then revert to the original image if you do not
complete this procedure.
5. Click TOP.
6. Click the Manage IPSO Images link in the System Configuration section.
7. (Optional) Click the COMMIT TESTBOOT button to use the image you are testing.
8. (Optional) Click the REVERT TO PREVIOUS IMAGE AND REBOOT button to use the original
image.
9. Click APPLY.
Note
IP2250 systems can store a maximum of two Nokia IPSO images.
Note
If you enter a URL, the system must be configured to use a valid DNS server. You can
use the DNS Configuration page to configure which DNS servers the system will use.
Note
If you enter the absolute path to an image on an FTP site, you must type a double slash (//)
after the domain name. For example:
ftp://test.acme.com//tmp/ipso.tgz
If you enter a path that is relative to the home directory of the user whose name and
password you enter in step 5 and step 6, use the standard URL format. For example:
ftp://test.acme.com/tmp/ipso.tgz
4. (Optional) If the HTTP site on which the Nokia IPSO image is stored requires
authentication, enter the HTTP realm to which authentication is needed in the ENTER HTTP
REALM (FOR HTTP URLS ONLY) text box.
5. (Optional) If the server on which the Nokia IPSO image is stored requires authentication,
enter the user name in the ENTER USER NAME text box.
6. (Optional) If the server on which the Nokia IPSO image is stored requires authentication,
enter the password in ENTER PASSWORD text box.
7. Specify whether the installed packages (such as VPN-1/FireWall-1 packages) start
automatically after the system is rebooted with the new image.
8. Click APPLY.
A message appears that tells you that the upgrade process could take a long time if the
network is slow.
9. Click APPLY again.
The system downloads the specified image file.
10. To see messages about the status of the download and installation process, click New image
installation status.
11. When you see the following message at the bottom of the list of messages, the download and
installation process is complete:
To install/upgrade your packages run /etc/newpkg after REBOOT
12. If you made configuration changes, click SAVE.
13. Click Manage IPSO images (including REBOOT and Next Boot Image Selection).
14. Under Select an image for next boot, select the image you just installed.
15. Select one of the following options for rebooting the system:
To reboot with the newly installed image, click REBOOT.
To test boot the new image, click TEST BOOT.
Note
When you click TEST BOOT, the system tests the new image for five minutes. If you let
the five-minute test period expire without committing to the new image, the system
automatically reboots and reverts to the previous image.
A new page appears, and you see a message telling you that the system will be rebooted. Do
not click anything on this page.
If you did not choose the test boot option, the upgrade is complete after the appliance reboots.
You do not need to do anything else.
Rebooting a cluster
When you click Reboot, Shut Down System on the main configuration page in Cluster Voyager,
you see the Cluster Traffic Safe Reboot link. If you click this link, the cluster nodes are rebooted
in a staggered manner. The process is managed so that at least one node is always operational.
For example, if you reboot a two-node cluster, one node restarts first. The second node waits for
the first node to restart successfully and rejoin the cluster before it reboots. If the first node does
not successfully rejoin the cluster, the first node does not reboot.
Managing Packages
Installing Packages
Note
You can install a maximum of two versions of Check Point’s VPN-1/FireWall-1 on IP2250
systems. The only packages you can install are
* VPN-1/FireWall-1 NG with Application Intelligence (R55) for Nokia IPSO 3.8 (or later)
* SVN Foundation
* Policy Server
5. Enter the FTP directory where the packages reside at the FTP site.
6. (Optional) Enter the user account and password to use when connecting to the FTP site. If
you leave these fields empty, the anonymous account is used.
Note
If you specify a user account and password, you must re-enter the password whenever
you change the FTP site, FTP directory, or FTP user on future requests.
7. Click APPLY.
Note
A list of files ending with extensions .tgz, .Z, and .gz in the specified FTP directory
appears in the SITE LISTING field.
8. Select a package to download from the SITE LISTING field, then click APPLY.
The selected package is downloaded to the local Nokia IPSO system. After the download is
complete, the package appears in the UNPACK NEW PACKAGES field.
9. Select the package in the UNPACK NEW PACKAGES field, then click APPLY
The package is unpacked into the local file system.
10. Click the Click here to install/upgrade [file name] link.
11. (Optional) Click YES next to Display all packages, then click APPLY to display all of your
installed packages.
12. (Optional) Click YES next to Install, then click APPLY to perform a first-time installation.
13. (Optional) Click Yes next to Upgrade.
14. (Optional) Click the button of the package from which you want to upgrade under Choose
one of the following packages to upgrade from.
15. Click APPLY.
16. Click SAVE to make your changes permanent.
Enabling Packages
This procedure describes how to enable a package.
1. Click CONFIG on the home page.
2. Click the Manage Installed Packages link in the System Configuration section.
3. Click ON next to the package you want to enable, then click APPLY.
4. Click SAVE.
Deleting Packages
This procedure describes how to delete a package:.
1. Click CONFIG on the home page.
2. Click the Manage Installed Packages link in the System Configuration section.
3. Click the Delete Packages link.
4. Click DELETE next to the package you want to delete, then click APPLY.
5. To make your changes permanent, click SAVE.
Your system advertises the MSS value you set, and remote terminated nodes respond by sending
segments in packets that do not exceed your advertised value. This segment size your system
advertises should be 40 bytes less than the smallest MTU between your system and the outgoing
interface. The 40-byte difference allows for a 20-byte TCP header and a 20-byte IP header,
which are included in the MTU.
To set the TCP MSS, do the following:
1. Click CONFIG on the home page.
2. Click the Advanced System Tuning link in the System Configuration section.
3. Enter the value you will use for your MSS.
The range for this value is 512 through 1500, and the default value is 1024. If you enter a
value outside of this range, an out-of-range error is generated.
4. Click APPLY.
5. Click SAVE to make your changes permanent.
Chapter Contents
Overview
SNMP Description
Interpreting SNMP
SNMP Error Messages
Configuring SNMPv3
Using Enhanced Security
Overview
SNMP Description
SNMP, as implemented on the Nokia platforms, supports the following:
Note
The Nokia implementation of SNMPv3 does not yet support SNMPv3 traps.
Note
The
isdnMibCallInformation
trap is not supported by
IPSO.
Note
The warmStart trap is
not supported.
Note
Note: The
dialCtlPeerCallInformati
on and
dialCtlPeerCallSetup
traps are not supported
by IPSO.
Note
Note: IPSO does not
send the traps that this
MIB supports when the
Nokia platform is used
as an IP security device.
Both the proprietary MIBs and the public MIBs are supplied with the system. To view more
detailed information about the MIBs, see the /etc/snmp/mibs directory.
Note
The SNMPv2-CONF MIB resides in the /etc/snmp/mibs/unsupported directory.
The SNMP agent implemented in Nokia IPSO enables an SNMP manager to monitor the device
and to modify the sysName, sysContact and sysLocation objects only.
Note
You must configure an SNMP string first to configure sysContact and sysLocation.
Because Nokia IPSO uses a proxy to support the Check Point MIB, reference the Check Point
documentation for any limitations of the CP-SNMPd.
Using cpsnmp_start
You must run the cpsnmp_start script to make sure that CP-SNMPd is running on Check Point
versions NG FP1, FP2, and FP3. You do this by first enabling the IPSO SNMPd from Nokia
Network Voyager and then enabling the CP-SNMPd by using /bin/cpsnamp_start on the
command line.
Note
Whenever you use the cprestart or cpstop;cpstart commands, you must run the
cpsnmp_start script to restart the CP-SNMPd when you are using NG FP3.
Note
Using FloodGate with Check Point NG FP1, FP2, and FP3 causes SNMP query operations
to fail, even on non-FloodGate CheckPoint MIB objects. You must restart the CP-SNMPd to
have SNMP query operations. On NG FP2, just disabling FloodGate might not enable
SNMP query operations. In this case, you might have to delete the FloodGate package from
your system.
Caution
To run the Check Point and SNMP daemons simultaneously, you must start the Check
Point SNMP daemon after you start VPN-1/FireWal NG, If you start the Check Point
SNMP daemon before you start VPN-1FireWall-1 NG, the IPSO daemon does not start.
All possible configuration options appear, which allow you to enter the necessary values.
4. To disable the SNMP daemon, click NO in the ENABLE SNMP DAEMON FIELD. Click
APPLY.
The configuration options disappear.
Note
The default is for the protocol to respond to requests from all interfaces.
5. To delete a configured IP address, click OFF button next to the entry for the address.
Click APPLY. The entry for the address disappears.
6. Click SAVE to make your change permanent.
Note
To enable specific SNMPv3 users, click the Add USM Users link at the bottom of the SNMP
Network Voyager page, which takes you to the Voyager page that lets you configure users
for SNMPv3. For more information, see “Adding a User-based Security Model User.”
3. (Optional) To enable or change the read-only community string, enter the name of the new
string in the READ-ONLY COMMUNITY STRING text box.
Use alphanumeric characters without spaces. Click APPLY.
The default read-only community string is public.
4. (Optional) To enable or change a read-write community string, enter the name in the READ-
WRITE COMMUNITY STRING text box.
Use alphanumeric characters without spaces. Click APPLY.
The name of the new read-write community string appears in the current read-write
community string field.
5. To make your changes permanent, click SAVE.
Note
The Nokia implementation of SNMPv3 does not yet support SNMPv3 traps.
8. (Optional) To receive notification that a temporary change to the system configuration has
occurred, click ON next to ENABLE SYSTEMTRAPCONFIGURATIONCHANGE TRAPS.
Click APPLY.
9. (Optional) To receive notification that a different configuration file has been selected, click
ON next to ENABLE SYSTEMTRAPCONFIGURATIONFILECHANGE TRAPS.
Click APPLY.
10. (Optional) To receive notification that a permanent change to the system configuration has
occurred, click ON next to ENABLE SYSTEMTRAPCONFIGURATIONSAVECHANGE TRAPS.
Click APPLY.
11. (Optional) To know when space on the system disk is low, click ON next to ENABLE
SYSTEMTRAPLOWDISKSPACE TRAPS. This trap is sent if the disk space utilization has
reached 80 percent or more of its capacity. If this situation persists, a subsequent trap is sent
after 15 minutes.
Click APPLY.
12. (Optional) To know when the system disk is full, click ON button next to ENABLE
SYSTEMTRAPNODISKSPACE TRAPS .This trap is sent if 2 percent or less of the disk space
remains available, or if the remaining disk space is equal to or less than 1 MB. If this
situation persists, a subsequent trap is sent after 15 minutes.
Click APPLY.
13. (Optional) To receive notification when a particular disk drive fails, click ON next to
ENABLE SYSTEMTRAPDISKFAILURE TRAPS.
Click APPLY.
Note
The systemTrapDiskFailure applies only to the IP740 and IP530 Nokia platforms.
14. (Optional) To receive notification when a system disk mirror set is created, click ON next to
ENABLE SYSTEMTRAPDISKMIRRORSETCREATE TRAPS.
Click APPLY.
15. (Optional) To receive notification when a system disk mirror set is deleted, click ON next to
ENABLE SYSTEMTRAPMIRRORSETDELETE TRAPS.
Click APPLY.
16. (Optional) To receive notification when a system disk mirror set is successfully synced,
click ON next to ENABLE SYSTEMTRAPDISKMIRRORSYNCSUCCESS TRAPS.
Click APPLY.
17. (Optional) To receive notification when a system disk mirror set fails during syncing, click
ON button next to ENABLE SYSTEMTRAPDISKMIRRORSYNCFAILURE TRAPS.
Click APPLY.
Note
The disk mirror traps are supported only on systems where disk mirroring is supported.
Note
Beginning with IPSO 3.7, if you do not configure a Trap PDU Agent address, the system
identifies the PDU Trap Agent address as 0.0.0.0 in SNMP traps. This change is in
accordance with RFC 2089. For all previous releases of Nokia IPSO, the default was to
use the IP address of the first valid interface.
The Network Management System uses the agent address to identify the network element that
generated the trap. This address must belong to one of the interfaces.
4. To make your changes permanent, click SAVE.
0 noError
1 tooBig
2 NoSuchName
3 BadValue
4 ReadOnly
5 genError
6 noAccess
7 wrongType
8 wrongLength
9 wrongEncoding
10 wrongValue
11 noCreation
12 inconsistentValue
13 resourceUnavailable
14 commitFailed
15 undoFailed
16 authorizationError
17 notWritable
18 inconsistentName
Note
You might not see the codes. The SNMP manager or utility interprets the codes and displays
and logs the appropriate message.
The subsequent, or fourth field, contains the error index when the error-status field is nonzero,
that is, when the error-status field returns a value other than zero, which indicates that an error
occurred. The error-index value identifies the variable, or object, in the variable-bindings list
that caused the error. The first variable in the list has index 1, the second has index 2, and so on.
The next, or fifth field, is the variable-bindings field. It consists of a sequence of pairs; the first is
the identifier. The second element is one of the following five: value, unSpecified,
noSuchOjbect, noSuchInstance, and EndofMibView. The following table describes each
element.
Variable-bindings
element Description
noSuchInstance Indicates that this object does not exist for this
operation.
GetRequest
The following table lists possible value field sets in the response PDU or error-status messages
when performing a GetRequest
GetBulkRequest
The GetBulkRequest minimizes the number of protocol exchanges by letting an SNMPv2
manager request that the response be as large as possible given the constraints on the message
size.
The GetBulkRequest PDU has two fields that do not appear in the other PDUs: non-repeaters
and max-repetitions. The non-repeaters field specifies the number of variables in the variable-
bindings list for which a single-lexicographic successor is to be returned. The max-repetitions
field specifies the number of lexicographic successors to be returned for the remaining variables
in the variable-bindings list.
If at any point in the process, a lexicographic successor does not exist, the endofMibView value
is returned with the name of the last lexicographic successor, or, if there were no successors, the
name of the variable in the request.
If the processing of a variable name fails for any reason other than endofMibView, no values are
returned. Instead, the responding entity returns a response PDU with an error-status of genErr
and a value in the error-index field that is the index of the problem object in the variable-
bindings field.
Configuring SNMP v3
Note
Nokia systems do not protect traps with authentication or encryption.
You must configure your SNMP manager to specify the security you want. If you are using a
UCD-SNMP/Net-SNMP based manager, here are the security-related options you can use in
request messages:
-u name Specifies the user name.
For example, to send an snmpwalk request from your manager with full protection you would
enter
snmpwalk -v 3 -u username -a MD5 -A password -x DES -X password -l
authPriv system_name OID
For more information about USM, see RFC 3414.
Note
The password of an SNMP USM user must have at least 8 characters.
11. Click APPLY, and then click SAVE to make your changes permanent.
A table appears on the SNMP page with the name of each user and his/her permissions.
Chapter Contents
Overview
IPv6 Description
Interfaces
Configuring IPv6 Logical Interfaces
Routing Configuration
Configuring an IPv6 Default Route
Configuring RIPng
Router Discovery
Configuring ICMPv6 Router Discovery
Traffic Management
Traffic Management Overview and Configuration
Overview
IPv6 Description
IPv6 is the next generation IP protocol and is expected to replace IPv4, the current IP protocol.
The Internet Engineering Task Force (IETF) formally began to work on the new protocol in
1994. IPv6 enhances IPv4 in many ways including:
Expanded addressing capabilities
Simplified header format
Improved support for extensions and options
Flow-labeling capability
Plug and play autoconfiguration
The IPv6 implementation includes basic features specified in IPv6 RFCs and features that
support IPv6-capable hosts in a network.
IPv6 includes a transition mechanism that allows users to adopt and deploy IPv6 in a diffuse way
and provides direct interoperability between IPv4 and IPv6 hosts.
The Nokia implementation supports the following features as specified in the corresponding
RFCs:
IPv6 Specification (RFC 2460)
ICMP v6 (RFC 2463)
Neighbor Discovery (RFC 2461, router only)
Basic IPv6 Socket Interface (RFC 2553), except the following features:
Compatibility with IPv4 nodes
Interfaces
This value represents the maximum number of output packets to be queued while the link-
layer destination address is being resolved.
4. In the GLOBAL NEIGHBOR DISCOVERY SETTINGS field, enter the value for the unicast retry
limit in the UNICAST RETRY LIMIT text box.
This value represents the number of times to retry Unicast Neighbor Discovery requests.
5. In the GLOBAL NEIGHBOR DISCOVERY SETTINGS field, enter the value for the multicast
retry limit in the MULTICAST RETRY LIMIT text box.
This value represents the number of times to retry Multicast Neighbor Discovery requests.
6. In the GLOBAL NEIGHBOR DISCOVERY SETTINGS field, enter the value for the duplicate
address detection retry limit in the DUPLICATE ADDRESS DETECTION RETRY LIMIT text
box. This value represents the number of times to retry Duplicate Address Detection
Neighbor Discovery requests.
7. In the PERMANENT NEIGHBOR DISCOVERY ENTRIES field, enter the permanent IPv6
address for the permanent neighbor discovery destination in the NEW PERMANENT
NEIGHBOR DISCOVERY ENTRY text box.
8. Click APPLY.
9. Click SAVE to make your changes permanent.
10. To flush current dynamic Neighbor Discovery entries, click FLUSH in the DYNAMIC
NEIGHBOR DISCOVERY ENTRIES field.
11. Click APPLY.
Note
The local address must be the address of another interface configured for the router.
5. (Optional) Enter the IPv6 link-local address of the local tunnel endpoint in the LOCAL IPV6
LINK LOCAL text box.
Note
This address must be the address of another interface configured for the router.
6. (Optional) Enter a value in the TIME TO LIVE text box for the Time to Live (TTL) packets
sent.
7. Click APPLY.
8. Click SAVE to make your changes permanent.
This value represents the pseudo-interface that is associated with this feature. It does not
correspond to a specific physical device
5. Enter the IPv4 address of the local interface in the LOCAL IPV4 ADDRESS text box.
Note
This address must be the address of another interface configured for the router.
6. (Optional) Enter a value in the TIME TO LIVE text box for the Time to Live (TTL) packets
sent.
7. Click APPLY.
8. Click SAVE to make your changes permanent.
6. To specify the order in which next hops are selected, enter a value from one to eight in the
PREFERENCE text box. The lower the value the more preferred the link.
The next preferred value is selected as the next hop only when an interface fails. A non-
reachable link is not selected as the next hop.
The preference option also supports equal-cost multipath routing. For each preference value,
you can configure as many as eight gateway addresses. The nexthop gate address for each
packet to the destination is selected based on the nexthop algorithm that is configured.
7. Click APPLY.
8. Click SAVE to make your changes permanent.
Routing Configuration
Configuring RIPng
1. Click CONFIG on the home page.
2. Click the RIPng link in the IPv6 section.
3. To enable RIPng, click ON next to the logical interface on which you want to run RIP, and
then click APPLY.
4. Enter a value in the METRIC text box for the RIPng metric to be added to routes that are sent
by way of the specified interface .
5. Click APPLY.
6. Click SAVE to make your changes permanent.
5. Enter a value in the METRIC text box for the metric cost that the created RIPng routes will
have.
6. Click APPLY.
7. Click SAVE to make your changes permanent.
8. To redistribute a specific interface route or routes into RIPng, click ON next to the IPv6
interface for the route to redistribute into RIPng.
9. Enter a value in the METRIC text box for the metric cost that the created RIPng routes will
have.
10. Click APPLY.
11. Click SAVE to make your changes permanent.
Router Discovery
Traffic Management
Chapter Contents
Asset Management Summary
Asset Management Summary Description
Chapter Contents
IPSO Process Management
Overview of Nokia IPSO Process Management
Process Description
Process Description
xntpd Network time protocol daemon. This daemon sets and maintains a
UNIX system time-of-day in compliance with Internet standard time
servers.
ADSL
Asymmetric Digital Subscriber Line. A modem technology that converts existing twisted-pair
telephone lines into an access path for multimedia and high-speed data communications.
Download speeds can be as high as 6 Mbps.
ARP
Address Resolution Protocol. A protocol that relates (fixes) an IP address to a hardware
address. It allows a host to find a physical address of a node on the same network when it only
knows the target’s logical address. ARP is used on a single network and is limited to hardware-
type broadcasting.
AS
Autonomous System. A group of networks and routers controlled by a single-administrative
authority. An unique number identifying an Internet-connected network that has routing policies
distinct from upstream connections.
ATM
Asynchronous Transfer Mode. A technology that transmits all voice, video, and data in
packets as small 53-bit cells (5-bit header, 48-bits data). ATM is capable of high-speed routing
up to 622 Mbps and is not packet-switched.
Bandwidth
The transmission width or capacity, usually measured in bits per second, of a network. Analog
bandwidth is measured in Hertz or cycles per second. Digital bandwidth is the amount or volume
of data that may be sent through a channel, measured in bits per second, without distortion.
Bandwidth should not be confused with the term band, such as a wireless phone that operates on
the 900 MHz band. Bandwidth is the space it occupies on that band. The relative importance of
bandwidth in wireless communications is that the size, or band-width, of a channel will impact
transmission speed. A lot of data flowing through a narrow channel takes longer than the same
amount of data flowing through a broader channel.
BGP
Border Gateway Protocol. An inter-domain routing protocol for communications between a
router in one autonomous system and routers in other autonomous systems.
CIDR
Classless Inter-domain Routing. A routing technique that allows routers to group routes
together to reduce the quantity of routing information carried by core routers. CIDR uses a group
of contiguous class-C addresses in place of one, different-sized class-B address.
CPDS
Connectionless Packet-Delivery Service. A form of packet-switching that relies on the global
addresses in each packet rather than on predefined virtual circuits. All address information is
contained in the message itself.
CRC
Cyclic Redundancy Check. A method used to check the transmission accuracy of a
communications link. A sending computer performs a calculation on the data and attaches the
result, and the receiving computer performs the same calculation and compare its result to the
attached value. If they do not match, a transmission error is returned with a retransmission
request.
CSU/DSU
Channel Service Unit/Data Service Unit. A service that connects an external digital circuit to a
digital circuit on a customer's premises. The DSU converts data into the correct format, and the
CSU terminates the line, conditions the signal, and participates in remote testing of the
connection.
DES
Data Encryption Standard. A 56-bit, U.S. National Bureau of Standard method of data
encryption. It's limited to 40 bits outside of U.S.
DCE
Data Communications Equipment. Switching equipment that forms a packet-switched
network, versus computers or terminals connected to the network. See DTE.
DHCP
Dynamic Host Configuration Protocol. A protocol that is used to lessen the administrative
burden of manually configuring TCP/IP hosts on a network.
DTE
Data Terminal Equipment. A terminal or computer that functions as a source or destination of
network communication; end-user equipment. See DCE.
DVMRP
Distance Vector Multicast Routing Protocol. A protocol that is used to propagate membership
information among multicast-capable routers.
E1
Transmission rate. A 2.048 Mbps (at 32 discrete channels) digital network system. Also called
CEPT.
E3
Transmission rate. Generally, the highest (34 Mbps) transmission rate in a European digital
infrastructure.
EGP
Exterior Gateway Protocol. A protocol that is used by a router in one autonomous system to
advertise the IP addresses of networks in its autonomous systems to a router in another
autonomous system. Handles load balancing.
Firewall
A system of hardware and software that enforces a boundary between two or more networks in
accordance with a local security policy. Nokia technology combines a firewall with a router.
FDDI
Fiber Distributed Data Interface. LAN technology for data transfer (up to 100 Mbps) on a
dual, counter-rotating, fiber-optic cable, token ring.
Frame Relay
A packet-based protocol that supports multiple logical channels over a single link. Frame Relay
is more efficient than X.25 and is generally considered a replacement. Frame Relay defines the
interface between user equipment and a WAN; it does not define internal operation of the
network, or the interfaces, or protocols used within the WAN. For this reason, the term Frame
Relay cloud is often used to describe the internal operation of a WAN that has a Frame Relay
interface.
FTP
File Transport Protocol. A TCP/IP protocol for transferring files between different systems. A
method of retrieving files to a home directory or directly to a computer using SLIP/PPP. There
are thousands of FTP sites on the Internet offering files and programs of all kinds.
GSM
Global System for Mobile Communication. The digital wireless-transmission technique used
in Europe and supported in North America for Personal Communication Service. GSM uses 900
MHz and 1800 MHz in Europe. In North America, GSM uses 1900 MHz.
HDLC
High-level Data Link Control. A popular ISO standard that is a bit-oriented, link-layer
protocol derived from Synchronous Data Link Control (SDLC). HDLC specifies a method of
encapsulating data on synchronous serial-data links.
Hop
The transition between two networks via a router. The next hop is defined as the IP address of
the next router port encountered while traveling to a destination IP (host). Cost is the number of
routers encountered along a route (series of hops) to a destination IP.
HSSI
High-speed Serial Interface. A network standard for high-speed (up to 52 Mbps) serial
communications over WAN links.
ICMP
Internet Control Message Protocol. The standard error and control message protocol for
Internet systems. Defined in RFC 792. The most well-known ICMP messages is the Echo
Request - Echo Reply sequence used by ping.
IDR
Inter-domain Routing Protocol. An OSI protocol that specifies how routers communicate with
routers in different domains.
IGP
Interior Gateway Protocol. Any protocol that propagates network accessibility and routing
information within an autonomous system. The Routing Information Protocol (RIP) is one IGP.
IGMP
Internet Group Management Protocol. Protocol that runs between hosts and their next-hop,
multicast routers; the mechanisms of the protocol allow a host to inform its local router that it
IGRP
Interior Gateway Routing Protocol. A a widely used interior gateway protocol that uses
distance vectors. Like RIP, IGRP allows multiple paths to a single destination, thus providing
load sharing and stability during topology changes.
IPSO
Nokia (Ipsilon) Router Operating System. An UNIX-like operating system based on FreeBSD
that runs Nokia's firewalls in conjunction with Check Point's FireWall-1 software.
IPSRD
Nokia (Ipsilon) Software Routing Daemon. Nokia software that computes routes using
resident-database information, which is configured and maintained by Nokia's Voyager. A
daemon is a dormant, background process (in a UNIX environment) that waits to perform tasks.
ISDN
Integrated Digital Service Network. The recommendation published by CCITT for private or
public digital telephone networks where binary data, such as graphics and digitized voice and
data transmission, pass over the same digital network that carries most telephone transmissions
today. ISDN provides 128 kbits bi-directional data capacity.
LAPB
Link Access Procedure, Balanced. Derived from HDLC, a CCITT X.25 version of a bit-
oriented data link protocol.
LLC
Logical Link Control. The upper portion of the datalink layer, as defined in IEEE 802.2. The
LLC sublayer presents a uniform interface to the user of the datalink service, usually the
network layer.
LMI
Local Management Interface. In frame relay, a specification that defines a method of
exchanging status information between devices such as routers. The routers learn which Data
Link Connection Identifier is defined, its current status, and then use it.
MAC
Media Access Control. The lower physical portion of the datalink layer. MAC differs for
various physical media. It controls access to a transmission medium such as Token Ring,
CSMA/CD, Ethernet, FDDI, etc. The term MAC address is often used as a synonym for a
physical address.
MIB
Management Information Base. A database that a SNMP router maintains to hold information
about all resources managed by a network management system.
MIME
Multipurpose Internet Mail Extensions. An extension to Internet Email that provides the
ability to transfer non-textual data, such as graphics, audio, video, and fax images.
MTU
Maximum Transfer Unit. The largest frame length (largest possible unit of data) that may be
sent on a given physical medium.
NAP
Network Application Platform. A term describing the Nokia hardware chassis and software
that routes network traffic and operates network applications. Nokia NAPs provide a full range
of networking capabilities, including IP routing, combined with state-of-the-art security
applications, virus detection, and intrusion detection.
NMS
Network Management System. A generic term describing most elements of network
management.
Octet
An octet is 8 bits. This term is used in networking, rather than byte, because some systems have
bytes that are not 8 bits long.
OPSEC
Open Platform for Secure Enterprise Connectivity. A level of certification applicable to
products that are deemed compatible with OPSEC standards. OPSEC-certified products
guarantee interoperability at the policy level between Checkpoint's FireWall-1 and leading
security applications. OPSEC Alliance members cover the broad range of enterprise network
security technologies, including authentication, encryption, content security, networking
infrastructure, application software, and managed service providers.
OSPF
Open Shortest Path First. Similar to RIP, except that OSPF broadcasts when a new router is on
the network or a route changes. OSPF also considers factors such as line capacity, delay, and
security restrictions, as well as Hop count when calculating a route. OSPF is a link state, as
OSI
Open Systems Interconnection. A set of international, openly developed and accepted
standards created by the ISO and CCITT (now ITU-T) for data networking.
PDU
Protocol Data Unit. A data object exchanged by protocol machines within a given layer of the
OSI Reference model, which contains both protocol-control information and user data
PIM
Protocol Independent Multicast. A routing protocol that provides scalable (Sparse or Dense
modes) of inter-domain, multicast routing across the Internet.
PPP
Point-to-Point Protocol. A protocol that provides router-to-router and host-to-network
connections over both synchronous and asynchronous circuits. Used by Internet Service
Providers. Allows dial-up networks. PPP is the successor to SLIP (IP over Serial lines, such as
telephone circuits or RS-232 cables).
Protocol
The rules of communication that describe how a computer responds when a message arrives, and
how a computer handles errors. Protocols allow a computer-communication discussion
independent of the hardware.
PSN
Packet-switching Node. Replaced Internet Message Processor (IMP) as a term. In packet
switching, all the data coming out of a host is broken into chunks (packets), each chunk has the
address of where it came from and where it is going. This enables packets of data from many
different sources to co-mingle on the same lines, and be sorted (at nodes) and directed to
different routes.
PVC
Permanent Virtual Circuit. A virtual circuit (X.25), virtual connection (Frame Relay), or
virtual-channel connection (ATM) that is established by administrative means, much like a
leased or dedicated real circuit.
RFC
Request for Comments. A series of notes (standards and specifications) recording proposed
techniques, ideas, and includes accepted TCP/IP standards. RFCs are continually emerging.
RIP
Routing Information Protocol. Network Layer protocol that runs on routers. Routers maintain
their routing tables by broadcasting their tables to their neighbors. This makes RIP an insecure
protocol, inviting hackers to capture these frequent broadcasts. Networks are then navigated
using fewest hops possible.
RSA
RSA is a public key or asymmetric, encryption scheme invented by and named for 3
mathematicians, Ron Rivest, Adi Shamir, and Len Adleman. The theoretical background to RSA
is that it's very difficult to find factors of a very large number that is the product of 2 prime
numbers. RSA has been analyzed closely and is considered very secure provided a sufficiently
long key is used.
SDLC
Synchronous Data Link Control. A bit-synchronous link-layer protocol that has spawned
numerous similar protocols, including HDLC and LAPB.
SLIP
Serial Line Internet Protocol. Internet protocol used to run IP over serial lines such as
telephone circuits or RS-232 cables interconnecting two systems. SLIP is now being replaced by
PPP.
SMI
Structure of Management Information. Based on RFC 1155, which specifies rules used to
define managed objects in a management information base (MIB).
SMTP
Simple Mail Transfer Protocol. A standard TCP/IP protocol that transfers electronic mail from
one machine to another. SMTP specifies how two mail systems interact and the format of the
messages they exchange.
SNMP
Simple Network Management Protocol. As a standard method of managing and monitoring
network devices on a TCP/IP-based internet, it allows network administrators to connect, setup,
and maintain a network.
SSH
Secure Shell. A program to log into another computer over a network that allows execution of
commands and to movement of files. Intended as a replacement for rlogin, rsh, and rcp, it
provides strong authentication and secure communications over channels that are not secure.
T1
A transmission rate. An AT&T term for a formatted digital signal, level-1 being transmitted at
a rate of 1.544 Mbytes using 24 discrete channels.
TCP/IP
Transmission Control Protocol/Internet Protocol. A suite of Internet protocols. Separately,
they are defined as:
TCP - Transmission Control Protocol. A protocol that ensures that connections are made and
maintained, which allows a process running on one computer to send a data stream to another
computer. TCP is a reliable, full-duplex, connection-oriented transport (verifying connection)
service. TCP works with IP to move packets through an inter-network.
IP - Internet Protocol part of the TCP/IP protocol that defines the IP datagram as the unit of
information passed on a network. IP includes the Internet Control Message Protocol.
TRPB
Truncated Reverse-Path Broadcasting. An algorithm used by multicast routing protocols to
determine the group memberships on each leaf of a subnetwork, which avoids forwarding
datagrams onto a leaf subnetwork that does not have a member of the destination group. Prunes
multicast distribution trees to a minimum.
TTL
Time to Live. The time allowed before an endlessly looping packet is discarded. TTL was
originally intended to be a measure of the time in seconds a datagram was allowed to be in
transit across a network. In practice, however, datagrams traverse routers in less than a second,
so usage was changed. Now as a datagram is forwarded, its TTL is decrements by one. Thus,
TTL actually represents the maximum number of Hops that a datagram can make before being
discarded.
UDP
User Datagram Protocol. A protocol that allows an application on one machine to send a short
datagram to an application on another machine. UDP contains an exact-port address.
Voyager
Nokia Voyager software. Nokia's Voyager software that communicates with its routing
software element, Ipsilon Routing Daemon (IPSRD) to configure interface hardware, set routing
protocols and routing policies, and monitor routing traffic and protocol performance.
VPI / VCI
Virtual Path Identifier/Virtual Circuit Identifier. Two fields (eight-bit identifiers) used in an
Asynchronous Transfer Mode packet to distinguish a semi-permanent connection destination.
VRRP
Virtual Router Redundancy Protocol. A means by which a router can automatically assume
responsibility for forwarding IP traffic that was sent to a default router's address when the
default router fails.
A Aggregation Classes
Configuring 399
AAA 311
Area Border Router, Alternate Behavior 171
Account Profile
ARP
Changing a Configuration 326 Address Resolution Protocol 13
Creating 315 Changing Global Parameters 161
Types 316 Configuring for the ATM Interface 164
Changing a Configuration 322 Deleting a Static Entry 163
Creating a Configuration 311 Deleting Dynamic Entries 163
Deleting a Configuration 326 Flushing All Dynamic Entries 163
Deleting an Authentication Server Configuration 322 Proxy, Adding an Entry 162
Profile Controls 317 Static, Adding an Entry 162
Service Module 312, 318 Table Entries 161
Service Profile 312 Viewing Dynamic Entries 163
Session Profile 316 ARP for ATM
Stacked Service Module 323 Adding a Static Entry 164
Accelerator Card Changing Global Parameters 164
Enabling 328 Deleting a Static Entry 165
Enabling for a Check Point VPN 329 Viewing and Deleting Dynamic ARP Entries 165
Enabling for an IPSO VPN 329 ASPATH Regular Expressions 252
Accelerator Cards Asset Management 497
Hot Swapping 328 Asset Management Summary 497
Access and Security Configuration 495 Viewing 497
Access Control List ATM
Adding a New Rule 397 Changing the IP Address of an Interface 105
Applying to an Interface 394 Changing the IP Address of an LIS Interface 110
Creating 393 Changing the IP MTU of an Interface 105, 110
Deleting 394 Changing the VPI/VCI of an Interface 104
Modifying a Rule 397 Changing the VPI/Vices of an LIS Interface 109
Removing 395 Configuring a Logical IP Subnet (LIS) Interface 108
Rules 395 Configuring an Interface 102
Access Control List Rules Configuring ARP 164
Configuring 395 Configuring QoS 404
Access Control Lists Deleting a QoS Descriptor 405
Configuring 392 Example 106
Aggregate Routes 17 Removing an Interface 105, 111
Creating 208 ATM QoS 404
Removing 208 ATM QoS Descriptor
Aggregation Class 399 Associating with an Interface and a Virtual
Creating 399 Channel 406
Deleting 400 Auditlog, Disabling 446
Aggregation Class, Associating with a Rule 400 Authentication
Nokia Network Voyager for IPSO 3.8 Reference Guide Index - 511
Methods 263 Enabling on an Interface 257
Profile Types 313 Bootstrap Protocol Relay 256
Authentication Profile Border Gateway Protocol 212
Changing a Configuration 325
Creating 313 C
Authentication, Authorization, and Accounting
CA Certificates 338
(AAA) 311
Call Traces, ISDN 89
Authentication, MD5 220
Candidate Bootstrap and Candidate Rendezvous
Point
B Configuring Router 186
Backing Up and Restoring Files 450 Cause Codes
Backup Files 450, 455 Troubleshooting 92
Manually Creating 450 Certificate and Private Key
Regularly Scheduled 450 Generating 309
Restoring 452, 453 Installing 310
Transferring to a Remote Server 452 Chargen Service 300
Backup Static Route 207 Cisco
Backup Static Routes 206 HDLC
BGP 16, 212 Changing the IP Address 144
Adjusting Timers 241 Cisco HDLC 143
AS Path Filtering 252 Changing the Keepalive Interval 143
Communities 216, 236 Configuring a Serial Interface 113
Confederation 218, 232 Configuring a T1 Interface 119
IGP Interactoins 215 Configuring an E1 Interface 127
Inbound Route Filters 10, 215 Configuring an HSSI Interface 134
Memory Requirements 222 Cisco Routers (PIM-SM), Configuring
Multi-Exit Discriminator (MED) 215 Compatibility 190
Neighbors 223 CLI Over HTTP 294
Neighbors, Verification 227 CLI Over HTTPs 294
Path Attributes 213 Cluster Management 359
Path Filtering Based on Communities 227 Cluster Voyager 378
Path Selection 243 Clustering
Redistributing Routes 18 Active 375
Redistribution 216 Adding a node to a cluster 376
Route Dampening 243 Changing Interface Configurations 383
Route Dampening, Verification 243 Cluster Mode 368
Route Inbound Policy 250 Cluster Terminology 359
Route Redistribution 245 Cluster Voyager 378
Sessions (Internal and External) 213 Configuring 357
Tables 222 Configuring in Voyager 388
BGP MED Configuring VPN-1/FireWall-1 386
Configuring 228 Creating a Cluster 368
Local Preference 230 Deleting a Configuration 384
Values Displaying Cluster Status and Members 38
Configuring 229 Example 387
Configuring for all Peers of AS200 228 Example Cluster 357
Configuring per External BGP 229 Example With a VPN Tunnel 391
Verification 230 Firewall Support 416
Bootp Relay 256 FP4 386
Disabling on an Interface 258 Internal and External Routers 390
Index - 512 Nokia Network Voyager for IPSO 3.8 Reference Guide
Joining a System 377 Monitoring 330
Managing 378 CSU/DSU, T1 Interfaces 119
Modes 359
New Cluster 367 D
No Dedicated Network 386
Data Collection Events, Configuring 28
Rebooting a Cluster 459
Recommended procedure for creating 376 Date and Time 441
Removing a Node 383 Daytime Service 300
Synchronizing the Time 384 DDR List
Adding a New Rule 84
Upgrading from IPSO 3.6 365
Applying to an Interface 85
Enabling cluster management 366 Creating 83
Upgrading IPSO Images 459
Deleting 83
Clustering Description 357
Removing from an Interface 85
Coldstart Delay
Default Route
Enabling 272
Configuring 203
COM2
Deleting IPSO 457
Configuring a Modem 295, 296
Deleting Locally Stored 455
COM2 Login 295
Dense-Mode PIM
COM3 Login 295 Setting Advanced Options 182
COM4 (PCMCIA)
Dense-Mode PIM (PIM-DM), Configuring 180
Configuring a Modem 297
Dial-on-Demand Routing Lists 82
Command-line Utility Files 21
Diffserv
Common Open Policy Server Description 407 Changing the Client ID Associated with a Specific
Community Strings Configuration 410
Disabling 472
Discard Service 299
Setting 471
Disk Mirroring 437
Configuration Lock 352
Disk Mirroring (RAID Level 1) 437
Configuration Locks
Distance Vector Multicast Routing Protocol 197
Overriding 353
DNS Hostname 436
Configuration Overview 367
DNS Server, Selecting to Resolve for Hostnames 436
Configuration Set
DSA and RSA
Deleting 449
Managing User Identities 306
Factory Default 449
DVMRP 16, 197, 198
Loading 449
DVMRP Tunnel
Managing Multiple 448 Configuring 159
Saving the Current as New 448
Creating 158
COPS 407
Removing 159
Activating and Deactivating the Client 409
DVMRP Tunnels 14, 158, 159
Client ID Dynamic Monitoring 28
Configuring Security Parameters 408
Deleting 410
E
Configuring 407
Configuring a Client ID and Policy Decision E1
Point 407 CSU/DSU 127
Expedited Forwarding 412 EBGP
Rate Shaping 411 Configuring 226
Crontab File, Scheduling Jobs 455 Load Balancing 237, 239
Cryptographic Acceleration 327 Load Balancing, Verification 241
Displaying States 40 Multihop Support 219
Internet Key Exchange Protocol (IKE) 327 Echo Service 299
Ethernet Interface
Nokia Network Voyager for IPSO 3.8 Reference Guide Index - 513
Changing the Autoadvertise Setting 56 GRE Tunnels 151
Changing the Duplex Setting 56 Example 154
Changing the IP Address 57 Group Procedures 292
Changing the Speed 55 Groups
Configuring 54 Managing 292
Exclusive Configuration Lock
Login With 352 H
Login Without 352
HA GRE Tunnels 155
Example 155
F Hello Interval, VRRP 263
Factory Default Configuration Set 449 Help
Failure Notification 441 Opening a Second Window to View 26
FDDI 70, 73 High Availability, PIM 184
FDDI Interface Hostname
Changing the Duplex Setting 72 Changing 448
Changing the IP Address 72 Hostnames, Resolving 436
Configuring 70 Hot Swapping Nokia Encryption Accelerator
Features Cards 328
Not in this Release 285 HSSI Interfaces 134
Not Supported 440 HTTP
Supported 440 Tunneling over SSH 307
Files, Backup and Restore 450 HTTP, CLI 294
Files, Restoring 452, 453 HTTPs, CLI 294
Filters, Inbound Route 249
Forward Nonlocal, IP Broadcast Helper 259 I
Frame Relay 146
IBGP
Changing the Active Status Monitor Setting 149
Configuring Static Routes 231
Changing the DLCI 147
IBGP Peer, Setting the Local Preference Value 231
Changing the Interface Type 148
IBGP, Configuring 224
Changing the IP Address 149
iclid
Changing the Keepalive Interval 146
Displaying Status 40
Changing the LMI Parameters in 148
iclid Commands 41
Configuring a Serial Interface 116
ICMPv6 Router Discovery 492
Configuring a T1 Interface 123
IGMP 200
Configuring an E1 Interface 131
Configuring 201
Configuring an HSSI Interface 137
IGP Inbound Filters, Configuring 249
Removing an Interface 150
IGRP 16, 192
FTP Access 293, 495
Aggregation 195
Aliased Interfaces 195
G Configuring 195
Gigabit Ethernet Enabling 197
Example 66 Example 196
Gigabit Ethernet Interface 65 Exterior Routes 194
Changing the IP Address 66 IKE, Cryptographic Acceleration 327
Configuring 65 Images 457
GRE Tunnel Inbound Route Filters 249
Changing IP TOS Value 153 Incoming Call
Configuring 152 Configuring the IP650 88
Creating 151 Indicators and Interface Status 13
Removing 154 Inline Help
Index - 514 Nokia Network Voyager for IPSO 3.8 Reference Guide
Viewing Dynamic for a Section or Field 25 Protocol Negotiation and Key Management 332
Viewing for the Page 25 Removing a Tunnel 350
Interface Transport mode 330
Displaying Historical Linkstate Statistics 33 Transport Rule 344
Displaying Historical Throughput Tunnel mode 330
Statistics 31, 34, 35 Tunnel Rule Example 345
Displaying Linkstate Statistics 32 Tunnels 330
Unnumbered 139 IPsec Transport Rule Example 347
Interfaces IPsec Tunnel
Assigning Roles 408 Configuring 349
Associating a Queue Class 403 IPSO 9
Changing an Unnumbered to a Numbered IPSO Image
Interface 140 Upgrading 457
Configuring 51, 369 IPSO Images
Creating a Logical 76 Deleting 457
Displaying Settings 40 Installing 457
E1 (with built-in CSU/DSU) 127 Managing 456
FDDI 70 Selecting 456
ISDN 74 Testing 456
Serial 117 IPv4 in IPv6 Tunnels 488
T1 119, 125 IPv4 or IPv6, Choosing the General Configuration
Token Ring 97 Page 336
Types 10 IPv6 484
Unnumbered 139 Configuring 483
Virtual LAN 68 Creating a Static Route 489
Interfaces, HSSI 134 Creating an Aggregate Routes 490
Inter-Gateway Routing Protocol 192 Description 484
Interior Routing Protocols 15 Displaying Running States 40
Internet Group Management Protocol 200 Interfaces 485
IP Addresses Logical Interfaces 485
Configuring 11 Neighbor Discovery 485
IP Broadcast Helper 258 Network Access and Services 495
Configuring Services 259 Router Discovery 492
Disabling Services 259 Routing Configuration 490
Forward Nonlocal 259 Traffic Management 494
IP over ATM (IPoA) 108 IPv6 and IPv4 Compatibility 486
Example 111 IPv6 Default Route 488
IP330 IPv6 in IPv4 Tunnels 486
Configuring to Place an Outgoing Call 88 IPv6 over IPv4 487
IP650 IPv6 to IPv4 487
Configuring to Handle an Incoming Call 88 ISDN 75
IPsec 340 Bearer-Capable Values 97
Creating a Policy 336 Call Traces 89
Creating a Tunnel Rule 342 Cause Code Fields 92
Device Certificates 339 Cause Values 93
Implementation in IPSO 334 Deleting a Logical Interface
Parameters 335 82
Phase 1 Configuration 335 Incoming Number 80
Platforms 335 Interfaces 74
Policies 341 Logical Interface 76
Proposal and Filters 337 Network Configuration Example 87
Nokia Network Voyager for IPSO 3.8 Reference Guide Index - 515
Place and Receive Calls N
81 Network Access 293
Receive Calls Network Access, Services 299
79 Network Devices
Removing an Incoming Number Configuring 10
81 NTP 284
Tracing Traffic 92 Configuring 285
Troubleshooting 91, 92 Peers 284
ISDN Calling Line-Identification Screening 80 Reference Clock 284
Servers 284
NTP Description 284
J
Job Scheduling, Crontab File 455
Join-Time Shared Features, Configuring 373
O
Online Help
Viewing 24
K Open Shortest Path First 169
Kernel Forwarding Table, Displaying 39 OSPF 16, 169
Authentication 170
L Configuring 171, 173
Description 169
Load Balancing, Controlling 386
Redistributing Routes 19
Logging
Unnumbered Interface 142
Setting Log Level 91
Virtual Links 142
Logical Interface
Outgoing Call
Creating 76
Configuring the IP330 88
Login 294, 352
Overriding Configuration Locks 353
Login/Logout Activity 37
Loopback Interface 150
Adding an IP Address 150 P
Changing the IP Address 150 Packages
Using 13 Deleting 461
Disabling 461
M Enabling 460
Installing 459
Mail Relay 439
Managing 459
Configuring 440
Packet Filtering 392
Mail, Sending 440
Password Procedures 289
Management Activity Log 37
Passwords, Changing 289
MED 228
Physical Interface 75
Memory Size 222
PIM 179
Message Log, Viewing 92
Debugging 190
Mirror Set
Disabling 181
Creating 437
High-Availability Mode 184
Deleting 438
PIM-DM
Modem Configuration 295, 296, 297
Configuring 180
Monitoring
PIM-SM 183
Dynamic and Static 28
PIM-SM Static Rendezvous Point 187
Multi-Exit Discrininator 228
PKI, Using 333
Multiple Static Routes
PM (Process Monitor) 499
Configuring 204
Point-to-Point Link over ATM 102
Index - 516 Nokia Network Voyager for IPSO 3.8 Reference Guide
Point-to-Point Protocol 145 Authentication 175
PPP 145 Enabling on an Interface 179
Changing the IP Address 146 Network Mask 175
Changing the Keepalive Interval 145 RIPng
Changing the Keepalive Maximum Failures 145 Configuring 490
Configuring a Serial Interface 114 Redistributing Aggregate Routes 491
Configuring a T1 Interface 121 Redistributing Interface Routes 491
Configuring an E1 Interface 129 Redistributing Static Routes 490
Configuring an HSSI Interface 135 Route
Process, Management 499 Displaying Settings 39
Protocol-Independent Multicast 179 Rank Assignments 210
Route Aggregation 207
Q Route Dampening 220
Route Rank 210
QoS Descriptor Setting 211
Creating 404
Route Redistribution 244
Queue Class 401 Route Redistribution Between Protocols 19
Configuration Values 402 Route Reflection 217
Creating 402
Router Discovery 260
Deleting 402
Router Discovery Server 260
Queue Classes
Router Discovery Services
Configuring 401
Disabling 261
Enabling 260
R Router Services
RADIUS Configuring 255
Configuring 318 Routes
Rate Shaping Bandwidth Redistributing All 246
Displaying 30 Redistributing One 245
Report 29 Routes, Redistributed 490
Redistributed Routes 490 Routing 14
Redistributing Routes 18 Configuring 167
BGP 18 Protocol Rank 211
OSPF 19 Routing Daemon
OSPF to BGP 248 Displaying Status 40
OSPF to RIP 247 Routing Information Protocol 175
RIP and IGRP 18 Routing Protocol, Displaying Information 39
RIP to OSPF 246 Routing Protocols 15
RIP to OSPF External 247 Routing Subsystem 15
Remote System Logging 443 RSA and DSA
Resource Managing User Identities 306
Displaying Settings 39 Rule
Restoring Files 452, 453 Deleting 85, 399
Remote Server 453 Modifying 84
RIP 15, 175
Auto Summarization 176, 178 S
Configuring 177 S/Key
Configuring Timers 177 Configuring 290
RIP 1 176 Disabling 292
Enabling on an Interface 179 Using 291
RIP 1, Network Mask 176 S/Key Password 292
RIP 2 175
Nokia Network Voyager for IPSO 3.8 Reference Guide Index - 517
Scheduled Jobs Deleting 442
Configuring 455 Static Monitoring 38
Scheduled Jobs, Deleting 456 Static Route
Second Window Backup 207
Opening to View Help 26 Configuring over an Unnumbered Interface 141
Secure Shell 301 Creating 203
Authorized Keys 304 Static Route, Backup 207
Changing Key Pairs 305 Static Routes 17, 202
Server Options 302 Backup 206
Secure Socket Layer 308 Configuring for an IBGP Session 231
Security and Access Configuration 495 Rank 204, 212
Security Model Statistics
Modifying a User-based User Entry 482 Interface Linkstate 33
Serial Interfaces 113 Interface Throughput 31, 34, 35
Service Module Configuration Subsystem, Routing 15
Changing 325 System
Service Profile Entry Displaying Status 40
Deleting an Item 326 System Configuration Auditlog
Session Management Setting 445
Enabling 351 System Configuration Auditlog, Deleting 446
Session Profile Configuration System Functions
Changing 326 Configuring 425
Session Profile Types 316 System Health
Session Timeouts Monitoring 35, 36
Configuring 353 System Logging 442
Settings Remote 443
Interface 40 System Logs, Monitoring 36
Slot System Resources, Monitoring and Configuring 27
Displaying Statistics 40 System Utilization, Displaying Statistics 28
SNMP 463
Agent Address 471 T
Configuring 463
T1 Interface 119, 125
Enabling and Disabling the Daemon 470
TACACS+
Entering Location and Contact Information 476
Configuring 320
Sending Traps to a Network Management
System 472 TCP MD5 Authentication 220, 242
TCP/IP stack
SNMPv3 security 479
Tuning 461
Trap Agent Address 475
tcpdump, Using with ISDN 92
Traps 473
Telnet
USM 479
Enabling Access 495
Version 471
Telnet Access 294
Software 9
Time and Date 441
Sparse-Mode PIM
Configuring 183 Time Service 300
Token Ring Interface 97, 100
Setting Advanced Options 188
Changing 99
SSH 301
Configuring 97
Configuring 301
Deactivating 98
SSL 308
Traffic Management 392
Enabling Voyager Web Access 308
Configuring 355
Troubleshooting 311
Traffic Queuing 393
Static Host 442
Index - 518 Nokia Network Voyager for IPSO 3.8 Reference Guide
Traffic Shaping 392 How to Use 23
Transparent Mode 415 Navigating 23
Configuration 420 Voyager Session Management 351
Configuring 415 Disabling 352
Functionality 419 Voyager Web Access 293
Group Configuration 415 VPN
Neighbor Learning 416 Building on ESP 332
Receive Processing 416 Configuring Tunnels 370
Transmit Processing 416 Tunnels 14
VPN Support 418 VRRP 262
VRRP Support 417 Disabling for a Transparent Mode Group 424
Transparent Mode Group Enabling Accept Connections 272
Adding an Interface 422 Enabling for a Transparent Mode Group 424
Creating 421 Hello Interval 263
Deleting 421 Monitored Circuit 264
Deleting an Interface 422 Monitored Circuit Configuration 280, 281
Disabling 423 Monitored Circuit Mode, Creating a Virtual Router
Disabling VRRP 424 (Simplified Configuration) 277
Enabling 423 Monitored Circuit, Deleting a Virtual Router 279
Enabling VRRP 424 Monitored Circuit, Deleting Configurations (Simpli-
Transparent Mode Groups fied Configuration), 279
Monitoring 424 Priority 262
Trusted CA Certificates 338 Sample Configurations 268
Tunnel Interfaces, Configuring 14 Setting a Virtual MAC Address for a Virtual
Tunnel Requirements 335 Router 273
Tunneling HTTP Over SSH 307 Troubleshooting and Monitoring 283
Virtual Routers 262
U VRRPv2 Configuration 275, 276, 277
VRRPv2, Creating a Virtual Router 270, 271
Unnumbered Interface 139
VRRPv2, Removing a Virtual Router 274
Unnumbered Interfaces 139
User
Removing 290 X
User-based Security Model User 480 X.21 113
Deleting 481
Permissions 482
Users
Adding 289
V
V.35 113
Virtual LAN 68
Virtual Router Redundancy Protocol 262
VLAN 68
Configuring an Interface 68
Deleting an Interface 69
Example Topology 70
Maximum Number 69
Voyager
Enabling Session Management 351
Help Conventions 25
Nokia Network Voyager for IPSO 3.8 Reference Guide Index - 519
Index - 520 Nokia Network Voyager for IPSO 3.8 Reference Guide