Efficient Networks Router family Command line interface Dokumentacja

Przeglądaj online lub pobierz Dokumentacja dla Networking Efficient Networks Router family Command line interface. Efficient Networks Router family Command line interface Product specifications Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - 5RXWHU)DPLO\

Part No. 107-0002-000(IILFLHQW1HWZRUNV5RXWHU)DPLO\7HFKQLF DO5HIHUHQFH*XLGH

Strona 2 - Efficient Networks

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide10 Efficient Networks®Sample VRRP Configuration. . . . . . . . . .

Strona 3

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-16 Efficient Networks®Relaying BootP RequestsThe DHCP re

Strona 4

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-17Network Address Translation (NAT)Net

Strona 5

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-18 Efficient Networks®Masquerading With masquerading, mu

Strona 6

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-19NOTE:ww.xx.yy.zz is the IP address t

Strona 7

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-20 Efficient Networks®-> remote addserver 192.168.1.2

Strona 8

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-21The second command gets an error due

Strona 9

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-22 Efficient Networks®Server Request HierarchyAs shown e

Strona 10 - Contents

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-23Classic NATWith classic NAT, one PC

Strona 11

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-24 Efficient Networks®IP Address RangeThe range of local

Strona 12

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-25Range Overlap Rules• The per-interfa

Strona 13 - INTRODUCTION

Efficient Networks®11ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsAccessibility . . . . . . . . . . . . . . . .

Strona 14 - Document Conventions

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-26 Efficient Networks®system selnat addpolicy <remote

Strona 15

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-27Viewing PoliciesThe policy listing i

Strona 16 - Page 1-4 Efficient Networks

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-28 Efficient Networks®-> system addserver <ipaddr&

Strona 17 - WMI Web Management Interface

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-29Key Enabled FeaturesThe router has s

Strona 18 - Page 1-6 Efficient Networks

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-30 Efficient Networks®NOTE:Feature keys are generated fo

Strona 19 - PRODUCT OVERVIEW

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-31Key RulesThe following rules apply w

Strona 20 - WAN Interfaces

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-32 Efficient Networks®Listing the Installed Feature Keys

Strona 21

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-33Feature StatusThe current feature st

Strona 22 - Virtual Connections

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-34 Efficient Networks®Spanning TreeThe Spanning Tree alg

Strona 23 - Bridging

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-35It does the following major tasks:•

Strona 24 - Page 2-6 Efficient Networks

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide12 Efficient Networks®Secure Shell (SSH) Configuration List Page.

Strona 25

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-36 Efficient Networks®Manual Boot ModeWhen the router is

Strona 26 - System Interoperability

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-37Option 2: Boot from Flash MemorySele

Strona 27 - Protocol Conformance

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-38 Efficient Networks®The boot IP address is the router

Strona 28 - IPX Routing

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-393. Select option 4 to Boot through t

Strona 29 - Encapsulation Options

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-40 Efficient Networks®The debugging mode (option #) is a

Strona 30 - Page 2-12 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-41The error patterns are listed in the

Strona 31 - INSTALLATION AND SETUP

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-42 Efficient Networks®Routers with Six LEDsIf your route

Strona 32 - Local Router

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-43Software Kernel UpgradesYou can upgr

Strona 33 - IP Routing Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-44 Efficient Networks®CAUTION:Warning: Before performing

Strona 34 - Page 3-4 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-45Step 7 When you are satisfied that t

Strona 35

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-1CHAPTER 1CHAPTER 1 INTRODUCTIONThis man

Strona 36 - IPX Routing Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-46 Efficient Networks®-> copy [email protected]:sf

Strona 37

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-47Differentiated Services Framework (D

Strona 38 - Bridging Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-48 Efficient Networks®QoS Deployment ExampleTo understan

Strona 39

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-49bandwidth beyond the 50% minimum wil

Strona 40

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-50 Efficient Networks®PoliciesQoS policies are created t

Strona 41

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-51qos set -sa 192.168.1.5 192.168.1.12

Strona 42 - MAC Encapsulated Routing

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-52 Efficient Networks®-du <duration> <hh:mm>

Strona 43

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-53Deleting PoliciesPolicies can be del

Strona 44 - Configuring Your Computer

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-54 Efficient Networks®Misc. Administrative FunctionsThe

Strona 45 - Windows 98

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-1CHAPTER 5CHAPTER 5 SYSTEM SECURITYT

Strona 46 - Step6 Click OK

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-2 Efficient Networks®Document ConventionsTable explains the s

Strona 47 - Windows NT 4

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-2 Efficient Networks®User AuthenticationUser authenticatio

Strona 48

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-3There are two methods for creating a us

Strona 49 - Windows 2000

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-4 Efficient Networks®Access to system operation can be fur

Strona 50 - Step5 Click Properties

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-5Access: WAN, LAN, ConsoleStatus: Enable

Strona 51 - Step 7 Click OK

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-6 Efficient Networks®Initial (Default) SettingWhen the rou

Strona 52 - Windows ME

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-7-> user set lookup radius Subsequent

Strona 53

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-8 Efficient Networks®Managing User AccountsThe following s

Strona 54 - Windows XP

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-9-> user set password myname newsecre

Strona 55 - Step 5 Click Properties

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-10 Efficient Networks®Changing account accessThe Access Pr

Strona 56 - Mac OS 9.x

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-11Once the RADIUS server receives the re

Strona 57

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-3BER Basic Encoding Rules or Bit Error Rate

Strona 58 - Mac OS X

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-12 Efficient Networks®Server Information ConfigurationFor

Strona 59

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-13Radius Server ConfigurationWhile vendo

Strona 60 - Page 3-30 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-14 Efficient Networks®Serial-Console Port0x00010000 Serial

Strona 61

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-15Controlling Remote ManagementSeveral m

Strona 62 - Installation

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-16 Efficient Networks®-> system snmpport default2->

Strona 63

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-17Restricting Remote AccessTo allow remo

Strona 64 - Establishing a Connection

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-18 Efficient Networks®Disabling WAN ManagementYou can allo

Strona 65

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-19The following command is used to enabl

Strona 66 - Terminal Sessions

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-20 Efficient Networks®PAP/CHAP Security AuthenticationThe

Strona 67

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-21During link negotiation (LCP), each si

Strona 68

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-4 Efficient Networks®LOP Loss of Pointer (UNI Fault Managemen

Strona 69

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-22 Efficient Networks®PAP AuthenticationFor PAP, when a PA

Strona 70 - Configuring the Router

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-23Authentication LevelsThe router also u

Strona 71 - Configuration Tables

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-24 Efficient Networks®Receive FiltersThe router next compa

Strona 72

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-25Output FiltersFinally, the router comp

Strona 73

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-26 Efficient Networks®Filter ExamplesExample 1: Input Filt

Strona 74

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-27-> remote ipfilter append input acc

Strona 75 - Configuring PPP with Bridging

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-28 Efficient Networks®eth ip filter flush inputeth ip filt

Strona 76

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-29Example 4: Medium Security FirewallThe

Strona 77

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-30 Efficient Networks®# E-mail - SMTP and POP3 requests fr

Strona 78

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-31# SSL acceptedremote ipfilter insert i

Strona 79

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-5VPCI Virtual Path Connection IdentifierVPI

Strona 80

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-32 Efficient Networks®# NNTP tcpremote ipfilter insert out

Strona 81 - Test IP Routing

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-33# Turn on ip filter watch for debuggin

Strona 82 - Test IPX Routing

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-34 Efficient Networks®Stateful FirewallThe Built-in Firewa

Strona 83

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-35command - This parameter defines the l

Strona 84 - Page 3-54 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-36 Efficient Networks®Application --a imap | telnet | boot

Strona 85 - SYSTEM MANAGEMENT

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-37message logging - Specify one of these

Strona 86 - DHCP Address Allocation

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-38 Efficient Networks®• The order in which the rules are e

Strona 87 - DHCP Client Requests

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-39Rule ModificationTo modify a previousl

Strona 88 - Adding a Subnetwork

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-40 Efficient Networks®Port Information - When port informa

Strona 89

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-41Message Logging - Modifies the message

Strona 90 - Setting the Lease Time

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-6 Efficient Networks®This page intentionally left blank.

Strona 91

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-42 Efficient Networks®The information displayed includes:•

Strona 92 - Setting Option Values

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-43The firewall shall, by default, drop a

Strona 93

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-44 Efficient Networks®UDP Flood AttackSimilar to ICMP floo

Strona 94 - Enable/Disable BootP

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-45Finger BombIn this attack, an intruder

Strona 95

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-46 Efficient Networks®EncryptionEncryption is a key-enable

Strona 96 - Commands

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-47Sample ConfigurationSuppose that the r

Strona 97 - -> dhcp del 128

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-48 Efficient Networks®Observe the following guidelines:• S

Strona 98 - -> dhcp clear all records

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-49File Format for the Diffie-Hellman Num

Strona 99 - BootP Service

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-50 Efficient Networks®IPSec (Internet Protocol Security)IP

Strona 100 - Relaying BootP Requests

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-51The router supports both IPSec encapsu

Strona 101 - General NAT Rules

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-1CHAPTER 2CHAPTER 2 PRODUCT OVERVIEW

Strona 102 - Client Configuration

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-52 Efficient Networks®If ESP encryption is selected, ESP a

Strona 103 - Server Configuration

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-53Because VPN users are likely to be usi

Strona 104 - Failed to add server

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-54 Efficient Networks®Main Mode and Aggressive ModeThe rou

Strona 105

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-55Additional IKE SettingsIn addition to

Strona 106 - Server Request Hierarchy

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-56 Efficient Networks®The session initiator creates a cook

Strona 107 - Host Remapping

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-57The following commands define the peer

Strona 108 - Page 4-24 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-58 Efficient Networks®IKE Proposal CommandsThe IKE proposa

Strona 109 - Creating Policies

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-59Defines the name of a new IKE IPSec pr

Strona 110 - Page 4-26 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-60 Efficient Networks®-> ike ipsec proposals set espaut

Strona 111 - NetMeeting (H.323) with NAT

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-61IKE IPSec Policy CommandsThe IKE IPSec

Strona 113 - Key Enabled Features

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-2 Efficient Networks®WAN InterfacesRouters are available

Strona 114 - Page 4-30 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-62 Efficient Networks®Requires that the data come from the

Strona 115 - Key Rules

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-63Main Mode ExampleThe following example

Strona 116 - -> key list -l

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-64 Efficient Networks®# Describe the branch office IKE pha

Strona 117 - Feature Revocation

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-65# Branch office example using IKE# Hom

Strona 118 - Boot Code Options

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-66 Efficient Networks®ike ipsec policies add home_policyik

Strona 119

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-67#Describe the branch office peer#IKE a

Strona 120 - Option 1: Retry Start-Up

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-68 Efficient Networks®IPSec CommandsThe following commands

Strona 121 - Option 3: Boot from Network

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-69-> ipsec set authentication <sha

Strona 122 - Page 4-38 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-70 Efficient Networks®SSHSecure Shell (SSH) is a key-enabl

Strona 123 - Option 6: Set Time and Date

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-71Another perspective of the SSH protoco

Strona 124 - Routers with Four LEDs

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-3IDSLIDSL (ISDN DSL) A hybrid of ISDN a

Strona 125

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-72 Efficient Networks®Once the secure session has been est

Strona 126 - Routers with Six LEDs

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-73SSH SessionsFor SSH to be operational,

Strona 127 - Software Kernel Upgrades

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-74 Efficient Networks®• Key pairs can also be generated wi

Strona 128 - CAUTION:

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-75BlowfishBlowfish is a block cipher tha

Strona 129 - Upgrading from the WAN

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-76 Efficient Networks®Configure Bridge FilteringBridge fil

Strona 130 - Task Complete

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-1CHAPTER 6CHAPTER 6 CONNECTI

Strona 131

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-2 Efficient Networks®NOTE:When you stop or restar

Strona 132 - QoS Deployment Example

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-3The address ranges assigned to

Strona 133 - -> qos off

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-4 Efficient Networks®RIP ControlsThe Routing Info

Strona 134 - Policy Parameters

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-5The available RIP options on t

Strona 135

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-4 Efficient Networks®Virtual ConnectionsThe router’s wide

Strona 136 - Moving Policies

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-6 Efficient Networks®ARPARP is a low-level protoc

Strona 137 - -> qos del all

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-7Dial BackupThe Dial Backup cap

Strona 138 - -> time <hh:mm:ss>

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-8 Efficient Networks®To set a restriction for an

Strona 139 - SYSTEM SECURITY

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-9Optionally, Dial Backup can ac

Strona 140 - User Authentication

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-10 Efficient Networks®# Specify the primary phone

Strona 141 - Management Classes

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-11Setting DSL Link ConditionsAf

Strona 142 - Templates

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-12 Efficient Networks®The default retry period is

Strona 143

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-13To clear the ping list of all

Strona 144 - Procedures

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-14 Efficient Networks®During the ping test, every

Strona 145 - -> user list lookup

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-15Dial SettingThe string for th

Strona 146 - *********"

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-5Routing offers advantages over bridgin

Strona 147 - -> user disable myname

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-16 Efficient Networks®VRRP BackupWhen a router is

Strona 148 - Changing account access

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-17IP AddressEvery logical inter

Strona 149 - -> rad list secret

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-18 Efficient Networks®A VRID has these characteri

Strona 150 - Server Retries Timer

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-19Defining VRRP AttributesEach

Strona 151 - Radius Server Configuration

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-20 Efficient Networks®Time Interval Attribute (de

Strona 152

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-21NOTE:Our implementation does

Strona 153 - Controlling Remote Management

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-22 Efficient Networks®Disabling or Deleting VRRPT

Strona 154 - Example:

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-23Sample VRRP ConfigurationThe

Strona 155 - Restricting Remote Access

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-24 Efficient Networks®eth ip vrid 7## A VRRP attr

Strona 156 - -> reboot

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-25# In this example, the VRRP i

Strona 157

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-6 Efficient Networks®Bridging has these capabilities:• Al

Strona 158 - Authentication Process

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-26 Efficient Networks®L2TP Tunneling - Virtual Di

Strona 159 - CHAP Authentication

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-27L2TP Concepts This section de

Strona 160 - Authentication Passwords

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-28 Efficient Networks®Tunnels• Tunnels are virtu

Strona 161 - IP Filtering

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-29A tunnel session automaticall

Strona 162 - Transmit Filters

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-30 Efficient Networks®Step 2 Try to establish IP

Strona 163 - ICMP Redirect

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-31NOTE:Verify that the IP addre

Strona 164 - Filter Examples

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-32 Efficient Networks®AssumptionsIn this example,

Strona 165 - Built-in Firewall Filters

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-333. Shared_Secret 4. 10.0.0.1L

Strona 166 - Page 5-28 Efficient Networks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-34 Efficient Networks®4. Does the remote router d

Strona 167

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-35Complete LNS and L2TP Client

Strona 168 - Page 5-30 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-7When to Use Routing or Bridging or Bot

Strona 169

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-36 Efficient Networks®Configuration ProcessThe fo

Strona 170 - Page 5-32 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-37Set up ISDN parameters:isdn s

Strona 171

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-38 Efficient Networks®eth ip enable eth ip addr 1

Strona 172 - Stateful Firewall

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-39Set up ISDN parameters:isdn s

Strona 173

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-40 Efficient Networks®remote add internet remote

Strona 174 - Page 5-36 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-41PPPoE (PPP over Ethernet)PPPo

Strona 175 - 64.12.11.1 -d out

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-42 Efficient Networks®In addition, if the remote

Strona 176 - Deleting Firewall Rules

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-43If your service provider char

Strona 177 - Rule Modification

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-44 Efficient Networks®## Enable bridging through

Strona 178 - Page 5-40 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-45# ---------------------------

Strona 179 - Viewing Dropped Packets

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-8 Efficient Networks®Routing and Bridging ControlsThe rou

Strona 180 - Denial of Service Attacks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-46 Efficient Networks® Flags ...

Strona 181 - ICMP Flood Attack

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-47Transport (Layer-2) VPNsVirtu

Strona 182 - Tiny Packet Attack

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-48 Efficient Networks®Network (Layer-3) VPNsTunne

Strona 183 - Ping Flood

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-49Technology StandardsIPSecThis

Strona 184 - Encryption

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-50 Efficient Networks®Tunnel ServerFunctionThe L2

Strona 185 - Configuration Commands

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-51LocationThis software is inst

Strona 186

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-52 Efficient Networks®Workstation Client to LAN S

Strona 187

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-53Types of VPNs usedBoth ATM PV

Strona 188 - Page 5-50 Efficient Networks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-54 Efficient Networks®DES Encryption with Dynamic

Strona 189 - Device or

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-55Step 1: Configure Both Router

Strona 190 - IKE Management

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-9The router supports the following WAN

Strona 191 - Phase 2 IKE:

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-56 Efficient Networks®NOTE:You cannot ping the tu

Strona 192 - Phase 1 IKE — Main Mode:

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-57Set LAC and/or LNS. In this c

Strona 193 - Security Associations (SAs)

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-58 Efficient Networks®Define the name of our tunn

Strona 194 - -> ike peers list

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-59Add an IP route to the LAN on

Strona 195

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-60 Efficient Networks®

Strona 196 - IKE IPSec Proposal Commands

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-61VPN with IP Filtering and MS

Strona 197 - <proposalname>

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-62 Efficient Networks®This page intentionally lef

Strona 198 - Page 5-60 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-1CHAPTER 7CHAPTER 7 MON

Strona 199 - IKE IPSec Policy Commands

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-2 Efficient Networks®SNMPThe Simple Network

Strona 200 - IKE Configuration Examples

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-3Trap GenerationSNMP agent

Strona 201 - Main Mode Example

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-10 Efficient Networks®IP RoutingIP routing support, in co

Strona 202 - Page 5-64 Efficient Networks

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-4 Efficient Networks®Configuring SNMPThe rou

Strona 203 - ″ThisIsASecret12345;)″

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-5Sets the SNMP password.-&

Strona 204 - (No fixed IP address)

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-6 Efficient Networks®TroubleshootingSoftware

Strona 205

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-7LEDs in Ready StateOnce t

Strona 206 - IPSec Commands

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-8 Efficient Networks®History LogThe History

Strona 207

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-9If the terminal window di

Strona 208 - SSH Protocol

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-10 Efficient Networks®Connection ProblemsIf

Strona 209 - Version Identification

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-11Remote Network Access Pr

Strona 210 - Requests (commands)

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-12 Efficient Networks®TCP/IP Routing• Check

Strona 211 - -> ssh keygen

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-13IPX Routing• Check that

Strona 212 - Encryption Options

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-11Encapsulation OptionsThis section des

Strona 213 - Bridge Filtering

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-14 Efficient Networks®Telnet Access Problems

Strona 214 - Configure Bridge Filtering

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-15If you hear clicking dur

Strona 215 - -> eth restart

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-16 Efficient Networks®remote setauthen chap

Strona 216 - -> eth ip options

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-1CHAPTER 8CHAPTER 8 WEB MANA

Strona 217 - Managing Routes

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-2 Efficient Networks®Radio Button Radio buttons a

Strona 218 - RIP Controls

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-3Router Information PageThe prim

Strona 219 - -> eth list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-4 Efficient Networks®Easy SetupThe Easy Setup scre

Strona 220

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-5On the Protocol Selection page

Strona 221 - Dial Backup

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-6 Efficient Networks®Point-to-Point Protocol over

Strona 222 - Configuring Dial Backup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-7If IP Routing enabled is select

Strona 223

 Copyright 2002, Efficient Networks, Inc.All rights reserved. Printed in the U.S.A.Efficient Networks and SpeedStream are registered trademarks, and

Strona 224 - ISDN Phone Numbers

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-12 Efficient Networks®RFC 1483 or RFC 1490BridgingUser da

Strona 225 - -> system list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-8 Efficient Networks®Step2 Enter the PPPoE Service

Strona 226 - Addresses to Ping

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-9A PPP Username and password are

Strona 227

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-10 Efficient Networks®RFC 1483 NetworkingSelection

Strona 228 -

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-11Selection of this option will

Strona 229 - Dial Setting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-12 Efficient Networks®RFC 1483 MAC Encapsulated Ro

Strona 230 - VRRP Backup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-13Step2 Optional, click to selec

Strona 231 - -> eth ip vrid 7 0:1

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-14 Efficient Networks®Dynamic Host Configuration P

Strona 232 - -> eth list 0:1

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-15Selection of manual DNS config

Strona 233 - -> eth vrrp list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-16 Efficient Networks®Local Area Network Configura

Strona 234 - Page 6-20 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-17User ManagementThe User Manage

Strona 235 - Starting VRRP

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-1CHAPTER 3CHAPTER 3 INSTALLATI

Strona 236 - Disabling or Deleting VRRP

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-18 Efficient Networks®Adding A User AccountTo add

Strona 237 - Internet

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-19Privileges can be configured i

Strona 238 - Page 6-24 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-20 Efficient Networks®The Add/Modify User page is

Strona 239

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-21Privileges can be configured i

Strona 240 - Advantages of Tunneling

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-22 Efficient Networks®User Lookup ConfigurationThe

Strona 241 - L2TP Client Illustration

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-23Secure Mode ConfigurationSecur

Strona 242 - LAN/server

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-24 Efficient Networks®Change PasswordThe Change Pa

Strona 243

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-25Access Control FormThe Access

Strona 244 - Commands to configure tunnels

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-26 Efficient Networks®ExamplesThe following exampl

Strona 245 - Sample Configurations

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-27Key Enabled Feature List PageT

Strona 246 - Page 6-32 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-2 Efficient Networks®Remote RoutersThroughout this

Strona 247

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-28 Efficient Networks®Add Feature PageThe Add Feat

Strona 248 - Page 6-34 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-29Delete Feature PageThe Delete

Strona 249

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-30 Efficient Networks®Update Feature PageSome feat

Strona 250 - (ISDN)

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-31Feature Enabled/Disable PageWh

Strona 251

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-32 Efficient Networks®Revoke Feature PageIf a feat

Strona 252 - Page 6-38 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-33Unrevoke Feature PageThe Unrev

Strona 253

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-34 Efficient Networks®Router Clock PageThis functi

Strona 254 - Define the actual tunnel:

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-35DCHP ConfigurationDHCP is a TC

Strona 255 - PPPoE (PPP over Ethernet)

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-36 Efficient Networks®To re-configure the current

Strona 256 - PPPoE Client

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-37NOTE:The last IP address must

Strona 257

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-3Protocols to be UsedThe informat

Strona 258 - Page 6-44 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-38 Efficient Networks®NATNetwork Address Translati

Strona 259 - Managing PPPoE Sessions

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-39Inbound NAT SettingThis sectio

Strona 260 - Flags ... 1

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-40 Efficient Networks®Advanced SetupThe Advanced S

Strona 261 - ATM or Frame Relay transport

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-41SNMPSimple Network Management

Strona 262 - Tunneling

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-42 Efficient Networks®To configure SNMP, perform t

Strona 263 - DES Encryption

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-43SNMP IP Filter PageThe SNMP IP

Strona 264 - Page 6-50 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-44 Efficient Networks®To delete a filter, perform

Strona 265 - Types of VPNs used

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-45SSHSecure Shell (SSH) allows s

Strona 266 - LAN client to LAN server

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-46 Efficient Networks®Secure Shell Configuration p

Strona 267 - Secure VPN Option

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-47SSH ConfigurationTo change the

Strona 268 - Page 6-54 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-4 Efficient Networks®• For Remote Routers:Although

Strona 269

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-48 Efficient Networks®SSH KeysDiffie-Hellman is th

Strona 270 - Page 6-56 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-49Key UploadTo load the key pair

Strona 271

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-50 Efficient Networks®Firewall ScriptsYour router

Strona 272 - Page 6-58 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-51CAUTION:All network security e

Strona 273

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-52 Efficient Networks®QoSQoS is a key enabled feat

Strona 274 - Page 6-60 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-53To change the current settings

Strona 275

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-54 Efficient Networks®QoS Policy Configuration pag

Strona 276 - Page 6-62 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-55QoS Policy ParametersThe follo

Strona 277 - PERFORMANCE

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-56 Efficient Networks®The following configuration

Strona 278

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-57Step3 In the field provided, s

Strona 279 - Trap Generation

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-5NOTE:An Ethernet route is usuall

Strona 280 - Configuring SNMP

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-58 Efficient Networks®QoS Policy CreationTo create

Strona 281

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-59Qos Policy ModificationTo modi

Strona 282 - Troubleshooting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-60 Efficient Networks®Stateful FirewallAn IP filte

Strona 283

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-61To change the current settings

Strona 284 - Step 3 Click Connect

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-62 Efficient Networks®Dropped Packet PageThe Dropp

Strona 285

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-63Firewall Rule Configuration pa

Strona 286

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-64 Efficient Networks®Address - These parameters d

Strona 287

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-65To delete a single rule or ran

Strona 288 - Page 7-12 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-66 Efficient Networks®Firewall Rule CreationTo cre

Strona 289

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-67Firewall Rule ModificationTo m

Strona 290 - Software Download Problems

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-6 Efficient Networks®IPX Routing Network ProtocolSy

Strona 291 - L2TP Tunnel Troubleshooting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-68 Efficient Networks®Dial BackupDial Backup, when

Strona 292 - Page 7-16 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-69Step7 Enter the Reset DSL Time

Strona 293 - WEB MANAGEMENT INTERFACE

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-70 Efficient Networks®Step3 Click the Home link to

Strona 294

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-71Command Line InterfaceCommand

Strona 295 - Router Information Page

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-72 Efficient Networks®Web Management Interface Pr

Strona 296 - Easy Setup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-73tools/dhcp.html Data - Read D

Strona 297

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-74 Efficient Networks®tools/loopGround.html Voice

Strona 298 - Page8-6 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-7You need the following informati

Strona 299

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-8 Efficient Networks®Bridging Network ProtocolTo co

Strona 300 - Page8-8 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-9DNS Internet Account Information

Strona 301

B. After receiving an RMA, the end user shall ship the product or defective component, including power supplies and cable, where applicable, freight o

Strona 302 - RFC 1483 Networking

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-10 Efficient Networks®IP Routing Entries• For the E

Strona 303

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-11DLCI number (for RFC 1490)The D

Strona 304 - Page8-12 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-12 Efficient Networks®Bridging Network ProtocolTo c

Strona 305

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-13If you are connecting to multip

Strona 306 - Page8-14 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-14 Efficient Networks®If NAT is not enabled, you ma

Strona 307

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-15Microsoft WindowsWindows 98Step1

Strona 308 - Step3 Click Save and Reboot

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-16 Efficient Networks®Step6 Click OK.Step7 Click OK

Strona 309 - User Management

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-17Windows NT 4Step1 On your deskto

Strona 310 - Adding A User Account

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-18 Efficient Networks®Step6 Click OK.Step7 Click OK

Strona 311 - Editing A User Account

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-19Windows 2000Step1 On your deskto

Strona 312

Efficient Networks® Router familyTechnical Reference GuideTable of ContentsContentsEfficient Networks®51 Introduction. . . . . . . . . . . . . . . .

Strona 313

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-20 Efficient Networks®Step5 Click Properties.Step6

Strona 314

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-21Step 7 Click OK.Step 8 Click OK

Strona 315

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-22 Efficient Networks®Windows MEStep 1 On your desk

Strona 316

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-23Step 6 Under the IP Address tab

Strona 317 - Access Control Form

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-24 Efficient Networks®Windows XPStep 1 On your desk

Strona 318 - Feature Activation

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-25Step 4 The Local Area Connectio

Strona 319 - Key Enabled Feature List Page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-26 Efficient Networks®Apple MacintoshTo configure T

Strona 320

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-27Step 2 The TCP/IP control panel

Strona 321 - Step2 Click Apply

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-28 Efficient Networks®Mac OS XStep 1 Under the Appl

Strona 322

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-29Step 3 The Network window shoul

Strona 323 - Step3 Click Apply

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide6 Efficient Networks®PPP Link Protocol (over ATM or Frame Relay)

Strona 324

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-30 Efficient Networks®LinuxStep 1 From a terminal w

Strona 325

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-31Step 3 When settings are comple

Strona 326 - Router Clock Page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-32 Efficient Networks®InstallationVerify the Packag

Strona 327 - DCHP Configuration

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-33Step 5 Connect the AC power ada

Strona 328 - Page8-36 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-34 Efficient Networks®Establishing a Connection To

Strona 329

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-35Step 2 Restart the PC and power

Strona 330

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-36 Efficient Networks®Terminal SessionsThe router s

Strona 331

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-37Step 4 In the Com 1 (or 2) Prop

Strona 332 - Advanced Setup

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-38 Efficient Networks®Terminal Session for Macintos

Strona 333 - SNMP Configuration Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-39Telnet Session for Remote Acces

Strona 334 - Page8-42 Efficient Networks

Efficient Networks®7ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsBootP Service . . . . . . . . . . . . . . . .

Strona 335 - Step2 Click Add IP Range

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-40 Efficient Networks®Configuring the RouterHaving

Strona 336 - SNMP Password Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-41Configuration TablesThe followi

Strona 337

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-42 Efficient Networks®Configuring PPP with IP Routi

Strona 338 - Page8-46 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-43Configuring PPP with IPX Routin

Strona 339 - SSH Configuration

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-44 Efficient Networks®Remote RoutersNew Entry Enter

Strona 340

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-45Configuring PPP with BridgingTh

Strona 341

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-46 Efficient Networks®Configuring RFC 1483 / RFC 14

Strona 342 - Firewall Scripts

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-47Link Protocol/DLCIb(for Frame R

Strona 343

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-48 Efficient Networks®Configuring RFC 1483 / RFC 14

Strona 344 - QoS Configuration Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-49Configuring RFC 1483 / RFC 1490

Strona 345 - Step4 Click Apply

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide8 Efficient Networks®Client-Server Security . . . . . . . . . . .

Strona 346 - QoS Policy Configuration page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-50 Efficient Networks®Configuring RFC 1483MER / RFC

Strona 347 - QoS Policy Deletion

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-51Verify the Router Configuration

Strona 348 - Step3 Select a delete option

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-52 Efficient Networks®Test IP Routing to a Remote D

Strona 349

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-53If you cannot access the remote

Strona 350 - Step4 Click Save

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-54 Efficient Networks®This page intentionally left

Strona 351 - Step2 Click Modify/Display

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-1CHAPTER 4CHAPTER 4 SYSTEM MANAGEM

Strona 352

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-2 Efficient Networks®DHCP (Dynamic Host Configuration Pr

Strona 353

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-3NOTE:For information on configuring t

Strona 354

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-4 Efficient Networks®Manipulating Subnetworks and Explic

Strona 355 - Firewall Rule Parameters

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-5Example 1:The following command creat

Strona 356 - Firewall Rule Deletion

Efficient Networks®9ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsMain Mode and Aggressive Mode. . . . . . . . .

Strona 357

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-6 Efficient Networks®Dynamic Client LeasesDynamic client

Strona 358

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-7CommandsThe following commands are us

Strona 359

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-8 Efficient Networks®To release the client lease so it b

Strona 360

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-9-> dhcp clear valueoption <code

Strona 361

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-10 Efficient Networks®-> dhcp list definedoptionsThis

Strona 362

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-11Specify the Boot (TFTP) ServerThe fo

Strona 363 - Step2 Click Execute

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-12 Efficient Networks®Configuring BootP/DHCP RelaysBootP

Strona 364

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-13To list the definition for all optio

Strona 365

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-14 Efficient Networks®Clearing All DHCP InformationIf ne

Strona 366

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-15BootP ServiceThis section first disc

Komentarze do niniejszej Instrukcji

Brak uwag