Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
8Activity

Table Of Contents

About the Nokia Network Voyager Reference Guide
Conventions This Guide Uses
Notices
Text Conventions
Menu Items
Related Documentation
Software Overview
Logging In to Network Voyager
Logging Off
Obtaining a Configuration Lock
To override a configuration lock
Navigating in Network Voyager
Reloading Pages
Accessing Documentation and Help
Viewing Hardware and Software Information for Your System
2Configuring Interfaces
Interface Overview
IP2250 and IP2255 Management Ports
Configuring Network Devices
Configuring IP Addresses
Interface Status
Configuring Tunnel Interfaces
Ethernet Interfaces
Configuring Ethernet Interfaces
Link Aggregation
Supported Standards
Upgrading IPSO with Link Aggregation
Managing Link Aggregation Using SNMP
Configuring Switches for Link Aggregation
Link Aggregation on the IP2250 and IP2255
Configuring Link Aggregation
Configuring Dynamic Link Aggregation
To configure dynamic link aggregation
Link Redundancy
Configuring Link Redundancy Groups
Gigabit Ethernet Interfaces
Configuring the Descriptor Size
Point-to-Point Over Ethernet
Configuring PPPoE
Configuring MSS Clamping
Virtual LAN Interfaces
FDDI Interfaces
ISDN Interfaces
To configure an ISDN physical interface
Configuring Calling Line-Identification Screening
Dial-on-Demand Routing (DDR) Lists
ISDN Network Configuration Example
ISDN Troubleshooting
Token Ring Interfaces
Token Ring Example
Point-to-Point Link over ATM
ATM Example
IP over ATM (IPoA)
IPoA Example
Serial (V.35 and X.21) Interfaces
Serial Interface Example
T1(with Built-In CSU/DSU) Interfaces
T1 Interface Example
E1 (with Built-In CSU/DSU) Interfaces
HSSI Interfaces
Unnumbered Interfaces
Configuring Unnumbered Interfaces
To configure an unnumbered interface
Configuring OSPF over Unnumbered Interface
OSPF over Unnumbered Interfaces Using Virtual Links
Cisco HDLC Protocol
Point-to-Point Protocol
Frame Relay Protocol
Loopback Interfaces
GRE Tunnels
Configuring GRE Tunnels
To create a GRE tunnel
GRE Tunnel Example
High Availability GRE Tunnels
HA GRE Tunnel Example
DVMRP Tunnels
DVMRP Tunnel Example
ARP Table Entries
Configuring ARP for ATM Interfaces
Transparent Mode
Limitations
Transparent Mode Processing Details
Configuring Transparent Mode in VPN Environments
Example of Transparent Mode
Configuring Transparent Mode
Enabling or Disabling a Transparent Mode Group
Monitoring Transparent Mode Groups
To monitor transparent mode groups
Transparent Mode and Check Point NGX
Virtual Tunnel Interfaces (FWVPN) for Route-Based VPN
Creating Virtual Tunnel Interfaces
To create a virtual tunnel interface
3Configuring System Functions
Configuring Banner and Login Messages
Configuring DHCP
Configuring DHCP Client Interfaces
DHCP Client Configuration
Configuring the DHCP Server
DHCP Server Configuration
Changing DHCP Service
Adding DHCP Address Pools
Enabling or Disabling DHCP Address Pools
Assigning a Fixed-IP Address to a Client
To assign a fixed-IP address to a client
Creating DHCP Client Templates
Configuring Dynamic Domain Name System Service
Configuring Dynamic Domain Name System Zones
Configuring the Domain Name Service
Configuring Disk Mirroring
Using an Optional Disk (Flash-Based Platforms Only)
Mail Relay
System Failure Notification
Configuring Mail Relay
Sending Mail
Configuring System Time
Setting System Time
Configuring Daylight Savings Time
Configuring Host Addresses
Configuring System Logging
Configuring Logging on Disk-Based Systems
Configuring Logging on Flash-Based Systems
Configuring Audit Logs
To set the system configuration audit log
Remote Core Dump Server on Flash-Based Systems
Changing the Host Name
Managing Configuration Sets
Downgrading Nokia IPSO Images
Configuring Monitor Reports
Managing Packages
Installing and Enabling Packages
Advanced System Tuning
Tuning the TCP/IP Stack
Controlling SecureXL
Sequence Validation
Router Alert IP Option
Optimize for Two-Port IP1260
4High Availability Solutions
Using an External Load Balancer
Configuring the Firewall for a Load Balancer
VRRP Overview
How VRRP Works
Before You Configure VRRP
Single License VRRP
Constraints
Before You Enable Single License VRRP
Setting the Global VRRP Options
Configuring Monitored-Circuit VRRP for a Single License Configuration
Management Interface
Configuring the Firewall for Single License VRRP
Enabling Single License VRRP
To enable Single License VRRP
Failback Requires a Reboot
Configuring VRRP
Choosing Global Settings
Choosing a VRRP Method
Understanding Monitored-Circuit VRRP
Selecting Node Parameters
Configuring Monitored-Circuit VRRP
Configuring Monitored-Circuit VRRP using the Simplified Method
Configuring Monitored-Circuit VRRP using the Full Method
Configuring VRRPv2
Configuring Check Point NGX for VRRP
Configuring VRRP Rules for Check Point NGX
Configuration Rule for Check Point NGX FP1
Firewall Synchronization on IP2250 and IP2255 Platforms
Monitoring VRRP
Monitoring the Firewall State
Troubleshooting VRRP
General Configuration Considerations
Firewall Policies
Access Control Lists
Switched Environments
Configuring Traps
Configuring Trap Receivers
Setting the Trap PDU Agent Address
Interpreting Error Messages
GetNextRequest
GetBulkRequest
Configuring SNMPv3
Request Messages
Managing SNMP Users
6Configuring IPv6
IPv6 Overview
Interfaces
IPv6 and IPv4 Compatibility
Configuring IPv6 in IPv4 Tunnels
To configure IPv6 in IPv4 tunnels
Configuring IPv6 to IPv4
Configuring IPv6 over IPv4
Configuring IPv4 in IPv6 Tunnels
To configure IPv4 in IPv6 tunnels
Configuring an IPv6 Default or Static Route
To configure an IPv6 default or static route
Routing Configuration
Configuring OSPFv3
Configuring RIPng
Creating IPv6 Aggregate Routes
Creating Redistributed Routes
Router Discovery
Configuring ICMPv6 Router Discovery
VRRP for IPv6
Configuring VRRP for IPv6
Creating a Virtual Router for an IPv6 Interface Using VRRPv3
Creating a Virtual Router to Back Up Another VRRP Router Addresses Using VRRPv3
Setting a Virtual MAC Address for a Virtual Router
Changing the IP Address List of a Virtual Router in VRRPv3
Removing a Virtual Router in VRRPv3
Creating a Virtual Router in Monitored Circuit Mode for IPv6
Setting Interface Dependencies for a Monitored Circuit Virtual Router for IPv6
Changing the List of Addresses in a Monitored Circuit Virtual Router for IPv6
Traffic Management
Security and Access Configuration
7Managing Security and Access
Password and Account Management
Configuring Password History Check
Configuring Mandatory Password Change
Denying Account Access After Failed Login Attempts
Denying Access to Unused Accounts
Changing Passwords
Managing User Accounts
Adding and Deleting Users
Managing and Using S/Key
Managing Groups
Role-Based Administration
Managing Roles
Assigning Roles and Access Mechanisms to Users
To assign roles and access mechanisms to users
Creating Cluster Administrator Users
Configuring Network Access and Services
Configuring a Modem on COM2, COM3, or COM4
Configuring Nokia Network Voyager Access
Configuring Basic Nokia Network Voyager Options
Generating and Installing SSL/TLS Certificates
Certificate Signing Request (CSR)
Self-Signed X.509 Certificate
Secure Shell (SSH)
DNS spoofing
IP spoofing
IP source routing
Initial SSH Configuration
Configuring Advanced Options for SSH
Configuring Secure Shell Authorized Keys
Changing Secure Shell Key Pairs
Managing User RSA and DSA Identities
Tunneling HTTP Over SSH
To tunnel HTTP over SSH
Network Voyager Session Management
Enabling or Disabling Session Management
Configuring Session Timeouts
Authentication, Authorization, and Accounting (AAA)
Configuring AAA Service Modules
Configuring RADIUS
Configuring TACACS+
Encryption Acceleration
Enabling Encryption Accelerator Cards
Monitoring Cryptographic Acceleration
IPSec Tunnels (IPSO Implementation)
Using PKI
IPSec Implementation in IPSO
IPSec Parameters
Creating an IPSec Policy
Proposal and Filters
Trusted CA Certificates
Putting It All Together
Creating an IPSec Tunnel Rule
To create an IPSec tunnel rule
Transport Rule
IPSec Tunnel Rule Example
IPSec Transport Rule Example
Changing the Local/Remote Address or Local/Remote Endpoint of an IPSec Tunnel
Removing an IPSec Tunnel
To remove an IPSec tunnel
Configuring OSPF Areas and Global Settings
RIP 2
RIP 1
Virtual IP Address Support for VRRP
Configuring RIP
Configuring RIP Timers
Configuring Auto-Summarization
RIP Example
Configuring Virtual IP Support for VRRP
PIM Support for IP Clustering
Configuring Dense-Mode PIM
PIM Dense Mode State Refresh
Disabling PIM
Setting Advanced Options for Dense-Mode PIM (Optional)
Configuring Sparse-Mode PIM
Configuring High-Availability Mode
Configuring a PIM-SM Static Rendezvous Point
Setting Advanced Options for Sparse-Mode PIM (Optional)
Debugging PIM
IGRP
Generation of Exterior Routes
Aliased Interfaces
IGRP Aggregation
Configuring IGRP
DVMRP
Configuring DVMRP
Configuring DVMRP Timers
IGMP
Configuring IGMP
IGMP Version 3
Static Routes
To configure a default or static route
Adding and Managing Static Routes Example
Backup Static Routes
Route Aggregation
Route Aggregation Example
Route Rank
Rank Assignments
Routing Protocol Rank Example
Support for BGP-4++
BGP Sessions (Internal and External)
BGP Path Attributes
BGP Multi-Exit Discriminator
BGP Interactions with IGPs
Inbound BGP Route Filters
Redistributing Routes to BGP
Communities
Route Reflection
Confederations
EBGP Multihop Support
Route Dampening
TCP MD5 Authentication
Changing the Local Preference Value Example
BGP Confederation Example
Route Reflector Example
BGP Community Example
EBGP Load Balancing Example: Scenario #1
EBGP Load Balancing Example: Scenario #2
Adjusting BGP Timers Example
TCP MD5 Authentication Example
BGP Route Dampening Example
BGP Path Selection
BGP-4++ Example
Route Redistribution
Redistributing Routes to RIP and IGRP
Redistributing OSPF to BGP Example
Redistributing Routes with OSPF
Inbound Route Filters
BGP Route Inbound Policy Example
BGP AS Path Filtering Example
ASPATH Regular Expressions
9Configuring Traffic Management
Differentiated Services (DiffServ)
Traffic Management with Differentiated Services
Performance Considerations
Configuring Access Control Lists
Configuring ACL Rules
Configuring Aggregation Classes
To create an Aggregation Class
Configuring Queue Classes
Configuring ATM QoS
To delete an ATM QoS descriptor
Configuring Common Open Policy Server
Configuring a COPS Client ID and Policy Decision Point
Configuring Security Parameters for a COPS Client ID
Assigning Roles to Specific Interfaces
Activating and Deactivating the COPS Client
Changing the Client ID Associated with Specific Diffserv Configuration
Deleting a Client ID
Example: Rate Shaping
Example: Expedited Forwarding
10Configuring Router Services
BOOTP/DHCP Relay
Configuring BOOTP/DHCP Relay
IP Broadcast Helper
Router Discovery Overview
Configuring Router Discovery
Network Time Protocol (NTP)
Configuring NTP
11Monitoring System Configuration and Hardware
Viewing System Utilization Statistics
CPU-Memory Live Utilization
Disk and Swap Space
Monitoring Process Utilization
IPSO Process Management
Generating Monitor Reports
Monitoring System Health
Monitoring System Logs
Viewing Cluster Status and Members
Viewing Routing Protocol Information
Displaying the Kernel Forwarding Table
Displaying Route Settings
Displaying Interface Settings
Hardware Monitoring
Power supply
Voltage sensors
Using the iclid Tool
iclid Commands
Preventing Full Log Buffers and Related Console Messages
Index
0 of .
Results for:
No results containing your search query
P. 1
IPSO4200-VoyRefGuide-N450000359r

IPSO4200-VoyRefGuide-N450000359r

Ratings: (0)|Views: 4,749|Likes:
Published by Joshua Teoh Spartan

More info:

Published by: Joshua Teoh Spartan on Mar 02, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/23/2013

pdf

text

original

You're Reading a Free Preview
Pages 11 to 179 are not shown in this preview.
You're Reading a Free Preview
Pages 190 to 226 are not shown in this preview.
You're Reading a Free Preview
Pages 237 to 336 are not shown in this preview.
You're Reading a Free Preview
Pages 347 to 401 are not shown in this preview.
You're Reading a Free Preview
Pages 412 to 504 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->