Efficient Networks Router family Command line interface Spécifications

Naviguer en ligne ou télécharger Spécifications pour Mise en réseau Efficient Networks Router family Command line interface. Efficient Networks Router family Command line interface Product specifications Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 366
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - 5RXWHU)DPLO\

Part No. 107-0002-000(IILFLHQW1HWZRUNV5RXWHU)DPLO\7HFKQLF DO5HIHUHQFH*XLGH

Page 2 - Efficient Networks

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide10 Efficient Networks®Sample VRRP Configuration. . . . . . . . . .

Page 3

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-16 Efficient Networks®Relaying BootP RequestsThe DHCP re

Page 4

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-17Network Address Translation (NAT)Net

Page 5

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-18 Efficient Networks®Masquerading With masquerading, mu

Page 6

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-19NOTE:ww.xx.yy.zz is the IP address t

Page 7

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-20 Efficient Networks®-> remote addserver 192.168.1.2

Page 8

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-21The second command gets an error due

Page 9

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-22 Efficient Networks®Server Request HierarchyAs shown e

Page 10 - Contents

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-23Classic NATWith classic NAT, one PC

Page 11

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-24 Efficient Networks®IP Address RangeThe range of local

Page 12

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-25Range Overlap Rules• The per-interfa

Page 13 - INTRODUCTION

Efficient Networks®11ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsAccessibility . . . . . . . . . . . . . . . .

Page 14 - Document Conventions

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-26 Efficient Networks®system selnat addpolicy <remote

Page 15

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-27Viewing PoliciesThe policy listing i

Page 16 - Page 1-4 Efficient Networks

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-28 Efficient Networks®-> system addserver <ipaddr&

Page 17 - WMI Web Management Interface

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-29Key Enabled FeaturesThe router has s

Page 18 - Page 1-6 Efficient Networks

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-30 Efficient Networks®NOTE:Feature keys are generated fo

Page 19 - PRODUCT OVERVIEW

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-31Key RulesThe following rules apply w

Page 20 - WAN Interfaces

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-32 Efficient Networks®Listing the Installed Feature Keys

Page 21

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-33Feature StatusThe current feature st

Page 22 - Virtual Connections

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-34 Efficient Networks®Spanning TreeThe Spanning Tree alg

Page 23 - Bridging

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-35It does the following major tasks:•

Page 24 - Page 2-6 Efficient Networks

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide12 Efficient Networks®Secure Shell (SSH) Configuration List Page.

Page 25

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-36 Efficient Networks®Manual Boot ModeWhen the router is

Page 26 - System Interoperability

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-37Option 2: Boot from Flash MemorySele

Page 27 - Protocol Conformance

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-38 Efficient Networks®The boot IP address is the router

Page 28 - IPX Routing

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-393. Select option 4 to Boot through t

Page 29 - Encapsulation Options

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-40 Efficient Networks®The debugging mode (option #) is a

Page 30 - Page 2-12 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-41The error patterns are listed in the

Page 31 - INSTALLATION AND SETUP

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-42 Efficient Networks®Routers with Six LEDsIf your route

Page 32 - Local Router

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-43Software Kernel UpgradesYou can upgr

Page 33 - IP Routing Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-44 Efficient Networks®CAUTION:Warning: Before performing

Page 34 - Page 3-4 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-45Step 7 When you are satisfied that t

Page 35

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-1CHAPTER 1CHAPTER 1 INTRODUCTIONThis man

Page 36 - IPX Routing Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-46 Efficient Networks®-> copy [email protected]:sf

Page 37

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-47Differentiated Services Framework (D

Page 38 - Bridging Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-48 Efficient Networks®QoS Deployment ExampleTo understan

Page 39

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-49bandwidth beyond the 50% minimum wil

Page 40

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-50 Efficient Networks®PoliciesQoS policies are created t

Page 41

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-51qos set -sa 192.168.1.5 192.168.1.12

Page 42 - MAC Encapsulated Routing

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-52 Efficient Networks®-du <duration> <hh:mm>

Page 43

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-53Deleting PoliciesPolicies can be del

Page 44 - Configuring Your Computer

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-54 Efficient Networks®Misc. Administrative FunctionsThe

Page 45 - Windows 98

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-1CHAPTER 5CHAPTER 5 SYSTEM SECURITYT

Page 46 - Step6 Click OK

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-2 Efficient Networks®Document ConventionsTable explains the s

Page 47 - Windows NT 4

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-2 Efficient Networks®User AuthenticationUser authenticatio

Page 48

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-3There are two methods for creating a us

Page 49 - Windows 2000

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-4 Efficient Networks®Access to system operation can be fur

Page 50 - Step5 Click Properties

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-5Access: WAN, LAN, ConsoleStatus: Enable

Page 51 - Step 7 Click OK

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-6 Efficient Networks®Initial (Default) SettingWhen the rou

Page 52 - Windows ME

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-7-> user set lookup radius Subsequent

Page 53

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-8 Efficient Networks®Managing User AccountsThe following s

Page 54 - Windows XP

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-9-> user set password myname newsecre

Page 55 - Step 5 Click Properties

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-10 Efficient Networks®Changing account accessThe Access Pr

Page 56 - Mac OS 9.x

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-11Once the RADIUS server receives the re

Page 57

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-3BER Basic Encoding Rules or Bit Error Rate

Page 58 - Mac OS X

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-12 Efficient Networks®Server Information ConfigurationFor

Page 59

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-13Radius Server ConfigurationWhile vendo

Page 60 - Page 3-30 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-14 Efficient Networks®Serial-Console Port0x00010000 Serial

Page 61

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-15Controlling Remote ManagementSeveral m

Page 62 - Installation

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-16 Efficient Networks®-> system snmpport default2->

Page 63

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-17Restricting Remote AccessTo allow remo

Page 64 - Establishing a Connection

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-18 Efficient Networks®Disabling WAN ManagementYou can allo

Page 65

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-19The following command is used to enabl

Page 66 - Terminal Sessions

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-20 Efficient Networks®PAP/CHAP Security AuthenticationThe

Page 67

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-21During link negotiation (LCP), each si

Page 68

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-4 Efficient Networks®LOP Loss of Pointer (UNI Fault Managemen

Page 69

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-22 Efficient Networks®PAP AuthenticationFor PAP, when a PA

Page 70 - Configuring the Router

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-23Authentication LevelsThe router also u

Page 71 - Configuration Tables

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-24 Efficient Networks®Receive FiltersThe router next compa

Page 72

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-25Output FiltersFinally, the router comp

Page 73

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-26 Efficient Networks®Filter ExamplesExample 1: Input Filt

Page 74

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-27-> remote ipfilter append input acc

Page 75 - Configuring PPP with Bridging

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-28 Efficient Networks®eth ip filter flush inputeth ip filt

Page 76

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-29Example 4: Medium Security FirewallThe

Page 77

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-30 Efficient Networks®# E-mail - SMTP and POP3 requests fr

Page 78

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-31# SSL acceptedremote ipfilter insert i

Page 79

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-5VPCI Virtual Path Connection IdentifierVPI

Page 80

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-32 Efficient Networks®# NNTP tcpremote ipfilter insert out

Page 81 - Test IP Routing

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-33# Turn on ip filter watch for debuggin

Page 82 - Test IPX Routing

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-34 Efficient Networks®Stateful FirewallThe Built-in Firewa

Page 83

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-35command - This parameter defines the l

Page 84 - Page 3-54 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-36 Efficient Networks®Application --a imap | telnet | boot

Page 85 - SYSTEM MANAGEMENT

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-37message logging - Specify one of these

Page 86 - DHCP Address Allocation

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-38 Efficient Networks®• The order in which the rules are e

Page 87 - DHCP Client Requests

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-39Rule ModificationTo modify a previousl

Page 88 - Adding a Subnetwork

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-40 Efficient Networks®Port Information - When port informa

Page 89

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-41Message Logging - Modifies the message

Page 90 - Setting the Lease Time

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-6 Efficient Networks®This page intentionally left blank.

Page 91

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-42 Efficient Networks®The information displayed includes:•

Page 92 - Setting Option Values

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-43The firewall shall, by default, drop a

Page 93

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-44 Efficient Networks®UDP Flood AttackSimilar to ICMP floo

Page 94 - Enable/Disable BootP

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-45Finger BombIn this attack, an intruder

Page 95

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-46 Efficient Networks®EncryptionEncryption is a key-enable

Page 96 - Commands

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-47Sample ConfigurationSuppose that the r

Page 97 - -> dhcp del 128

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-48 Efficient Networks®Observe the following guidelines:• S

Page 98 - -> dhcp clear all records

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-49File Format for the Diffie-Hellman Num

Page 99 - BootP Service

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-50 Efficient Networks®IPSec (Internet Protocol Security)IP

Page 100 - Relaying BootP Requests

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-51The router supports both IPSec encapsu

Page 101 - General NAT Rules

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-1CHAPTER 2CHAPTER 2 PRODUCT OVERVIEW

Page 102 - Client Configuration

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-52 Efficient Networks®If ESP encryption is selected, ESP a

Page 103 - Server Configuration

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-53Because VPN users are likely to be usi

Page 104 - Failed to add server

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-54 Efficient Networks®Main Mode and Aggressive ModeThe rou

Page 105

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-55Additional IKE SettingsIn addition to

Page 106 - Server Request Hierarchy

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-56 Efficient Networks®The session initiator creates a cook

Page 107 - Host Remapping

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-57The following commands define the peer

Page 108 - Page 4-24 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-58 Efficient Networks®IKE Proposal CommandsThe IKE proposa

Page 109 - Creating Policies

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-59Defines the name of a new IKE IPSec pr

Page 110 - Page 4-26 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-60 Efficient Networks®-> ike ipsec proposals set espaut

Page 111 - NetMeeting (H.323) with NAT

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-61IKE IPSec Policy CommandsThe IKE IPSec

Page 113 - Key Enabled Features

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-2 Efficient Networks®WAN InterfacesRouters are available

Page 114 - Page 4-30 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-62 Efficient Networks®Requires that the data come from the

Page 115 - Key Rules

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-63Main Mode ExampleThe following example

Page 116 - -> key list -l

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-64 Efficient Networks®# Describe the branch office IKE pha

Page 117 - Feature Revocation

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-65# Branch office example using IKE# Hom

Page 118 - Boot Code Options

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-66 Efficient Networks®ike ipsec policies add home_policyik

Page 119

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-67#Describe the branch office peer#IKE a

Page 120 - Option 1: Retry Start-Up

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-68 Efficient Networks®IPSec CommandsThe following commands

Page 121 - Option 3: Boot from Network

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-69-> ipsec set authentication <sha

Page 122 - Page 4-38 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-70 Efficient Networks®SSHSecure Shell (SSH) is a key-enabl

Page 123 - Option 6: Set Time and Date

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-71Another perspective of the SSH protoco

Page 124 - Routers with Four LEDs

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-3IDSLIDSL (ISDN DSL) A hybrid of ISDN a

Page 125

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-72 Efficient Networks®Once the secure session has been est

Page 126 - Routers with Six LEDs

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-73SSH SessionsFor SSH to be operational,

Page 127 - Software Kernel Upgrades

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-74 Efficient Networks®• Key pairs can also be generated wi

Page 128 - CAUTION:

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-75BlowfishBlowfish is a block cipher tha

Page 129 - Upgrading from the WAN

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-76 Efficient Networks®Configure Bridge FilteringBridge fil

Page 130 - Task Complete

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-1CHAPTER 6CHAPTER 6 CONNECTI

Page 131

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-2 Efficient Networks®NOTE:When you stop or restar

Page 132 - QoS Deployment Example

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-3The address ranges assigned to

Page 133 - -> qos off

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-4 Efficient Networks®RIP ControlsThe Routing Info

Page 134 - Policy Parameters

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-5The available RIP options on t

Page 135

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-4 Efficient Networks®Virtual ConnectionsThe router’s wide

Page 136 - Moving Policies

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-6 Efficient Networks®ARPARP is a low-level protoc

Page 137 - -> qos del all

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-7Dial BackupThe Dial Backup cap

Page 138 - -> time <hh:mm:ss>

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-8 Efficient Networks®To set a restriction for an

Page 139 - SYSTEM SECURITY

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-9Optionally, Dial Backup can ac

Page 140 - User Authentication

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-10 Efficient Networks®# Specify the primary phone

Page 141 - Management Classes

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-11Setting DSL Link ConditionsAf

Page 142 - Templates

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-12 Efficient Networks®The default retry period is

Page 143

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-13To clear the ping list of all

Page 144 - Procedures

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-14 Efficient Networks®During the ping test, every

Page 145 - -> user list lookup

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-15Dial SettingThe string for th

Page 146 - *********"

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-5Routing offers advantages over bridgin

Page 147 - -> user disable myname

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-16 Efficient Networks®VRRP BackupWhen a router is

Page 148 - Changing account access

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-17IP AddressEvery logical inter

Page 149 - -> rad list secret

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-18 Efficient Networks®A VRID has these characteri

Page 150 - Server Retries Timer

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-19Defining VRRP AttributesEach

Page 151 - Radius Server Configuration

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-20 Efficient Networks®Time Interval Attribute (de

Page 152

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-21NOTE:Our implementation does

Page 153 - Controlling Remote Management

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-22 Efficient Networks®Disabling or Deleting VRRPT

Page 154 - Example:

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-23Sample VRRP ConfigurationThe

Page 155 - Restricting Remote Access

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-24 Efficient Networks®eth ip vrid 7## A VRRP attr

Page 156 - -> reboot

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-25# In this example, the VRRP i

Page 157

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-6 Efficient Networks®Bridging has these capabilities:• Al

Page 158 - Authentication Process

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-26 Efficient Networks®L2TP Tunneling - Virtual Di

Page 159 - CHAP Authentication

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-27L2TP Concepts This section de

Page 160 - Authentication Passwords

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-28 Efficient Networks®Tunnels• Tunnels are virtu

Page 161 - IP Filtering

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-29A tunnel session automaticall

Page 162 - Transmit Filters

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-30 Efficient Networks®Step 2 Try to establish IP

Page 163 - ICMP Redirect

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-31NOTE:Verify that the IP addre

Page 164 - Filter Examples

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-32 Efficient Networks®AssumptionsIn this example,

Page 165 - Built-in Firewall Filters

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-333. Shared_Secret 4. 10.0.0.1L

Page 166 - Page 5-28 Efficient Networks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-34 Efficient Networks®4. Does the remote router d

Page 167

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-35Complete LNS and L2TP Client

Page 168 - Page 5-30 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-7When to Use Routing or Bridging or Bot

Page 169

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-36 Efficient Networks®Configuration ProcessThe fo

Page 170 - Page 5-32 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-37Set up ISDN parameters:isdn s

Page 171

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-38 Efficient Networks®eth ip enable eth ip addr 1

Page 172 - Stateful Firewall

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-39Set up ISDN parameters:isdn s

Page 173

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-40 Efficient Networks®remote add internet remote

Page 174 - Page 5-36 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-41PPPoE (PPP over Ethernet)PPPo

Page 175 - 64.12.11.1 -d out

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-42 Efficient Networks®In addition, if the remote

Page 176 - Deleting Firewall Rules

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-43If your service provider char

Page 177 - Rule Modification

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-44 Efficient Networks®## Enable bridging through

Page 178 - Page 5-40 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-45# ---------------------------

Page 179 - Viewing Dropped Packets

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-8 Efficient Networks®Routing and Bridging ControlsThe rou

Page 180 - Denial of Service Attacks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-46 Efficient Networks® Flags ...

Page 181 - ICMP Flood Attack

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-47Transport (Layer-2) VPNsVirtu

Page 182 - Tiny Packet Attack

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-48 Efficient Networks®Network (Layer-3) VPNsTunne

Page 183 - Ping Flood

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-49Technology StandardsIPSecThis

Page 184 - Encryption

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-50 Efficient Networks®Tunnel ServerFunctionThe L2

Page 185 - Configuration Commands

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-51LocationThis software is inst

Page 186

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-52 Efficient Networks®Workstation Client to LAN S

Page 187

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-53Types of VPNs usedBoth ATM PV

Page 188 - Page 5-50 Efficient Networks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-54 Efficient Networks®DES Encryption with Dynamic

Page 189 - Device or

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-55Step 1: Configure Both Router

Page 190 - IKE Management

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-9The router supports the following WAN

Page 191 - Phase 2 IKE:

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-56 Efficient Networks®NOTE:You cannot ping the tu

Page 192 - Phase 1 IKE — Main Mode:

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-57Set LAC and/or LNS. In this c

Page 193 - Security Associations (SAs)

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-58 Efficient Networks®Define the name of our tunn

Page 194 - -> ike peers list

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-59Add an IP route to the LAN on

Page 195

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-60 Efficient Networks®

Page 196 - IKE IPSec Proposal Commands

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-61VPN with IP Filtering and MS

Page 197 - <proposalname>

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-62 Efficient Networks®This page intentionally lef

Page 198 - Page 5-60 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-1CHAPTER 7CHAPTER 7 MON

Page 199 - IKE IPSec Policy Commands

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-2 Efficient Networks®SNMPThe Simple Network

Page 200 - IKE Configuration Examples

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-3Trap GenerationSNMP agent

Page 201 - Main Mode Example

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-10 Efficient Networks®IP RoutingIP routing support, in co

Page 202 - Page 5-64 Efficient Networks

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-4 Efficient Networks®Configuring SNMPThe rou

Page 203 - ″ThisIsASecret12345;)″

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-5Sets the SNMP password.-&

Page 204 - (No fixed IP address)

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-6 Efficient Networks®TroubleshootingSoftware

Page 205

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-7LEDs in Ready StateOnce t

Page 206 - IPSec Commands

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-8 Efficient Networks®History LogThe History

Page 207

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-9If the terminal window di

Page 208 - SSH Protocol

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-10 Efficient Networks®Connection ProblemsIf

Page 209 - Version Identification

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-11Remote Network Access Pr

Page 210 - Requests (commands)

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-12 Efficient Networks®TCP/IP Routing• Check

Page 211 - -> ssh keygen

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-13IPX Routing• Check that

Page 212 - Encryption Options

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-11Encapsulation OptionsThis section des

Page 213 - Bridge Filtering

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-14 Efficient Networks®Telnet Access Problems

Page 214 - Configure Bridge Filtering

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-15If you hear clicking dur

Page 215 - -> eth restart

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-16 Efficient Networks®remote setauthen chap

Page 216 - -> eth ip options

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-1CHAPTER 8CHAPTER 8 WEB MANA

Page 217 - Managing Routes

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-2 Efficient Networks®Radio Button Radio buttons a

Page 218 - RIP Controls

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-3Router Information PageThe prim

Page 219 - -> eth list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-4 Efficient Networks®Easy SetupThe Easy Setup scre

Page 220

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-5On the Protocol Selection page

Page 221 - Dial Backup

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-6 Efficient Networks®Point-to-Point Protocol over

Page 222 - Configuring Dial Backup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-7If IP Routing enabled is select

Page 223

 Copyright 2002, Efficient Networks, Inc.All rights reserved. Printed in the U.S.A.Efficient Networks and SpeedStream are registered trademarks, and

Page 224 - ISDN Phone Numbers

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-12 Efficient Networks®RFC 1483 or RFC 1490BridgingUser da

Page 225 - -> system list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-8 Efficient Networks®Step2 Enter the PPPoE Service

Page 226 - Addresses to Ping

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-9A PPP Username and password are

Page 227

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-10 Efficient Networks®RFC 1483 NetworkingSelection

Page 228 -

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-11Selection of this option will

Page 229 - Dial Setting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-12 Efficient Networks®RFC 1483 MAC Encapsulated Ro

Page 230 - VRRP Backup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-13Step2 Optional, click to selec

Page 231 - -> eth ip vrid 7 0:1

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-14 Efficient Networks®Dynamic Host Configuration P

Page 232 - -> eth list 0:1

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-15Selection of manual DNS config

Page 233 - -> eth vrrp list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-16 Efficient Networks®Local Area Network Configura

Page 234 - Page 6-20 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-17User ManagementThe User Manage

Page 235 - Starting VRRP

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-1CHAPTER 3CHAPTER 3 INSTALLATI

Page 236 - Disabling or Deleting VRRP

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-18 Efficient Networks®Adding A User AccountTo add

Page 237 - Internet

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-19Privileges can be configured i

Page 238 - Page 6-24 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-20 Efficient Networks®The Add/Modify User page is

Page 239

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-21Privileges can be configured i

Page 240 - Advantages of Tunneling

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-22 Efficient Networks®User Lookup ConfigurationThe

Page 241 - L2TP Client Illustration

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-23Secure Mode ConfigurationSecur

Page 242 - LAN/server

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-24 Efficient Networks®Change PasswordThe Change Pa

Page 243

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-25Access Control FormThe Access

Page 244 - Commands to configure tunnels

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-26 Efficient Networks®ExamplesThe following exampl

Page 245 - Sample Configurations

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-27Key Enabled Feature List PageT

Page 246 - Page 6-32 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-2 Efficient Networks®Remote RoutersThroughout this

Page 247

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-28 Efficient Networks®Add Feature PageThe Add Feat

Page 248 - Page 6-34 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-29Delete Feature PageThe Delete

Page 249

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-30 Efficient Networks®Update Feature PageSome feat

Page 250 - (ISDN)

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-31Feature Enabled/Disable PageWh

Page 251

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-32 Efficient Networks®Revoke Feature PageIf a feat

Page 252 - Page 6-38 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-33Unrevoke Feature PageThe Unrev

Page 253

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-34 Efficient Networks®Router Clock PageThis functi

Page 254 - Define the actual tunnel:

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-35DCHP ConfigurationDHCP is a TC

Page 255 - PPPoE (PPP over Ethernet)

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-36 Efficient Networks®To re-configure the current

Page 256 - PPPoE Client

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-37NOTE:The last IP address must

Page 257

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-3Protocols to be UsedThe informat

Page 258 - Page 6-44 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-38 Efficient Networks®NATNetwork Address Translati

Page 259 - Managing PPPoE Sessions

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-39Inbound NAT SettingThis sectio

Page 260 - Flags ... 1

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-40 Efficient Networks®Advanced SetupThe Advanced S

Page 261 - ATM or Frame Relay transport

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-41SNMPSimple Network Management

Page 262 - Tunneling

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-42 Efficient Networks®To configure SNMP, perform t

Page 263 - DES Encryption

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-43SNMP IP Filter PageThe SNMP IP

Page 264 - Page 6-50 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-44 Efficient Networks®To delete a filter, perform

Page 265 - Types of VPNs used

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-45SSHSecure Shell (SSH) allows s

Page 266 - LAN client to LAN server

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-46 Efficient Networks®Secure Shell Configuration p

Page 267 - Secure VPN Option

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-47SSH ConfigurationTo change the

Page 268 - Page 6-54 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-4 Efficient Networks®• For Remote Routers:Although

Page 269

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-48 Efficient Networks®SSH KeysDiffie-Hellman is th

Page 270 - Page 6-56 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-49Key UploadTo load the key pair

Page 271

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-50 Efficient Networks®Firewall ScriptsYour router

Page 272 - Page 6-58 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-51CAUTION:All network security e

Page 273

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-52 Efficient Networks®QoSQoS is a key enabled feat

Page 274 - Page 6-60 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-53To change the current settings

Page 275

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-54 Efficient Networks®QoS Policy Configuration pag

Page 276 - Page 6-62 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-55QoS Policy ParametersThe follo

Page 277 - PERFORMANCE

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-56 Efficient Networks®The following configuration

Page 278

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-57Step3 In the field provided, s

Page 279 - Trap Generation

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-5NOTE:An Ethernet route is usuall

Page 280 - Configuring SNMP

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-58 Efficient Networks®QoS Policy CreationTo create

Page 281

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-59Qos Policy ModificationTo modi

Page 282 - Troubleshooting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-60 Efficient Networks®Stateful FirewallAn IP filte

Page 283

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-61To change the current settings

Page 284 - Step 3 Click Connect

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-62 Efficient Networks®Dropped Packet PageThe Dropp

Page 285

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-63Firewall Rule Configuration pa

Page 286

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-64 Efficient Networks®Address - These parameters d

Page 287

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-65To delete a single rule or ran

Page 288 - Page 7-12 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-66 Efficient Networks®Firewall Rule CreationTo cre

Page 289

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-67Firewall Rule ModificationTo m

Page 290 - Software Download Problems

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-6 Efficient Networks®IPX Routing Network ProtocolSy

Page 291 - L2TP Tunnel Troubleshooting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-68 Efficient Networks®Dial BackupDial Backup, when

Page 292 - Page 7-16 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-69Step7 Enter the Reset DSL Time

Page 293 - WEB MANAGEMENT INTERFACE

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-70 Efficient Networks®Step3 Click the Home link to

Page 294

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-71Command Line InterfaceCommand

Page 295 - Router Information Page

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-72 Efficient Networks®Web Management Interface Pr

Page 296 - Easy Setup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-73tools/dhcp.html Data - Read D

Page 297

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-74 Efficient Networks®tools/loopGround.html Voice

Page 298 - Page8-6 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-7You need the following informati

Page 299

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-8 Efficient Networks®Bridging Network ProtocolTo co

Page 300 - Page8-8 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-9DNS Internet Account Information

Page 301

B. After receiving an RMA, the end user shall ship the product or defective component, including power supplies and cable, where applicable, freight o

Page 302 - RFC 1483 Networking

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-10 Efficient Networks®IP Routing Entries• For the E

Page 303

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-11DLCI number (for RFC 1490)The D

Page 304 - Page8-12 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-12 Efficient Networks®Bridging Network ProtocolTo c

Page 305

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-13If you are connecting to multip

Page 306 - Page8-14 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-14 Efficient Networks®If NAT is not enabled, you ma

Page 307

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-15Microsoft WindowsWindows 98Step1

Page 308 - Step3 Click Save and Reboot

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-16 Efficient Networks®Step6 Click OK.Step7 Click OK

Page 309 - User Management

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-17Windows NT 4Step1 On your deskto

Page 310 - Adding A User Account

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-18 Efficient Networks®Step6 Click OK.Step7 Click OK

Page 311 - Editing A User Account

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-19Windows 2000Step1 On your deskto

Page 312

Efficient Networks® Router familyTechnical Reference GuideTable of ContentsContentsEfficient Networks®51 Introduction. . . . . . . . . . . . . . . .

Page 313

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-20 Efficient Networks®Step5 Click Properties.Step6

Page 314

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-21Step 7 Click OK.Step 8 Click OK

Page 315

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-22 Efficient Networks®Windows MEStep 1 On your desk

Page 316

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-23Step 6 Under the IP Address tab

Page 317 - Access Control Form

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-24 Efficient Networks®Windows XPStep 1 On your desk

Page 318 - Feature Activation

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-25Step 4 The Local Area Connectio

Page 319 - Key Enabled Feature List Page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-26 Efficient Networks®Apple MacintoshTo configure T

Page 320

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-27Step 2 The TCP/IP control panel

Page 321 - Step2 Click Apply

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-28 Efficient Networks®Mac OS XStep 1 Under the Appl

Page 322

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-29Step 3 The Network window shoul

Page 323 - Step3 Click Apply

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide6 Efficient Networks®PPP Link Protocol (over ATM or Frame Relay)

Page 324

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-30 Efficient Networks®LinuxStep 1 From a terminal w

Page 325

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-31Step 3 When settings are comple

Page 326 - Router Clock Page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-32 Efficient Networks®InstallationVerify the Packag

Page 327 - DCHP Configuration

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-33Step 5 Connect the AC power ada

Page 328 - Page8-36 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-34 Efficient Networks®Establishing a Connection To

Page 329

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-35Step 2 Restart the PC and power

Page 330

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-36 Efficient Networks®Terminal SessionsThe router s

Page 331

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-37Step 4 In the Com 1 (or 2) Prop

Page 332 - Advanced Setup

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-38 Efficient Networks®Terminal Session for Macintos

Page 333 - SNMP Configuration Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-39Telnet Session for Remote Acces

Page 334 - Page8-42 Efficient Networks

Efficient Networks®7ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsBootP Service . . . . . . . . . . . . . . . .

Page 335 - Step2 Click Add IP Range

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-40 Efficient Networks®Configuring the RouterHaving

Page 336 - SNMP Password Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-41Configuration TablesThe followi

Page 337

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-42 Efficient Networks®Configuring PPP with IP Routi

Page 338 - Page8-46 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-43Configuring PPP with IPX Routin

Page 339 - SSH Configuration

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-44 Efficient Networks®Remote RoutersNew Entry Enter

Page 340

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-45Configuring PPP with BridgingTh

Page 341

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-46 Efficient Networks®Configuring RFC 1483 / RFC 14

Page 342 - Firewall Scripts

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-47Link Protocol/DLCIb(for Frame R

Page 343

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-48 Efficient Networks®Configuring RFC 1483 / RFC 14

Page 344 - QoS Configuration Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-49Configuring RFC 1483 / RFC 1490

Page 345 - Step4 Click Apply

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide8 Efficient Networks®Client-Server Security . . . . . . . . . . .

Page 346 - QoS Policy Configuration page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-50 Efficient Networks®Configuring RFC 1483MER / RFC

Page 347 - QoS Policy Deletion

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-51Verify the Router Configuration

Page 348 - Step3 Select a delete option

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-52 Efficient Networks®Test IP Routing to a Remote D

Page 349

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-53If you cannot access the remote

Page 350 - Step4 Click Save

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-54 Efficient Networks®This page intentionally left

Page 351 - Step2 Click Modify/Display

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-1CHAPTER 4CHAPTER 4 SYSTEM MANAGEM

Page 352

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-2 Efficient Networks®DHCP (Dynamic Host Configuration Pr

Page 353

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-3NOTE:For information on configuring t

Page 354

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-4 Efficient Networks®Manipulating Subnetworks and Explic

Page 355 - Firewall Rule Parameters

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-5Example 1:The following command creat

Page 356 - Firewall Rule Deletion

Efficient Networks®9ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsMain Mode and Aggressive Mode. . . . . . . . .

Page 357

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-6 Efficient Networks®Dynamic Client LeasesDynamic client

Page 358

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-7CommandsThe following commands are us

Page 359

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-8 Efficient Networks®To release the client lease so it b

Page 360

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-9-> dhcp clear valueoption <code

Page 361

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-10 Efficient Networks®-> dhcp list definedoptionsThis

Page 362

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-11Specify the Boot (TFTP) ServerThe fo

Page 363 - Step2 Click Execute

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-12 Efficient Networks®Configuring BootP/DHCP RelaysBootP

Page 364

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-13To list the definition for all optio

Page 365

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-14 Efficient Networks®Clearing All DHCP InformationIf ne

Page 366

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-15BootP ServiceThis section first disc

Commentaires sur ces manuels

Pas de commentaire