3Com Router User Manual
Have a look at the manual 3Com Router User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 3Com manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Sub-Interface157 Any packet reaching the null interface will be dropped, which provides another method for packet filtering: Just sending unnecessary network traffic to Null0 interface, so that there is no need to configure ACL. For example: Use static routing configuration command ip route-static 192.101.0.0 255.255.0.0 null 0 will drop all the packets sent to network segment 192.101.0.0. 2Configure operating parameters of the interface ip unreachables is the only command which can be configured on the Null interface. It indicates that the router will reply the ICMP unreachable packet when it receives packets sent to the Null interface. Please perform the following configurations in Null interface view. Ta b l e 189 Configure/Remove the sending of ICMP unreachable packet Sub-InterfaceThe 3Com Router comes up with the concept of “sub-interface” and allows users to configure multiple sub-interfaces on one physical interfaces on the 3Com Router series, making it very flexible for configuration. Sub-interfaces refer to the multiple logical virtual interfaces configured on one physical interface. These virtual interfaces share the physical layer parameters of the physical interface, meanwhile, they can be configured with their own link layer parameters and network layer parameters. Therefore, the multiple virtual interfaces corresponding to one physical are called “sub-interfaces”. ■In the 3Com Router series, the physical interfaces supporting sub-interface features include: ■Ethernet interface: When the sub-interface of Ethernet has not been configured with VLAN id, the sub-interface can only support IPX network protocol. After configured with VLAN id, it will be able to support both IPX and IP protocols. ■WAN interface which link layer protocol is frame relay: Its sub-interface can support IP and IPX network protocols. WAN interface which link layer protocol is X.25: Its sub-interface can support IP and IPX network protocols. Configure Sub-Interface According to different physical interfaces, sub-interface configuration includes: ■Configure sub-interfaces of Ethernet interface ■Configure sub-interfaces of WAN interface which link layer protocol is frame relay ■Configure sub-interfaces of WAN interface which link layer protocol is X.25 OperationCommand Configure the sending of ICMP unreachable packetip unreachables Remove the sending of ICMP unreachable packetundo ip unreachables
158CHAPTER 11: CONFIGURING LOGICAL INTERFACE Configure sub-interfaces of Ethernet interface 1Create and delete Ethernet sub-interfaces Please use the following commands in all views. Ta b l e 190 Create and delete Ethernet interface When using the above commands, if corresponding Ethernet sub-interface has been created (the same as sub-number), enter the view of this sub-interface directly. Otherwise, first create Ethernet sub-interface with sub-number as the specified one, and then enter the view of this sub-interface. 2Configure relevant working parameters If the sub-interface of Ethernet has not been configured with VLAN id, it can only support IPX network protocol. Therefore, only IPX network address and other IPX working parameters can be configured on this sub-interface. After configured with VLAN id, the sub-interface of Ethernet can support IP and IPX. The detailed configuration procedure and method are similar to those of the Ethernet interface. Please refer to Chapter 9 “Configuring LAN Interface” and Chapter 20 “Configuring IP Address”. Configure sub-interfaces of WAN interface which link layer protocol is frame relay 1Create and delete WAN sub-interfaces Please use the following commands in all views. Ta b l e 191 Create and delete WAN sub-interface When using the above commands, if corresponding WAN sub-interface has been created (the same as sub-number), enter the view of this sub-interface directly. Otherwise, first create WAN sub-interface with sub-number as the specified one, and then enter the view of this sub-interface. 2Configure relevant working parameters The following items can be configured on the sub-interface of WAN interface which link layer protocol is frame relay: ■Frame relay address mapping which is different from the affiliated WAN interface (i.e. the main interface) ■IP address which is not in the same network segment as the affiliated WAN interface OperationCommand Create Ethernet sub-interface and enter its viewinterface ethernet number.sub-number Delete the specified Ethernet sub-interfaceundo interface ethernet number.sub-number OperationCommand Create WAN sub-interface and enter its viewinterface serial number.sub-number [ multipoint | point-to-point ] Delete specified WAN sub-interfaceundo interface serial number.sub-number [ multipoint | point-to-point ]
Sub-Interface159 ■IPX network number which is different from that of the affiliated WAN interface, and other IPX working parameters ■Virtual circuit of the sub-interface Please see chapters in Operation Manual - Link Layer Protocol and Operation Manual - Network Protocol for details about the above configurations. Configure sub-interfaces of WAN interface which link layer protocol is X.25 1Create and delete WAN sub-interfaces The command is the same as above. 2Configure relevant working parameters The following items can be configured on the sub-interface of WAN interface which link layer protocol is X.25: ■X.25 address mapping different from the affiliated WAN interface (i.e. the main interface) ■IP address which is not in the same network segment as the affiliated WAN interface ■IPX network number which is different from that of the affiliated WAN interface, and other IPX working parameters ■Virtual circuit of the sub-interface Please see chapters in the Operation Manual - Link Layer Protocol and Operation Manual - Network Protocol for details about the above configurations, and sub-interface monitoring and maintenance. No further details are provided here. Typical WAN sub-interface configuration example I. Networking Requirements As shown below, WAN interface Serial0 of router A is connected with router B and router C via public frame relay network. By configuring sub-interfaces on Serial0 of router A, LAN 1 can simultaneously access LAN 2 and LAN 3 via Serial0. II. Networking Diagram Figure 48 Networking diagram of WAN sub-interface configuration example III. Configuration Procedure 1Enter the view of WAN interface Serial0 of router A [Router]interface serial 0 2Select frame relay link layer protocol Router ARouter B Router C Frame relay Ethernet 1 Serial0DLCI=50 202.38.160.1 202.38.161.2 129.9.0.0 Ethernet 3Ethernet 2 DLCI=60DLCI=70 DLCI=80 202.38.160.2 202.38.161.1129.10.0.0 129.11.0.0
160CHAPTER 11: CONFIGURING LOGICAL INTERFACE [Router-Serial0]link-protocol fr 3Specify DTE as its frame relay terminal type [Router-Serial0]fr interface-type dte 4Create sub-interface Serial 0.1 on WAN interface Serial0 of router A in point-to point mode, and enter its view [Router]interface serial 0.1 point-to-point 5Set its IP address to 202.38.160.1 and address mask to 255.255.255.0. [Router-Serial0.1]ip address 202.38.160.1 255.255.255.0 6Allocate a virtual circuit with DLCI 50 to it. [Router-Serial0.1]fr dlci 50 7Create sub-interface Serial 0.2 on WAN interface Serial0 of router A in point-to point mode, and enter its view [Router]interface serial 0.2 point-to-point 8Set its IP address to 202.38,161.1 and address mask to 255.255.255.0. [Router-Serial0.2]ip address 202.38.161.1 255.255.255.0 9Allocate a virtual circuit with DLCI 60 to it. [Router-Serial0.2]fr dlci 60 10Configure the static route from router A to LAN2 and LAN3. [Router]ip route-static 129.10.0.0 255.255.0.0 202.38.160.2 [Router]ip route-static 129.11.0.0 255.255.0.0 202.38.161.2 Configurations of router B and router C are omitted here. For fault diagnosis and troubleshooting of sub-interface, please see chapters in Operation Manual - Link Layer Protocol and Operation Manual - Network Protocol in this manual. Standby Center Logic ChannelThe standby center not only provides mutual backup between respective interfaces, but also chooses a certain virtual circuit belonging to X.25 or frame relay as the main interface or standby interface of the standby center. Please see relevant chapters in Operation Manual – Reliability for details about the standby center. To facilitate configuration, the user can specify relevant logic channel for the above-mentioned virtual circuit and configure working parameters of the standby center in the logic channel. Configure Standby Center Logic ChannelFor detailed description, monitoring and maintenance, typical configuration example, fault diagnosis and troubleshooting oriented to the configurations of the standby center logic channel, please see Operation Manual – Reliability. Virtual-Template and Virtual InterfaceVirtual-template as the name implies, is a template used to configure a virtual interface, mainly used in VPN and MP. After setting up the connection of VPN session, it is necessary to create a virtual interface to exchange data with the opposite end. At this times configuration and
Virtual-Template and Virtual Interface161 dynamically create a virtual interface based on the configuration parameters of the template. Similarly, after multiple PPP links are bound as MP, a virtual interface also needs to be created to exchange data with the opposite end. At this time, select an interface template to dynamically create a virtual interface. Configure Virtual-Template In VPN and MP application environments, the system automatically creates and deletes virtual interface, which is completely transparent to the user. The user only needs to configure VPN or MP at corresponding physical interface, create and configure virtual-template and then build up relation between the virtual-template and relevant physical interface. Virtual-template configuration includes: ■Create and delete virtual-template ■Set working parameters of the virtual-template ■Build up corresponding relation between the virtual-template and relevant physical interface. 1Create and delete virtual-template Please use the following commands in all views. Ta b l e 192 Create or delete virtual-template Here, number stands for template number of virtual-template ranging 1 to 25, i.e. the user can create up to 25 virtual-templates. In executing interface virtual-template command, if corresponding virtual-template has been created, then directly enter the view of this virtual-template. Otherwise, first create the virtual-template with specified template number. In deleting the virtual-template, make sure that all of its derived virtual interfaces have been removed and this virtual-template is not in use any more. 2Set work parameters of virtual-template Compared with normal physical interface, the virtual-template has the following features: the link layer protocol only supports PPP, and the network protocol supports IP and IPX. Therefore, the following working parameters can be set: ■Set working parameters of PPP ■Set IP address of virtual interface ■Set IP address (or IP address pool) allocated to PPP opposite end Settings of these parameters on virtual-template are the same as those on normal interface. Please see related chapters of PPP configuration in Operation Manual – Link Layer Protocol, IP address configuration in Operation Manual – Network Protocol and RADIUS configuration in Operation Manual – Security for configuration details. OperationCommand Create virtual-template and enter its viewinterface virtual-template number Delete the virtual-templateundo interface virtual-template number
162CHAPTER 11: CONFIGURING LOGICAL INTERFACE 3Create corresponding relation between the virtual-template and related physical interface In VPN application environment, it is necessary to build up corresponding relations between L2TP group and virtual-template. In MP application environment, it is necessary to build up corresponding relations between MP and virtual-template. Please see chapters in Operation Manual – VPN and Operation Manual – Link Layer Protocol for detailed description. Display and Debug Virtual-Template and Virtual InterfaceThe virtual interface, automatically created by the system if necessary, will work by using parameters of related virtual-template. So, its unnecessary for manual configuration. The virtual interface will be deleted because of low-layer link disconnection or user intervention. The following command can be used to display the state of virtual-template in all views. Ta b l e 193 Display state of the specified virtual-template TroubleshootingBefore checking and eliminating faults of virtual-template, first find out the virtual-template is used to create VPN virtual access interface or MP virtual interface, then locate the fault of the virtual-template in actual application environment. Fault 1: Fail to create virtual interface. Troubleshooting: the reasons may be as follows: ■The virtual-template is not configured with IP address. Therefore, PPP consultation fails and the virtual interface cant turn to Up state. ■The virtual-template is not configured with IP address (or IP address pool) allocated to the opposite end. If it is required to allocate addresses to the opposite end in actual application, the virtual interface cannot meet the requirement, nor turn to Up state. ■PPP authentication parameter is set incorrectly. If the opposite end is not the user defined by the router, PPP consultation will also fail. Please see related chapters of Operation Manual – VPN and Operation Manual – Link Layer Protocol for more methods of fault diagnosis and troubleshooting of virtual-template. OperationCommand Display the state of the specified virtual-templatedisplay interfaces virtual-template virtual-template-number
IV LINK LAYER PROTOCOL Chapter 12Configuring PPP and MP Chapter 13Configuring PPPoE Client Chapter 14Configuring SLIP Chapter 15Configuring ISDN Protocol Chapter 16Configuring LAPB and X.25 Chapter 17Configuring Frame Relay Chapter 18Configuring HDLC Chapter 19Configuring Bridge
12 CONFIGURING PPP AND MP This chapter contains information on the following topics: ■PPP Overview ■MP Overview ■Configure PPP ■Configure MP ■Display and Debug PPP ■Typical PPP Configuration Example ■Typical MP Configuration Example ■Fault Diagnosis and Troubleshooting of PPP PPP OverviewThe Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagram over point-to-point links. It gains wide applications since it can provide user authentication, support synchronous/asynchronous lines and can be expanded easily. PPP defines a whole set of protocols, including link control protocol (LCP), network control protocol (NCP) and authentication protocols (PAP and CHAP). Of them: ■Link Control Protocol is used to negotiate some parameters of the link and is responsible for creating and maintaining the link. ■Network Control Protocol is used to negotiate the parameters of network layer protocol. PPP Authentication Mode 1PAP authentication PAP (Password Authentication Protocol) is a 2-way handshake authentication protocol and it transmits username and password in plain text over the Internet. The process of PAP authentication is as follows: The requester repeatedly sends its username/password combination across the link until the authenticator responds with an acknowledgment or until the link is broken. The authenticator may disconnect the link if it determines that the username/password combination is not valid. 2CHAP authentication CHAP (Challenge-Handshake Authentication Protocol) is a 3-way handshake authentication protocol. It only sends the username but not the password across the link. The process of CHAP is as follows:
166CHAPTER 12: CONFIGURING PPP AND MP The authenticator sends some randomly generated packets to the requester (challenge), and at the same time it sends its configured username to the requester. When the requester receives the challenge, it will look for the user password according to the authenticators username and its own user list. If it finds the user in the user list with the same name as the authenticators username, the requester builds the response with its own password, serial number of packet using MD5 algorithm, and sends the generated response and its configured username to the authenticator (response). After receiving the response from the requester, the authenticator does the same encryption as the requester with the saved password, serial number of packet using MD5 algorithm. Then it compares the encryption result with the response from requester, and returns the response according to the comparison result (Acknowledge or Not Acknowledge). 3Phases of PPP negotiation: aWhen the physical layer is unavailable, the link is in Dead phase. A link shall start from the Dead phase. When the physical layer becomes available, PPP link enters the Establish phase. bIn Establish phase, PPP link carries out LCP negotiation, including negotiation of working mode (SP or MP), authentication mode and maximum transmission unit etc. After the successful LCP negotiation, the status of LCP is Open, indicating that the link has been established. cIf the authentication is not configured, it begins NCP negotiation. At this time, the status of LCP is still Open, while the status of NCP is changed from Initial to Request-sent. dIf the authentication is configured (the remote verifies the local or the local verifies the remote), it enters Authenticate phase to start CHAP or PAP authentication. If the authentication fails, it enters Te r m i n a t e phase, the link is removed and LCP turns down. After successful authentication, the NCP negotiation begins. At this time, the status of LCP is still Open, while the status of NCP is changed from Initial to Request-sent. eNCP negotiation supports the negotiations of IPCP and IPXCP, of which IPCP negotiation mainly includes the IP addresses of two partners. One or more network layer protocols is selected and configured through NCP negotiation. The selected network layer protocol must be configured successfully before this network layer protocol sends packets through this link. fPPP link will remain in communication status until a specific LCP or NCP frame closes this link or some external events take place (for example, the intervention of user). Phases of PPP negotiation are shown in the following diagram.