|
Networking and VPN Basics |
|
|
1 | (38) |
|
|
2 | (22) |
|
|
2 | (1) |
|
The Application Layer (Layer 7) |
|
|
3 | (1) |
|
The Presentation Layer (Layer 6) |
|
|
4 | (1) |
|
The Session Layer (Layer 5) |
|
|
4 | (1) |
|
The Transport Layer (Layer 4) |
|
|
4 | (1) |
|
The Network Layer (Layer 3) |
|
|
5 | (1) |
|
The Data Link Layer (Layer 2) |
|
|
6 | (1) |
|
The Physical Layer (Layer 1) |
|
|
6 | (1) |
|
Overview of a Local Area Network |
|
|
7 | (1) |
|
Overview of a Wide Area Network |
|
|
8 | (1) |
|
Media Access Control Addressing |
|
|
8 | (1) |
|
Internet Protocol Addressing |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
Protocols and Other Standards |
|
|
12 | (1) |
|
|
12 | (1) |
|
Interior Gateway Protocol |
|
|
13 | (1) |
|
Exterior Gateway Protocol |
|
|
14 | (1) |
|
Routing Information Protocol |
|
|
14 | (1) |
|
|
15 | (1) |
|
Virtual Router Redundancy Protocol |
|
|
16 | (1) |
|
|
16 | (1) |
|
Integrated Services Digital Network |
|
|
17 | (1) |
|
Lightweight Directory Access Protocol |
|
|
18 | (1) |
|
Remote Authentication Dial-In User Service |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
Channel Service Unit/Data Service Unit |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
22 | (2) |
|
|
24 | (2) |
|
|
24 | (1) |
|
Dial Access to a Single Workstation |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (3) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
Stateful Packet Inspection |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (9) |
|
|
29 | (1) |
|
VPN Tunneling Protocols and Standards |
|
|
30 | (1) |
|
|
30 | (2) |
|
Public Key Infrastructure |
|
|
32 | (1) |
|
|
32 | (1) |
|
Internet Protocol Security |
|
|
33 | (1) |
|
|
34 | (1) |
|
Point-to-Point Tunneling Protocol |
|
|
35 | (1) |
|
Layer 2 Tunneling Protocol |
|
|
36 | (1) |
|
Generic Routing Encapsulation |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (36) |
|
The Nortel VPN Router Portfolio |
|
|
40 | (1) |
|
|
41 | (5) |
|
|
41 | (1) |
|
Hardware Interface Options |
|
|
42 | (1) |
|
Peripheral Component Interconnect Expansion Slots |
|
|
42 | (1) |
|
|
42 | (1) |
|
1000Base-SX/1000Base-T Ethernet |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
Serial Interfaces (V.35, X.21, RS-232) |
|
|
44 | (1) |
|
|
45 | (1) |
|
High Speed Serial Interface |
|
|
45 | (1) |
|
Encryption Accelerator Modules |
|
|
45 | (1) |
|
|
45 | (1) |
|
Nortel VPN Router Solutions |
|
|
46 | (21) |
|
|
48 | (2) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (1) |
|
|
53 | (2) |
|
|
55 | (1) |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (2) |
|
|
66 | (1) |
|
|
66 | (1) |
|
VPN Router Features Comparison |
|
|
67 | (3) |
|
|
70 | (4) |
|
Branch Office Tunnel VPN Solution |
|
|
70 | (1) |
|
|
71 | (1) |
|
Remote Access VPN Solution |
|
|
72 | (2) |
|
|
74 | (1) |
|
The Nortel VPN Router Software Overview |
|
|
75 | (58) |
|
|
76 | (3) |
|
|
76 | (1) |
|
Bandwidth Management Services |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
Secure Sockets Layer Services |
|
|
79 | (1) |
|
|
79 | (1) |
|
VPN Router Software Version 6.00 |
|
|
79 | (3) |
|
|
80 | (1) |
|
Optional Software Licenses |
|
|
80 | (1) |
|
Advanced Router License Key |
|
|
80 | (1) |
|
Contivity Stateful Firewall License Key |
|
|
81 | (1) |
|
Additional VPN Tunnel Support License Key |
|
|
81 | (1) |
|
Features Introduced in VPN Router Version 6.00 |
|
|
81 | (1) |
|
Loading, Verifying, and Upgrading the VPN Router Software |
|
|
82 | (20) |
|
|
83 | (1) |
|
Loading a New Version of VPN Router Software |
|
|
83 | (19) |
|
|
102 | (4) |
|
|
106 | (16) |
|
Installing the VPN Client Software |
|
|
106 | (1) |
|
|
107 | (1) |
|
Installing the VPN Client |
|
|
107 | (6) |
|
Upgrading the VPN Client Software |
|
|
113 | (1) |
|
Uninstalling the Existing Version of VPN Client Software |
|
|
113 | (2) |
|
|
115 | (7) |
|
|
122 | (10) |
|
The VPN Client Connection Wizard Process |
|
|
125 | (1) |
|
Selecting Username and Password Authentication Type |
|
|
126 | (4) |
|
Selecting Hardware or Software Token Card Authentication Type |
|
|
130 | (2) |
|
|
132 | (1) |
|
The Nortel VPN Router in the Network |
|
|
133 | (52) |
|
What Is a Virtual Private Network? |
|
|
133 | (2) |
|
|
135 | (23) |
|
|
136 | (2) |
|
Aggressive Mode Branch Office Tunnel |
|
|
138 | (3) |
|
|
141 | (1) |
|
|
142 | (3) |
|
VPN-Enabled Device Acting in Client Mode |
|
|
145 | (3) |
|
Small Office or Home Office |
|
|
148 | (6) |
|
|
154 | (4) |
|
|
158 | (6) |
|
Nortel 100 VPN Router Added to Existing Regional Office Network |
|
|
160 | (2) |
|
Upgrading a Regional Office to VPN Technology |
|
|
162 | (2) |
|
|
164 | (9) |
|
The VPN Router as an Access Point |
|
|
166 | (2) |
|
Client Access to the Corporate Network |
|
|
168 | (3) |
|
Client Load Balancing and Failover |
|
|
171 | (1) |
|
Corporate User Access to the Internet |
|
|
172 | (1) |
|
Backup Interface Services |
|
|
173 | (4) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
Time of Day or Day of the Week |
|
|
176 | (1) |
|
|
177 | (3) |
|
Network Administration of VPN Routers |
|
|
180 | (4) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (2) |
|
Other Management Considerations |
|
|
184 | (1) |
|
|
184 | (1) |
|
Management Options and Overview |
|
|
185 | (44) |
|
|
186 | (1) |
|
|
187 | (10) |
|
Accessing the CLI Through a Telnet Session |
|
|
187 | (1) |
|
Accessing the CLI Through the Serial Port |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
Global Configuration Mode |
|
|
190 | (1) |
|
|
191 | (5) |
|
|
196 | (1) |
|
|
197 | (7) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
Checking the Current Status of Your VPN Router |
|
|
206 | (15) |
|
|
206 | (1) |
|
|
206 | (2) |
|
|
208 | (2) |
|
|
210 | (2) |
|
|
212 | (2) |
|
VPN Router System Status Tools |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
219 | (1) |
|
Address Resolution Protocol |
|
|
219 | (2) |
|
VPN Router Administration |
|
|
221 | (4) |
|
|
221 | (1) |
|
Lightweight Directory Access Protocol |
|
|
222 | (1) |
|
Remote Authentication Dial-In User Service |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
Configuring Bandwidth Management |
|
|
225 | (2) |
|
|
227 | (2) |
|
|
229 | (48) |
|
|
230 | (12) |
|
|
231 | (1) |
|
|
232 | (1) |
|
Configuring Internal LDAP |
|
|
232 | (3) |
|
|
235 | (2) |
|
|
237 | (3) |
|
|
240 | (2) |
|
Using Remote Authentication Dial-in User Service |
|
|
242 | (8) |
|
Enabling RADIUS Authentication |
|
|
242 | (1) |
|
|
243 | (2) |
|
RADIUS Authentication Options |
|
|
245 | (1) |
|
|
246 | (1) |
|
|
246 | (2) |
|
Enabling RADIUS Accounting |
|
|
248 | (2) |
|
Understanding Certificates |
|
|
250 | (4) |
|
SSL Encryption with LDAP Server |
|
|
251 | (1) |
|
LDAP Certificate Installation |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
Using Public Key Infrastructure |
|
|
254 | (21) |
|
|
254 | (1) |
|
CA and X.509 Certificates |
|
|
254 | (1) |
|
|
255 | (1) |
|
Requesting a Server Certificate |
|
|
255 | (1) |
|
Server Certificates Using CMP |
|
|
255 | (5) |
|
Trusted CA Certificate Installation |
|
|
260 | (1) |
|
Trusted CA Certificate Settings |
|
|
261 | (3) |
|
Certificate Revocation List Configuration |
|
|
264 | (1) |
|
|
265 | (2) |
|
|
267 | (1) |
|
|
268 | (1) |
|
Enabling Certificate Use for Tunnels |
|
|
268 | (1) |
|
Identifying Individual Users with Certificates |
|
|
269 | (1) |
|
Identifying Branch Offices with Certificates |
|
|
270 | (1) |
|
|
271 | (2) |
|
L2TP/IPSec Authentication |
|
|
273 | (1) |
|
Adding L2TP Access Concentrators |
|
|
274 | (1) |
|
|
275 | (2) |
|
|
277 | (60) |
|
|
277 | (6) |
|
Using Stateful Inspection |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
Network Address Translation |
|
|
282 | (1) |
|
Configuring Stateful Firewall |
|
|
283 | (7) |
|
Configuration Prerequisites |
|
|
283 | (1) |
|
Stateful Firewall Manager System Requirements |
|
|
284 | (1) |
|
Enabling Firewall Options |
|
|
284 | (1) |
|
Enabling the Stateful Firewall Feature |
|
|
285 | (1) |
|
Connection Limitation and Logging |
|
|
286 | (1) |
|
Application-Specific Logging |
|
|
286 | (1) |
|
Remote Logging of Firewall Events |
|
|
287 | (1) |
|
Anti-Spoofing Configuration |
|
|
288 | (1) |
|
Malicious Scan Detection Configuration |
|
|
289 | (1) |
|
|
290 | (21) |
|
Firewall Policy Creation and Editing |
|
|
290 | (1) |
|
|
290 | (2) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (7) |
|
|
305 | (1) |
|
Firewall Configuration Verification |
|
|
306 | (1) |
|
Sample Security Policy Configuration |
|
|
306 | (2) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (2) |
|
|
311 | (4) |
|
|
311 | (3) |
|
|
314 | (1) |
|
|
315 | (20) |
|
Types of Address Translation |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
Dynamic Routing Protocols |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
Application Level Gateways |
|
|
331 | (1) |
|
Configuring NAT ALG for SIP |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
Hairpinning with a UNIStim Call Server |
|
|
333 | (1) |
|
Hairpinning with a STUN Server |
|
|
333 | (1) |
|
|
334 | (1) |
|
Hairpinning Configuration |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
335 | (2) |
|
Overview of Ethernet LANs and Network Routing |
|
|
337 | (48) |
|
|
338 | (5) |
|
Basic Physical Topology Types |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
Carrier Sense Multiple Access with Collision Detection |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
343 | (3) |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (4) |
|
Media Access Control (MAC Addressing) |
|
|
350 | (1) |
|
Internet Protocol (IP Addressing) |
|
|
351 | (1) |
|
Address Resolution Protocol |
|
|
351 | (2) |
|
Reverse Address Resolution Protocol |
|
|
353 | (1) |
|
Virtual Local Area Network |
|
|
353 | (2) |
|
|
355 | (7) |
|
|
356 | (2) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
362 | (2) |
|
|
363 | (1) |
|
Routing Protocol Concepts |
|
|
363 | (1) |
|
Routing Information Protocol |
|
|
364 | (6) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (6) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (5) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
379 | (1) |
|
Path Vector Routing Algorithm |
|
|
380 | (1) |
|
Virtual Router Redundancy Protocol |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (3) |
|
Tunneling, VoIP, and Other Features |
|
|
385 | (38) |
|
|
386 | (4) |
|
Point-to-Point Tunneling Protocol |
|
|
390 | (6) |
|
Layer 2 Tunneling Protocol |
|
|
396 | (4) |
|
IP Security Tunneling Protocol |
|
|
400 | (5) |
|
|
405 | (5) |
|
|
410 | (3) |
|
Point-to-Point Protocol over Ethernet |
|
|
413 | (3) |
|
Client Address Redistribution |
|
|
416 | (2) |
|
|
418 | (1) |
|
Backup Interface Services |
|
|
419 | (2) |
|
|
421 | (2) |
|
|
423 | (40) |
|
Overview of the Nortel VPN Client |
|
|
424 | (2) |
|
Operating System Compatibility |
|
|
424 | (1) |
|
Supported Operating Systems |
|
|
425 | (1) |
|
Operating Systems Supported Prior to the Nortel VPN Client Version 4.91 |
|
|
426 | (1) |
|
Operating Systems Supported in the Nortel VPN Client Version 6.01 |
|
|
426 | (1) |
|
Optional Licensing Operating Systems Supported |
|
|
426 | (1) |
|
Installing the Nortel VPN Client |
|
|
426 | (7) |
|
Using the Nortel VPN Client |
|
|
433 | (7) |
|
|
434 | (1) |
|
VPN Client Main Menu Items |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | (2) |
|
|
439 | (1) |
|
Nortel VPN Client Customization |
|
|
440 | (2) |
|
VPN Custom Client Installation Modes |
|
|
441 | (1) |
|
VPN Customer Client Group Profiles Overview |
|
|
442 | (1) |
|
VPN Custom Client Icons and Custom Bitmaps |
|
|
442 | (1) |
|
VPN Client Event Logging and Keepalives Overview |
|
|
442 | (5) |
|
|
443 | (2) |
|
|
445 | (1) |
|
Internet Security Association and Key Management Protocol Keepalive |
|
|
446 | (1) |
|
Network Address Translation Traversal Keepalive |
|
|
446 | (1) |
|
|
447 | (1) |
|
|
447 | (2) |
|
|
449 | (2) |
|
|
451 | (4) |
|
|
453 | (1) |
|
|
454 | (1) |
|
Support for All Zeros Addressing in Inverse Split Mode |
|
|
455 | (1) |
|
|
455 | (3) |
|
|
455 | (1) |
|
Software Requirement Set Builder |
|
|
456 | (1) |
|
|
456 | (1) |
|
TunnelGuard Features Overview |
|
|
457 | (1) |
|
TunnelGuard Icon Information |
|
|
457 | (1) |
|
TunnelGuard Installation Considerations |
|
|
457 | (1) |
|
|
457 | (1) |
|
|
458 | (1) |
|
|
458 | (3) |
|
|
461 | (2) |
|
VPN Router Administration Lab Exercises |
|
|
463 | (66) |
|
Installing the VPN Client Software |
|
|
464 | (1) |
|
|
464 | (1) |
|
|
464 | (1) |
|
|
465 | (1) |
|
Initial Setup of the Nortel VPN Router |
|
|
465 | (3) |
|
|
465 | (1) |
|
|
466 | (2) |
|
|
468 | (1) |
|
Enabling and Using VPN Client Logging |
|
|
468 | (1) |
|
|
468 | (1) |
|
|
468 | (1) |
|
|
469 | (1) |
|
|
469 | (2) |
|
|
469 | (1) |
|
|
469 | (1) |
|
|
470 | (1) |
|
|
471 | (2) |
|
|
471 | (1) |
|
|
471 | (1) |
|
|
472 | (1) |
|
Configuring Client Failover |
|
|
473 | (2) |
|
|
473 | (1) |
|
|
473 | (2) |
|
|
475 | (1) |
|
Configuring IPSec Mobility |
|
|
475 | (2) |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
477 | (1) |
|
Configuring Automatic Backups |
|
|
477 | (2) |
|
|
477 | (1) |
|
|
477 | (2) |
|
|
479 | (1) |
|
Configuring a Peer-to-Peer Branch Office Tunnel |
|
|
479 | (3) |
|
|
479 | (1) |
|
|
480 | (2) |
|
|
482 | (1) |
|
|
482 | (2) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
483 | (1) |
|
Configuring Network Time Protocol |
|
|
484 | (4) |
|
|
484 | (1) |
|
|
484 | (3) |
|
|
487 | (1) |
|
|
488 | (4) |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
489 | (2) |
|
|
491 | (1) |
|
|
492 | (1) |
|
Configuring the Nortel 100 VPN Router |
|
|
492 | (10) |
|
|
492 | (1) |
|
|
493 | (1) |
|
|
493 | (2) |
|
|
495 | (7) |
|
|
502 | (1) |
|
Configuring CLIP for Management IP Address |
|
|
502 | (3) |
|
|
503 | (1) |
|
|
503 | (2) |
|
|
505 | (1) |
|
Configuring Administrator User Tunnels |
|
|
505 | (7) |
|
|
505 | (1) |
|
|
506 | (5) |
|
|
511 | (1) |
|
Configuring Syslog Server |
|
|
512 | (3) |
|
|
512 | (1) |
|
|
513 | (2) |
|
|
515 | (1) |
|
Configuring User IP Address Pools |
|
|
515 | (6) |
|
|
515 | (1) |
|
|
516 | (1) |
|
Configuring User IP Address Assignment Using DHCP Lab |
|
|
516 | (3) |
|
Configuring User IP Address Assignment Using Address Pool Lab |
|
|
519 | (2) |
|
|
521 | (1) |
|
Client Address Redistribution Configuration |
|
|
521 | (6) |
|
|
522 | (1) |
|
|
522 | (4) |
|
|
526 | (1) |
|
|
527 | (2) |
|
|
529 | (64) |
|
Overview of Network Troubleshooting |
|
|
530 | (1) |
|
|
530 | (3) |
|
Make Sure You Understand the Problem |
|
|
530 | (1) |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
532 | (1) |
|
|
533 | (8) |
|
|
533 | (3) |
|
|
536 | (2) |
|
|
538 | (1) |
|
|
539 | (2) |
|
|
541 | (1) |
|
Other Troubleshooting Tools |
|
|
541 | (4) |
|
|
542 | (1) |
|
|
543 | (1) |
|
Network Management Station |
|
|
544 | (1) |
|
Nortel VPN Router Troubleshooting |
|
|
545 | (8) |
|
|
546 | (1) |
|
|
546 | (2) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
549 | (2) |
|
|
551 | (1) |
|
|
552 | (1) |
|
VPN Router System Recovery |
|
|
553 | (9) |
|
System Recovery for Disk-Based Versions |
|
|
554 | (1) |
|
|
555 | (2) |
|
Reformat Hard Disk Option |
|
|
557 | (1) |
|
|
557 | (1) |
|
Perform File Maintenance option |
|
|
557 | (1) |
|
|
557 | (1) |
|
|
558 | (1) |
|
System Recovery for Diskless Versions |
|
|
558 | (1) |
|
|
559 | (1) |
|
Reformat Hard Disk Option |
|
|
559 | (1) |
|
|
559 | (1) |
|
Perform File Maintenance Option |
|
|
559 | (2) |
|
|
561 | (1) |
|
Use of the Nortel VPN Router Reporting Utilities |
|
|
562 | (20) |
|
|
563 | (1) |
|
|
564 | (2) |
|
|
566 | (1) |
|
|
566 | (2) |
|
|
568 | (1) |
|
|
569 | (2) |
|
|
571 | (1) |
|
|
572 | (2) |
|
|
574 | (1) |
|
|
574 | (2) |
|
|
576 | (1) |
|
|
577 | (1) |
|
|
578 | (1) |
|
|
579 | (2) |
|
|
581 | (1) |
|
|
582 | (2) |
|
General Network Proactive Measures |
|
|
584 | (7) |
|
|
585 | (1) |
|
|
585 | (1) |
|
Always Have a System Recovery Disk Available |
|
|
586 | (1) |
|
Dial Access for Support Personnel |
|
|
587 | (1) |
|
|
587 | (1) |
|
|
588 | (1) |
|
Upgrades and Configuration Changes |
|
|
588 | (1) |
|
|
589 | (1) |
|
|
590 | (1) |
|
|
590 | (1) |
|
|
591 | (1) |
|
|
592 | (1) |
|
Appendix A Abbreviation and Acronym Reference Listing |
|
|
593 | (20) |
|
Appendix B Command Line Interpreter Commands |
|
|
613 | (52) |
|
Access via Console Connection |
|
|
614 | (1) |
|
Access via Telnet Session |
|
|
615 | (1) |
|
|
615 | (16) |
|
|
616 | (1) |
|
|
616 | (3) |
|
|
619 | (1) |
|
|
619 | (1) |
|
|
619 | (1) |
|
|
620 | (1) |
|
|
620 | (1) |
|
|
620 | (1) |
|
|
621 | (1) |
|
|
622 | (1) |
|
|
623 | (1) |
|
|
623 | (2) |
|
|
625 | (1) |
|
|
625 | (1) |
|
|
625 | (1) |
|
|
626 | (1) |
|
|
626 | (1) |
|
show ip interface Command |
|
|
627 | (1) |
|
|
627 | (2) |
|
|
629 | (1) |
|
show switch-settings Command |
|
|
630 | (1) |
|
|
631 | (1) |
|
|
631 | (29) |
|
|
632 | (1) |
|
|
633 | (1) |
|
|
633 | (2) |
|
|
635 | (1) |
|
show current-config-file Command |
|
|
636 | (1) |
|
|
636 | (1) |
|
|
636 | (2) |
|
|
638 | (1) |
|
|
639 | (2) |
|
|
641 | (1) |
|
|
642 | (1) |
|
|
643 | (1) |
|
|
644 | (1) |
|
|
644 | (1) |
|
|
645 | (1) |
|
|
645 | (1) |
|
|
646 | (1) |
|
|
647 | (1) |
|
show running Configuration Command |
|
|
647 | (7) |
|
|
654 | (1) |
|
|
654 | (1) |
|
|
655 | (1) |
|
|
656 | (1) |
|
|
656 | (1) |
|
|
656 | (1) |
|
|
657 | (1) |
|
|
657 | (1) |
|
|
657 | (1) |
|
|
658 | (1) |
|
|
658 | (1) |
|
|
659 | (1) |
|
|
659 | (1) |
|
Global Configuration Mode |
|
|
660 | (3) |
|
|
663 | (2) |
|
Appendix C Related Request for Comments Reference Guide |
|
|
665 | (22) |
|
Appendix D References and Resources |
|
|
687 | (4) |
|
Nortel Networks Documentation |
|
|
687 | (1) |
|
|
688 | (1) |
|
|
689 | (2) |
Index |
|
691 | |