Software Release 9.21
Chapters to
ci co OlE Router Products
ConfigurationGuide
Chapters to6 Software Release 9.21
Corporate Headquarters PO Box 3075
1525 OBrien Drive
Menlo Park CA 94026
415 326-1941
800 553-NETS
Customer Order Number DOC-RTCG9.21
Cisco Document Assembly Number 83-0120-01
Text Part Number 78-1241-01 The products and specifications configurations and other technical information regarding the products contained in this manual are subject to change without notice All statements technical information and recommendations contained in this manual are believed to be accurate and reliable but are
without of and take full for their of in this presented warranty any kind express or implied users must responsibility application any products specified manual
incidental or limitation how warranties so Some states do not allow limitation or exclusion of liability for consequential or damages on long implied last
and also have other that the above limitations or exclusions may not apply to you This warranty gives Customers specific legal rights you may rights vary from state to state
instruction This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the manual may cause
with the limits for device interference to radio communications This equipment has been tested and found to comply Class computing pursuant to
Subpart of Part 15 of FCC Rules which are designed to provide reasonable protection against such interference when operated in commercial
will be environment Operation of this equipment in residential area is likely to cause interference in which case the user at his own expense required to take whatever measures may be required to correct the interference
The third software be included with and will be to the software license following party may your product subject agreement
The Cisco implementation of TCP header compression is an adaptation of program developed by the University of California Berkeley UCB as part of
UCB public domain version of the UNIX operating system All rights reserved Copyright 1981 Regents of the University of Califomia
Network Time Protocol NTP Copyright 1992 David Mills The University of Delaware makes no representations about the suitability of this
software for any purpose
Point-to-Point Protocol Copyright 1989 Carnegie Mellon University All rights reserved The name of the University may not be used to endorse or
promote products derived from this software without specific prior Written permission
The Cisco of is of the and the of implementation TN3270 an adaptation tn3270 curses termcap programs developed by University California Berkeley
of domain version of the UNIX All reserved 198 of the of UCB as part UCBs public operating system rights Copyright 1-1988 Regents University
California
XRemote is trademark of Network Computing Devices Inc Copyright 1989 Network Computing Devices Inc Mountain View California N.C.D
makes no representations about the suitability of this software for any purpose
The Window System is trademark of the Massachusetts Institute of Technology Copyright 1987 by Digital Equipment Corporation Maynard
Massachusetts and the Massachusetts Institute of Technology Cambridge Massachusetts All rights reserved
THIS MANUAL CISCOS SOFTWARE AND TIlE SOFTWARE OF THE ABOVE-LISTED SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING THOSE OF
MERCHANTABILITY AND FITNESS FOR PARTICULAR PURPOSE OR ARISING FROM COURSE OF DEALING USAGE OR TRADE PRACTICE
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANYINDIRECT SPECIAL CONSEQUENTIAL OR INCIDENTAL DAMAGES INCLUDING WITHOUT LIMITATION LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL EVEN IF CISCO HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES
Notice of Restricted Rights
disclosure Use duplication or by the Government is subject to restrictions as set forth in subparagraph of the Commercial Computer Software
Restricted Rights clause at FAR 52.227-19 and subparagraph 1ii of the Rights in Technical Data and Computer Software clause at DFARS 252.227-
7013 The information in this manual is subject to change without notice
Access Without Compromise CDDI CiscoWorks Cisco Intemetwork Operating System Netscape SMARTnet Tite Packet and UniverCD are trademarks
and Cisco Systems and the Cisco logo are registered trademarks of Cisco Systems Inc
All other products or services mentioned in this document are the trademarks service marks registered trademarks or registered service marks of their
respective owners
Router Products Configuration Guide
Copyright 1988-1993 Cisco Systems Inc
All rights reserved Printed in USA SOFTWARE LICENSE
READ CAREFULLY BEFORE USING ThIS SOFTWARE LICENSE AGREEMENT
PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SOFTWARE BY USING THE SOFTWARE YOU
AGREE TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS LICENSE IF YOU DO NOT AGREE WITH THE TERMS OF THIS LICENSE PROMPTLY RETURN THE UNUSED SOFTWARE MANUAL AND RELATED EQUIPMENT WITH PROOF OF PAYMENT TO THE PLACE OF PURCHASE FOR FULL REFUND
Cisco Inc to Customer nonexclusive and nontransferable license to use the Cisco software Systems Cisco grants Customer Software in object code form solely on single central processing unit owned or leased by Customer or otherwise embedded in equipment provide by Cisco Customer may make one archival of the software Customer affixes such all and copy provided to copy copyright confidentiality proprietary notices that appear on the original
Except as expressly authorized above CUSTOMER SHALL NOT COPY IN WHOLE OR IN PART SOFTWARE OR DOCUMENTATION MODIFY THE SOFTWARE REVERSE COMPILE OR REVERSE ASSEMBLE ALL OR ANY PORTION OF THE SOFTWARE OR RENT LEASE DISTRIBUTE SELL OR CREATE DERIVATIVE WORKS OF THE SOFTWARE
Customer that of the licensed agrees aspects materials including the specific design and structure of individual programs constitute trade secrets and/or copyrighted material of Cisco Customer not to disclose or otherwise make available such trade secrets or material in form agrees provide copyrighted any
third the to any party without prior consent of Cisco Customer agrees to implement reasonable security measures to protect such trade secrets and
material Title Software copyrighted to and documentation shall remain solely with Cisco
Cisco LIMITED WARRANTY warrants that the Software will substantially conform to the published specifications for such Software if used properly in accordance with the Documentation for of from the date of To be for Customer must all period ninety 90 days shipment eligible remedy report warranted problems within the warranty period to the party which supplied the Product to Customer or to the Cisco Service Partner if the Software was
multinational exported under the uplift program Ciscos sole and exclusive obligation and Customers exclusive remedy with respect to nonconforming
Software upon contact will be at Ciscos option and potentially through the Sales or Service Partner either to provide correction or workaround for any reproducible errors or ii to refund to Customer the license fee for the Software in the event that license fee was paid and the other remedy is not available or if the license fee was zero refund the of the hardware less calculated on basis Customer that it will price depreciation straightline agrees
with Cisco or its Sales or Service Partner in the environment in which the error occurred Customer to cooperate creating Further agrees supply any necessary equipment for such tests
This Limited does not to Software which has been as authorized has not been Warranty apply altered except by Cisco installed operated repaired or maintained in accordance with any installation handling maintenance or operating instructions supplied by Cisco has been subjected to unusual physical or electrical stress misuse negligence or accident is used in ultra hazardous activities has been used in such way that Cisco or its Sales
Partner cannot reasonably reproduce the Software error has been exported from the original country of destination without payment of an uplift or has been In no event does Cisco warrant that the Software is error free or that Customer will be able to its networks without misapplied operate problems or interruptions
THIS WARRANTY IS IN LIEU OF AND CISCO DISCLAIMS ALL OTHER WARRANTIES EITHER EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR PARTICULAR PURPOSE
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT SPECIAL CONSEQUENTIAL OR INCIDENTAL DAMAGES INCLUDING WITHOUT LIMITATION LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS CISCO SOFTWARE EVEN IF CISCO HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES SOME STATES DO NOT ALLOW LIMITATION OR EXCLUSION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES OR LIMITATION ON HOW LONG IMPLIED WARRANTIES LAST SO ThE ABOVE LIMITATIONS OR EXCLUSIONS MAY NOT APPLY TO CUSTOMER
Customer will with all laws and if it the This restriction shall survive comply applicable export regulations exports products termination of this Agreement
This License is effective until terminated Customer terminate this License at lime the software with may any by destroying together all copies thereof
Cisco terminate this License if the Customer fails with condition hereof may immediately to comply any term or Upon any termination of this License
Customer shall discontinue use of the Software and shall destroy all copies of the software
This License shall be and construed in accordance with the laws of the of California If hereof governed by State any portion is found to be void or
the of this License shall remain in full force and effect This License constitutes the entire License unenforceable remaining provisions between the parties with respect to the use of the Software
Restricted Rights Ciscos software and supporting documentation are provided with RESTRICTED RIGHTS Use duplication or disclosure by the
is to the restrictions set forth in of the Restricted Government subject as subparagraph Commercial Computer Software Rights clause at FAR 52.227-
19 and subparagraph clli of The Rights in Technical Data and Computer Software clause at DFARS 52.227-703 HARDWARE WARRANTY
Performance Warranty Cisco warrants to Customer for period of ninety 90 days from the shipping date that Hardware purchased under this Agreement
within the svill be free from hardware defects in material and workmanship To be eligible for remedy Customer must report all warranted problems
to the which the Product to Customer or to the Cisco Service Partner if the Hardware was under the multinational warranty period party supplied exported
uplift program
Hardware Remedies In the event of warranted problem with respect to the Hardware Customer must contact the place it acquired the Hardware or the
Cisco Service Partner if the Hardware was exported pursuant to the multinational uplift program as soon as possible after it becomes aware of the defect
Cisco or the Sales or Service Partner as appropriate will supply replacement parts for the products listed in Ciscos recommended spares list Replacement
will be within five after of Customers Cisco or its Sales or Service Partner will bear the cost for parts shipped working days receipt request shipment
Customer Customer all defective boards and assemblies to installation of the boards and of advance replacements to must return prior replacement
assemblies to Cisco or the Sales or Service Partner in accordance with the then current RMA procedures Ciscos sole snd exclusive obligation with respect
defective Hardware will Ciscos Sales Service Partner if to either advance service as to be at option and through or necessary provide replacement
described above iireplace the Product with Product that does not contain the defect or iii refund the price paid for the Hardware less depreciation
calculated on straight-line basis
The above does which has been authorized has not been installed Exclusions warranty not apply to anyProduct altered except as by Cisco operated
instructions has been to repaired or maintained in accordance with any installation handling maintenance or operating supplied by Cisco subjected
electrical is used in ultra hazardous has been used in such that Cisco unusual physical or stress misuse negligence or accident activities .5 way
from the of destination without of In no event cannot reasonably reproduce the Software error or has been exported original country payment an uplift
its networks without does Cisco warrant that Customer will be able to operate problems or interruptions
Disclaimer THIS WARRANTY IS IN LIEU OF AND CISCO DISCLAIMS ALL OTHER OF ALL OTHER WARRANTIES EXPRESSED OR IMPLIED INCLUDING THOSE OF MERCHANTABILITY NONINFRINGEMENT AND FITNESS FOR PARTICULAR PURPOSE OR ARISING FROM COURSE OF DEALING
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT SPECIAL CONSEQUENTIAL OR INCIDENTAL DAMAGES INCLUDING WITHOUT LIMITATION LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS CISCO SOFTWARE EVEN IF CISCO HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES SOME
STATES DO NOT ALLOW LIMITATION OR EXCLUSION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES OR LIMITATION ON HOW LONG IMPLIED WARRANTIES LAST SO THE ABOVE LIMITATIONS OR EXCLUSIONS MAY NOT APPLY TO CUSTOMER TABLE OF CONTENTS
About This Manual xlv
Document Objectives xlv
Audience xlv
Document Organization xlv
Document Conventions xlvi
PART Product ntroduction
Chapter Router Product Overview 1-1
Supported Network Protocols 1-1
Supported Media 1-2
Using the Router 1-2
Chapter Understanding the User Interface 2-1
User Interface Task List 2-2
Access Each Command Mode 2-2
User EXEC Mode 2-4
Privileged EXEC Mode 2-4
Global Configuration Mode 2-6
Interface Configuration Mode 2-8
Subinterface Configuration Mode 2-10
Line Configuration Mode 2-11
Router Configuration Mode 2-12
IPX-Router Configuration Mode 2-13
Route-Map Configuration Mode 2-14 ROM Monitor Mode 2-14
Get Context-Sensitive Help 2-15
Check Command Syntax 2-17
Use the Command History Features 2-18
Set the Command History Buffer Size 2-19
Recall Commands 2-19
Disable the Command History Feature 2-20
Use the Editing Features 2-20
Enable Enhanced Editing Mode 2-21
Move Around on the Command Line 2-21
Complete Partial Command Name 2-21
Paste in Buffer Entries 2-22
Edit Command Lines thatWrap 2-22
Delete Entries 2-23
Scroll Down Line or Screen 2-23
Redisplay the Current Command Line 2-24
Transpose Mistyped Characters 2-24
Table of Contents Control Capitalization 2-24
Designate Keystroke as Command Entry 2-24 Disable Enhanced Editing Mode 2-25
Set Terminal Parameters 2-25
Set Communication Speed Databits Stop Bits and Parity 2-26 Set Flow Control 2-26
Create Packet Dispatch Sequences 2-27
Specify the Terminal Type 2-27 Set the Terminal Screen Length and Width 2-27
Define Escape Character Key Sequences 2-28
Specify the International Character Display 2-28
Set Character Padding 2-28
Lock the Keyboard 2-29
Set Pending Output Notification 2-29
Prevent Errant Connection Attempts 2-29
Configure Telnet Capabilities for Session 2-29
Generate Hardware Break Signal 2-30
Suppress Telnet Remote Echo and Go Ahead Options 2-30
Negotiate Speeds 2-30
Send Telnet Synchronize Signal 2-31
Set End-of-Line Control 2-31
Use Telnet Connections 2-31
Log into Server 2-32
Connect to Remote Routers via Telnet 2-32
Switch between Telnet Connections 2-32
Execute Special Telnet Sequences 2-32
Clear Line 2-33
Exit Session 2-33
Monitor Telnet Connections 2-34
List Open Connections 2-34
Assign Logical Name to Connection 2-34
Display TCP Statistics on Open Telnet Connections 2-34
Display Current Terminal Parameters 235
Display Line Information 2-35
Enable Finger Protocol 2-35
PART System nterface Configuration Management
Chapter Loading System Images Microcode Images and Configuration Files 3-1
System Image Microcode Image and Configuration File Load Task List 3-1
Use the Autolnstall Procedure 3-2
Requirements 3-2
vi Router Products Configuration Guide How It Works 3-3
Acquire the New Routers IP Address 3-3
Resolve the IP Address to the Host Name 3-4
Download the New Routers Host Configuration File 3-5
Perform the Autolnstall Procedure 3-6
Modify the Existing Routers Configuration 3-6
Set up the TFTP Server 3-8
Set up the BOOTP or RARP Server 3-9
Connect the New Router to the Network 3-10
Enter Configuration Mode 3-11
Configure the Router from the Terminal 3-11
Configure the Router from Nonvolatile Memory 3-12
Configure the Router from File on Remote Host 3-12
Modify the Configuration Register Boot Field 3-12
Specify the System Image the Router Loads upon Restart 3-14 Loading from Flash Memory 3-14
Security Precautions 3-15
Flash Memory Configuration 3-15 Loading from Network Server 3-17 Loading from ROM 3-18
Using Fault-Tolerant Boot Strategy 3-19
Specify the Configuration File the Router Loads upon Restart 3-19
Network Configuration File 3-20
Host Configuration File 3-20
Change the Buffer Size for Loading Configuration Files 3-21
Manually Load System Image 3-22
Manually Booting from Flash 3-22
Manually Netbooting 3-23
Manually Booting from ROM 3-23
Configure Router as TFTP Server 3-24
Configure Router as RARP Server 3-24
Specify SLIP Extended BOOTP Requests 3-26
Specify MOP Server Boot Requests 3-26
Copy System Images from Network Server to Flash Memory 3-27
Verify the Image in Flash Memory 3-30
Copy System Images from Flash Memory to Network Server 3-30
Copy Configuration File from the Router to Network Server 3-31
Display System Image and Configuration Information 3-32
Clear the Contents of NVRAM 3-33
Reexecute the Configuration Commands in NVRAM 3-33
Table of Contents vii Use Flash Memory as TFTP Server 3-33
Prerequisites 3-33
Configuring the Flash Server 3-34
Configuring the Client Router 3-34
Loading Microcode Images over the Network 3-36
Display Microcode Information 3-37
Chapter Configuring Terminal Lines and Modem Support 4-1
Enter Line Configuration Mode 4-1
Create Additional Virtual Terminal Lines 4-2
Eliminate Virtual Terminal Lines 4-2
Absolute versus Relative Line Numbers 4-2
Configuration Task List 4-3
Set Communication Parameters 4-4
Configure Automatic Baud Detection 4-4
Configure Flow Control for Communications 4-4
Define Command String for Automatic Execution 4-5
Create Packet Dispatch Sequences 4-5
Specify the Transport Protocol for Specific Line 4-5
Establish Terminal Session Limits 4-6
Set up Modem Control on the Auxiliary Port 4-6
Configure Automatic Dialing 4-7
Close Modem Connections 4-8
Automatically Answer Modem 4-9
Support Dial-In Modem 4-11
Support Reverse Modem Connections/Prevent Incoming Calls 4-12
Support Dial-In and Dial-Out Modems 4-13
Configure Line Timeout Interval 4-14
Configure Support for Chat Scripts 4-15
Configure Rotary Groups 4-15
Configure Automatic Line Disconnect 4-15
Configure High-Speed Modem Support 4-15
Support Reverse TCP Connections 4-16
Define Terminal Operation Characteristics 4-16
Specify the Terminal Type 4-17 Set the Terminal Screen Length and Width 4-17
Define Escape Character and Other Key Sequences 4-18
Specify the International Character Display 4-18
Set Character Padding 4-19
Disable Enhanced Editing Mode 4-19
Set Terminal-Locking Mechanism 4-20
Dedicate Line to Particular User 4-20
Provide Line Connection Information after the Login Prompt 4-20
Enable Password Checking at Login 4-20
Act as Pipe for File Transfers 4-21
Configure Terminal Banner Messages 4-21
Configure Message-of-the-Day MOTD Banner 4-22
Configure Line Activation Message 4-22
viii Router Products Configuration Guide Configure an Incoming Message Banner 4-22
Configure an Idle Terminal Message 4-22
Enable or Disable the Display of Messages 4-23
Configure Telnet Capabilities 4-23
Generate Hardware Break Signal 4-23
Suppress Telnet Remote Echo and Go-Ahead Options 4-24
Negotiate Speed 4-24
Send Telnet Synchronize Signal 4-24
Set End-of-Line Control 4-24
Define Telnet Connection Failure and Success Messages 4-25
Record the Device Location 4-25
Set Pending Output Notification 4-25 Refuse Connection 4-25
Establish and Control the EXEC Process 4-26
Display Debug Messages on the Terminal 4-26
Configuration Examples 4-26
Line Configuration Example 4-27
Example of Creating Additional Virtual Terminal Lines 4-27
Example of Eliminating Virtual Terminal Lines 4-27
Banner Message Example 4-28
Password Checking Examples 4-28
Chapter Managing the System 5-1
Understanding System Management 5-2
Configuration Management 5-3
Set the Router Name 5-3
Set the Router Time Services 5-3
Network Time Protocol 5-4
VINES Time Service 5-5
Cisco 7000 Calendar 5-5
Configure NTP 5-5
Configure NTP Authentication 5-5
Configure NTP Associations 5-6
Configure NTP Broadcast Service 5-6
Configure NTP Access Restrictions 5-7
Configure the Source IP Address for NTP Packets 5-8
Configure the System as an Authoritative NTP Server 5-8
Configure NTP to Update the Cisco 7000 Calendar 5-8
Configure VINES Time Service 5-9
Configure Time and Date Manually 5-9
Configure the Time Zone 5-9
Configure Summer Time 5-10
Set the System Clock 5-10
Set the Cisco 7000 Calendar 5-10
Monitor Time Services 5-12
Configure Simple Network Management Protocol SNMP Support 5-12 Enable SNMP and Define Access Control 5-13
Define SNMP Trap Operations 5-13
Define the Maximum SNMP Packet Size 5-13
Table of Contents ix Enable the SNMP Server Shutdown Mechanism 5-14 5-14 Establish the Contact Location and Serial Number of the SNMP Server
Disable the SNMP Server 5-14 Monitor SNMP Status 5-14
Security Management 5-15
Establish Password Protection 5-15
Protect Access to Terminal Lines 5-15 5-16 Protect Access to Privileged EXEC Commands 5-16 Encrypt the Passwords Disable Password Protection 5-16
Recover Lost Password 5-16
Create Access Lists 5-17
Establish Terminal Access Control 5-18
Set TACACS Password Protection at the User Level 5-19
Disable Password Checking at the User Level 5-19 5-19 Set Optional Password Verification Level 5-20 Set TACACS Password Protection at the Privileged
Disable Password Checking at the Privileged Level 5-20
Set Notification of User Actions 5-21
Set Authentication of User Actions 5-21 5-21 Establish the TACACS Server Host and Response Times
Set Limits on Login Attempts 5-22
Enable the Extended TACACS Mode 5-22
Establish Username Authentication 5-22
Authentication Protocol 5-23 Enable Challenge Handshake CHAP
Fault Management 5-23
Display System Information 5-24 5-24 Receiving Automatic Warning Messages 5-25 Receiving the Automatic Shutdown Message
Test Network Connectivity 5-25
Set up TCP Keepalive Packet Service 5-25
Test Connections with the Ping Command 5-26
Trace Packet Routes 5-26
Limit TCP Transactions 5-26
Test Memory and Interfaces 5-27
Test Flash 5-27
Test System Memory 5-27
Test Interfaces 5-27
Log System Error Messages 5-27 5-28 Log Errors to UNIX Syslog Daemon Enable Message Logging 5-28
Set the Error Message Display Device 5-29 Define the Error Message Severity Level and Facilities 5-29
Define the Syslog Facility 5-30
Enable Timestamps on Log Messages 5-31
Enable Debug Operations 5-32
System Performance Management 5-32
Configure Switching and Scheduling Priorities 5-33
Establish Queuing Strategies 5-33
Router Products Configuration Guide Set Priority by Protocol Type 5-35
Assign Default Priority 5-35
Set Priority by Interface Type 5-35
Specify the Maximum Packets and Bytes in the Priority Queues 5-36
Assign Priority by STUN Address 5-36
Assign Priority Group or Custom Queue to an Interface 5-36
Monitor the Priority and Custom Queuing Lists 5-37 Modify the System Buffer Size 5-37
Delay EXEC Startup 5-38
Handle Idle Telnet Connection 5-38
Accounting Management 5-38
Display Stack Utilization 5-38
Display Memory Utilization 5-39
System Management Examples 5-39
System Configuration File Example 5-40
Clock Calendar and NTP Configuration Examples 5-40
Examples of Modifying Buffers 5-41
Username Examples 5-41
Chapter Configuring Interfaces 6-1
Interface Configuration Task List 6-1
Understand Supported Interfaces and Encapsulations 6-2
Synchronous Serial 6-2
Synchronous Serial Encapsulation Methods 6-3
Asynchronous Serial 6-3
Asynchronous Serial Encapsulation Methods 6-3
Ethernet 6-4
Ethernet Encapsulation Methods 6-4
Token Ring 6-4
Token Ring Encapsulation Methods 6-5 ISDN Basic Rate Interface BRI 6-5
ISDN Encapsulation Methods 6-5 Fiber Distributed Data Interface FDDI 6-6
FDDI Encapsulation Methods 6-6 Using Connection Management CMT Information 6-6 High-Speed Serial Interface HSSI 6-7
HSSI Encapsulation Methods 6-8 Online Insertion and Removal OIR 6-8
Understand Fast and Autonomous Switching Support 6-9
Fast Switching Support 6-9
Autonomous Switching Support 6-9
Transparent Bridging 6-9
IP over PPP and IETF Frame Relay 6-10 IPX 6-10
Configure the Interface Type 6-10
Configure an ISDN Basic Rate Interface 6-11
Configure Dialer Interface 6-11
Table of Contents xi 6-11 Configure an Ethernet Interface
Configure an FDDI Interface 6-12
Configure an HSSI Interface 6-12
Configure Loopback Interface 6-12
Configure Null Interface 6-13 6-13 Configure Synchronous Serial Interface
Configure Token Ring Interface 6-13
Configure Tunnel Interface 6-13 6-14 Configure an Asynchronous Serial Interface Establish Asynchronous Connections using PPP or SLIP 6-14 Interface 6-17 Configuring Serial 6-18 Configuring the CRC
Using the NRZI Line Coding Format 6-18 Clock 6-18 Enabling the Internal Clock 6-18 Inverting the Transmit Signal
6-19 Add Description for an Interface
Configure Subinterfaces 6-19 and 6-19 Understand Supported Interfaces Encapsulations Interfaces Frame 6-21 Configure Subinterfaces on Serial Running Relay Encapsulation and Ethernet Interfaces Configure Subinterfaces on Token Ring FDDI Running
Multiple IPX Encapsulations 6-23
Understand Tunneling 6-25
Advantages of Tunneling 6-25 6-26 Special Considerations
6-27 Configure IP Tunneling Interface 6-28 Configure the Tunnel 6-28 Configure the Tunnel Source Destination 6-28 Configure the Tunnel Mode 6-28 Configure the Tunnel 6-29 Configure End-to-End Checksumming
Identification 6-29 Configure Tunnel Key Out-of-Order 6-29 Configure Tunnel Interface to Drop Datagrams Monitor IP Tunnels 6-30
Reenable HIDLC Serial Encapsulation 6-30
Select the Ethernet Encapsulation 6-30
Module the Cisco 4000 6-31 Configure the Ethernet Network Interfac on
the Cisco 4000 6-31 Extend the lOBaseT Capability on
Configure ATM-DXI 6-31
Convert HSSI to Clock Master 6-31
Enable MOP 6-32
Enable MOP Message Support 6-32
Select the Token Ring Speed 6-32
Enable Early Token Release 6-32
xii Router Products Configuration Guide Select the ISDN BRI Switch Type 6-33
Define ISDN Service Profile Identifiers SPIDs 6-33
Define ISDN TEl Negotiation 6-34
Configure FDDI Timers and Features 6-34
Enable FDDI Bridging Encapsulation 6-34 Set Token Rotation Time 6-35
Set the Transmission Valid Timer 6-36
Control the Transmission Timer 6-36
Modify the C-Mm Timer 6-36 Modify the TB-Mm Timer 6-36 Modify the FDDI Timeout Timer 6-36
Control SMT Frame Processing 6-37
Enable Duplicate Address Checking 6-37
Set the Bit Control 6-37
Control the CMT Microcode 6-37
Start and Stop FDDI 6-38
Configure FDDI Dual-Homing 6-38 Control the FDDI SMT Message Queue Size 6-38
Configure the Point-to-Point Protocol 6-38
Enable PPP Encapsulation 6-39 Enable Challenge Handshake Authentication Protocol CHAP 6-39 Enable Link Quality Monitoring LQM 6-40
PPP Magic Number Support 6-40
Configure Dial Backup Service 6-40
Configure Loopback Detection 6-41
Set Transmit Delay 6-42
Configure DTR Signal Pulsing 6-42
Configure the Clock Rate on DCE Appliques 6-42
Specify the Serial Network Interface Module Timing 642
Control Interface Hold-Queue Limits 6-43
Set Bandwidth 6-43
Set Interface Delay 6-44
Limit Transmit Queue Size 6-44
Adjust Maximum Packet Size/MTU Size 6-44
Invert TXC Clock Signal 6-44
Prevent Phase Shifting 6-45
Monitor and Maintain the Interface 6-45
Monitor Interface Status 6-45
Monitor the Interface Port 6-46
Clear and Reset the Interface 6-46
Shut Down and Restart an Interface 6-47
Run Interface Loopback Diagnostics 6-48
Table of Contents xiii 6-48 Enable Loopback Testing on the HSSI Cards 6-51 Enable Loopback on MCI and SCI Serial Cards 6-51 Enable Loopback on MCI and MEC Ethernet Server 6-51 Configure the Ethernet Loopback 6-52 Enable Loopback on the CSC-FCI FDDI Card Enable Loopback on Token Ring Cards 6-52
6-52 Interface Configuration Examples 6-53 Examples of Enabling Interface Configuration 6-53 Example of Enabling Ethernet Encapsulation Dedicated Asynchronous Interface Example 6-53 Interface 6-53 Example of Restricting Access on the Asynchronous 6-54 Asynchronous Routing and Dynamic Addressing Example PPP Connection Example 6-54 SLIP Connection Examples 6-54
Interface Description Examples 6-55
Interface Shutdown Examples 6-55 6-56 IP Tunneling Examples Password 6-59 CHAP with an Encrypted Example Down 6-60 Examples of Dial Backup Service when Primary Line Goes Reaches Threshold 6-60 Examples of Dial Backup Service when Primary Line when Line Exceeds Threshold 6-60 Examples of Dial Backup Service Primary
PART Wide-Area Networking
LAPB 1-1 Chapter Configuring X.25 and
and X.25 7-1 Ciscos Implementation of LAPB X.25 Virtual Circuits 7-2 Facility Handling in Encapsulated X.25 Virtual Circuits 7-2 Facility Handling in Routed Standard 1984 X25 Facilities 7-2 CCITT-Specified Marker Facilities 7-4 7-5 Local Marker Facilities Specified for DDN or BFE X.25
LAPB Configuration Task List 7-5
Establish LAPB DCE or DTE Operation 7-6 7-6 Set the LAPB Retransmission Timer and Frame Parameters
Define the LAPB Hold Queue Size 7-7
X.25 Configuration Task List 7-7 7-8 Configure an X.25 Datagram Transport
Set X.25 DTE or DCE Operation 7-8
Set the X.25 Interface Address 7-9
Establish Protocol-to-X.l2l Address Map 7-9
Establish Permanent Virtual Circuit PVC 7-10
Establish Default VC Protocol 7-10
7-11 Configure X.25 Routing
Enable Local X.25 Routing 7-12
Construct the X.25 Routing Table 7-13
Translate X.25 Called and Calling Addresses 7-13
Update the X.121 Address 7-14
xiv Router Products Configuration Guide Configure Local Switched PVC 7-14
Configure Remote Tunneled PVC 7-14
Configure CMNS Routing 7-15
Enable CMNS on an Interface 7-15
Specify CMNS Static Map of Addresses 7-16
Configure DDN or BFE X.25 7-16
DDN X.25 Dynamic Mapping 7-17
Enable DDN X.25 7-18
Define IP Precedence Handling 7-18
Configure Blacker Emergency Mode 7-18
Configure X.25 Level Parameters and Special Features 7-20
Configure Virtual Circuit Ranges 7-21
Configure the Switched Virtual Circuit Idle Timer 7-22
Increase the Number of Virtual Circuits Allowed 7-23
Configure the Ignore Destination Timer 7-23
Set Default Window Sizes 7-23
Set Default Packet Sizes 7-24
Establish the Packet Acknowledgment Policy 7-24
Configure the X25 Level Retransmission Timers 7-24
Set X.25 TCP Header Compression 7-25
Define X.25 Host Names 7-25
Define the Default Encapsulation Protocol 7-25
Configure the X.25 User Facilities 7-26
Set the Packet Numbering Modulo 7-26
Suppress the Calling Address 7-27
Suppress the Called Address 7-27
Disable Packet-Level Restarts 7-27
Define the VC Packet Hold Queue Size 7-27
Configure an Interface Alias 7-28
Configure X.25 Bridging 7-28
Monitor and Maintain LAPB and X.25 7-28
LAPB and X.25 Configuration Examples 7-29
Typical LAPB Configuration Example 7-29
Typical X.25 Configuration Example 7-29
Example of Setting Virtual Circuit Ranges 7-31
Example of Switching PVC on the Same Router 7-31
X.25 Route Address Pattern Matching Example 7-31
X.25 Routing Example 7-32
Example of Using PVC to Exchange IP Traffic 7-33
Example of Establishing Connection between Two PVCs 7-33
Example of Enabling Remote Tunneling 7-34
Example of Enabling CMNS for X.121 and MAC Addresses 7-35
Example of Switching CMNS over PDN 7-35
Example of Switching CMNS over Leased Lines 7-37
DDN X.25 Configuration Example 7-39
Example of Setting BFE Emergency Mode 7-39
Example of Configuring X.25 to Allow Ping Support over Multiple Lines 7-40
Example of Netbooting over X.25 7-41
Table of Contents xv 8-1 Chapter Configuring Frame Relay
8-1 Cisco Implementation of Frame Relay 8-2 Frame Relay Hardware Requirements
List 8-3 Frame Relay Configuration Task
8-3 Enable Frame Relay on an Interface
Set Frame Relay Encapsulation 8-4
Establish Mapping 8-4
Customize Your Frame Relay Network 8-5
Configure Frame Relay Switching 8-5
Enable Frame Relay Switching 8-6 NNI 8-6 Configure Frame Relay DTE Device DCE Switch or Support
Specify the Static Route 8-7
Configure the LMI 8-7
Set the LMI Type 8-7
Set the LMI Keepalive Interval 8-7
Set the LMI Polling and Timer Intervals 8-8 8-8 Select Frame Relay Inverse ARP Define Subinterfaces 8-9
Associate DLCI with Subinterface 8-9
8-10 Configure Frame Relay in Test Environment
Set the Local DLCI 8-10
Set the DLCI for Multicasts 8-10
Monitor the Frame Relay Connections 8-11
8-11 Frame Relay Configuration Examples
Example of Configurations Using IETF Encapsulation 8-12 Example of Two Routers in Static Mode 8-12 8-12 Example of Routing DECnet Packets
Example of Routing IPX Packets 8-13 Backward 8-13 Example of Configuration Providing Compatibility
Example of Netbooting over Frame Relay 8-13 8-14 Example of Transparent Bridging Using Subinterfaces
PVC Switching Configuration Example 8-14
Example of Configuring Pure Frame Relay DCE 8-15 Example of Hybrid DTE/DCE PVC Switching 8-18
Example of Switching over an IP Tunnel 8-20
Chapter Configuring SMDS 9-1
Ciscos Implementation of SMDS 9-1 SMDS Addresses 9-2
SMDS Hardware Requirements 9-2
SMDS Configuration Task List 9-3
Set SMDS Encapsulation 9-3
Specify the SMDS Address 9-4
Establish Address Mapping 9-4
Provide Map to Multicast Address 9-5
xvi Router Products Configuration Guide Enable Address Resolution Protocol ARP 9-5 Enable Broadcast ARP Messages 9-6
Customize Your SMDS Network 9-7
Configure Specific Protocols 9-7 ARP and IP 9-7
DECnet 9-7
CLNS 9-8
XNS and IPX 9-8
AppleTalk 9-8 Banyan VINES 9-8
Enable Transparent Bridging 9-8
Configure Multiple Logical IP Subnets 9-9
Reenable the Data Exchange Interface Version 3.2 with Heartbeat Support 9-9
Configure Pseudo-broadcasting 9-9
Enable IP Fast Switching 9-10
Monitor the SMDS Connections 9-10
SMDS Configuration Examples 9-il
Typical Multiprotocol Configuration Example 9-11
Example of Configuration with Remote Peer on the Same Network 9-12
Example of Configuring MultiLIS Network 9-12
Example of Configuring Pseudo-broadcasting 9-13
Dial-on-Demand 10-1 Chapter 10 Configuring Routing
Ciscos Implementation of Dial Backup and DDR 10-1
Placing Calls using DDR 10-2
Chat Scripts on the Auxiliary Port 10-2
V.25bis over Synchronous Interfaces 10-2
Controlling Access for DDR 10-3
Dial Backup Configuration Task List 10-4 Select Backup Line 10-4
Define the Traffic Load Threshold 10-5
Define Backup Line Delays 10-5
DDR Configuration Task Overview 10-6
Configure an Interface to Place Calls 10-6
Configure Chat Scripts for Asynchronous Interfaces 10-6
Suggested Chat Script Naming Conventions 10-7
Specify Chat Scripts for Asynchronous Lines 10-7
Calls to Single Site 10-7
Calls to Multiple Sites 10-9
Calling on Single Line or Multiple Lines 10-9
Calling from Dialer Rotary Groups 10-10
Configure an Interface to Receive Calls 10-12
Calls from Single Site 10-13
Calls from Multiple Sites 10-13
Receiving on Single Line or Multiple Lines 10-13
Receiving on Dialer Rotary Group 10-13
Table of Contents xvii Configure an Interface to Place and Receive Calls 10-16
Place and Receive Calls from Single Site 10-16
Place and Receive Calls from Multiple Sites 10-17
DDRforIPX 10-19
Customize the DDR Network 10-19
Set Line Idle Time 10-20
Set Idle Time for Busy Interfaces 10-20
Set Line Downtime 10-20
Set Carrier Wait Time 10-21
Controlling Access to DDR Interface 10-21
Monitor DDR Connections 10-22
DDR Configuration Examples 10-22
Example of Dial Backup using Aux Port 10-23
Example of Dial Backup using DDR and ISDN 10-23
Example of Configuring DDR in an IP Environment 10-24
Example of Configuring DDR in an IPX Environment 10-24
Example of Configuring Multiple Destination Dial Strings 10-25 Example of Configuring Dialer Rotary Groups 10-25
Example of Dialing Single Site or Multiple Sites 10-26
Example of Using Chat Scripts 10-27
Example of Writing and Implementing Chat Scripts 10-27
Example of Chat Scripts and Dialer Mapping 10-28
Example of System Scripts and Modem Scripts 10-29
Dial-on-Demand PPP Configuration Example 10-29
PART Routing Protocols
Chapter 11 Configuring Apollo Domain 11-1
Ciscos Implementation of Apollo Domain 11-1
Apollo Domain Addresses 11-2
Apollo Domain Configuration Task List 11-2
Enable Apollo Domain Routing 11-3
Control Access to the Apollo Domain Network 11-3
Tune Apollo Domain Network Performance 11-4
Configure Static Routes 11-4
Set Routing Table Update Timers 11-4
Set the Maximum Paths 11-4
Configure Apollo Domain over WANs 11-5
Monitor the Apollo Domain Network 11-5
Apollo Domain Configuration Examples 11-5
Configuring Apollo Domain Routing Example 11-5
Access List Example 11-6
Routing Table Update Timer Example 11-6
xviii Router Products Configuration Guide Chapter 12 Configuring AppleTalk 12-1
Ciscos Implementation of AppleTalk 12-1
Standard AppleTalk Services 12-1
Enhancements to Standard AppleTalk 12-2
AppleTalk Phase and Phase 12-3
AppleTalk Addresses 12-4
Configuration Guidelines and Compatibility Rules 12-4
AppleTalk Configuration Task List 12-5
Enable AppleTalk Routing 12-5
Enable AppleTalk Routing on the Router 12-5
Manually Configure an Interface 12-6
Dynamically Configure an Interface 12-6
Dynamically Configure Nonextended Interface 12-7
Dynamically Configure an Extended Interface 12-8
Configure Transition Mode 12-8
Control Access to AppleTalk Networks 12-9
Create Access Lists 12-10
Create Filters 12-11
Create Data Packet Filters 12-12
Create Routing Table Update Filters 12-13
Create GetZoneList GZL Filters 12-15
Enable Partial Zone Filters 12-16
Configure the Name Display Facility 12-16
Set Up Special Configurations 12-16
Configure Free-Trade Zones 12-17
Configure SNMP in AppleTalk Networks 12-17
Configure AppleTalk Tunneling 12-18
Configure AppleTalk MaciP 12-19
Configure IPTalk 12-21
Configure IP Encapsulation of AppleTalk Packets 12-22 Specify the UDP Port Ranges 12-23
Tune AppleTalk Network Performance 12-24
Control Routing Updates 12-24
Disable the Processing of Routed RTMP Packets 12-24
Disable the Transmission of Routing Updates 12-25
Prevent the Advertisement of Routes to Networks with No Associated Zones 12-25
Set Routing Table Update Timers 12-25
Assign Proxy Network Numbers 12-26
Disable Checksum Generation and Verification 12-26
Control the AppleTalk ARP Table 12-27
Control the Delay between ZIP Queries 12-28
Log Significant Network Events 12-28
Disable Fast Switching 12-28
Configure AppleTalk over WANs 12-28
Table of Contents xix Monitor the AppleTalk Network 12-29
Monitor the AppleTalk Network Using Router Commands 12-29
Monitor the AppleTalk Network Using Network Monitoring Packages 12-30
AppleTalk Configuration Examples 12-31
Configuring an Extended AppleTalk Network Example 12-31
Configuring Nonextended AppleTalk Network Example 12-31
Configuring Nonextended Network in Discovery Mode Example 12-32 Transition Mode Example 12-33
AppleTalk Access List Examples 12-34
Hiding and Sharing Resources with Access List Examples 12-38
MacIP Examples 12-43 SNMP-over-DDP Example 12-44
Proxy Network Number Example 12-44 IPTaIk Example 12-45
Chapter 13 Configuring Banyan VINES 13-1
Ciscos Implementation of VINES 13-1
VINES Addresses 13-1
VINES Configuration Task List 13-2
Configure VINES Routing 13-2
Enable VINES Routing on the Router 13-3
Enable VINES Routing on an Interface 13-3 Enable VINES on Serverless Networks 13-4
Control Access to the VINES Network 13-4
Configure Other VINES Network Parameters 13-6
Select an Encapsulation Type 13-7
Control the Display of Host Addresses 13-7
Control the Base of Host Addresses 13-7
Control Routing Updates 13-8
Disable Fast Switching 13-8
Set the Time 13-9
Configure Static Routes 13-10
Configure Static Paths 13-10
Control the Forwarding of Broadcast Packets 13-10
Configure VINES over WANs 13-10
Monitor and Maintain the VINES Network 13-11
VINES Configuration Examples 13-11
Typical VINES Network Configuration Example 13-12
Serverless Network Configuration Example 13-13
Access List Example 13-16
Time-of-Day Service Example 13-17
xx Router Products Configuration Guide Chapter 14 Configuring DECnet 14-1
Ciscos Implementation of DECnet 14-1
DECnet Configuration Task List 14-3
Enable DECnet Routing 14-3
Establish DECnet Routing on Global Basis 14-3
Assign DECnet Cost to Each Interface 14-5
Specify the DECnet Node Type 14-6
Configure DECnet on Token Rings 14-6
Configure Address Translation 14-7
Make Poor Mans Routing Connection 14-7
Enable Phase IV-to-Phase Conversion 14-8
Propagate Phase IV Areas through an OSI Backbone 14-8
Establish the Routing Table Size 14-9
Configure Level Routers 14-9
Set Areas as Unreachable 14-9
Configure Level Routers 14-10
Set Areas as Unreachable 14-10
Specify Designated Routers 14-10
Control Access to DECnet Networks 14-10
Create an Access List Based on Source Addresses 14-11
Create an Access List Based on Source and Destination Addresses 14-11
Add Filters to Access Lists 14-11
Configure Access Groups 14-12
Configure Routing Filters 14-12
Enhance DECnet Performance 14-12
Set Maximum Equal-Cost Paths 14-13
Establish Selection for Paths of Equal Cost 14-13
Set Maximum Visits 14-14
Adjust the Hello Timer 14-14
Disable Fast Switching 14-14
Set the Congestion Threshold 14-15
Adjust the Broadcast Routing Timer 14-15
Configure DECnet over WANs 14-15
Monitor and Maintain the DECnet Network 14-15
DECnet Configuration Examples 14-16
Example of Enabling DECnet 14-16
Example of Configuring Phase IV Areas through an OSI Backbone 14-16
Example of Configuring Address Translation 14-18
Table of Contents xxi IP 15-1 Chapter 15 Configuring
Ciscos Implementation of IP 15-1
IP Configuration Task List 15-2
Network Interfaces 15-2 Assign IP Addresses to
Network Interfaces 15-3 Assign Multiple IF Addresses to
Allowable Internet Addresses 15-4
Enable Use of Subnet Zero 15-4
Interface 15-4 Enable IP Processing on Serial
Configure IP Addressing Options 15-5
Establish Address Resolution 15-6
Define Static ARP Cache 15-6
Set ARP Encapsulations 15-7
Disable Proxy ARP 15-7 Map Host Names to IP Addresses 15-8 Map IP Addresses to Host Names 15-8 15-9 Specify the Domain Name
Specify Name Server 15-9
Disable the DNS 15-9
15-10 Configure HP Probe Proxy Name Requests
Disable IP Routing 15-10
15-1 Routing Assistance when IP Routing Is Disabled ProxyARP 15-11 Default Gateway 15-11
The Router Discovery Mechanism 15-1
Configure Routing Process 15-13
15-13 Configure Broadcast Packet Handling
Enable Directed Broadcast-to-Physical Broadcast Translation 15-14
Forward UDP Broadcast Packets and Protocols 15-14
Establish an Internet Broadcast Address 15-15
Flood IP Broadcasts 15-16
15-17 Speed Up Flooding of UDP Datagrams
Configure IP Services 15-17
Disable ICMP Protocol Unreachable Messages 15-17
Disable ICMP Redirect Messages 15-18
Understand Path MTU Discovery 15-18
Set the MTU Packet Size 15-20
Enable ICMP Mask Reply Messages 15-20
Disable IP Source Routing 15-20
Interfaces 15-2 Configure Simplex Ethernet
Filter IF Packets 15-21
Create an Access List 15-22
Create Standard and Extended Access Lists 15-22
Apply an Access List to an Interface 15-23
xxii Router Products Configuration Guide Configure IP Security Options 15-24
Enable IPSO and Set the Security Classifications 15-24
Select the Security Levels 15-25
Default Values for Minor Keywords 15-25
Configure IP Accounting 15-26
Configure Performance Parameters 15-26
Compress TCP Packet Headers 15-27 Set the TCP Connection Attempt Time 15-27
Enable Fast Switching 15-28
Enable Fast Switching on the Same Interface 15-28
Enable IP Autonomous Switching 15-29
Control Route Cache Invalidation 15-29
Configure IP over WANs 15-30
Monitor and Maintain the IP Network 15-30
Clear Caches Tables and Databases 15-30
Display System and Network Statistics 15-30
IP Configuration Examples 15-3
Serial Interfaces Configuration Example 15-32
Example of Creating Network from Separated Subnets 15-32 Dynamic Lookup Example 15-33
Example of Establishing IP Domains 15-33
Example of Configuring HP Hosts on Network Segment 15-33 Helper Addresses Example 15-33 Broadcasting Examples 15-34 Flooded Broadcast Example 15-34
Flooding of IP Broadcasts Example 15-35 Customizing ICMP Services Example 15-35
Simplex Ethernet Interfaces Example 15-35 Access List Examples 15-36
Examples of Implicit Masks in Access Lists 15-36
Examples of Configuring Extended Access Lists 15-37
IPSO Configuration Examples 15-38 Ping Command Example 15-39
Chapter 16 Configuring IP Routing Protocols 16-1
Ciscos Implementation of IP Routing Protocols 16-1
The Interior Gateway Protocols 16-1 The Exterior Gateway Protocols 16-2
Router Discovery Protocols 16-2
Multiple Routing Protocols 16-2
IP Routing Protocols Task List 16-3
Determine Routing Process 16-3
Configure IGRP 16-4
Ciscos IGRP Implementation 16-4
IGRP Updates 16-5
IGRP Configuration Task List 16-5
Table of Contents xxiii Create the IGRP Routing Process 16-5
Allow Point-to-Point Updates for IGRP 16-6
Define Unequal-Cost Load Balancing 16-6
Adjust the IGRP Metric Weights 16-7 Disable Hoiddown 16-7
Enforce Maximum Network Diameter 16-8
Configure OSPF 16-8
Ciscos OSPF Implementation 16-8
OSPF Configuration Task List 16-9
Enable OSPF 16-9
Configure OSPF Interface Parameters 16-10 16-11 Configure OSPF over Different Physical Networks
Configure OSPF Network Type 16-11
Configure OSPF for Nonbroadcast Networks 16-11
Configure OSPF Area Parameters 16-12
Configure Route Summarization between OSPF Areas 16-12
Create Virtual Links 16-12
Generate Default Route 16-13
Configure Lookup of DNS Names 16-13 Force the Router ID Choice with Loopback Interface 16-13
Configure RIP 16-14
Running IGRP and RIP Concurrently 16-15
Allow Point-to-Point Updates for RIP 16-15
Configure IS-IS 16-15
IS-IS Configuration Task List 16-15
Enable IS-IS 16-16
Configure IS-IS Interface Parameters 16-16
Configure IS-IS Link State Metrics 16-17
Set the Advertised Hello Interval 16-17
Set the Advertised CSNP Interval 16-17
Set the Retransmission Interval 16-18
Specify Designated Router Election 16-18
Specify the Interface Circuit Type 16-18
Assign Password for an Interface 16-19
Configure Miscellaneous IS-IS Parameters 16-19 Generate Default Route 16-19
Specify Router Level Support 16-19
Configure IS-IS Authentication Passwords 16-20
Summarize Address Ranges 16-20
Configure BGP 16-20
Ciscos BGP Implementation 16-20 How BGP Selects Paths 16-21
BGP Configuration Task List 16-21
Enable BGP Routing 16-22
Configure BGP Neighbors 16-22
Reset BGP Connections 16-23
Configure BGP Route Filtering by Neighbor 16-23
Configure BGP Path Filtering by Neighbor 16-23
Disable Next-Hop Processing on BGP Updates 16-24
xxiv Router Products Configuration Guide Configure BGP Administrative Weights 16-24
Configure BGP Interactions with IGPs 16-25
Configure Miscellaneous BGP Parameters 16-26
Configure Neighbor Options 16-26 Indicate Backdoor Routes 16-26
Set Administrative Distance 16-27
Adjust BGP Timers 16-27
Configure the INTER_AS METRIC 16-27
Configure EGP 16-27
Ciscos EGP Implementation 16-28
EGP Configuration Task List 16-28
Enable EGP Routing 16-28
Configure EGP Neighbor Relationships 16-29
Adjust EGP Timers 16-29
Configure Third-Party EGP Support 16-29
Configure Backup Routers 16-30
Configure Default Routes 16-30
Define Central Routing Information Manager Core Gateway 16-30
Configure GDP 16-3
Configure IRDP 16-33
Configure Miscellaneous IRDP Parameters 16-33
Configure Routing Protocol-Independent Features 16-34
Use Variable-Length Subnet Masks 16-34
Configure Static Routes 16-34
Specify Default Routes 16-35
Specify Default Network 16-35
The Gateway of Last Resort 16-36
Redistribute Routing Information 16-36
Supported Metric Translations 16-37
Filter Routing Information 16-38
Prevent Routing Updates through an Interface 16-38
Suppress Routes from Being Advertised in Routing Updates 16-39
Suppress Routes Listed in Updates from Being Processed 16-39
Apply Offsets to Routing Metrics 16-39 Filter Sources of Routing Information 16-39
Adjust Timers 16-40
Enable or Disable Split Horizon 16-41
Monitor and Maintain the IP Network 16-42
Clear Caches Tables and Databases 16-42
Display System and Network Statistics 16-43
IP Routing Protocol Configuration Examples 16-44
Variable-Length Subnet Masks Example 16-44
Example of Overriding Static Routes with Dynamic Protocols 16-45
Example of Configuring IS-IS as an IP Routing Protocol 16-45
Static Routing Redistribution Example 16-46 IGRP Redistribution Example 16-47 RIP and IGRP Redistribution Example 16-47
OSPF Routing and Route Redistribution Examples 16-48
Table of Contents xxv BGP Route Advertisement and Redistribution Examples 16-54 Default Metric Values Redistribution Example 16-55 Route Map Examples 16-56
IGRP Feasible Successor Relationship Example 16-59
BGP Synchronization Example 16-60
BGP Basic Neighbor Specification Examples 16-60
Third-Party EGP Support Example 16-62
Backup EGP Router Example 16-62 EGP Core Gateway Example 16-62 Example of Autonomous System within EGP 16-63 Passive Interface Examples 16-64 Administrative Distance Examples 16-65
Split Horizon Examples 16-66
Chapter 17 Configuring ISO CLNS 17-1
Ciscos Implementation of ISO CLNS 17-1
Configuring ISO CLNS 17-1
ISO CLNS Configuration Task List 17-2
Assign Domain Boundaries NSAP Addresses and Area Addresses 17-2
ISO CLNS Addressing Background 17-2
Addressing Rules 17-4
Entering Routes 17-5
Configure NETs for Domains and Areas 17-5
Multihoming in IS-IS Areas 17-6
Configure Static NET Address for the Router 17-7 Map NSAP Addresses to Media Addresses 17-7
Specify Shortcut NSAP Addresses 17-9
Use the IP Domain Name System to Discover ISO CLNS Addresses 17-9
Configure Routing Process 17-10
Static Routing Overview 17-10
Dynamic Routing Overview 17-10
End Systems and Intermediate Systems 17-10
Configure CLNS Static Routing for the Router 17-11
Configure CLNS on the Router 17-11
Assign Static NET Address for the Router 17-11
Enable ISO CLNS for an Interface 17-12
Enter Specific Static Route 17-12
Configure ISO-IGRP Dynamic Routing 17-13
Configure ISO-IGRP Parameters 17-13
Adjust ISO-IGRP Metrics 17-14
Adjust ISO-IGRP Timers 17-14
Enable or Disable Split Horizon 17-15
Redistribute Routes into an ISO-IGRP Domain 17-15
Specify Preferred Routes 17-16
Configure IS-IS Dynamic Routing 17-16
Configure IS-IS Interface Parameters 17-17
Configure IS-IS Link State Metrics 17-17
Set the Advertised Hello Interval 17-17
xxvi Router Products Configuration Guide Set the Advertised CSNP Interval 17-18
Set the Retransmission Interval 17-18
Specify Designated Router Election 17-18
Specify the Interface Circuit Type 17-19
Configure IS-IS Password Authentication 17-19
Configure IS-IS Parameters 17-19
Redistribute Routes into an IS-IS Domain 17-20
Specify Preferred Routes 17-20
Specify Router Level Support 17-21
Configure IS-IS Authentication Passwords 17-21
Configure ES-IS Parameters 17-21
Specify Hello Packets 17-22
Filter Packet Forwarding and Establish Adjacencies 17-22
Configure CLNS over WANs 17-23
Configure CLNS over X.25 17-23
Configure Miscellaneous Features 17-24
Header Options 17-24
Assign Static NSAP Addresses for an Interface 17-24
Configure DECnet OSI or Phase Cluster Aliases 17-24
Configure DEC-Compatible Mode 17-25
Allow Security-Option Packets to Pass 17-25
Enhance ISO CLNS Performance 17-25
Specify the MTU Size 17-26
Disable Checksums 17-26
Disable Fast Switching 17-26
Set the Congestion Threshold 17-27
Transmit Error PDUs 17-27
Control Redirect PDUs 17-27
Configure Parameters for Locally Sourced Packets 17-28
Monitor and Maintain the ISO CLNS Network 17-29
ISO CLNS Configuration Examples 17-30
Examples of Configuring NETs 17-30
Basic Static Routing Examples 17-31
Static Intradomain Routing Example 17-33
Static Interdomain Routing Example 17-34
Example of Routing within the Same Area 17-35
Example of Dynamic Routing in More Than One Area 17-36
Example of Dynamic Routing in Overlapping Areas 17-37
Dynamic Interdomain Routing Example 17-37
IS-IS Routing Configuration Examples 17-39
Examples of Configuring Router in Two Areas 17-41
Example of Configuring ISO CLNS over X.25 17-42
Example of Customizing Performance Parameters 17-43
Example of Configuring DECnet Cluster Aliases 17-43 Route Map Examples 17-43 CLNS Filters Examples 17-44
Table of Contents xxvii Chapter 18 Configuring Novell IPX 18-1
Ciscos Implementation of Novell IPX 18-1
IPX Addresses 18-1
IPX Configuration Task List 18-2
Enable IPX Routing 18-2
Enable IPX Routing on the Router 18-2
Assign Network Numbers to Individual Interfaces 18-2
Assign Network Numbers to Interfaces that Support Single Network 18-3
Assign Network Numbers to Interfaces that Support Multiple Networks 18-3
Control Access to IPX Networks 18-4
Create Access Lists 18-6
Create Generic Filters 18-6
Create Filters for Updating the Routing Table 18-7
Create Service Advertisement Protocol SAP Filters 18-8 Create Get Nearest Server GNS Response Filters 18-9
Create IPX NetBIOS Filters 18-9
Create Broadcast Message Filters 18-10
Tune IPX Network Performance 18-11
Control Novell IPX Compliance 18-12
Configure Static Routes 18-13
Adjust Routing Table Update Timers 18-13
Configure Static SAP Table Entries 18-14
Configure the Queue Length for SAP Requests 18-14
Adjust SAP Update Timers 18-14 Set Maximum Paths 18-15
Control Responses to GNS Requests 18-15
Use Helper Addresses to Forward Broadcast Messages 18-15 Control the Forwarding of Type 20 Packets 18-16 Enable the Forwarding of Type 20 Packets 18-17 Restrict the Acceptance of Incoming Type 20 Packets 18-17 Restrict the Forwarding of Outgoing Type 20 Packets 18-17
Disable IPX Fast Switching 18-18
Enable Autonomous Switching 18-18
Pad Odd-Length Packets 18-18
Repair Corrupted Network Numbers 18-19
Configure IPX over WANs 18-19
Monitor the IPX Network 18-19
Configuration Examples 18-20
Enabling IPX Routing Example 18-20
Enabling IPX Routing on Multiple Networks Example 18-20
Enabling IPX over WAN Interface Example 18-21
IPX Network Access Example 18-21
SAP Input Filter Example 18-22
SAP Output Filter Example 18-23
xxviii Router Products Configuration Guide Helper Facilities to Control Broadcasts Examples 18-24
Forwarding to an Address Example 18-24
Forwarding to All Networks Example 18-26 All-Networks Flooded Broadcast Example 18-27 IPX over DDR Example 18-27
Chapter 19 Configuring XNS 19-1
Ciscos Implementation of XNS 19-1
Ungermann-Bass Net/One Environments 19-1
XNS Addresses 19-2
Configuration Task List 19-3
Enable XNS Routing 19-3
Enable Standard XNS Routing 19-3
Enable Ungermann-Bass Net/One Routing 19-4
Control Access to the XNS Network 19-4
Create Access Lists 19-6
Create Generic Filters 19-6
Create Filters for Updating the Routing Table 19-7
Tune XNS Network Performance 19-7
Configure Static Routes 19-8
Set Routing Table Update Timers 19-8
Set Maximum Paths 19-8
Control Broadcast Messages 19-9
Forward Broadcast Messages to Specified Hosts 19-10 Specify XNS Protocol Types for Forwarding Broadcast Messages 19-10
Configure Flooding 19-11
Disable XNS Fast Switching 19-12
Configure XNS over WANs 19-12
Monitor the XNS Network 19-12
XNS Configuration Examples 19-12
Enabling XNS Routing Configuration Example 19-13
Enabling and Configuring Net/One Routing Configuration Example 19-13 Routing Update Timers Example 19-14
3Com Access List Example 19-14
Helpering Example 19-15
PART Bridging
Chapter 20 Configuring Transparent Bridging 20-1
Cisco Implementation of Transparent and Source-Route Transparent Bridging 20-1
Transparent Bridging Features 20-1
Source-Route Transparent Bridging Features 20-2
Table of Contents xxix Transparent and SRT Bridging Configuration Task List 20-3
Configure Transparent Bridging and SRT Bridging 20-3
Assign Bridge Group Number and Define the Spanning-Tree Protocol 20-3
Assign Each Network Interface to Bridge Group 20-4
Choose the OUT for Ethernet Type II Frames 20-5
Configure Transparent Bridging over WANs 20-5
Configure X.25 Transparent Bridging 20-5
Configure Frame Relay Transparent Bridging 20-5
Bridging in Frame Relay Network with no Multicasts 20-6
Bridging in Frame Relay Network with Multicasts 20-6
Configure SMDS Transparent Bridging 20-6
Configure Transparent Bridging Options 20-7
Disable IP Routing 20-7
Enable Autonomous Bridging 20-7
Configure LAT Compression 20-8
Establish Multiple Spanning-Tree Domains 20-8
Prevent the Forwarding of Dynamically Determined Stations 20-9 Forward the Multicast Addresses 20-10
Filter Transparently Bridged Packets 20-10
Filter by MAC-Level Address 20-11
Filter by Specific MAC Address 20-11 Filter by Vendor Code 20-li Filter by Protocol Type 20-12
Define and Apply Extended Access Lists 20-14
Filter LAT Service Announcements 20-15
Enable LAT Group Code Service Filtering 20-16
Specify Deny Conditions for LAT Group Codes on Input 20-16
Specify Permit Conditions for LAT Group Codes on Input 20-16
Specify Deny Conditions for LAT Group Codes on Output 20-17
Specify Permit Conditions for LAT Group Codes on Output 20-17
Adjust Spanning-Tree Parameters 20-17
Set the Bridge Priority 20-18
Set an Interface Priority 20-18
Assign Path Costs 20-18
Adjust BPDU Intervals 20-18
Adjust the Interval between Hello BPDUs 20-19
Define the Forward Delay Interval 20-19
Define the Maximum Idle Interval 20-19
Disable the Spanning Tree on an Interface 20-19
Tune the Transparently Bridged Network 20-20
Monitor and Maintain the Transparent Bridge Network 20-21
Transparent Bridging Configuration Examples 20-21
Basic Bridging Example 20-22
Transparent Bridging Example 20-23
Ethernet Bridging Example 20-23
xxx Router Products Configuration Guide Source-Route Transparent SRT Bridging Example 20-25
Configuration for the New York City router 20-25
Configuration for the Thule Greenland router 20-25 Multicast or Broadcast Packets Bridging Example 20-26 X.25 Transparent Bridging Example 20-27
Frame-Relay Transparent Bridging Examples 20-28
Bridging in Frame Relay Network with No Multicasts 20-28
Bridging in Frame Relay Network with Multicasts 20-29
Example of Complex Transparent Bridging Network Topology 20-30
Chapter 21 Configuring Source-Route Bridging 21-1
Source-Route Bridging Overview 21-1
Ciscos Implementation of Source-Route Bridging 21-2
SRB Configuration Task List 21-3
Configure Source-Route Bridging 21-3
Configure Dual-Port Bridge 21-5
Enable SRB on the Appropriate Token Ring Interface 21-5
Configure Multiport Bridge using Virtual Ring 21-6
Define Ring Group in SRB Context 21-6
Enable SRB and Assign Ring Group to an Interface 21-6
Enable the and Forwarding Blocking of Spanning Tree Explorers 21-7 Limit the Maximum SRB Hops 21-8
Configure Remote Source-Route Bridging 21-8
Configure RSRB Using Direct Encapsulation 21-9
Define Ring Group in RSRB Context 21-10 the Identify Remote Peers Direct Encapsulation 21-10
Enable SRB on the Appropriate Interfaces 1-10
Configure RSRB Using IP Encapsulation over an FST Connection 1-11
Set Up an FST Peer Name and Assign an IP Address 21-11 Identify the Remote Peers FST Connection 21-11
Enable SRB on the Appropriate Interfaces 1-12
Performance Considerations when Using FST in Redundant Network Topology 21-12
Configure RSRB Using IP Encapsulation over TCP Connection 1-12 Identify the Remote Peer TCP Connection 21-13
Enable SRB on the Appropriate Interfaces 1-13
Configure RSRB Using TCP and LLC2 Local Acknowledgment 21-13 Enable LLC2 Local Acknowledgment between Two Remote Peer Bridges 21-15
Enable SRB on the Appropriate Interfaces 21-16
Notes on Using LLC2 Local Acknowledgment 1-16
Configure Bridging Routed Protocols 21-17
EnableUseoftheRlF 21-18
Configure Static RFEntry 21-18
Configure the RIF Timeout Interval 21-19
Configure Translation between SRB and TB Environments 21-19
Overview of SR/TLB 21-19
Enable Bridging between Transparent Bridging and SRB 21-2
Table of Contents xxxi Enable Translation Compatibility with IBM 8209 Bridges 21-21
Enable Token Ring LLC2 to Ethernet Conversion 21-22
Configure NetBIOS Support 1-23
Ensure that Proxy Explorers Is Enabled on the Appropriate Interface 21-24
Specify Timeout and Enable NetBIOS Name Caching 21-25
Create Static Entries in the NetBIOS Name Cache 1-25
Specify Dead Time Intervals for NetBIOS Packets 1-25
Configure LAN Network Manager Support 21-26
How the Router Works with LNM 1-28
Configure LNM Software on the Management Stations to Communicate with the Router 1-29
Prevent LNM Stations from Modifying Router Parameters 21-29
Enable Other LRMs to Change Router/Bridge Parameters 21-30
Apply Password to an LNM Reporting Link 1-30 Enable LNM Servers 21-30
Change Reporting Thresholds 21-3 Change an LNM Reporting Interval 21-3
Monitor LNM Operation 21-3
Secure the SRB Network 21-32
Configure NetBIOS Access Filters 21-32
Configure NetBIOS Access Filters Using Station Names 21-32
Configure Access Filters Using Byte Offset 21-33
Configure Administrative Filters for Token Ring Traffic 21-34
Filter Frames by Protocol Type 21-35 Filter Frames by VendorCode 1-36
Filter Input by Source Addresses 21-36
Filter Output by Source Addresses 21-36
Configure Access Expressions that Combine Administrative Filters 1-36
Configure Access Expressions 21-37
Optimize Access Expressions 1-38
Alter Access Lists Used in Access Expressions 21-39
Tune the SRB Network 21-39
Prioritize Traffic Based on SNA Local LU Addresses 21-39
Enable Class of Service 21-40
Assign Priority Group to an Input Interface 1-41
Enable or Disable the Source-Route Fast-Switching Cache 21-41
Enable or Disable the Source-Route Autonomous-Switching Cache 21-41
Configure Proxy Explorers 21-42
Configure the Largest Frame Size 21-43
Establish SRB Interoperability with Specific Token Ring Implementations 21-43
Establish SRB Interoperability with IBM PC/3270 Emulation Software 21-43
Establish SRB Interoperability with TI MAC Firmware 21-44
Reporting Spurious Frame-Copied Errors 21-44
Monitor and Maintain the SRB Network 21-44
SRB Configuration Examples 21-46
Example of Basic SRB with Spanning Explorers 21-47 Example of SRB Only 21-47
Example of SRB and Routing Certain Protocols 1-48
xxxii Router Products Configuration Guide Example of Multiport SRB 21-48
Example of Source-Route Bridging with Multiple Virtual Ring Groups 21-49
Example of RSRB Using IP Encapsulation over TCP Connection 21-50
Example of RSRB Using IP Encapsulation Over an FST Connection 21-5
Example of RSRB Using All Types of Transport Methods 21-53 Example of RSRB with Local Acknowledgment 21-54
Example of RSRB with Local Acknowledgment and Passthrough 1-58
Example of Local Acknowledgment for LLC2 1-61
Example of IP for Load Sharing Over RSRB 21-63
Example of Adding Static RIF Cache Entry 21-65
Example of Adding Static RIF Cache Entry for Two-Hop Path 21-65 Example of SRITLB for Simple Network 1-66
Example of SRITLB with Access Filtering 1-68
Example of NetBIOS Support with Static NetBIOS Cache Entry 21-69 Example of LNM for Simple Network 21-69 Example of LNM for More Complex Network 21-70
Example of NetBIOS Access Filters 21-7
Example of Filtering Bridged Token Ring Packets to IBM Machines 21-72
Example of Administrative Access FiltersFiltering SNAP Frames on Output 21-73
Example of Creating Access Expressions 21-75
Example of Access Expressions 21-76
Example of Configuring Priority for Locally Terminated Token Ring Interfaces in RSRB 21-76
Example of Fast Switching 21-78
Example of Autonomous Switching 21-78
Example of SNA Traffic Prioritization by LU Address 21-78
PART BM Networking
Chapter 22 Configuring STUN and SUIC Local Acknowledgment 22-1
Configuration Task List 22-2
Set Up STUN Network 22-2 Enable STUN on Global Basis 22-2
Configure the STUN Protocol Groups 22-3
SDLC Protocol 22-3
SDLC Transmission Groups 22-3
Non-SDLC Protocols 22-4
Enable STUN Interfaces and Place in STUN Group 22-4
Establish the SDLC Frame Encapsulation Method 22-5
Configure TCP Encapsulation with SDLC Local Acknowledgment and Priority Queuing 22-5
Assign the Router an SDLC Primary or Secondary Role 22-6 Enable the SDLC Local Acknowledgment Feature 22-6
Establish Priority Queuing Levels 22-7
Configure TCP Encapsulation without Local Acknowledgment 22-7
Configure HDLC Encapsulation 22-8
Set up Traffic Priorities 22-8 Enable Class of Service 22-8
Assign Queuing Priorities 22-9
Table of Contents xxxiii Prioritize by Serial Interface Address 22-9
Prioritize by Logical Unit Address 22-10
Prioritize STUN Traffic over All Other Traffic 22-10
Configure Proxy Polling 22-11
Enable Proxy Polling 22-12
Set the Proxy Polling Intervals 22-12
Monitor STUN Network Activity 22-13
STUN Configuration Examples 22-13
Example of Configuring STUN Priorities 22-14
Example of Configuring Serial Link Address Prioritization Using STUN TCP/IP Encapsulation 22-15
Example of Configuring STUN Multipoint Implementation Using Line-Sharing Device 22-18
Example of Configuring Local Acknowledgment on Per-STUN-Peer Basis 22-20
Example of Configuring Local Acknowledgment for STUN Packets 22-20
Configuring LOCADDR Priority GroupsSimple Example 22-2
Example of Configuring LOCADDR Priority Groups for STUN 22-22
Example of Configuring Transmission Groups 22-23
Example of Configuring Proxy Polling for STUN 22-24
Chapter 23 Configuring LLC2 and SDLC Parameters 23-1
LLC2 23-2
LLC2 Configuration Task List 23-2
Control Transmission of Information Frames 23-2
Set the Maximum Number of Information Frames Received before Sending an Acknowledgment 23-3 Set the Maximum Delay for Acknowledgments 23-3
Set the Number of Retries Allowed 23-3
Set the Time for Resending Information Frames 23-4
Set the Time for Resending Rejected Frames 23-4
Establish Polling Level 23-4
Set the Polling Frequency 23-5
Set the Polling Interval 23-5
Set the Transmit-Poll-Frame Timer 23-5
Set Up XID Transmissions 23-6
Set the Time for XID Retries 23-6
Monitor LLC2 Stations 23-6
SDLC 23-6
SDLC Configuration Task List 23-7
Enable Router as Primary or Secondary SDLC Station 23-7
Determine Use of Frame Rejects 23-8
Set SDLC Timer and Retry Counts 23-8
Set SDLC Frame and Window Sizes 23-9
Control the Buffer Size 23-9
Control Polling of Secondary Stations 23-9
Monitor SDLC Stations 23-10
xxxiv Router Products Configuration Guide Configuration Examples 23-10 LLC2 Example 23-10 SDLC Example 23-11
Chapter 24 Configuring SDLLC Media Translation 24-1
Cisco Implementation of SDLLC Media Translation 24-1
Virtual Token Ring Concept Implementation 24-2
Resolving Differences in LLC2 and SDLC Frame Size 24-2
Maintaining Dynamic RIF Cache 24-3
Other Implementation Considerations 24-3
SDLLC Configuration Task List 24-3
Configure SDLLC with Direct Connection 24-3
Enable SDLLC Media Translation 24-4
Specify the XID Value 24-4
Initiate Connection to Token Ring Host 24-4
Configure SDLLC with RSRB 24-5
RSRB using Direct Encapsulation 24-5
RSRB over FST Connection 24-5
RSRB over TCP Connection 24-6
Configure SDLLC with RSRB and Local Acknowledgment 24-6
Configure SDLLC with Ethernet and Translational Bridging 24-7
Customize SDLLC Media Translation 24-7
Set the Largest LLC2 I-Frame Size 24-7
Set the Largest SDLC I-Frame Size 24-8
Increase the SDLC Line Speed 24-8
Other Customizing Considerations 24-8
Monitor SDLLC Media Translation 24-9
SDLLC Configuration Examples 24-9 Example of SDLLC with Direct Connection 24-9
Example of SDLLC with Single Router using RSRB 24-10 Example of SDLLC with RSRB Single 3x74 24-11
Example of SDLLC with RSRB Multiple 3x74s 24-12
Configuring SDLLC with RSRB and Local Acknowledgment 24-14 NCP and VTAM Sysgen Parameters 24-15
Index
Table of Contents xxxv xxxvi Router Products Configuration Guide OF FGURES
Figure 31 Using SLARP to Acquire the New Routers IP Address 3-3
Figure 3-2 Using BOOTP/RARP to Acquire the New Routers IP Address 3-4
Figure 3-3 Dynamically Resolving the New Routers IP Address-to-Host Name Mapping 3-5
Figure 3-4 Configuring Router as RARP Server 3-25
Figure 4-1 EXEC and Daemon Creation on Line with No Modem Control 4-7
Figure 4-2 EXEC and Daemon Creation on Line Configured for Continuous CTS 4-9
Figure 4-3 EXEC Creation on Line Configured for High-Speed Dial-up Modem 4-10
Figure 4-4 EXEC Creation on Line Configured for Modem Callin 4-11
Figure 4-5 Daemon Creation on Line Configured for Modem Callout 4-13
Figure 4-6 EXEC and Daemon Creation on Line Configured for Incoming and Outgoing Calls 4-14
Figure 6-1 Using Subinterfaces to Provide Full Connectivity on Partially Meshed Frame Relay Network 6-22
Figure 6-2 Novell Network with and without Subinterfaces 6-24
Figure 6-3 IP Tunneling Terminology and Concepts 6-25
Figure 6-4 Providing Workarounds for Networks with Limited Hop Counts 6-26
Figure 6-5 Tunnel Precautions Hop Counts 6-27
Figure 6-6 HSSI Loopback Testing 6-49
Figure 6-7 HSSI External Loopback Request 6-50
Figure 6-8 Using the PPP EXEC Command 6-54
Figure 6-9 Connecting Multiprotocol Subnetworks across Single-Protocol Backbone 6-57
Figure 6-10 Creating Virtual Private Networks across WANs 6-58
Figure 7-1 Transporting LAN Protocols across an X.25 PDN 7-8
Figure 7-2 Establishing an IP Encapsulation PVC through an X.25 Network 7-33
Figure 7-3 X.25 Tunneling Connection 7-33
Figure 7-4 Local Switching and Remote Tunneling PVCs 7-34
Figure 7-5 Example Network Topology for Switching CMNS over PDN 7-36
Figure 7-6 Example Network Topology for Switching CMNS over Leased Line 7-38
Figure 7-7 Parallel Serial Lines to X.25 Network 7-40
Figure 8-1 Typical Frame Relay Configuration 8-3
Figure 8-2 Frame Relay Switched Network 8-5
Figure 8-3 PVC Switching Configuration 8-14
Figure 8-4 Frame Relay DCE Configuration 8-15
Figure 8-5 Hybrid DTE/DCE PVC Switching 8-18
Figure 8-6 Frame Relay Switch over IP Tunnel 8-20
Figure 9-1 Typical SMDS Configuration 9-3
List of Figures xxxvii Figure 9-2 Multiple Logical IP Subnet Configuration 9-12
Figure 10-1 Dial-on-Demand Routing Interconnection 10-2
Figure 10-2 Sample Dialer Interface Configuration 10-12
Figure 10-3 Hub-and-Spoke Configuration Using Dial-on-Demand Routing 10-18
Figure 10-4 Sample Dialer String or Dialer Map Configuration 10-26
Figure 10-5 Chat Script Configuration and Function 10-27
Figure 10-6 Dial-On Demand Routing Configuration 10-30
Figure 11-1 Apollo Domain Addresses 11-2
Figure 12-1 IPTalk Configuration Example 12-22
Figure 12-2 InteroPoll Output 12-30
Figure 12-3 Nonextended AppleTalk Routing between Two Ethernet Networks 12-31
Figure 12-4 Routing in Discovery Mode 12-32
Figure 12-5 Transition Mode Topology and Configuration 12-33
Figure 12-6 Example Topology of Partially Obscured Zone 12-37
Figure 12-1 Controlling Access to Common AppleTalk Network 12-39
Figure 12-8 Controlling Resource Access among Multiple AppleTalk Zones 12-40
Figure 12-9 Example Network Topology 12-44
Figure 13-1 VINES Logical Network 13-2
Figure 13-2 VINES Simple Configuration 13-12
Figure 13-3 VINES Serverless Configuration 13-13
Figure 13-4 VINES Serverless X.25 Configuration 13-14
Figure 13-5 VINES Complex Serverless Configuration 13-15
Figure 13-6 VINES Access List Configuration 13-16
Figure 14-1 DECnet Nodes and Areas 14-4
Figure 14-2 DECnet Cost Values 14-5
Figure 14-3 Sample Phase IV/Phase Network 14-17
Figure 14-4 ATG Configuration Example 14-18
Figure 15-1 Path MTU Discovery 15-19
Figure 15-2 IP Fast Switching on the Same Interface 15-28
15-3 Figure Creating Network from Separated Subnets 15-32
Figure 15-4 IP Helper Addresses 15-34
Figure 15-5 IP Flooded Broadcast 15-34
Figure 15-6 Simplex Ethernet Connections 15-35
Figure 15-7 IPSO Security Levels 15-38
xxxviii Router Products Configuration Guide Figure 16-1 Interior System and Exterior Routes 16-4
Figure 16-2 GDP Report Message Packet Format 16-32
Figure 16-3 Overriding Static Routes 16-45
Figure 16-11 Illustration of IS-IS Routing 16-45
Figure 16-5 Sample OSPF Autonomous System Network Map 16-50
Figure 16-6 Interface and Area Specifications for OSPF Example Configuration 16-52
Figure 16-1 Assigning Metrics for Redistribution 16-56
Figure 16-0 Assigning Metrics for IGRP Path Feasibility 16-59
Figure 16-9 Illustration of Synchronization 16-60
16-6 Figure 16-10 Assigning Internal and External BGP Neighbors
16-63 Figure 1611 Core EGP Third-Party Update Configuration Example
Figure 16-12 Router in AS 164 Peers with Router in AS 109 16-64
Figure 16-13 Filtering IGRP Updates 16-64
Figure 16-14 Disabled Split Horizon Example for Frame Relay Network 16-67
Figure 11-1 ISO-IGRP NSAP Addressing Structure 17-3
Figure 17-2 IS-IS NSAP Addressing Structure 17-4
Figure 17-3 Static Routing Illustration 17-32
Figure 11-4 CLNS X.25 Intradomain Routing 17-33
Figure 11-5 CLNS Interdomain Static Routing 17-34
Figure 17-6 CLNS Dynamic Routing within Single Area 17-35
Figure 17-7 CLNS Dynamic Routing within Two Areas 17-36
Figure 17-0 CLNS Dynamic Interdomain Routing 17-37
Figure 17-9 ISO-IGRP Configuration 17-41
Figure 17-10 Routers Acting as DTEs and DCEs 17-42
Figure 10-1 Novell IPX Servers Requiring Access Control 18-21
Figure 10-2 SAP Input Filter 18-22
Figure 10-3 SAP Output Filter 18-24
Figure 10-4 IPX Clients Requiring Server Access through Router 18-25
Figure 10-5 Type Broadcast Flooding 18-26
Figure 10-6 IPX over DDR Configuration 18-28
Figure 19-1 Helper Addresses 19-15
Figure 20-1 Example of Basic Bridging 20-22
Figure 20-2 Ethernet Bridging Configuration Example 20-24
Figure 20-3 Example Network Configuration 20-25
List of Figures xxxix 20-26 Figure 204 Network Demonstrating Output Address List Filtering
Figure 20-5 X.25 Bridging Example 20-27
Figure 20-6 Frame-Relay Bridging Example 20-28
Figure 20-7 Bridged Subnetworks with Domains 20-30
Figure 21-1 IEEE 802.5 Token Ring Frame Format 21-1
Figure 21-2 Dual-Port Bridge 21-4
Figure 21-3 Multiple Dual-Port Bridges 21-4
Figure 21-4 Multiport Bridge using Virtual Ring 21-5
Figure 21-5 Remote Source-Route Bridged Topology 21-8
Figure 21-6 LLC2 Session Without Local Acknowledgment 21-14
Figure 21-7 LLC2 Session with Local Acknowledgment 21-14
Figure 21-8 Topology for Bridging Routed Protocols across Source-Route Bridged Network 21-17
Figure 21-9 Example of Simple SRITLB Topology 21-20
Figure 21-10 LNM Linking to Source-Route Bridge on Each Local Ring 21-27
Figure 21-11 LAN Network Manager Monitoring and Translating 21-28
Figure 21-12 Access Expression Example 21-37
Figure 21-13 SNA Local Address Prioritization 21-40
Figure 21-14 Dual Port Source-Route Bridge Configuration 21-47
Figure 21-15 Four-Port Source-Route Bridge 21-48
Figure 21-16 Two Virtual Rings Connected by an Actual Token Ring 21-49
Figure 21-17 Remote Source-Route Bridging Using TCP as Transport 21-50
Figure 21-18 Remote Source-Route Bridging Using FST as Transport 21-51
Figure 21-19 Remote Source-Route Bridge Using All Types of Transport Methods 21-53
Figure 21-20 RSRB with Local AcknowledgmentLess Complex Configuration 21-54
Figure 21-21 Network Topology for RSRB with Local Acknowledgment and Passthrough 21-58
Figure 21-22 Remote Source-Route Bridging Using Local AcknowledgmentMore Complex Example 21-61
Figure 21-23 RSRBSimple Reliability 21-63
Figure 21-24 Assigning RIP to Source-Route Bridge 21-65
Figure 21-25 Assigning RIF to Two-Hop Path 21-65
Figure 21-26 Example of Simple SR/TLB Configuration 21-66
Figure 21-27 Example of Bit-Swapped Address 21-68
Figure 21-28 Specifying Static Entry 21-69
Figure 21-29 Router with Two Token Rings Configured as Local Source-Route Bridge 21-69
Figure 21-30 Router with Three Token Rings Configured as Multiport Bridge 21-70
xl Router Products Configuration Guide Figure 21-31 Router Filtering Bridged Token Ring Packets to IBM Machines 21-72
Figure 21-32 Router Filtering SNAP Frames on Output 21-73
Figure 21-33 Network Configuration Using NetBIOS Access Filters 21-76
Figure 21-34 RSRB Configuration Example 21-76
Figure 22-1 SDLC Session without Local Acknowledgment 22-5
Figure 22-2 SDLC Session with Local Acknowledgment 22-6
Figure 22-3 Serial Link Address Prioritization 22-9
Figure 22-4 SNA Logical Unit LU Address Prioritization 22-10
Figure 22-5 IBM SDLC Configuration without Proxy Polling 22-11
Figure 22-6 IBM SDLC Configuration with Proxy Polling 22-12
Figure 22-1 STUN Simple Serial Transport 22-14
Figure 22-B STUN TCP/IP Encapsulation 22-15
Figure 22-9 STUN Communication Involving Line-Sharing Device 22-18
Figure 23-1 Two SDLC Secondary Stations Attached to Single Serial Interface through an MSD 23-11
Figure 24-1 SNA Link-Level Support 24-1
Figure 24-2 SDLLC with Ethernet and Translational Bridging 24-7
Figure 24-3 SDLLC Communication between 37x5 and 3x74 Connected to the Same Router Direct Connection 24-10
Figure 24-4 SDLLC with Single Router using RSRB 24-10
Figure 24-5 SDLLC with RSRB with Single 3x74 24-11
Figure 24-6 SDLLC with RSRB Multiple 3x74s 24-12
Figure 24-1 SDLLC with RSRB and Local Acknowledgment 24-14
List of Figures xli xlii Router Products Configuration Guide 0F TABLES
Table 2-1 Summary of Command Modes 2-3
Table 2-2 Editing Keys and Functions for Software Release 9.1 and Earlier 2-25
Table 2-3 Special Telnet Commands 2-33
Table 5-2 Protocols that have Access Lists Specified by Names 5-17
Table 5-1 Factory Diagnostic Mode Settings for the Configuration Register 5-17
Table 5-3 Protocols that have Access Lists Specified by Numbers 5-18
Table 5-4 Error Message Logging Keywords 5-30
Table 5-5 Logging Facility Types 5-31
Table 6-1 Subinterface Configuration Commands 6-19
Table 6-2 Commands that Allow Subinterfaces as Parameters 6-20
Table 6-3 Show Commands that Allow Subinterfaces as Parameters 6-21
Table 6-4 ISDN Office Switch Types 6-33
Table 7-1 LAPB Parameters 7-7
Table 7-2 Protocols and Initial Byte of Call User Data 7-11
Table 7-3 DDN IntemetlX 121 Address Conventions 7-17
Table 7-4 X.25 Virtual Circuits 7-22
Table 7-5 X.25 Retransmission Timers 7-25
Table 9-1 Protocol Families and Types of Multicasts Needed 9-7
Table 10-1 CCITT V.25bis Options 10-3
Table 10-2 Modem Script Execution 10-28
Table 10-3 System Script Execution 10-28
Table 12-1 AppleTalk Phase and Phase 12-3
Table 12-2 Zone and Interface Associations for Partial Zone Advertisement Example 12-38
Table 12-3 Partial Zone Advertisement Control on Network 30 12-38
Table 14-1 Packet Exchange between Nodes and 14-19
Table 15-1 Reserved and Available Internet Addresses 15-4
Table 15-2 Configuration Register Settings for Broadcast Address Destination 15-16
Table 15-3 Default Security Keyword Values 15-25
Table 16-1 Default Administrative Distances 16-35
Table 16-2 Default Administrative Distances 16-40
Table 17-1 Sample Routing Table Entries 17-5
Table 17-2 Hierarchical Routing Examples 17-5
Table 18-1 Novell IPX Encapsulation Types on IEEE Interfaces 18-4
List of Tables xliii Table 182 IPX Filters 18-5
Table 19-1 XNS Filters 19-5
xliv Router Products Configuration Guide AboutThis Manual
This section discusses the objectives audience organization and conventions of the Router
Products Configuration Guide publication
Document Objectves
maintain includes task This publication describes the tasks necessary to configure and your router It does overviews expanded descriptions of tasks and comprehensive configuration examples It not with the provide complete command syntax descriptions and therefore must be used in conjunction
Router Products Command Reference
Audence
This publication is intended primarily for network administrators who will be configuring and
maintaining routers but are not necessarily familiarwith the tasks involved the relationship between tasks them or the commands necessary to perform particular
Document Organzaton
Each related tasks This publication is divided into five main parts part comprises chapters describing
in this matches the of or functions The organization of parts and chapters publication organization
that this document does not parts and chapters in the Router Products Command Reference except follows contain appendixes The parts in this publication are as
Part One Product Introduction contains an overview of the router and task descriptions for the
with this system user interface and command parser Begin your system configuration process
part of the manual
Part Two System and Interface Configuration and Management describes the tasks pertaining and and also describes to system interfaces system booting terminal session asynchronous lines EXEC commands
Part Three Wide-Area Networking describes the tasks pertaining to X.25 Frame Relay
SMDS and dial-on-demand routing
Part Four Routing Protocols contains chapters that describe how to configure each network
protocol that we support These protocols include Apollo Domain AppleTalk Banyan VINES DECnet Internet Protocol IP ISO Connectionless Network Services CLNS Novell IPX and in Xerox XNS including Ungermann-Bass and 3Com The chapters are arranged alphabetical
order for ease of use The routing protocols including IGRP BGP RIP OSPF
IS-IS and ISO-IGRP also are discussed
About This Manual xlv Document Conventions
Part Five Bridging contains chapters that describe how to configure transparent bridging
source-route bridging source-route transparent SRT bridging and source-route transparent
translational bridging SRJTLB on our routers/bridges
Part Six IBM Networking contains chapters that describe how to configure the SDLC
network Included also transport and serial tunneling mechanisms in an IBM local-area are the
commands for the Local Acknowledgment feature managing your source-route bridges with
LAN Network Manager and SDLLC our solution to translating between IBMs SDLC data link
protocol for serial lines and ISOs LLC2 data link protocol for Token Ring networks
Document Conventions
Software and hardware documentation uses the following conventions
The symbol or Ctrl represent the key labeled Control For example the key combination AD or
Ctrl-D means hold down the Control key while you press the key Keys are indicated in
capitals but are not case sensitive
string is defined as nonquoted set of characters For example when setting up community
around the the will include the string for SNMP to public do not use quotes string or string
quotation marks
Command descriptions use these conventions
Commands and keywords are in boldface font
Arguments for which you supply values are in italic font
Elements in square brackets are optional
vertical bars Alternative but required keywords are grouped in braces and separated by
Examples use these conventions
Examples that contain system prompts denote interactive sessions indicating that the user enters
commands at the prompt The system prompt indicates the current command mode For example
the prompt router conf ig indicates global configuration mode
Terminal sessions and information the system displays are in screen font
in font Information you enter is boldface ecreen
Nonprinting characters such as passwords are in angle brackets
in brackets Default responses to system prompts are square
Exclamation points at the beginning of line indicate comment line They are also displayed
by the router for certain processes
Caution Means reader be careful You are capable of doing something that might result in
equipment damage or loss of data
Note Means reader take note Notes contain helpful suggestions or references to materials not
contained in this manual
xlvi Router Products Configuration Guide Product
Dntroduct on CHAPTER
Router Product Overview
Complex intemetworks have grown past the point where they can depend on equipment from single
vendor At the same time small independent networks are finding it necessary to interconnect and
interoperate Virtually all organizations creating and connecting local-area networks LANs and
wide-area networks WAN5 today have major commitments to hardware and software from many
different vendors Therefore current and future internetworking requires products that support
multiprotocol and multimedia networks with multivendor products
Our routers connect LANs and WANs and allow them to interoperate with equipment from most
vendors over most available media This chapter describes the protocols and media that our routers
support
Supported Network Protocos
Our routers support many networking protocols as well as several routing protocols These protocols
are based on both open standards and proprietary protocols from variety of vendors Our routers
also support wide set of bridging and IBM connectivity solutions
Our routers can forward packets concurrently from any combination of the following
WAN protocols
X.25 and its derivatives including LAPB and DDN X.25
Frame Relay
Switched Multimegabit Data Service SMDS
Dial-on-Demand Routing DDR
Integrated Services Digital Networks ISDN
Point-to-Point Protocol PPP
High-level Data Link Control HDLC
SLIP for asynchronous lines
LAN protocols
Apollo Domain
AppleTalk Phase and Phase
Banyan VINES
DBCnet Phase IVfPhase
Internet Protocol IP
Router Product Overview 1-1 Supported Media
ISO Connectionless Network Services CLNS and Connection Mode Network Services CMNS
Novell IPX
XNS and Ungermann-Bass
Bridging types
Source-route transparent SRT bridging
Transparent bridging TB
Source-route bridging SRB
Remote source-route bridging RSRB
Source-route translational bridging SRJTLB
Support for IBM networking
Serial tunneling STUN
Synchronous Data Link Control SDLC
LLC2
SDLLC
Supported Meda
Our routers support the following industry-standard networking media
EthernetIEEE 802.3 and Type II
Token RingIEEE 802.5
FDDIsingle and dual mode
Synchronous serialV.35 RS-232 RS-449 RS-530 and X.21
High-Speed Serial Interface HSSIsupports T3 E3 and SONIET rates
Usng the Router
Your router comes with its software already installed You normally connect an ASCII terminal to
the routers console port and it is from this terminal that you configure and manage the router For
hardware installation procedures refer to the hardware manual for your router platform
When you boot the router it loads system image that contains specific version of system
software It also loads configuration files which contain commands that customize the operation of
your router.You also can use TFTP to retrieve these configuration files from remote network
device These files can be stored on the local router on remote router that has been configured as
TFTP server or on host running TFTP For information about booting the router refer to the
discussion of loading system images microcode images and configuration files in Chapter of this manual
You can build most straightforward configurations of the router and create configuration file using
the setup facility This facility is described in the Router Products Getting Started Guide To
enhance the configuration use the protocol-specific commands described in Chapters through 24
of this manual
1-2 Router Products Configuration Guide Using the Router
that lets The router software provides user interface called command interpreter or EXEC you
the This interface also context-sensitive The configure and manage router user provides help which of command interpreter has several different command modes each of provides group commands related commands that you can use to configure the router and display its status Some been are available to all users while others can be executed after an enabling password has given by information about command The command the operator Context-sensitive help gives syntax
in of this manual interpreter and its help feature are described Chapter
terminal and You use the command-line parser to configure interfaces sessions asynchronous
communications lines Interfaces are connections to network media such as Ethernet Token Ring
and serial media You configure them to run different routing protocols and other networking
and modems connected to the router that other network protocols You configure terminal sessions so
is described in of this the users can log in to the router Configuring interfaces Chapter manual
these interfaces described in routing bridging and IBM protocols you can configure on are Chapters
and communications lines through 24 of this manual Configuring terminal sessions asynchronous
is discussed in Chapter of this manual
such tasks the You also can configure and manage the router itself performing as naming router
tasks described in setting the routers time configuring SNMP and setting security These are
Chapter of this manual
about router Refer to the Documentation for We provide various documentation your Roadmap
the various For the latest information information about the interrelationship among documents
about the software including new features added since the documentation was printed and
additional caveats about using the software refer to the release notes that accompany it
Router Product Overview 1-3 Using the Router
1-4 Router Products Configuration Guide CH APTE1
Understanding the User Hnterlace
The interface router user provides several different command modes Each command mode provides of related This group commands chapter describes how to access and list the commands available
in each command mode It also discusses the user interface to Telnet which you might use to connect
to another router
Entering at the system prompt allows you to obtain list of commands available for each command mode
The command is called the The the commands interpreter EXEC EXEC interprets you type and carries out the corresponding operations You must log into the router before you can enter an EXEC
command For security purposes the EXIEC has two levels of access to commands user and
privileged The EXEC commands available at the user level are subset of the EXEC commands
available at the privileged level From the privileged level you can also access global configuration
mode and six specific configuration modes interface subinterface line router ipx-router and route- map configuration
Almost every system configuration command also has no form In general use the no form to
disable feature or function Use the command without the keyword no to reenable disabled feature
enable feature that is disabled default For IP or by example routing is enabled by default Specify
the command no ip routing to disable IP routing and specify ip routing to reenable it The Router Products Command Reference publication provides the complete syntax for every command and describes what the no form of command does
If does find valid your router not system image or if its configuration file is corrupted at startup the system may enter read-only memory ROM monitor mode brief description of the ROM
monitor mode is included in this chapter
The interface user also provides context-sensitive help on command syntax This chapter describes how the to use help system It also describes the command editing and command history features that enable you to recall previous command entries and easily edit command entries
For complete description of the commands mentioned in this chapter refer to Chapter of the
Router Products Command Reference publication
Understanding the User Interface 2-1 User Interface Task List
User nterface Task List
You can perform the following tasks to become familiarwith the routers user interface to configure
various aspects of the user interface and to use Telnet connections
Access each command mode page 2-2
Get context-sensitive help page 2-15
Check command syntax page 2-17
Use the command history features page 2-18
Use the editing features page 2-20
Set terminal parameters page 2-25
Lock the keyboard page 2-29
Set pending output notification page 2-29
Prevent errant connection attempts page 2-29
Configure Telnet capabilities for session page 2-29
Use Telnet connections page 2-3
Monitor Telnet connections page 2-34
Access Each Command Mode
This section describes how to access each of the routers command modes
User EXEC mode
Privileged EXEC mode
Global configuration mode
Interface configuration mode
Subinterface configuration mode
Line configuration mode
Router configuration mode
IPX-router configuration mode
Route-map configuration mode
ROM monitor mode
Table 2-1 lists the command modes how to access each mode the prompt you will see while you
are in that mode and the method to exit that mode The prompts listed assume the default router name Router
2-2 Router Products Configuration Guide Access Each Command Mode
Table 2-1 Summary of Command Modes
Command
Mode Access Method Prompt Exit Method
User EXEC Log into router Router Use the logout command
From EXEC Routera Privileged user mode use the To exit back to user EXEC mode use the disable EXEC enable EXEC command command
To exit into global configuration mode use the
configure privileged EXEC command
Global use the Router To exit From privileged EXEC mode config to privileged EXEC mode use the exit or
configuration configure privileged EXEC end command or press Ctrl-Z command To exit to interface configuration mode enter an
interface configuration command
Interface Routerconfig-if From global configuration mode To exit to global configuration mode use the exit
configuration enter by specifying an interface with command
an interface command To exit to privileged EXEC mode press Ctrl-Z
To exit to subinterface configuration mode specify
subinterface with the interface command
Subinterface From To exit global configuration mode Routerconfig-subif to global configuration mode use the exit
configuration specify subinterface with an command interface command To exit to privileged EXEC mode press Ctrl-Z
Line Router To From global configuration mode config1ine exit to global configuration mode use the exit
configuration enter by specifying line with an line command command To exit to privileged EXEC mode press Ctrl-Z
Router Routerconfig-router From global configuration mode To exit to global configuration mode use exit
configuration enter by specifying router with command router command To exit to privileged EXEC mode press Ctrl-Z
router Router IPX From global configuration mode configipx-router To exit to global configuration mode use the exit
configuration enter by specifying the ipx router command command
Route From Routerconfig-route-rnapa To exit to map global configuration mode global configuration mode use the exit configuration enter by specifying the route-map command command To exit to privileged EXEC mode press Ctrl-Z
ROM From EXEC use the To exit privileged mode to user EXEC mode press to continue monitor reload EXEC command Press Break
during the first 60 seconds while the
system is booting
The preceding table might not include all of the possible ways to access or exit each command mode
Understanding the User Interface 2-3 Access Each Command Mode
User EXEC Mode
After you log into the router you are automatically in user EXEC command mode The EX1EC
commands available at the user level are subset of those available at the privileged level In
general the user EXEC commands allow you to connect to remote routers change terminal settings
on temporary basis perform basic tests and list system information
To list the user EXEC commands complete the following task
Task Command
List the user EXEC commands
The user-level prompt consists of the routers host name followed by the angle bracket
Router
The default host name is Router unless it has been changed during initial configuration using the
setup command Refer to the Router Products Getting Started Guide for information on the setup
facility You can also change the router name using the hostname global configuration command
as described in Chapter
Example
To list the commands available in user EXEC mode enter as shown in the following example
Router Exec commands connect Open terminal connection disconnect Disconnect an existing telnet session enable Turn on privileged commands exit Exit from the EXEC help Description of the interactive help system lock Lock the terminal
login Log in as particular user logout Exit from the EXEC name-connection Name an existing telnet connection ping Send echo messages resume Resume an active telnet connection show Show running system information
systat Display information about terminal lines telnet Open telnet connection terminal Set terminal line parameters where List active telnet connections Router
this how router has The list of commands may vary slightly from example depending upon your
been configured
The user EXEC commands that set terminal parameters are shown in the section Configure Telnet
Capabilities for Session later in this chapter
Privileged EXEC Mode
Because many of the privileged commands set operating parameters privileged access should be
password-protected to prevent unauthorized use The command set includes those commands
contained in user EXEC mode as well as the configure command through which you can access the
2-4 Router Products Configuration Guide Access Each Command Mode
also includes remaining command modes Privileged EXEC mode high-level testing commands
such as debug For details on the debug command see the Debug Command Reference publication
For details on the setup command see the Router Products Getting Started Guide
To access and list the privileged EXEC commands complete the following tasks
Task Command
Step Enter the privileged EXEC mode enable
asswordl
Step List privileged EXEC commands
If the system administrator has set password you are prompted to enter it before being allowed
access to privileged EXEC mode The password is not displayed on the screen and is case-sensitive
The system administrator uses the enable password global configuration command to set the
password that restricts access to privileged mode This command is described in Chapter
The privileged-level prompt consists of the routers host name followed by the pound sign If
the router named with the hostname that would the was command name appear as prompt instead of Router
Router
Understanding the User Interface 2-5 Access Each Command Mode
Example
The following example shows how to access privileged EXEC mode and list privileged EXEC commands
Router enable Pas sword Router Exec commands bfe For manual emergency modes setting clear Reset functions clock Manage the system clock configure Enter configuration mode connect Open terminal connection copy Copy config file to or from tftp server debug Debugging functions disable Turn off privileged commands disconnect Disconnect an existing telnet session enable Turn on privileged commands exit Exit from the EXEC
help Description of the interactive help system llc2 Execute llc2 tests lock Lock the terminal
login Log in as particular user logout Exit from the EXEC nameconnection Name an existing telnet connection ping Send echo messages reload Halt and perform cold restart resume Resume an active telnet connection
send Send message to other tty lines setup Run the SETUP command facility show Show running system information systat Display information about terminal lines telnet Open telnet connection terminal Set terminal line parameters test Test subsystems memory and interfaces trace Trace route to destination where List active telnet connections
whichroute Do route table lookup and display results write Write running configuration to memory network or terminal Router
list of this router has The commands may vary slightly from example depending upon how your
been configured
From the privileged level you can access global configuration mode For instructions see Global
Configuration Command Mode which follows this section
To return from privileged EXEC mode to user EXEC mode perform the following task
Task Command
Move from privileged EXEC mode to user EXEC mode disable
GobaI Configuration Mode
Global configuration commands apply to features that affect the system as whole Use the
configure privileged EXEC command to enter global configuration mode When you enter this
command the EXEC prompts you for the source of the configuration commands
Configuring from terminal memory or network
2-6 Router Products Configuration Guide Access Each Command Mode
You then either the can specify terminal nonvolatile memory NVRAM or file stored on network server as the source of commands The default configuration see Chapter is to type in commands from the terminal console Pressing the Return key begins this configuration method
Commands to enable particular routing or bridging function are also global configuration commands For information on protocol-specific global configuration commands see the
appropriate chapter in this guide
To and list access the global configuration commands complete the following tasks
Task Command
At the from the Step terminal privileged EXEC mode enter configure
configuration mode CR
Step List the global configuration commands
Example
The shows how following example to access global configuration mode and list global configuration commands
Router configure Configuring from terminal memory or network CR Enter configuration commands one per line End with CNTL/Z Routerconfig Configure commands
accesslist Add an access list entry apollo Apollo global configuration commands appl eta 1k Appletalk global configuration commands arp Set static ARP entry asyncbootp Modify system bootp parameters autonomous system Specify local AS number to which we belong banner Define login banner boot Modify system boot parameters bridge Transparent bridging buffers Adjust system buffer pool parameters busy-message Display message when connection to host fails chat-script Define modem chat script clns Global CLNS configuration subcommands
clock Configure time-of-day clock decnet Global DECnet configuration subcommands default -value Default character-bits values
dialerlist Create dialer list entry enable Modify enable password parameters end Exit from configure mode exit Exit from configure mode
frame-relay Global frame relay configuration commands help Description of the interactive help system hostname Set systems network name interface Select an interface to configure ip Global IP configuration subcommands ipx Novell/IPX global configuration commands line Configure terminal line lnm IBM Lan Manager locaddr-priority-list Establish queueing priorities based on LU address logging Modify message logging facilities login-string Define host-specific login string mop The DEC MOP Server netbios NETBIOS access control filtering no Negate command or set its defaults ntp Configure NTP
Understanding the User Interface 2-1 Access Each Command Mode
priority-list Build priority list
queue-list Build custom queue list rif Source-route RIF cache routemap Create route-map or enter routemap command mode router Enable routing process scheduler-interval Maximum interval before running lowest priority process service Modify use of network based services smt-queue-threshold Set the max number of unprocessed SMT frames snmpserver Modify SNMP parameters source-bridge Source-route bridging ring groups stun STUN global configuration commands
tacacs-server Modify TACACS query parameters tftp-server Provide TFTP service for netload requests tn3270 tn3270 configuration command username Establish User Name Authentication
vines Vines global configuration commands x25 X.25 Level
xns XNS global configuration commands Router config
The list of commands may vary slightly from this example depending upon how your router has
been configured
To exit global configuration command mode and return to privileged EXEC mode use one of the
following commands
Task Command
Exit global configuration mode exit
end CtrlZ
From global configuration mode you can access six configuration sublevels interface subinterface
line router ipx-router and route-map configuration commands These command modes are
described in the following sections
Onterface Configuraton Mode
Many features are enabled on per-interface basis Interface configuration commands modify the operation
of an interface such as an Ethernet FDDI or serial port Interface subcommands always follow an interface
command which defines the interface type
For details on interface configuration commands that affect general interface parameters such as
bandwidth clock rate and so on see Chapter For protocol-specific commands see the appropriate
chapter in this guide
To access and list the interface configuration commands complete the following tasks
Task Command
Step From global configuration mode enter interface inteiface-type interface-number
interface configuration mode
Step List the interface configuration commands
2-8 Router Products Configuration Guide Access Each Command Mode
Example
In the following example serial interface is about to be configured The new prompt
indicates interface config-if configuration mode In this example the user asks for help by requesting list of commands
Routerconfig interface serial CR Router config-if Interface configuration commands access-expression Build bridge boolean access expression apollo Apollo interface subcommands appletalk Appletalk interface subcornmands
arp Set arp type arpa probe snap or timeout backup Modify dial-backup parameters bandwidth Set bandwidth informational parameter bridge-group Transparent bridging interface parameters clns CLNS interface subcommands
clockrate Configure serial interface clock speed custom-queue-list Assign custom queue list to an interface decnet Interface DECnet config commands delay Specify interface throughput delay description Interface specific description dialer Dial-on-demand routing DDR commands dialer-group Assign interface to dialer-list down-when-looped Force looped serial interface down
encapsulation Set encapsulation type for an interface ethernet-transit-oui Token-ring to Ethernet OUI handling exit Exit from interface configuration mode frame-relay Set frame relay parameters hdh Set HDH mode
help Description of the interactive help system hold-queue Set hold queue depth ip Interface Internet Protocol config commands ipx Novell interface subcomrnands isis IS-IS commands iso-igrp ISO-IGRP interface subcommands keepalive Enable keepalive lapb X.25 Level parameters Link Access Procedure Balanced llc2 LLC2 Interface Subcommands 1mm IBM Lan Manager
locaddrpriority Assign priority group loopback Configure internal loopback on an interface mac-address Manually set interface MAC address mop DEC MOP server commands mtu Set the interface Maximum Transmission Unit MTU netbios Use defined NETBIOS access list or enable name-caching no Negate command or set its defaults ntp Configure NTP ppp Point-to-point protocol
priority-group Assign priority group to an interface pulse-time Enables pulsing of DTR during resets pup PUP interface subcommands sdlc SDLC commands sdllc Configure SDLC to LLC2 translation shutdown Shutdown the selected interface smds Modify SMDS parameters source-bridge Configure interface for source-route bridging stun STUN interface subcommands
transmit-interface Assign transmit interface to receive-only interface transmitter-delay Set dead-time after transmitting datagram tunnel protocol-over-protocol tunneling tx-queue-limit Configure card level transmit queue limit vines Vines interface subcoxnmands xns XNS interface subcommands
Understanding the User Interface 2-9 Access Each Command Mode
list of this router has The conmiands may vary slightly from example depending upon how your
been configured
To exit interface configuration mode and return to global configuration mode enter the exit
command Or press Ctrl-Z to exit configuration mode and return to privileged EXEC mode
Subnterface Configiration Mode
You can configure multiple virtual interfaces called subinterfaces on single physical interfaëe
This feature is supported on the following interfaces
Serial interfaces with Frame Relay encapsulation
Token Ring interfaces IPX only
FDDI interfaces IPX only
Ethernet interfaces IPX only
Subinterfaces appear to be distinct physical interfaces to the various protocols For example Frame
Relay networks provide multiple point-to-point links called permanent virtual circuits PVCs
PVCs can be grouped under separate subinterfaces that in turn are configured on single physical
interface From bridging spanning tree viewpoint each subinterface is separate bridge port and
frame arriving on one subinterface can be sent out on another subinterface
Subinterfaces also allow multiple encapsulations for protocol on single interface For example
router can receive an ARPA-framed IPX packet and forward the packet back out the same physical
interface as SNAP-framed IPX packet
For detailed information on how to configure subinterfaces see Chapter For information on how
to configure Frame Relay bridging IPX and IF subinterfaces see the appropriate chapters in this guide
To access and list the subinterface configuration commands complete the following tasks
Task Command
Step From interface configuration mode configure virtual See the example that follows For list of all
interface interface commands that allow subinterface
implementation see Chapter
Step List the subinterface configuration commands
Example
In the following example subinterface is configured for serial line which is configured for Frame
Relay encapsulation The subinterface is called 2.1 to indicate that it is subinterface of serial
interface The new prompt configsubif indicates subinterface configuration mode The
subinterface can be configured to support one or more Frame Relay PVCs To list the commands
available in subinterface configuration mode enter question mark
Routerconfig interface serial Router config-if encapsulation frame-relay Routerconfig-if interface serial 2.1 Router config-subif Interface configuration commands apollo Apollo interface subcommands appletalk Appletalk interface subcommands bandwidth Set bandwidth informational parameter bridge-group Transparent bridging interface parameters
2-10 Router Products Configuration Guide Access Each Command Mode
clns CLNS interface subcommands
decnet Interface DECnet config commands delay Specify interface throughput delay description Interface specific description exit Exit from interface configuration mode framerelay Set frame relay parameters ip Interface Internet Protocol config commands ipx Novell interface subcommands isis ISIS commands
isoigrp ISO-IGRP interface subcommands no Negate command or set its defaults ntp Configure NTP shutdown Shutdown the selected interface
The list of commands from this how may vary slightly example depending upon your router has been configured
To exit subinterface configuration mode and return to global configuration mode enter the exit
command Or press Ctrl-Z to exit configuration mode and return to privileged EXEC mode
Line Configuration Mode
Line commands the configuration modify operation of serial terminal line Line configuration
commands always follow line command which defines line number These commands are
used to connect to generally remote routers change terminal parameter settings on line-by-line
and set the modem basis up auxiliary port configuration to support Dial-on-Demand Routing DDR see Chapter 10
To and list the access auxiliary port console port and virtual terminal line configuration commands
complete the following tasks
Task Command
Step From global configuration mode configure an line aux con vty line-n umber
auxiliary console or virtual terminal line number
Step List the line configuration commands
Example The following example shows how to enter line configuration mode for virtual terminal line and
list the line configuration commands
Routerconfig line vty CR Router config-line Line configuration commands
access-class Filter connections based on an IP access list activationcharacter Define the activation character autobaud Set line to autobaud autocommand Automatically execute an EXEC command autohangup Automatically hangup when last connection closes autohost Automatically connect to host cts-required Require CTS on line data-character-bits Size of characters being handled databits Set number of data bits per character disconnect-character Define the disconnect character dispatch-character Define the dispatch character dispatch-timeout Set the dispatch timer editing Enable command line editing escape-character Change the current lines escape character
Understanding the User Interface 2-11 Access Each Command Mode
exec Start an EXEC process exec-banner Enable the display of the EXEC banner exec-character-bits Size of characters to the command exec exec-timeout Set the EXEC timeout exit Exit from line configuration mode flowcontrol Set the flow control help Description of the interactive help system history Set the size of the command history buffer holdcharacter Define the hold character
length Set number of lines on screen location Enter terminal location description lockable Allow users to lock line
login Enable password checking modem Configure the Modem Control Lines monitor Copy debug output to the current terminal line no Negate command or set its defaults notify Inform users of output from concurrent sessions padding Set padding for specified output character parity Set terminal parity password Set password private Configuration options that user can set will remain in effect between terminal sessions refusemessage Define refuse banner rotary Add line to rotary group rxspeed Set the receive speed sessionlimit Set maximum number of sessions sessiontimeout Set interval for closing connection when there is no input traffic
specialcharacter-bits Size of the escape and other special characters speed Set the transmit and receive speeds start-character Define the start character
stop-character Define the stop character stopbits Set async line stop bits telnet Telnet protocol-specific configuration telnet-transparent Send CR as CR followed by NULL instead of CR followed by LF terminal-type Set the terminal type transport Define transport protocols for line txspeed Set the transmit speeds vacantmessage Define vacant banner width Set width of the display terminal Router config-line
The list of commands may vary from this example depending upon how your router has been
configured
To exit line configuration mode and return to global configuration mode use the exit command To
exit configuration mode and return to privileged EXEC mode press Ctrl-Z
Router Configuration Mode
Router configuration commands configure routing protocol and always follow router command
To access and list the router configuration commands complete the following tasks
Task Command
Step From global configuration mode enter router router
configuration mode See the list in the example for keywords
Step List the router configuration commands
2-12 Router Products Configuration Guide Access Each Command Mode
Examples
To list the available the router router configuration keywords enter command followed by space
and question mark at the global configuration prompt
Routerconfig router bgp Border Gateway Protocol BGP egp Exterior Gateway Protocol EGP igrp Interior Gateway Routing Protocol IGRP isis ISO ISIS
iso-igrp IGRP for OSI networks ospf Open Shortest Path First OSPF rip Routing Information Protocol RIP static Static CLNS Routing
In the following example the router is configured to support the routing information protocol RIP The new prompt is config-router
Routerconfig router rip Router config-router Router configuration commands default-information Control distribution of default information default-metric Set metric of redistributed routes distance Define an administrative distance distribute-list Filter networks in routing updates exit Exit from routing protocol configuration mode
help Description of the interactive help system neighhor Specify neighbor router network Enable routing on an IP network no Negate or set default values of command offset-list Add or subtract offset from IGRP RIP or HELLO metrics passive-interface Suppress routing updates on an interface redistribute Redistribute information from another routing protocol timers Adjust routing timers Router config
list of this router has The commands may vary slightly from example depending upon how your
been configured
To exit router configuration mode and return to global configuration mode enter the exit command
Or press Ctrl-Z to exit configuration mode and return to privileged EXEC mode
PXRouter Configuration Mode
Internet Packet Exchange IPX is Novell network-layer protocol To access and list the IPX
routing configuration commands complete the following tasks
Task Command
Step From global configuration mode enter ipx- ipx router
router configuration mode See the appropriate IPX chapter for keywords
Step List the ipx-router configuration commands
In the following example IPX RIP routing is configured The new prompt is config- ipx-router
Routerconfig ipx router ripCR Routerconfig-ipx-router
To exit IPX router configuration mode and return to global configuration mode enter the exit
command Or press Ctrl-Z to exit configuration mode and return to privileged EXEC mode
Understanding the User Interface 2-13 Access Each Command Mode
RouteMap Configuration Mode
The route-map command set is used to configure routing table and source and destination
information To access and list the route-map configuration commands complete the following
tasks
Task Command
Step From global configuration mode enter route-map configuration route-map map tagi mode
Step List the route-map configuration commands
In the following example route map named arizonal is configured The new prompt is
config-route-rnap Enter question mark to list route-map configuration commands
Routerconfig route-map WORD Route map tag Routerconfig route-map arizonal CR Router config-route-map Route Map configuration commands exit Exit from route-map configuration mode help Description of the interactive help system match Match values from routing table no Negate or set default values of command set Set values in destination routing protocol Router config-route-map
To exit route-map configuration mode and return to global configuration mode enter the exit
command Ctrl-Z to exit mode and return to mode Or press configuration privileged EXEC
ROM Monitor Mode
If your router does not find valid system image or if its configuration file is corrupted at startup the system may enter read-only memory ROM monitor mode From ROM monitor mode you can
boot the router or perform diagnostic tests
From the Cisco 2000 Cisco 3000 and Cisco 4000 you can also enter ROM monitor mode by
entering the reload EXEC command and then pressing the Break key during the first 60 seconds of
startup To save changes to the configuration file use the write memory command before issuing the reload command
To access and list the ROM monitor configuration commands complete the following tasks
Task Command
Enter RUM monitor mode from privileged EXEC reload
mode Press Break during the first 60 seconds while the
system is booting
List the RUM monitor commands
2-14 Router Products Configuration Guide Get Context-Sensitive Help
The ROM monitor prompt is the angle bracket
state Toggle cache state for help Server IF address TFTP Server Name Load and execute system image from ROB or from TFTP server Continue execution address /5 Deposit value of size into location with modifier /S Examine location with size with modifier Begin execution Help for commands Initialize Stack trace
Server IF address TFTP Server Name Load system image from RON or from TFTP server but do not begin execution Show configuration register option settings Set the break point
Single step next instruction function Test device for help
Deposit and Examine sizes maybe byte long or short Modifiers may be register or byte swap Register names are DOD7 AOA6 SS US SR and PC
To return to user EXEC mode enter to continue To boot the system image file use the command
see Chapter For details on other ROM monitor mode commands refer to the appropriate hardware installation guide
Get ContextSenstve Hp
The previous sections described the first level of help available with the user interface Entering
question mark at the system prompt displays list of commands available for each command
mode You can also get list of any commands associated keywords and arguments with the
context-sensitive help feature
To get help specific to command mode command keyword or arguments perform one of the
following tasks
Task Command
Obtain brief description of the help system in any command mode help
Obtain list of commands that begin with particular character string abbreviated-command-entry
Complete partial command name abbreviated-command-entryTab
List all commands available for particular command mode
List commands associated keywords command
List keywords associated arguments command keyword
When context-sensitive using help the space or lack of space before the is significant To obtain
list of commands that begin with particular character sequence type in those characters followed
immediately by the Do not include space This form of help is called word help because it completes word for you
Understanding the User Interface 2-15 Get Context-Sensitive Help
To list keywords or arguments enter in place of keyword or argument Include space before
the This form of help is called command syntax help because it reminds you which keywords or
arguments are applicable based on the command keywords and arguments you already have entered
You can abbreviate commands and keywords to the number of characters that allow unique
abbreviation For abbreviate the show to example you can command sh
Example
is available in command for brief of the Enter the help command which any mode description
help system
Router help
Help may be requested at any point in command by entering question mark If nothing matches the help list will be empty and you must back up until entering shows the available options Two styles of help are provided Full help is available when you are ready to enter command argument e.g show and describes each possible argument Partial help is provided when an abbreviated argument is entered and you want to know what arguments match the input e.g showpr
obtain As described in the help command output you can enter partial command name and to
list of commands beginning with particular character set See Complete Partial Command
Name later in this chapter for more detail
The following example illustrates how the context-sensitive help feature enables you to create an
access list from configuration mode First enter the letters co at the system prompt followed by
mark leave between the last letter and the The the question Do not space system provides
commands that begin with Co
Router co
configure connect copy
lists the commands and Enter the configure command followed by space and to keywords
brief explanation
Router configure memory Configure from NV memory network Configure from TFTP network host terminal Configure from the terminal cr
Enter the terminal keyword to enter configuration mode from the terminal
Router configure terminal Enter configuration commands one per line End with CNTL/Z Router config
2-16 Router Products Configuration Guide Check Command Syntax
Enter the accesslist command followed by space and to list the commands keywords
Routerconfig access-list 1-99 IP standard access list 100-199 IP extended access list 10001099 IPX SAP access list 1100-1199 Extended 48-bit MAC address access list 200-299 Protocol type-code access list 300-399 DECnet access list 400-499 XNS standard access list 500-599 XNS extended access list 600699 Appletalk access list 700-799 48bit MAC address access list 800899 IPX standard access list 900999 IPX extended access list
Enter the access list number 99 and then enter another to see the arguments that apply to the
keyword and brief explanations
Routerconfig access-list 99 deny Specify packets to reject permit Specify packets to forward
Enter the deny argument followed by to list additional options
Routerconfig access-list 99 deny A.B.C.D Address to match
Enter the IP address followed by to list additional options
Routerconfig accesslist 99 deny 131.108.134.0
A.B.C.D Mask of bits to ignore cr
The cr symbol appears in the list indicating that one of your options is to press Return to execute
the command The other option is to add wild-card mask Enter the wild-card mask followed by
to list further options
Routerconfig accesslist 99 deny 131.108.134.0 0.0.0.255 cr
Routerconfig accesslist 99 deny 131.108.134.0 0.0.0.255
The cr symbol by itself indicates there are no more keywords or arguments Press Return to
execute the command The system adds an entry to access list 99 that denies access to all hosts on subnet 131.108.134.0
Check Command Syntax
The user interface provides syntax checking in the form of an error location indicator The
character the in the command where have entered incorrect appears at point string you an command The location indicator and interactive allow keyword or argument error help system you to easily
find and correct syntax errors
the the clock In following example suppose you want to set router First use context-sensitive help
to check the syntax for setting the clock
Router clock set Set the time and date Router clock
Understanding the User Interface 211 Use the Command History Features
The help output shows that the set keyword is required Next check the syntax for entering the time
Router clock Set hhrrimss Current time Router clock set
Enter the current time
Router clock Set 133200 Incomplete command
The system indicates that you need to provide additional arguments to complete the command Press
Ctrl-P see the next sectionUse the Command History Features to automatically repeat the
previous command entry Then add space and question mark to reveal the additional arguments
Router clock Set 133200 1-31 Day of the month
January Month of the year February March
April
May June July August September October November December
Now you can complete the command entry
Router clock Set 133200 23 February 93
Invalid input detected at marker
The caret symbol and help response indicate an error at 93 To list the correct syntax enter the
command up to the point where the error occurred and then enter question mark
Router clock Set 133200 23 February 19932035 Year
Router4t clock set 133200 23 February
Enter the year using the correct syntax and press Return to execute the command
Router clock Set 133200 23 February 1993
Use the Command Hstory Features
With the current software release the user interface provides history or record of commands you
have entered This feature is particularly useful for recalling long or complex commands or entries
including access lists With the command history feature you can complete the following tasks
Set the command history buffer size
Recall commands
Disable the command history feature
2-18 Router Products Configuration Guide Use the Command History Features
Set the Command History Buffer Size
number of command By default the system records 10 command lines in its history buffer To set the the terminal the task in lines the system will record during current session complete following EXEC mode
Task Command
Enable the command history feature for the current terminal history size number of lines
terminal session
the task in To configure the number of command lines the system will record complete following
line configuration mode
Task Command
Enable the command history feature history size number of lines
Recall Commands
To recall commands from the history buffer perform one of the following tasks
Task Key Sequence/Command
Arrow.1 Recall commands in the history buffer beginning Press Ctrl-P or the Up
with the most recent command Repeat the key commands sequence to recall successively older
Arrow.1 Return to more recent commands in the history Press Ctil-N or the Down
buffer after recalling commands with Ctrl-P or the
Up Arrow Repeat the key sequence to recall
successively more recent commands
While in EXEC mode list the commands you have show history
just entered
The arrow keys function only on ANSI-compatible terminals such as VT100s
As mentioned this feature is particularly useful when you are entering long complex commands the Arrow such as access lists.To create several access lists with minor variations use Ctrl-P or Up
to recall previous access list then use the line editing feature to modify it
Understanding the User Interface 2-19 Use the Editing Features
Disabe the Command Hstory Feature
The command history feature is automatically enabled To disable it during the current terminal
session complete the following task in EXEC mode
Task Command
Disable the command history feature for the current session no terminal history size
To configure the line with the command history feature disabled complete the following task in line
configuration mode
Task Command
Configure the line so that the command history feature is disabled no history size
Use the Ed