eDXC RTB v4 M
eDXC RTB v4 M
eDXC RTB v4 M
FOR
ALSTOM e-DXC
Enhanced Digital Cross-connect
USER'S MANUAL
Version 4 18 AUG, 2014
Disclaimers
II. Manufacturer assumes no responsibility for any loss or claims by third parties
that may arise through the use of this product.
IV. The contents of this manual are subject to change without prior notice due to
engineering improvements.
V. No part of this manual may be reproduced in any form without the express
written consent of the Manufacturer.
VI. Sample displays shown in this manual may differ from the actual displays.
VII. Information in this manual may differ from software information due to
firmware changes.
VIII. All brands and product names are trademarks or registered trademarks of
their respective holders.
Table of Contents
2 INSTALLATION .......................................................................................................5
2.1 Site Selection .............................................................................................................................. 5
2.2 Mechanical Installation ............................................................................................................... 5
2.3 Ethernet Connection ................................................................................................................... 6
3 OPERATION ............................................................................................................7
3.1 Using A Terminal ........................................................................................................................ 7
3.1.1 VT-100 Monitor Connection ................................................................................................... 7
3.1.2 VT-100 Monitor Serial Port Setup .......................................................................................... 8
3.2 System Operation ..................................................................................................................... 10
3.3 WAN Timeslot Map Setup ........................................................................................................ 12
3.3.1 Setting crossconnect on e-DXC Controller. ......................................................................... 12
3.3.2 Assigning timeslots for a WAN port on Router-B card. ........................................................ 14
3.4 Effecting New Configuration ..................................................................................................... 15
3.5 LED Operation .......................................................................................................................... 15
4 PPP/MLPPP...........................................................................................................16
4.1 Overview ................................................................................................................................... 16
4.2 Step by Step Setup Instructions ............................................................................................... 17
13 QOS SETUP.......................................................................................................44
13.1 Overview ................................................................................................................................... 44
13.2 Policy Syntax ............................................................................................................................ 45
13.2.1 Policy add......................................................................................................................... 45
13.2.2 Policy delete ..................................................................................................................... 46
13.2.3 Policy display ................................................................................................................... 46
13.3 Step by Step Setup Instructions ............................................................................................... 47
17 VLAN ..................................................................................................................62
17.1 Overview ................................................................................................................................... 62
17.2 VLAN Setup Instructions .......................................................................................................... 63
17.2.1 Application #1 (Fig. 16-1) Step by Step Setup Instructions ............................................. 63
17.2.2 Application #2 (Fig. 16-2) Step by Step Setup Instructions ............................................. 66
17.3 VLAN and Port Tables .............................................................................................................. 70
17.3.1 VLAN Table ...................................................................................................................... 70
17.3.2 Vlan Port Table ................................................................................................................ 70
20 COMMAND LIST................................................................................................99
List of Figures
List of Tables
Table 2-1 RJ45 10/100M Ethernet Connector Pin Assignment .............. Error! Bookmark not defined.
Table 3-1 VT-100 Monitor Parameters Default Setting ........................................................................... 8
Table 3-2 Front Panel LED Indication ................................................................................................... 15
Table 3-3 Front Panel Active LED Indication ........................................................................................ 15
Table 16-1 Transit and transmission delays.............................................. Error! Bookmark not defined.
Table 16-2 (Rapid) Spanning Tree algorithm timer values ....................... Error! Bookmark not defined.
Table 16-3 Bridge and port priority parameter values ............................... Error! Bookmark not defined.
Table 17-1 VLAN Table ........................................................................................................................... 70
Table 17-2 VLAN Port................................................................................ Error! Bookmark not defined.
Table 21-1 Subnet mask and prefix length conversion ............................. Error! Bookmark not defined.
D Bitte führen Sie das Gerät am Ende seinerLewbensdauer den zue Verfügung
stehended Rückgabeund Sammelsystemen zu.
GB At the end of the product's useful life, please dispose of it at appropriate collection
points provided in your country
F Une fois le produit en fin devie, veuillez le déposer dans un point de recyclage
approprié.
ES Para preservar el medio ambiente, al final dela vida útil de su producto, depositelo
en los laguares destinado aello de acuerdo con la legislación vigente.
P No final de vida útil do producto, por favor coloque no ponto de recolha apropriado.
I I Onde tutelare l'ambiente, non buttate l'apparecchio trai i normali rifiuti al termine
della sua vita utile, ma portatelo presso i punti DI RACCOLTA specifici per questi
rifiuti previsti dalla normativa vigente.
NL Wij raden u aan het apparant aan het einde van zijn nuttige levensduur, niet bij hey
gewone huisafval te deponeren, maar op de dearvoor bestemde adressen.
PL Gdy produkt nie nadaje sie juz do dalszego uzytku, nalezy zostawic go w jednym ze
specjalnych punktów zajmujacych sie zbiórka zuzytych producktów w wybranych
miejscach na terenie kraju.
SLO Ko se izdelku izteče življenska doba, ga odnesite na ustrezno zbirno mesto oziroma
ga odvrzite v skladu z veljavnimi predpisi.
PRC 當產品使用壽命結束,請在你的國家所提供的適當地點做好回收處理
Chapter 1 Product Description
1 Product Description
1.1 Description
The Router-B card is designed for the Alstom e-DXC. It occupies one regular slot of the Alstom e-DXC.
When used within the Alstom e-DXC, this card combines the function of a router and directs Ethernet
traffic to/from multiple WAN channels. With this card, access from LAN to WAN is accomplished within
one card, resulting in savings in cost and in space.
1.2 Applications
Application A: As a Router
WAN WAN
E1/ T1 E1/ T1
Router-B e-DXC
1 8
LAN 1 LAN 8
1
Chapter 1 Product Description
2
Chapter 1 Product Description
1.3 Specifications
WAN Interface
Up to 64 WAN ports
Each WAN port has data rate nX64K bps, 1≤ n ≤32
The total bandwidth of all 64 WAN ports is up to 8Mbps
Layer-two protocol: HDLC, PPP/MLPPP, Frame Relay, Cisco compatible HDLC
Up to 64 Frame Relay PVCs
Each interface can be configured as a bridge port or router port
LAN Interface
Eight 10/100BaseT interfaces
Auto MDI/MDI-X crossover
Speed auto-sensing
Half/full duplex auto-negotiation
Speed/duplex force mode
Compliant to IEEE 802.3u
One RJ45 connector per Ethernet port
Each interface can be configured as a bridge port or router port
Router
Routing protocol: RIP-I, RIP-II, OSPF
Static route
Address Translation
NAT/NAPT
Static address table for NAT
Port forwarding table for NAPT (Virtual Service)
DHCP
DHCP server support for LAN users (RFC2131, RFC2132)
BOOTP compatible
DHCP relay
QoS
QoS based on rate limit
Classification based on
Inbound/outbound direction
Source/destination IP addresses
DSCP
Protocol types (ICMP, TCP, UDP, …)
Port number range
Remote Bridge
User configurable aging time
Up to 16K MAC table
Cisco ISL packet transparent
VLAN packet transparent
Padding/un-padding Ethernet FCS
Rapid Spanning Tree Protocol support (IEEE 802.1w)
VLAN-ID mapping
3
Chapter 1 Product Description
Diagnostics
Ping
Traceroute
Physical
6 regular slots on e-DXC
4
Chapter 2 Installation
2 Installation
● Location of the rack should be part of the central office equipment layout design. Considerations
should be given to entrance cable routing and -48 Vdc power.
● The installation site should have -48 Vdc power. An optional AC/DC power converter can be used.
Use Only with Class 2 power source, -48 Vdc, 100 watts.
5
Chapter 2 Installation
Note: The Ethernet interface supports Auto MDI/MDI-X and will work with either a parallel or a crossover
cable.
6
Chapter 3 Operation
3 Operation
This chapter describes the Router-B card configuration options and operational functions. Refer to
subsequent chapters for detailed instructions regarding specific applications.
In order to properly set up the set up the Router-B plug-in card you will need a VT-100 Monitor. A VT-100
Monitor is a PC running emulator software. Use a DB-9 cable to connect the front Console Port of the e-
DXC to either COM Port 1or COM Port 2 of the PC you are using as a VT-100 monitor. It doesn’t matter
which COM Port you connect to.
Note: Many newer PCs come with USB Ports. If user’s PC has a USB port rather than COM ports
you will need to purchase a available PC USB to DB-9 conversion cable commercially. These
cables come with software which loaded in a PC, allow the user to send keyboard commands
through the PC’s USB Port to the DB-9 Console Port of the Router-B card.
7
Chapter 3 Operation
Open your VT-100 emulator program. Left-click your mouse on Setup. A drop-down menu will appear.
Left click your mouse on Serial port Setup.
Set COM Port to whichever COM Port you are connected to on your VT-100 monitor. Then select your
other settings from Table 3-1 below.
After selecting your settings left-click your mouse on OK. The setup screen will disapear.
To save your setup, left-click Save setup with your mouse, as shown in the screen bleow.
8
Chapter 3 Operation
You can save the setup in any directory you choose. For the sake of convenience we saved our setup in
the Loopterm file on our desktop.
9
Chapter 3 Operation
Press “O” to Log On, the following screen will show up.
[DISPLAY] [SETUP]
C -> System Config Display S -> System Config Setup
D -> SDH/SONET Display H -> SDH/SONET Setup
J -> PDH Display K -> PDH Setup
P -> Map Display G -> Map Setup
Q -> Alarm Queue M -> Alarm Setup
I -> System Information L -> File Transfer
T -> System Log V -> Store/Retrieve Backup Config
N -> Unit Registration
[LOG] [MISC]
F -> Log Off Y -> Alarm Cut Off
O -> Log On Z -> Reset
U -> Choose a Trib Unit X -> Clear Alarm Queue
W -> Return to Default
Under the Controller Menu, press “U” to select a slot for the Router-B port. Then the port menu will show
as below. In the example, the Router-B Card is installed in slot-2.
[DISPLAY] [SETUP]
C -> System Config Display S -> System Config Setup
D -> SDH/SONET Display H -> SDH/SONET Setup
J -> PDH Display K -> PDH Setup
P -> Map Display G -> Map Setup
Q -> Alarm Queue M -> Alarm Setup
I -> System Information L -> File Transfer
T -> System Log V -> Store/Retrieve Backup Config
N -> Unit Registration
[LOG] [MISC]
F -> Log Off Y -> Alarm Cut Off
O -> Log On Z -> Reset
U -> Choose a Trib Unit X -> Clear Alarm Queue
W -> Return to Default
==>> Input the unit number (A to D or 1 to 12): 11
10
Chapter 3 Operation
[DISPLAY] [SETUP]
H -> Unit Alarm State L -> Command Line
M -> Unit Alarm Setup
X -> Clear Unit Alarm State
D -> Unit Firmware & Config Transfer
[LOG] [MISC]
U -> Choose Other Slot Y -> Unit Load Default Alarm Config
F -> Log Off [SETUP],[MISC] Menu
O -> Log On [SETUP],[MISC] Menu
E -> Return to Controller Main Menu
Under the Port Menu, press “L” to select the command line interface. A blank screen with a flashing
cursor will appear. Type in the command “exit” to return to port menu. See section 4 for further details.
Welcome!!
Press '?' to get help!
[11]admin>
11
Chapter 3 Operation
1. Set crossconnect on e-DXC controller. The Router-B supports up to 8 Mbps TDM bus.
2. CLI commands instruct the Router-B timeslot assignment for WAN ports.
[DISPLAY] [SETUP]
C -> System Config Display S -> System Config Setup
D -> SDH/SONET Display H -> SDH/SONET Setup
J -> PDH Display K -> PDH Setup
P -> Map Display G -> Map Setup
Q -> Alarm Queue M -> Alarm Setup
I -> System Information L -> File Transfer
T -> System Log V -> Store/Retrieve Backup Config
N -> Unit Registration
[LOG] [MISC]
F -> Log Off Y -> Alarm Cut Off
O -> Log On Z -> Reset
U -> Choose a Trib Unit X -> Clear Alarm Queue
W -> Return to Default
<< Press ESC key to return to Main Menu or enter a command >>
12
Chapter 3 Operation
Press “C” to enter TSI map Setup and the following screen will appear.
T.S.#:01
Clear:No
d/v :d
Source
Slot :
Port :
T.S. :01
Confirm?Yes
Move the cursor to Target Slot and then down to Target Port. The following screen will appear.
e-DXC === System Setup (MAP) === 18:21:50 03/04/2009
ARROW KEYS: CURSOR MOVE, TAB/`: ROLL UP/DOWN OPTIONS
MAP NO: MAP_1
Target OCT-RTB Source
Target PO/TS D SL/PO TS PO/TS D SL/PO TS PO/TS D SL/PO TS PO/TS D SL/PO TS
Slot :11 ===== ========== ===== ========== ===== ========== ===== ==========
Port :P1 1 d 17 d
T.S. :01 2 d 18 d
3 d 19 d
4 d 20 d
T.S.#:01 5 d 21 d
Clear:No 6 d 22 d
d/v :d 7 d 23 d
8 d 24 d
9 d 25 d
Source 10 d 26 d
Slot :11 11 d 27 d
Port : 12 d 28 d
T.S. : 13 d 29 d
14 d 30 d
Confirm?Yes 15 d 31 d
16 d 32 d
13
Chapter 3 Operation
Move the cursor to Source Slot and then down to Source Port. The following screen will appear. Then,
press Y to confirm your settings.
[DISPLAY] [SETUP]
H -> Unit Alarm State L -> Command Line
M -> Unit Alarm Setup
X -> Clear Unit Alarm State
D -> Unit Firmware & Config Transfer
[LOG] [MISC]
U -> Choose Other Slot Y -> Unit Load Default Alarm Config
F -> Log Off [SETUP],[MISC] Menu
O -> Log On [SETUP],[MISC] Menu
E -> Return to Controller Main Menu
14
Chapter 3 Operation
Welcome!!
Press '?' to get help!
[11]admin>
A blank screen with a flashing cursor will appear. Type in the command interface WAN1 timeslot set 1-
32.
Welcome!!
Press '?' to get help!
[11]admin>
All changes of Router-B card configuration take effect imediately except for the following feature: system
activate routing and configuration download. The feature take effect after the unit is powered down
and then powered up again.
The front panel of the Router-B has two LEDs for each LAN port They are for: Ethernet Link/Active, and
Ethernet speed. LED Indications are listed in Table 3-2, below.
15
Chapter 4 PPP MLPPP
4 PPP MLPPP
4.1 Overview
Multilink PPP can connect multiple links between two systems as needed to provide extra bandwidth.
Remotely accessing resources through PPP Multilink allows for the increase in overall throughput by
combining the bandwidth of two or more physical communication links.
Example: To bundle the four WAN interfaces (WAN1 to WAN4) in a virtual interface(m1) and make the
virtual interface become bridge mode. When the data packets transmit from LAN to bundle interface,
MLPPP will split and recombine the packets and transmit to WAN1 to WAN4.
16
Chapter 4 PPP MLPPP
Type in the command interface WANXX timeslot set to assgin 128 timeslots to all WAN interfaces.
[11]admin>multilink create m1
Command succeeded
Create a bridge group. Following command show an example that creates a bridge without a specifying
a MAC address. In the case, the Router B card randomly generates a MAC address for the group.
17
Chapter 5 Router-B Card Setup
The Router-B card stores all configuration changes in volatile RAM. After the device reboots, all the
changes will be gone. In order to save this configuration, type in the admin comand system
configuration save and then press the Enter key. The startup configuration is stored as a CLI script.
To restore factory settings in the future use the command system configuration reset. The command
resets the configuration to the factory default setting and then reboots the card.
Router-B card supports mutiple WAN interfaces. Before configuring each WAN interface, it needs to
setup the timeslot map in advance.
Type in the command interface WAN1 and WAN2 timeslot set to assgin timeslots to WAN interface
WAN1. The following example assigns 32 timeslots to interface WAN1 from timeslot 1 to timeslot 32 and
32 timeslots (33-64) to interface WAN2.
Welcome!!
Press '?' to get help!
The following example shows how to configure the encapsulation PPP on interface WAN1 and WAN2.
Note: make sure to follow the above setup step, otherwise the internet cannot work properly.
Welcome!!
Press '?' to get help!
The above settings are the basic settings for a valid WAN interface.
18
Chapter 5 Router-B Card Setup
An interface can be in either router mode or bridge mode, the following sections show how to set the
interface to router mode and bridge mode.
To set any interfaces to bridge mode, a bridge group must be created. After creating the bridge group, for
example br1, type in the admin command bridge br1 add WAN1 and press the enter key. Then the
WANxx interface will be in bridge mode and belong to the bridge group br1.
To assign an IP address and subnet mask to the WAN interfaces, type in the admin command interface
WAN1 ip and WAN2 ip followed by the IP address and subnet mask. In the following screen below,
interface wan1 is assigned an IP address 10.1.1.1 with subnet mask 255.0.0.0 and interface wan2 is
assigned an IP address 20.1.1.1 with subnet mask 255.0.0.0.
Note: WAN interface could be in bridge mode as default. The user can type in the admin command
show interface WAN1 configuration to check current mode. To switch to router mode, type in
the command bridge xxx delete WAN1.
Welcome!!
Press '?' to get help!
19
Chapter 5 Router-B Card Setup
The users may enable the RIP routing protocol to allow Router-B card automatically exchange dynamical
routing tables with other RIP-enabled routers. To enable RIP routing protocol, type in the command
interface WAN1 and WAN2 route rip setup enable.
Welcome!!
Press '?' to get help!
Router-B card supports both RIP version 1 and RIP version 2. The default version is version 2 in Router-
B card. To change the RIP version, type in the command interface WAN2 route rip version.
Welcome!!
Press '?' to get help!
20
Chapter 5 Router-B Card Setup
An interface can be either in router mode or bridge mode, the following sections shows how to set the
interface to router mode and bridge mode.
To set any interfaces to bridge mode, a bridge group must be created. Please refer to Chapter 14 for
details. After creating the bridge group, for example br1, type in the admin command bridge br1 add
lan1 and press the enter key. Then the LAN1 interface will be in bridge mode and belong to the bridge
group br1.
To assign an IP address and subnet mask to the LAN interfaces, type in the admin command interface
lan1 ip followed by the IP address and subnet mask. In the following screen below interface lan1 is
assigned with IP address 192.168.1.254 with subnetmask 255.255.255.0.
Welcome!!
Press '?' to get help!
The users may enable the RIP routing protocol to allow Router-B card automatically exchange dynamical
routing tables with other RIP-enabled routers. To enable RIP routing protocol, type in the command
interface lan1 route rip setup enable.
Welcome!!
Press '?' to get help!
Router-B card supports both RIP version 1 and RIP version 2. The default version in Router-B card is
version 2. To change the RIP version, type in the command interface lan1 route rip version.
Welcome!!
Press '?' to get help!
21
Chapter 6 Frame Relay Setup
6.1 Overview
Each Router-B WAN port can support multiple Frame Relay PVCs up to 16. The maximum number of
PVCs in a Router-B card is 64. Figure 6-1, below, illustrates a Frame Relay setup. The dashed lines in
the diagram represent Frame Relay PVCs.
Note: Router-B cards only support user site protocol and cannot communicate directly with each other.
They must be connected to a Frame Relay network that includes devices that run on FR network
protocol. The Alstom e-DXC Frame Relay card can be used as such a device.
User
Frame Relay
Network
22
Chapter 6 Frame Relay Setup
Welcome!!
Press '?' to get help!
Set Frame Relay polling protocol as Q.933 Annex A and its parameters n391, n392, n393, and t391.
Please note that these parameters must match the parameters on the network side.
Welcome!!
Press '?' to get help!
Welcome!!
Press '?' to get help!
Note: In the above screen the first 512 is the value for the CIR (Committed Information Rate in Kbps) of
PVC1. The total sum of the CIR values for all PVCs must not exceed the total physical bandwidth of the
WAN port. Physical bandwidth can be calculated by using the formula.
Physical bandwidth= n (Where n represents number of timeslots assigned for the WAN port) x 64k.
If you are not sure how many timeslots you used in your WAN port mapping, you can check by using the
command show timeslot.
Welcome!!
Press '?' to get help!
23
Chapter 6 Frame Relay Setup
A PVC can also run a dynamic routing protocol. In following example, RIP II is enabled.
Welcome!!
Press '?' to get help!
24
Chapter 7 IP Routing Setup
7 IP Routing Setup
7.1 Overview
Figure 7-1 below illustrates the Router-B card being used in router mode. The IP address and gateway
address used in the diagram correspond to the sample configuration instructions in Section 7.2.
Peer Router IP
100.2.254.253
IP Local Network
Network With
WAN 1 LAN 1
IP address
IP: 100.2.254.254 IP: 192.168.1.1
Mask: 255.255.0.0 Mask: 255.255.255.0
IP: 160.2.254.253
Mask:255.255.0.0
IP Router
Network address
100.3.0.0
255.255.0.0
Figure 7-1 IP Routing Setup
Welcome!!
Press '?' to get help!
In example, we disable routing protocol. If the RIP 1 or RIP 2 protocol are used, the setup procedure is
complete. If RIP protocol is not supported by the peer router, the user must use static routing.
Welcome!!
Press '?' to get help!
25
Chapter 7 IP Routing Setup
Welcome!!
Press '?' to get help!
Note:
1. the user are able to specify a default route by setting the network address and subnet mask as 0
(eg. route static add 0.0.0.0/0. 100.2.254.253 WAN1).
2. max static route number: 64
26
Chapter 8 OSPF Setup
8 OSPF Setup
8.1 Overview
Figure 8-1 below illustrates the Router-B card being used in router mode. The IP address and gateway
address used in the diagram correspond to the sample configuration instructions in Section 8.2.
Peer Router IP
100.2.254.253
IP Local Network
Network With
WAN 1 LAN 1
IP address
IP: 100.2.254.254 IP: 192.168.1.1
Mask: 255.255.0.0 Mask: 255.255.255.0
IP: 160.2.254.253
Mask:255.255.0.0
IP Router
Network address
100.3.0.0
255.255.0.0
OSPF is an interior gateway protocol used for routing between routers belonging to a single Autonomous
System. OSPF uses link-state technology in which routers send each other information about the direct
connections and links which they have to other routers. Each OSPF router maintains an identical
database describing the Autonomous System's topology. From this database, a routing table is
calculated by constructing a shortest- path tree. OSPF recalculates routes quickly in the face of
topological changes, utilizing a minimum of routing protocol traffic. OSPF provides support for equal-cost
multi-path. An area routing capability is provided, enabling an additional level of routing protection and a
reduction in routing protocol traffic. In addition, all OSPF routing protocol exchanges are authenticated.
OSPF has been designed expressly for the TCP/IP internet environment, including explicit support for
CIDR and the tagging of externally-derived routing information. OSPF also provides for the authentication
of routing updates, and utilizes IP multicast when sending/receiving the updates.
OSPF routes IP packets based solely on the destination IP address found in the IP packet header. IP
packets are routed "as is" - they are not encapsulated in any further protocol headers as they transit the
Autonomous System.
OSPF allows sets of networks to be grouped together. Such a grouping is called an area. The topology of
an area is hidden from the rest of the Autonomous System. This information hiding enables a significant
reduction in routing traffic. Also, routing within the area is determined only by the area's own topology,
lending the area protection from bad routing data.
OSPF enables the flexible configuration of IP subnets. Each route distributed by OSPF has a destination
and mask. Two different subnets of the same IP network number may have different sizes (i.e., different
masks). This is commonly referred to as variable length subnetting. A packet is routed to the best (i.e.,
longest or most specific) match.
27
Chapter 8 OSPF Setup
Welcome!!
Press '?' to get help!
Type in the admin command route ospf area add 1 to create an area with ID 1.
Welcome!!
Press '?' to get help!
28
Chapter 8 OSPF Setup
Set up the WAN1 interface. Type in the admin command interface wan1 route ospf setup enable 1 to
add WAN1 into area 1. Then press the Enter key.
Welcome!!
Press '?' to get help!
Save the configuration. Type in the command system configuration save. Then press the Enter key.
This setup procedure is now complete.
Welcome!!
Press '?' to get help!
29
Chapter 9 DHCP Setup
9 DHCP Setup
9.1 DHCP Server overview
DHCP (Dynamic Host Configuration Protocol) can be used to automatically assign IP addresses, to
deliver TCP/IP stack configuration parameters (ie. subnet mask and default router), and to provide other
configuration information. Figure 9-1, below, illustrates the Router-B card set up in a DHCP server
application. All hosts (shown on the right hand side of the network diagram) can get IP addresses from
the Router-B card when its DHCP Server is enabled.
30
Chapter 10 Network Address Translation Service
Welcome!!
Press '?' to get help!
[11]admin>
Once a subnet is created, we set network address. When the DHCP server allocate an IP address for a
client, the server will also send the client proper network address. The network address is
192.168.1.0/24.
Welcome!!
Press '?' to get help!
[11]admin>
An IP address range from 192.168.1.5 to 192.168.1.20 is for the subnet by type in command dhcp
server subnet loop1 ip_range.
Welcome!!
Press '?' to get help!
[11]admin>
The command dhcp server subnet domain_name works set works for domain name.
Welcome!!
Press '?' to get help!
A DNS server 192.168.1.2 is set by command dhcp server subnet loop1 dns_server add.
31
Chapter 10 Network Address Translation Service
Welcome!!
Press '?' to get help!
To use command dhcp server interface add to add all LAN interfaces which offer DHCP service. As
following example, only the LAN1 is enabled for the service.
Welcome!!
Press '?' to get help!
The command dhcp server enables the DHCP service. When the DHCP server is running, the hosts on
network connected to LAN1 can use the DHCP to obtain IP addresses.
Welcome!!
Press '?' to get help!
32
Chapter 10 Network Address Translation Service
Command succeeded
Deploying DHCP in a single subnet network is straightforward. DHCP messages are IP broadcast
messages, and all computers on the subnet can listen to and respond to these broadcasts. A single
DHCP server is all that is required.
It is complicated when there is more than one subnet on your network. This is because the DHCP
broadcast messages do not (by default) cross the router interfaces. The DHCP relay agent allows you to
place DHCP clients and DHCP servers on different subnets of your network or even to put them on
different networks.
The following example illustrates how to enable a DHCP relay service in the Router-B card.
Welcome!!
Press '?' to get help!
10.1 Overview
The Router-B card Network Address Translation (NAT) service allows IP clients on your local network to
access the Internet without requiring you to assign globally unique IP addresses to each system. This
33
Chapter 10 Network Address Translation Service
feature is used when the user's network only needs to have a few addresses available to access the
Internet. In addition, NAT acts as a filter, allowing only certain outbound connections and guaranteeing
that inbound connections cannot be initiated from the public network.
This chapter will describe how to setup NAT service to allow clients on your private network to access a
public network, such as the Internet.
In Chapter 11 will describe how to setup port fordwarding (virtual service) to allow clients on the public
network to access selected resources on your private network.
Figure 10-1 below illustrates the Router-B card being used to provide Network Address Translation
services. The IP addresses and gateway addresses used in the diagram correspond to the sample step
by step configuration instructions in Section 10.2.
Peer Router IP
100.2.254.253
IP Local Network
Network With
WAN 1 LAN 1
IP address
IP: 100.2.254.254 IP: 192.168.1.1
Mask: 255.255.0.0 Mask: 255.255.255.0
IP: 160.2.254.253
Mask:255.255.0.0
IP Router
Network address
100.3.0.0
255.255.0.0
34
Chapter 10 Network Address Translation Service
Network address translation service is only available on WAN or PVC interfaces which is in router mode.
To implement network address translationservice on Router-B card, the relevant WAN or PVC interface
must setup properly in advance.
Note: Type in the command show interface XXX config and then press the Enter key to check.
To enable the service, type in the admin command interface XXX napt setup enable.
Welcome!!
Press '?' to get help!
When network translation service is enabled, all routing protocols (including RIP 1 and RIP 2) are
automatically disabled. This setup procedure is now complete.
35
Chapter 11 Port Forwarding - Virtual Service
11.1 Overview
When NAPT is enabled, the user is able to set up a static port forwarding table in the e-DXC Router-B
card that instructs the Router-B card to forward specific service packets to specified internal servers.
Figure 11-1 below, illlustrates a HTTP and FTP server put into an intranet by a e-DXC Router-B with a
Port Forwarding Table. The Router-B card allows users on the public network (left-hand side of the
drawing) to access the HTTP and FTP Server on the right-hand side of the drawing.
36
Chapter 11 Port Forwarding - Virtual Service
To enable port forwrding service, NAPT must be enabled in the WAN or PVC interface in advance.
The user have to establish where http packets forwarded. Type in the command interface WAN1 napt
static add http followed by the port number and the http server ip address. Then press the Enter key. In
the sample screen below the packets are forwarded to port 80, then type in the IP address 192.168.1.25
for http server.
Welcome!!
Press '?' to get help!
The user has to establish where ftp packets forwarded. Type in the command interface WAN1 napt
static add ftp followed by the port number and the ftp server ip address. Then press the Enter key. In
the sample screen below the packets are forwarded to port 21, then type in the IP address 192.168.1.25
of our ftp server.
Welcome!!
Press '?' to get help!
To view the results of setup, type in the command show interface WAN1 nat. The setup configuration
will be displayed as the screen below.
Welcome!!
Press '?' to get help!
Command succeeded
37
Chapter 12 Traffic Filtering Setup
12.1 Overview
The Router-B card provides basic traffic filtering capabilities, such as access control lists (ACL). Traffic
filtering is the process of deciding the disposition of each packet that can possibly pass through a router
with the access control lists. With this feature, Router-B card provides the basic protection mechanism for
a routing firewall host, allowing the user to determine what traffic passes through it based upon the
contents of the packet, thereby potentially limiting access to each of the networks controlled by the lists.
The access control lists are a group of entries. Each entry defines a pattern that would be found in an IP
packet and associates an action with the packets. As each packet comes through an interface with an
associated access list, the list is scanned from top to bottom for a pattern that matches the incoming
packet. A permit or deny rule associated with the pattern determines that packet's disposition. The user
can also use a mask, which is like a wild card, to determine how much of an IP source or destination
address to apply to the pattern match. The pattern statement also include a TCP or UDP destination port
number.
Also, keep in mind that once you associate the list with an interface, any packet not matched by the list is
dropped by default.
38
Chapter 12 Traffic Filtering Setup
To define an access control list, user first needs to create the list by a unique name. Each ACL policy list
is referenced by this name. Once the list is created, user can add the new entry into the list by “policy acl
<list-name> append” command to define new packet filtering rule.
Defines the packet filtering rule; instructs the new entry to add at the tail of the list defined by the name
<list-name>
<list-name> Name of the ACL policy list which is created above, each policy list has
unique name.
action Each statement’s parameter is started with the action field; specify
packets matching the criteria should permit or deny. This decides the
disposition of the packet matching the pattern definition described by
selector.
selector Packet matching criteria, the selector sets some matching condition. If
the packet matches the condition, then the packet will be applied an
action according to the parameters specified by action. Format of the
selector is as following:
"[src_ip/prefix] [dst_ip/prefix] [protocol] [service]"
39
Chapter 12 Traffic Filtering Setup
Instructs the policy to be deleted. Each policy is indexed by the policy number in the ACL policy list, user
should mention the policy number which one to be removed.
Display all the filtering rules defined in the ACL list named “list-name”
Before adding any ACL entry, an ACL list must be created first. Type in the command policy acl create
followed by the name you WANt to gice. Then press the Enter key. In the following example, the list
name “list1” is given.
Welcome!!
Press '?' to get help!
After creating the control list, ACL entris are able to be appended.
A screen with a flashing cursor will appear. Type in the command policy acl list-1 append followed by
the packet source IP address plus its subnet mask prefix length, the packet destination IP address (ie.
your HTTP server) plus its subnet mask prefix length, and finally the number of the port where the packet
will be received. Press the Enter key.
In our sample screen below we keyed in any as the source address, 192.168.1.11/32 as the destination
HTTP IP address, 32 as the destinatrion address subnet mask prefix length, and 80 as the port number.
Welcome!!
Press '?' to get help!
40
Chapter 13 QoS Setup
Before configuring the access control lists, you need to setup relevent interfaces in router mode.
For example, three servers are located in the local network. Their IP addresses are as follows:
Note: This is a sample setup only. Your setup will have IP addresses relevant to your own situation.
Our goal in this example is to protect your local network behind the LAN1 interface but still privide some
traffic to access certain servers in the local network. More specifically, the following statements are given
to illustrates our security requirement.
1. The HTTP server is accessible by all PCs (also known as hosts) in the network, no matter from
internet or local network.
2. TELNET Server access (IP: 192.168.1.33) is available only to the designated Remote User (IP:
140.100.5.5 ). No other devices, including those at the company head office (Network: 192.168.1.0)
or branch office (Network: 100.3.0.0), can reach that server.
3. IP: 100.3.0.0 is the network for company branch office, so all traffic from that site is permitted to
access PCs in company head office (Network: 192.168.1.0) except the TELNET server, which is
only available to designated Remote User (IP: 140.100.5.5 ), as desbribed above.
4. Because TFTP Server Access is provided only for the custmer site (Network: 140.1.0.0) and the
company branch office(Network: 100.3.0.0), the Router-B card shall permit TFTP packets from
those sites.
41
Chapter 13 QoS Setup
Before adding any ACL entry, an ACL list must be created first. Type in the command policy acl create
followed by the name you WANt to give. Then press the Enter key. In the following example, the list
name “list1” is given.
Welcome!!
Press '?' to get help!
After creating the control list, ACL entries are able to be appended. Press the Enter key. In the example
entry shown below, any TCP packets with port number 80 is permitted to access the HTTP server, i.e.
the HTTP session to HTTP server is allowed.
Welcome!!
Press '?' to get help!
In the example entry shows below, packets with source IP address 140.100.5.5, destination IP address
192.168.1.11, TCP port number 23 is permitted, i.e. the TELNET session requests from 140.100.5.5 to
192.168.1.11 are allowed.
Welcome!!
Press '?' to get help!
In the following example, one more entry is appended to the access control list list1. That entry denies
all TCP packets with port number 23, i.e. the TELNET session is prohibitted to any location on the
company network.
Combining the last two entrise, this access list accepts only the TELNET session from 140.100.5.5 to
192.168.1.11 and drops all other TELNET session currently, which meets the 2nd security request.
Type in the command policy ac1 list1 append followed by the permit action, the selector specified the
packet source IP address and binary code subnet mask with the branch office network to meet the 3rd
security request.
The entries are scanned from top to bottom when packets passing through the Router-B card.
Welcome!!
Press '?' to get help!
42
Chapter 13 QoS Setup
The following command will allow any packets from a branch office to pass through to head office.
However, TELNET sessions are prohibited because the command above is appended.
In the following example, one more entry is appended to the access control list list1.That entry allows
UDP packets with source address 140.1.0.0/16, destination address 192.168.1.22/32 and port number
69, i.e. the TFTP sessions from custmer site are allowed to access the company branch office.
Welcome!!
Press '?' to get help!
The final command, shown below, can be omitted. If a packet cannot match any rules, the packet will be
dropped.
Welcome!!
Press '?' to get help!
43
Chapter 13 QoS Setup
In case of checking the rule entries in the control list, the user can type in the command show policy
XXX, where XXX shall be the name of access control list. For example, type in the command show
policy list1.
Welcome!!
Press '?' to get help!
Command succeeded
The access list will be active when it is associated with a port or interface. The ACL can be applied to
incoming or outgoing packets on the interface.
Type in the command interface XXX policy acl inbound/outbound YYY, where XXX is the interface
name and YYY is the access list name. For exmaple, type in the command where XXX is WAN1 and
YYY is list1.
Welcome!!
Press '?' to get help!
Command succeeded
13 QoS Setup
13.1 Overview
In packet networks, one important requirement for link sharing is to share bandwidth on a link between
multiple agencies, where each agency wants to receive a guaranteed share of the link bandwidth during
44
Chapter 13 QoS Setup
congestion. But where bandwidth that is not being used by one agency should be available to other
agencies sharing the link. Quality of Service (QoS) is the idea that transmission rates, error rates can be
measured, improved, and to some extent guaranteed in advance. QoS enables you to provide better
service to certain flows and helps user to control the use of the outbound traffic on a given link. Router-B
QoS is policy based where the traffic type defines each policy. In e-DXC, we have classified the outgoing
traffic (i.e. policy) by packet’s IP address, network protocol and/or TCP/UDP port number. User can
configure the committed bandwidth for a particular class of traffic by mentioning the minimum and
maximum bandwidth. Make sure total configured bandwidth of all such policy must not exceed the link’s
physical bandwidth.
Note: QoS is supported for WAN interface only and it supports maximum 32 WAN interfaces at a time.
policy-num When the policy is inserted into the list, policy_num specifies insert
point of the new policy entry, for append user should not skip this
parameter.
selector Outgoing packet match criteria, the selector sets some matching
condition. If the packet going through the interface matches the
condition, then the packet will be applied an action according to the
parameters specified by action-parameter. Format of the selector is as
following:
src_ip dest_ip protocol [src_port] [dst_port] [dscp]
src_ip The source network address that are interested by the
policy. The parameter will be matched with source
address field of IP packets.
dst_ip The interested destination network address. The
parameter will be matched with destination address field
of IP packets.
protocol Interested protocol type carried by an IP packet. The
field can be a decimal value or a protocol name, like
TCP or UDP.
src_port If protocol is TCP or UDP, user can mention the specific
source port number carried by an IP packet. User can
specify a range of source port or ‘any’ if he/she is not
interested for a particular source port number.
dst_port Interested destination port number for an IP packet if
protocol is TCP or UDP. User can mention destination
port number in minimum-maximum format for a range of
port number or ‘any’ if he/she is not interested for a
particular destination port number. Both
source/destination port number is a decimal value (1 to
65535)
dscp Diffrentiated Services Code Point (DSCP) is an integer
value encoded in the DS field of an IP header. The
DSCP is an example of traffic marking because its value
corresponds with a prefred QoS as the packet traverses
the network. The DSCP value corresponds to a specific
QoS. The six most significant bits of the DiffServ field is
45
Chapter 13 QoS Setup
action_parameter action_parameter controls the outgoing traffic flow rate for IP packet
matched the policy criteria specified by selector.
rate Committed access rate in minimum-maximum format.
The minimum rate is guaranteed the minimum rate of
the selected policy. When the maximum_rate is
mentioned in the action-parameter, the parameter is
specified the maximum rate of the selected policy. If
maximum_rate is not mentioned, it is used that
maximum rate is same as minimum rate.
type Unit of rate in kbps or mbps, specify the unit of
bandwidth in bits per sec.
Instruct the policy to be deleted. Each policy is indexed by the policy number in the policy list, user
should mention the policy number which one to be removed.
This CLI is used to display all policies user ever entered for a particular interface, shows all policy in the
policy list sequentially according to the policy number.
46
Chapter 13 QoS Setup
1. interface WAN1 policy qos rate_limit append 192.168.1.0/24 any TCP 23 any 60-60 kbps
2. interface WAN1 policy qos rate_limit append 192.168.1.0/24 any TCP 21 any 120 kbps
1. interface WAN1 policy qos rate_limit append 192.168.1.0/24 any any 80 any 120-120 kbps (for www)
2. interface WAN1 policy qos rate_limit append 192.168.1.0/24 any any 300 kbps (for other)
Following are the commands to setup traffic distribution control for subnet B:
1. interface WAN1 policy qos rate_limit append 192.168.2.0/24 any TCP 23 any 60 kbps (for telnet)
2. interface WAN1 policy qos rate_limit append 192.168.2.0/24 any TCP 21 any 120-120 kbps (for ftp)
3. interface WAN1 policy qos rate_limit append 192.168.2.0/24 any any 80 120 kbps (for www)
4. interface WAN1 policy qos rate_limit append 192.168.2.0/24 any any 100-100 kbps (for other)
47
Chapter 14 Remote Bridge Setup Overview
E1
WAN 1 LAN 1
LAN
TDM
Network
e-DXC #1
E1
WAN 1 LAN 1
LAN
e-DXC #2
48
Chapter 14 Remote Bridge Setup Overview
INVALID.
49
Chapter 15 IP Routing with Bridge Setup
Figure 15-1 below illustrates the Router-A card being used for IP Routing with bridge setup. The IP
address and gateway address used in the diagram correspond to the sample step by step configuration
instructions in Section 15.1.
For e-DXC #1
50
Chapter 15 IP Routing with Bridge Setup
For e-DXC #2
Note: For the device in subnet 192.168.100.0/24. If they want to access the 192.168.1.0/24 or other
subnets which through the RTA in DXC#1, they can add a static route and the gateway is
192.168.100.254
51
Chapter 16 STP/RSTP Setup
16 STP/RSTP Setup
16.1 Overview
The Spanning Tree Algorithm can be used to detect and disable network loops and to provide backup
links between bridges. This allows the device to interact with other STP/RSTP-compliant switches or
bridges in a network to ensure that only one route exists between any two stations on the network and to
provide backup links which automatically take over when a primary link goes down.
In Figure 16-1, below, the forwarding port in Router-B #4 is blocked so that there can only be one path
between PC#1 and PC #2.
52
Chapter 16 STP/RSTP Setup
In Figure 16-2, below, the WAN link between Router-B #1 and Router-B #2 has broken. The system
immediately removes the forwarding port block in Router-B #4 so that there is still a path between PC #1
and PC #2
The Spanning Tree Algorithm can be used to detect and disable network loops and to provide backup
links between bridges. This allows the device to interact with other STP/RSTP-compliant switches or
bridges in a network to ensure that only one route exists between any two stations on the network and to
provide backup links which automatically take over when a primary link goes down.
The spanning tree algorithms supported by this device include these versions:
Spanning tree algorithm uses a distributed algorithm to select a bridging device that serves as the root of
the spanning tree network. It selects a root port on each bridging device (except for the root device)
which incurs the lowest path cost when forwarding a packet from that device to the root device. Then it
selects a designated bridging device from each LAN, which incurs the lowest path cost when forwarding
a packet from that LAN to the root device. All ports connected to designated bridging devices are
assigned as designated ports. After determining the lowest cost spanning tree, it enables all root ports
and designated ports, and disables all other ports. Network packets are therefore only forwarded
between root ports and designated ports, eliminating any possible network loops.
Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge Protocol
Data Units) transmitted from the Root Bridge. If a bridge does not get a Hello BPDU after a predefined
interval (Maximum Age), the bridge assumes that the link to the Root Bridge is down. This bridge will
then initiate negotiations with other bridges to reconfigure the network topology. RSTP is designed as a
general replacement for the slower, legacy STP. RSTP achieves much faster reconfiguration (i.e., around
one tenth of the time required by STP) when a node or port fails.
53
Chapter 16 STP/RSTP Setup
Performance of the Bridges recommends default operational values for performance parameters. These
have been specified in order to avoid the need to set values prior to operation, and have been chosen
with a view to maximizing the ease with which Bridged LAN components interoperate. Recommended
default, absolute maximum, and ranges of parameters are specified in Tables 16-1 through 16-3.
54
Chapter 16 STP/RSTP Setup
Welcome!!
Press '?' to get help!
Set WAN port and LAN port to run bridge mode. Type in the command bridge br1 add lan1 and bridge
br1 add WAN1.
Welcome!!
Press '?' to get help!
Type in the command bridge br1 spantree to enable spanning tree protocol.
Welcome!!
Press '?' to get help!
Note: Type in the command show bridge br1 config and then press the Enter key.
55
Chapter 16 STP/RSTP Setup
Type in the command bridge br1 spantree priority followed by the bridge priority value you decide to
use. Then press the Enter Key. We used 32768. In the sample screen below.
Welcome!!
Press '?' to get help!
Set up the LAN port priority. Type in the command interface lan1 spantree priority followed by the
priority value (127). Press Enter. A sample screen is shown below.
Welcome!!
Press '?' to get help!
56
Chapter 16 STP/RSTP Setup
Set up the WAN port first. Type in the command interface WAN1 spantree priority followed by the
priority value (127). Press Enter. A sample screen is shown below.
Welcome!!
Press '?' to get help!
Set up the span tree Bridge Max Age, type in the command bridge br1 spantree age followed by a time
value in seconds (25). Press Enter. A sample screen is shown below.
Command succeeded
57
Chapter 16 STP/RSTP Setup
Set up the span tree Bridge Forward Delay, type in the command bridge br1 spantree delay followed by
a time value in seconds (20). Press Enter. A sample screen is shown below.
Command succeeded
Set up the span tree Hello Time, type in the command bridge br1 spantree hello followed by a time
value in seconds (4). Press Enter. A sample screen is shown below.
Command succeeded
Set up the LAN port cost. Type in the command interface lan1 spantree cost followed by the cost value
(100). Press Enter. A sample screen is shown below.
Command succeeded
58
Chapter 16 STP/RSTP Setup
Set up the WAN port cost. Type in the command interface WAN1 spantree cost followed by the cost
value (100). Press Enter. A sample screen is shown below.
Command succeeded
Set up the LAN span tree link type. Type in the command interface lan1 spantree link-type followed by
the type of link (p-to-p). Press Enter. A sample screen is shown below.
Command succeeded
Set up the WAN span tree link type. Type in the command interface WAN1 spantree link-type
followed by the type of link (p-to-p). Press Enter. A sample screen is shown below.
Command succeeded
59
Chapter 16 STP/RSTP Setup
Set the LAN edge-port to enable. Type in the command interface lan1 spantree edge-port followed by
enable. Press Enter. A sample screen is shown below.
Command succeeded
Set the WAN edge-port to enable. Type in the command interfae WAN1 spantree edge-port followed
by enable. Press Enter. A sample screen is shown below.
Command succeeded
60
Chapter 16 STP/RSTP Setup
The setup procedure is now complete. If you WANt to see what your setup looks like, type in the
command show bridge br1 spantree and press Enter. A sample display is shown below.
Bridge Information:
Bridge ID Hello Time Max Time Max Age Forward Delay Root Cost
====================================================================================
Root 32768-00E0E951CA32 4 sec 25 sec 20 sec 0
This 32768-00E0E951CA32 4 sec 25 sec 20 sec 0
Port Information:
State Priority Cost Edge-port Link-type Root Port
====================================================================================
lan1 Disabled 127 100 enabled p-to-p No
wan1 Forward 127 100 enabled p-to-p No
Command succeeded
61
Chapter 17 VLAN
17 VLAN
17.1 Overview
VLAN is used to subdivide a LAN into smaller entities known as VLAN1, VLAN2, VLAN3, ….. VLAN
4094. A device in a particular VLAN can monitor traffic in that VLAN only, and cannot monitor packets in
any other VLANs. This provides an important level of security and also assists the user to do certain
kinds of QoS.
In Figure 17-1, below, VLAN1 and VLAN2 both feed into the VLAN-aware Ethernet Switch. The switch
assigns a Port VID to each port. VLAN1 is assigned VID:3 and VLAN2 is assigned VID:5. Transmissions
from VLAN1(VID:3) and VLAN2(VID:5) are put into tagged packets by the switch and then passed on to
the Ethernet Port of the Router-B card.
The Router-B card reads the tag on the packets and uses this VLAN id to make packet forwarding
decisions. In the diagram below, the packets are to be sent via an E1 or DS1 interface to the Network. A
physical interface such as an E1 or DS1 interface can carry multiple logical channels. Each of these
channels can carry VLAN traffic (eg. VID:3, WAN1). The router-B forwards packets of a VLAN to a proper
logical chanel according to the tags on the packets.
Tagged
Packets
Tagged
Packets
Figure 17-2, below, is much like Figure 17-1, except that it contains both tagged and untagged packets
on the ethernet side. The Router-B assigns a default VLAN ID to untagged packets (ie.VLAN3 packets in
the diagram). The default VID is always the the Port VID of the Ehernet Port.
62
Chapter 17 VLAN
VLAN1 WAN 1
(VID:3) (VID:3)
VLAN1
(VID:3)
VLAN-aware
VLAN2
Network Ethernet Switch
(VID:5) Frame Relay VLAN2
WAN 2
WAN Link (VID:5)
(VID:5)
Tagged
Tagged Packets
VLAN3 WAN 3 Packets
(VID:7) (VID:7)
10/100 Ethernet Hub
VLAN3
(Untagged)
Router-B Card for e-DXC Untagged
Packets
Connect a cable between the COM port of your PC and the Console port of the e-DXC. Then follow the
instructions below.
The first step is to create a bridge group for the Router-B card. Type in the command bridge create
followed by the given name and a MAC address. Then press the Enter key.
The second parameter, MAC adress, is an optional parameter. If MAC address is not given, the Router-B
card will generate the MAC address randomly. It may conflict with the MAC address of other devices.
Welcome!!
Press '?' to get help!
For WAN interface setup, there are WAN1and WAN2 for setting.
Router-B card supports mutiple WAN interfaces. Before configuring each WAN interface, it needs to
setup the timeslot map in advance.
Type in the command interface WANXX timeslot set to assgin timeslots to interface WAN1. The
following example assigns 32 timeslots to interface WAN1 from timeslot 1 to timeslot 32.
Welcome!!
Press '?' to get help!
63
Chapter 17 VLAN
Command succeeded
Type in the command interface WANXX timeslot set to assgin timeslots to interface WAN2. The
following example assigns 32 timeslots to interface WAN2 from timeslot 33 to timeslot 64.
Welcome!!
Press '?' to get help!
Type in the admin command bridge br1 add lan1 WAN1 WAN2.
Welcome!!
Press '?' to get help!
2. VLAN Setup
The VLAN has to enable the bridge function. Type in the command bridge br1 vlan followed by enable.
Welcome!!
Press '?' to get help!
You must create a VID for each VLAN. To create VID:3 type in the command bridge br1 vlan create 3
and press Enter. To create VID:5 type in the command bridge br1 vlan create 5.
Welcome!!
Press '?' to get help!
64
Chapter 17 VLAN
You must setup the WAN Port to allow it to process VLAN1 (VID:3) or VLAN2 (VID:5).For tagged
member of VID:3 VLAN1. Type in the command Bridge br1 vlan add 3 tag WAN1. Press Enter. For
tagged member for VID:5 VLAN2. Type in the command Bridge br1 vlan add 5 tag WAN2.
Welcome!!
Press '?' to get help!
You must setup the Ethernet Port to allow it to process VLAN1 (VID:3) and VLAN2 (VID:5). To set LAN1
Ethernet to be a tagged member for VID:3 VLAN1, type in the command Bridge br1 vlan add 3 tag
lan1. Press Enter. To set LAN1 Ethernet to be a tagged member for VID:5 VLAN2, type in the command
Bridge br1 vlan add 5 tag lan1. Press Enter.
Welcome!!
Press '?' to get help!
[11]admin>sys consave
Command succeeded
65
Chapter 17 VLAN
Connect a cable between the COM port of your PC and the Console port of the e-DXC. Then follow the
instructions below.
The second parameter, MAC adress, is an optional parameter. If MAC address is not given, the Router-B
card will generate the MAC address randomly. It may conflict with the MAC address of other devices.
Welcome!!
Press '?' to get help!
Router-B card supports mutiple WAN interfaces. Before configuring each WAN interface, it needs to
setup the timeslot map in advance.
Type in the command interface WANXX timeslot set to assgin timeslots to interface WAN1. The
following example assigns 16 timeslots to interface WAN1 from timeslot 1 to timeslot 16.
Welcome!!
Press '?' to get help!
Type in the command interface WANXX timeslot set to assgin timeslots to interface WAN2. The
following example assigns 16 timeslots to interface WAN2 from timeslot 17 to timeslot 32.
Welcome!!
Press '?' to get help!
66
Chapter 17 VLAN
Type in the command interface WANXX timeslot set to assgin timeslots to interface WAN3. The
following example assigns 16 timeslots to interface WAN3 from timeslot 33 to timeslot 48.
Welcome!!
Press '?' to get help!
Type in the admin command bridge br1 add lan1 WAN1 WAN2 WAN3.
Welcome!!
Press '?' to get help!
2. VLAN Setup
You must set the VLAN mode. Type in the command bridge br1 vlan followed by the parameter you
require. In our sample screen we chose to use enable as our parameter.
Welcome!!
Press '?' to get help!
You must create a VID for each port. To create VID:3 type in the command bridge br1 vlan create 3
and press Enter. To create VID:5 type in the command set vlan create 5. To create VID:7 type in the
command bridge br1 vlan create 7.
Welcome!!
Press '?' to get help!
67
Chapter 17 VLAN
For tagged member of VID:3 VLAN1, type in the command Bridge br1 vlan add 3 tag WAN1. Press
Enter. For tagged member of VID:5 VLAN2, type in the command Bridge br1 vlan add 5 tag WAN2. For
tagged member of VID:7 VLAN2, type in the command Bridge br1 vlan add 7 tag WAN3.
Welcome!!
Press '?' to get help!
You must setup the Ethernet Port to allow it to process VLAN1 (VID:3), VLAN2 (VID:5) and VLAN3
(VID:7)
To set LAN1 Ethernet to be a tagged member for VID:3 VLAN1, type in the command Bridge br1 vlan
add 3 tag lan1. Press Enter. To set LAN1 Ethernet to be a tagged member for VID:5 VLAN2, type in the
command Bridge br1 vlan add 5 tag lan1. Press Enter. To set LAN1 Ethernet to be an untagged
member for VID:7 VLAN3, type in the command Bridge br1 vlan add 7 untag lan1. Press Enter. Finally,
to set LAN1’s PVID to be VID:7, key I the command interface lan1 vlan pvid 7.
68
Chapter 17 VLAN
command succeeded
69
Chapter 17 VLAN
The “show bridge br1 vlan table” command can be used to access the VLAN Table. The VLAN table
displays the tagged/untagged member for each VLAN ID. There can be as many as 4094 VLAN IDs. The
VID1 appears in the table is automatically generated. The others must be created.
===============================================================
VID:1
Tag Member:
Untag Member:
BrgMng_0, lan1, wan1, wan2
================================================================
VID:3
Tag Member:
lan1, wan1
Untag Member:
================================================================
VID:5
Tag Member:
lan1, wan2
Untag Member:
Command succeeded
The “show bridge br1 vlan port” command can be used to display a port’s parameters in the VLAN
environment.
VID:5
Tag Member:
lan1, wan2
Untag Member:
Command succeeded
Command succeeded
70
Chapter 18 Setting Up Firmware Up/Download with TFTP
18.1 Overview
Firmware/Configuration Up/Download functions can be performed with the server on the LAN side (ie.
same location as the e-DXC) or with the TFTP server on an outside network.
The Router-B card being used in router mode. The TFTP Server is on the LAN side. The IP addresses
and gateway addresses used in the diagram correspond to the step by step configuration instructions
found in Section 17.3 below.
Press “D” from the Router-B main menu to enter into the submen of the File Transfer, as shown below.
[DISPLAY] [SETUP]
H -> Unit Alarm State L -> Command Line
M -> Unit Alarm Setup
X -> Clear Unit Alarm State
D -> Unit Firmware & Config Transfer
[LOG] [MISC]
U -> Choose Other Slot Y -> Unit Load Default Alarm Config
F -> Log Off [SETUP],[MISC] Menu
O -> Log On [SETUP],[MISC] Menu
E -> Return to Controller Main Menu
71
Chapter 18 Setting Up Firmware Up/Download with TFTP
<< Press ESC key to return to Previous Menu or enter a command >>
Press “A” from the screen of File Transfer to Download Firmware. Then type in the IP address of the
TFTP and the file name. Your screen will tell you how many bytes were transmitted and if the download
was successful.
<< Press ESC key to abort, ENTER key to Upload/Download Firmware >>
Press “B” from the screen of File Transfer to Download Configuration. Then type in the IP address of the
TFTP and the file name Your screen will tell you how many bytes were transmitted and if the download
was successful. Before download the configuration, the user have to make sure the Config File Name
exists.
<< Press ESC key to abort, ENTER key to Upload/Download Firmware >>
72
Chapter 18 Setting Up Firmware Up/Download with TFTP
Press “C” from the screen of File Transfer to Upload Startup Configuration. Then type in the IP address
of the TFTP and the file name.
After setting up the IP and file name, press Enter. The system will ask if you really want to upload. Press
Y to confirm.
Your screen will tell you how many bytes were transmitted and if the upload was successful.
73
Chapter 18 Setting Up Firmware Up/Download with TFTP
Press “D” from the screen of File Transfer to Upload Working Configuration. Then type in the IP address
of the TFTP and the file name. Before download the configuration, the user have to make sure the
Config File Name exists.
<< Press ESC key to abort, ENTER key to Uplad/Dowlond Firmware >>
After setting up the IP and file name, press Enter. The system will ask if you really want to upload. Press
Y to confirm.
<< Press ESC key to abort, ENTER key to Uplad/Dowlond Firmware >>
Your screen will tell you how many bytes were transmitted and if the download was successful
74
Chapter 19 Appendix A: OPERATION COMMANDS
This chapter describes the Router-B card configuration options and operational functions. Each
command requires a certan user privilege. The Router-B CLI assigns Admin a higher privilege than
Operator. In addition, Command list shows in the end of Chapter 18.
Command: ping
Privilege: operator
Syntax: ping address [-l packet_size] [-w timeout]
Explanation: Issue ICMP echo packets to a host.
Parameters: address The destination address of the ICMP packets.
packet_size How many bytes to be carried by the ICMP packets. (1 to 1500)
timeout Timeout in milliseconds to wait for each reply (1 to 5000)
Command: traceroute
Privilege: operator
Syntax: traceroute address [-l max_hops] [-w timeout]
Explanation: Issue trace route requests
Parameters: address The destination address of the ICMP packets.
timeout Timeout in milliseconds to wait for each reply (1 to 5000)
max_hops Maximum number of hops to search for target (1 to 50)
75
Chapter 19 Appendix A: OPERATION COMMANDS
In the following commands, please replace “brg_name” with the real bridge group name in your system..
76
Chapter 19 Appendix A: OPERATION COMMANDS
checked.
Parameters: direction Set inbound or outbound
list_name list name or ”off” to disable access control
Note: A hello time value that is too low results in many BPDU hello messages being
sent over the network, possibly creating excessive traffic on the network. A
77
Chapter 19 Appendix A: OPERATION COMMANDS
value that is too high slows the response to network topology changes. The
default value of 2 seconds is recommended in 802.1d/802.1w. If you change
this value, the following relationship must be obeyed:
Bridge_Max_Age >= 2 x (Bridge_Hello_Time + 1.0 seconds)
78
Chapter 19 Appendix A: OPERATION COMMANDS
Explanation: For each bridge group, it will have a interface for management. This
interface should belong to one created VLAN. It means only hosts in
this VLAN could communicate with the interface. By default, this
interface will belong to VLAN 1.
Parameters: vid bridge brg_name VLAN ID. Range from 1-4094
79
Chapter 19 Appendix A: OPERATION COMMANDS
80
Chapter 19 Appendix A: OPERATION COMMANDS
81
Chapter 19 Appendix A: OPERATION COMMANDS
Privilege: Admin
Syntax: Dhcp server interface delete interface
Explanation: Exclude the interface(s)/bridge mgmt(s) from DHCP server so that any request from
a DHCP client on that interface(s) will be ignored by the server
Parameters: Interface lan1/lan2/bridge_group_name
82
Chapter 19 Appendix A: OPERATION COMMANDS
83
Chapter 19 Appendix A: OPERATION COMMANDS
The interface commands are always associated with an interface name (ex. interface lan1). Following
commands use ifname to represent an interface name.
84
Chapter 19 Appendix A: OPERATION COMMANDS
85
Chapter 19 Appendix A: OPERATION COMMANDS
higher value, the router will be more eligible to become the Designated Router. By
setting the value to 0, the router will no longer be eligible to be the Designated
Router. The default value is 1.
Parameters: value ( Valid values are 0 to 255)
86
Chapter 19 Appendix A: OPERATION COMMANDS
87
Chapter 19 Appendix A: OPERATION COMMANDS
88
Chapter 19 Appendix A: OPERATION COMMANDS
89
Chapter 19 Appendix A: OPERATION COMMANDS
Syntax: interface ifname pvc1 dlci DLCI [CIR] [Bc] [Be] [Qdepth]
Explanation: Sets/deletes a Frame Relay PVC.
Parameters: DLCI The PVC's DLCI (0/16 to 991). The parameter specifies DLCI of the
PVC in the WAN link. DLCI=0 will delete the PVC from the bearer
channel.
[CIR] Committed Information Rate (kbps). This specifies how much bandwidth
will be provided by the PVC. It can not be greater than physical
bandwidth of the WAN link.
[Bc] Committed Burst Size (kbits). The Router-B computes graduation of
bandwidth calculation by this parameter and CIR. The calculation
graduaton is (CIR/Bc) seconds.
[Be] Excess Burst Size (kbits)
[Qdepth] Max. queue length. When the PVC can offer enough bandwidth for user
traffic, it buffers the exceeded packets in internal queue. This parameter
specifies maximum number of packets can be put in the buffer. When
the queue length exceeds the limit all packets coming later will be
dropped.
90
Chapter 19 Appendix A: OPERATION COMMANDS
91
Chapter 19 Appendix A: OPERATION COMMANDS
92
Chapter 19 Appendix A: OPERATION COMMANDS
93
Chapter 19 Appendix A: OPERATION COMMANDS
Privilege: Admin
Syntax: route static delete network
Explanation: Deletes a static route
Parameters: network Destination network (nnn.nnn.nnn.nnn/prefix)
94
Chapter 19 Appendix A: OPERATION COMMANDS
95
Chapter 19 Appendix A: OPERATION COMMANDS
96
Chapter 19 Appendix A: OPERATION COMMANDS
97
Chapter 19 Appendix A: OPERATION COMMANDS
98
Chapter 20 Command List
20 Command List
99
Chapter 20 Command List
route static delete ....................................... 107, 110 show int wan1 chdlc .......................................... 110
show int wan1 frame_relay .............................. 110
S
show int wan1 nat ............................................... 110
show bridge ......................................................... 108 show policy .......................................................... 110
show bridge brg_name config ........................ 108 show route entry ......................................... 110, 111
show bridge brg_name spantree .................... 108 show system config ........................................... 111
show bridge brg_name vlan port ................... 108 show system fwinfo ........................................... 111
show bridge brg_name vlan state .................. 108 show system hwinfo .......................................... 111
show bridge brg_name vlan table .................. 108 show system log ................................................. 111
show dhcp relay config ..................................... 108 show timeslot ....................................................... 112
show dhcp relay status ..................................... 108 system active routing ........................................ 113
show dhcp server config all............................. 109 system configuration reset .............................. 113
show dhcp server config host......................... 109 system configuration save ............................... 113
show dhcp server config subnet .................... 109 system firmware load......................................... 113
show dhcp server lease .................................... 109 system reboot ...................................................... 113
show dhcp server status .................................. 109 T
show int lan1 config ........................................... 109
show int lan1 speed ........................................... 109 traceroute ................................................................ 87
show int lan1 statistics ..................................... 110
100
Chapter 21 Appendix B: Converting a Subnet Mask to Binary Code
IP addresses are sometimes followed by their subnet mask expressed in binary (base two) code. This
binary code is called a prefix length. For example, 192.168.1.1 16 is an IP address followed by the prefix
length 16. The prefix length 16 represents the subnet mask 255.255.0.0.
The simplest way to convert a legal subnet mask into a prefix length is to use the scientific calculator
located on most PCs. In the sample Windows screen below, click on Start and then move the cursor
over the Program and Accessories headings to arrive at the Calculator heading. Click on the
Calculator heading.
The calculator will appear. Click on the Dec (Decimal) heading. A dot will mark the circle beside the Dec
heading as shown below (You can ignore the right hand side headings: Degrees, Radians and Grads.)
101
Chapter 21 Appendix B: Converting a Subnet Mask to Binary Code
The sample subnet mask that we will convert from base ten notation to base two notation is 255.255.0.0.
Type in the value 255.
Click the Bin (Binary) heading. The base two equivalent of 255 will appear as 11111111.
Now let’s look at our base ten subnet mask, 255.255.0.0. We know that 255 converts to 11111111 in
base two. We also know that 0 is 0 regardless of what base it is expressed in.
base ten
255 255 0
. . . 0
base two 11111111 11111111 0 0
If you look at the base two line in the above drawing you will notice that there are sixteen 1s in it. The
prefix length of the subnet mask 255.255.0.0. is thus 16. The table of subnet mask show as below.
102
Chapter 21 Appendix B: Converting a Subnet Mask to Binary Code
103
Chapter 22 Appendix C: Router-Activation Procedure
Use a DB9 straight cable to connect the front panel Console Port of the e-DXC Router-B card to either
COM Port 1 or COM Port 2 of the PC you are using as a VT-100 monitor. It doesn’t matter which COM
Port you connect to.
Note: Many newer PCs use USB Ports. If your computer has a USB port rather than COM ports you will
need to purchase a commercially available PC USB to DB9 RS232 conversion cable. These cables
come with software which, when loaded into a PC, will allow you to send keyboard commands through
the PC’s USB Port to the DB9 Console Port of the Router-B card.
Make sure all communication parameters are correct (ie. baud rate, data bit, stop bit, and interface).
When your VT-100 terminal and the Router-B card unit are powered up, the e-DXC screen will appear on
your VT-100 monitor.
104
Chapter 22 Appendix C: Router-Activation Procedure
Type in the command show system hwinfo. Press Enter. Hardware information will appear on the
screen.
A sample screen is shown below. On our sample screen the e-DXC serial number is 27. Your serial
number will be different.
105
Chapter 23 Glossary
Write down your serial number and then match it to the serial number/activation number list that was
provided to you by Alstom. Find the Router-Activation code for your unit.
Type in the command system activate routing followed by the Router-Activation code you found in step
3. Press Enter. If the activation code is correctly entered a prompt will say “command succeeded”.
In the sample screen below we keyed in the admin command system activate routing
0BCE88FE092388EC7E63AC0F70C587D2 because that was the activation code provided by Alstom for
serial number 27.
4. Reboot system
In order to activate the router function you must reboot the Router-B card. You can do this by unplugging
the card then plugging it into the slot or by using the system reboot command.
This procedure is now complete. All router-related commands should now be available.
106
Chapter 23 Glossary
23 Glossary
107