Datacom DM2500
Datacom DM2500
Version 1.12.0
Contacts
Technical Support
Datacom has available a support portal - DmSupport, to help the customers in use and config of our equipment.
In this site the following are available: firmwares, technical datasheets, config guide, MIBs and manuals for down-
load. In addition, it allows opening of calls for assistance with our technical team.
We would like to highlight that our assistance through telephone support is available from Monday through Friday from
08:00 AM through 05:30 PM.
Important: For support assistance 24x7, please request a quotation to our sales department.
General Information
For any other additional information, please visit the https://www.datacom.com.br/en or call:
DATACOM
+55 51 3933-3000
Product Documentation
This document is part of a set of documents prepared to provide all necessary information about DATACOM products.
Software Platform
• Quick Configuration Guide - Provides instructions on how to set functionalities in a quick manner in the equipment
• Troubleshooting Guide - Provides instructions on how to analyze, identify and solve problems with the product
• Release Notes - Provides instructions on the new functionalities, identified defects and compatibilities between
Software and Hardware
Hardware Platform
The availability of some documents can vary depending on the type of product.
Access https://supportcenter.datacom.com.br to locate the related documents or contact the Technical Support for
additional information.
The present document is a set of instructions that provide a quick and objective explanation on the use of the functionalities
available in the product. It also covers the initial configs that are generally required immediately after installation of the
product.
This document was developed to be used as an eventual source for solution of technical issues, and for this reason its
sequential reading is not mandatory. However, if you are setting the equipment and is not familiar with the product,
reading of the document since the beginning is recommended.
It is presumed that the individual or individuals that manage any aspect of the product should have the basic knowledge of
Ethernet, network protocols and communication networks in general.
Audience
This guide is directed to network administrators, technicians or teams qualified to install, set, plan and maintain this
product.
Conventions
To facilitate understanding of the present manual, the following conventions were adopted:
Icons
Note The notes explain in a better manner a detail included in the text.
WEEE Directive Symbol (Applicable in the European Union and other European coun-
tries with separate collection systems). This symbol on the product or its packaging
indicates that this product must not be disposed of with other waste. Instead, it is your
responsibility to dispose of your waste equipment by handing it over to a designated
collection point for the recycling of waste electrical and electronic equipment. The
Note
separate collection and recycling of your waste equipment at the time of disposal
will help conserve natural resources and ensure that it is recycled in a manner that
protects human health and the environment. For more information about where you
can drop off your consumer waste equipment for recycling, please contact your local
city recycling office or the dealer from whom you originally purchased the product.
This symbols means that, case the procedure was not correctly followed, may exist
Warning
electrical shock risk.
Warning Represents laser radiation. It is necessary to avoid eye and skin exposure.
This symbol means that this text is very important and, if the orientations were not
Caution
correct followed, it may cause damage or hazard.
A warning icon requests special attention to the conditions that, if not avoided, may cause physical damages
to the equipment.
A caution icon requests special attention to the conditions that, if not avoided, may result in risk of death of
serious injury.
Table of Contents
Contacts 2
Product Documentation 3
1 Starting 7
1.1 Installing and energizing the equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2 Accessing the equipment using the console port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.3 Accessing the equipment using a ethernet port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Accessing the equipment for the first time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2 Basic Management 9
2.1 Firmware Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.2 Operation Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.2.1 Operational Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.2.2 Configuration Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3 Configuration Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3.1 Applying the Candidate Config to the Running Config . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3.2 Applying the Running Config to the Startup Configuration . . . . . . . . . . . . . . . . . . . . . . 12
2.3.3 Checking the Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.3.4 Restoring the Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.3.5 Restoring to the Factory Config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4 Configuration to a File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4.1 Exporting Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4.2 Importing Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4.3 Handling Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.4.4 Loading Configurations from a File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.5 Copying and pasting configuration commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.6 Configuration over SNMP protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.6.1 Applying a configuration via SNMP to running-config . . . . . . . . . . . . . . . . . . . . . . . . . 15
3 Equipment Management 16
3.1 Configuring a management interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.1.1 Management through an exclusive interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.1.2 Shared management in a physical interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.2 Configuring the hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.3 Configuring the banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.4 Configuring the system clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.5 Configuring the summertime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4 OAM 23
4.1 Setting the NetFlow/IPFIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.2 Macros and Watch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2.1 Macro . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2.2 Watch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2.3 Performing an action with Watch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.3 Setting the TWAMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.3.1 Setting the TWAMP Reflector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.3.2 Setting the TWAMP Sender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.3.3 IP SLA Object Tracking with TWAMP, Watch e Macro . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.3.4 TWAMP Comparator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
4.4 tcpdump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.5 Dump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.6 Show tech-support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.7 Monitor Bandwidth Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.7.1 Configuring the server mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.7.2 Configuring the client mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
5 Connectivity Tools 32
5.1 Ping and Ping6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
5.2 Traceroute and Traceroute6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
5.3 SSH Client and Telnet Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
6 Users Authentication 34
6.1 Change the default password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
6.2 Setting the Local Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
6.3 Setting the TACACS+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
6.4 Setting the RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
7 Interfaces 38
7.1 Setting the Ethernet Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
7.1.1 Setting speed and duplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
7.2 Setting the Loopback Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
8 Connection Services 43
8.1 Setting the DHCPv4 Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
8.1.1 Configurando as opções do DHCPv4 Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
8.2 Setting the DHCPv6 Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
8.3 Setting the DHCPv4 Relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.4 Setting the DHCPv6 Relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.5 Setting the DHCPv4 Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
8.6 Setting the DHCPv6 Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
8.7 Setting the PPPoE Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
9 Routing 49
9.1 Setting the Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
9.1.1 Static Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
9.1.2 Routing between VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
9.1.3 Enabling ECMP in static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
9.2 Setting the PBR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
9.3 Setting the RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
9.4 Setting the RIPng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
9.5 Setting the OSPFv2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
9.5.1 Configuring a Virtual Link in OSPFv2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
9.5.2 Enabling ECMP in OSPFv2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
9.5.3 Setting LSA filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
9.5.4 Filtering of LSAs announced for other areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
9.5.5 Filtering of LSAs announced for the specified area . . . . . . . . . . . . . . . . . . . . . . . . . . 56
9.5.6 Filtering of LSAs using prefix-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
9.6 Setting the OSPFv3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
9.6.1 Enabling ECMP in OSPFv3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
9.6.2 LSA filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
9.7 Setting the BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
9.7.1 iBGP IPv4 neighbor configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
9.7.2 eBGP IPv4 neighbor configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
9.7.3 eBGP IPv4 neighbor configuration with loopbacks . . . . . . . . . . . . . . . . . . . . . . . . . . 61
9.7.4 iBGP IPv6 neighbor configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
9.7.5 eBGP IPv6 neighbor configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
9.7.6 eBGP IPv6 neighbor configuration with loopback . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
10 QoS 83
10.1 Setting the Rate Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
10.2 Configuring classification, priorization and remarking of egress traffic . . . . . . . . . . . . . . . . . . . 84
10.2.1 Classification and priorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
10.2.2 Remarking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
10.2.3 Classifying locally generated packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
10.2.4 Classifying by address or port range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
10.3 Configuring DSCP remarking of ingress traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
11 Security 88
11.1 Configuring the SSH and Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
11.2 Configuring the NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
11.2.1 Source NAT (SNAT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
11.2.2 Destination NAT (DNAT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
11.3 Configuring the Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
11.3.1 Configuring ACL Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
11.3.2 Configuring the stateful Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
11.3.3 Firewall protections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
12 Tunneling 100
12.1 Setting GRE tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
12.2 Setting IPv6 GRE tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
12.3 Setting site-to-site IPsec VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
12.4 Setting site-to-site VPNs IPsec with NAT Traversal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
12.5 Protecting a GRE Tunnel with IPsec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
12.6 Setting VPN IPsec with Virtual Tunnel Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Warranty 112
1 Starting
This chapter contains the following sections:
Access to equipment CLI can be carried out through the console port. A serial cable is required. A terminal emulator such
as Hyper Terminal or similar is also needed. The terminal settings must be set as 9600 8N1.
In the factory configuration, Ethernet interface eth1 is configured with IP address 192.168.0.25/24. SSHv2 and TELNET are
enabled by default.
It is possible to manage the equipment through any Ethernet interface. Additional configuration can be performed to allow
access through other interface and also do disable SSHv2 or TELNET protocols, if required.
To login to the equipment for the first time, the admin user and admin default password must be used.
For security purposes, it is highly recommended to change the equipment default password.
Please read the Users’ Authentication chapter to check on how to proceed to change the user password.
2 Basic Management
This chapter contains the following sections:
• Firmware Update
• Operation Mode
• Configuration Types
• Configuration Files
Contact DATACOM Technical support to check the firmware images available for download and installation
according to your products.
It will be necessary to use a PC with a TFTP, SCP or HTTP Server installed in order to download the firmware to the
equipment.
It is possible to check the firmware installed in the equipment using the show firmware command:
To download the firmware file through TFTP, use the following command:
If it is decided not to perform the firmware swap and reboot after the download, the user may execute the firmware swap
later:
The user may choose not to reboot the equipment after firmware download and activation to finish the upgrade at a later
time. To finish the firmware upgrade, the user should use the reboot command:
reboot
After login in the equipment, the CLI is in the operational mode. In this mode it is possible to check the equipment
information, run connectivity tests and more. In this mode, it is not possible to modify the equipment configuration.
While in the operational mode, the CLI prompt will display as prefix the name of host followed by the $ character.
dm2500:~$
To check the list of possible operational commands, press the question mark ? or the [Tab] key in the
prompt.
It is possible to check some important information of the equipment in the operational mode using the following
commands:
Comando Descrição
Comando Descrição
It is possible to execute any command of the operational mode in the configuration mode adding the keyword run before
the command. Below there is an example:
To modify the configuration it is necessary to enter in the configuration mode through the following command:
configure
After entering in the configuration mode, the CLI prompt will exhibit the character as indicated below:
dm2500#
To exit the configuration mode, the user should use the following command:
dm2500# exit
DM2500 has three configurations, the candidate, the startup and the running configuration, as explained below.
• Candidate configuration: While the user changes the configuration and do not commits it, the configuration
is temporarily saved as candidate. If the equipment is rebooted or the user quits the session, the candidate
configuration is lost.
• Running configuration: After the user commits the candidate configuration, it is applied to the running configura-
tion. If the equipment reboots, the running configuration is lost.
• Startup configuration: The startup configuratoin is loaded when the device boots. After the commit command, the
user should run the save command to save the running configuration to the startup configuration.
To activate the candidate configuration, is necessary to copy it to the running configuration. The commit command
applies the candidate config to the running config.
commit
The user can temporarily apply the candidate configuration. When executing the command commit-confirm, the
candidate config is applied. The user must execute the commit command to apply the config definitively. If the commit is
not execute, the configuration is rolled back after the default time of 10 minutes.
The default 10 minutos timeout can be changed, as shown below, where the timeout is set to 5 minutes.
commit-confirm 5
To save the running config to the startup config, the user should use the save command, which will save the configuration.
The configuration is saved by default in the config.boot file. The save command must be executed in the configuration
mode.
save
Saving configuration to ’config.boot’...
Done
[edit]
In the configuratoin mode, to discard all uncommited changes, the user can use the discard command.
discard
The use can check the current configuration using the show configuration command.
show configuration
To check the candidate configuration, the user can execute the show command while in configuration mode.
show
The check the differences between the current configuration and the candidate one, the user should execute the command
compare.
compare
To revert to the last commited configuration, the user should use the rollback command.
rollback
commit
To complete the rollback, a reboot is needed. Be aware that during this procedure, there will be a brief
service interruption.
The folloing procedure will erase the current configuration and load the factory config.
load default
commit
The user can save the candidate configuration without needing to commit it, as shown below, where the candidate config
is saved to the CANDIDATE-CONFIG file.
save CANDIDATE-CONFIG
The user can export a configuration file to a SCP, FTP or TFTP server. The following command will send via TFTP protocol
the CONFIG_1 file to the server 172.1.1.1.
save tftp://172.1.1.1/CONFIG_1
The command below shows how to copy the configuration file config_1 from TFTP server 192.168.0.15 to the equipment.
The load command will erase the current configuration and replace it by the configuration in the file.
configure
load tftp://192.168.0.15/config_1
commit
The merge command can also be used. It will merge the current configuration against the configuration present in the file.
configure
merge tftp://192.168.0.15/config_1
commit
To list all saved files, the user should use the show configuration files in the operational mode.
To show the content of a file, the user should use the command below in the operational mode.
The load command replaces the candidate configuration with the configuration in the specified file.
load <file-name>
commit
It is possible to merge the candidate configuration with the configuration in a saved file. The configuration commands in
the file will be merged to the candidate configuration or will replace it in case of conflict.
merge <file-name>
commit
To paste a large number of configuration lines, the paste mode should be used. In the configuration mode, enter the paste
command. Then, the configuration commands can be pasted. To apply the configuration and exit the paste mode, enter
the commit command.
configure
paste
And then, the user pastes the configuration with the commit command at the end.
The DM2500 allows to configure the equipment through SNMP protocol using the DATACOM-ROUTER-B-MIB MIB.
The user will be able to use text mode configuration files previously created and made available on a TFTP server.
The equipment must have management and SNMP previously configured. For more information, see the
chapter Configuring the SNMP protocol
The following command sequence is supported only on computers running Linux operating system.
Suppose the user wants to apply the cfg-snmp-dm2500 configuration to the running-config of the DM2500 with IPv4
172.22.109.30 device via SNMP protocol using a TFTP server with IPv4 address 10.0.120.96.
Below is the command sequence for applying the cfg-snmp-dm2500 file configuration to running-config.
3 Equipment Management
This chapter will guide to user to perform equipment management configurations. This chapter contains the following
sessions:
The equipment can be management through any interface with a configured IP address.
It is possible to configure an interface with IPv4 or IPv6 address for equipment management.
The diagram below represents the network topology which will be used as base in this section.
This configuration mode is used when it is possible to use a dedicated ethernet interface for management. By default, the
IP address 192.168.0.25/24 is configured in the physical interface eth1.
In the procedure below, the default IP address is removed from eth1 and the new IP address 172.24.22.1/24 and gateway
172.24.22.254 are configured:
configure
delete interfaces ethernet eth1 address 192.168.0.25/24
set interfaces ethernet eth1 address 172.24.22.1/24
set system gateway-address 172.24.22.254
commit
save
In this configuration mode, the management IP address is assigned to a VLAN making it possible to configure another
VLANs and their repective IP addresses in the same interface. By default, the IP address 192.168.0.25/24 is configured in
the physical interface eth1.
In the procedure below, the default IP address is removed from eth1 and the new IP address 172.24.22.1/24 and gateway
172.24.22.254 are configured in the VLAN 10:
configure
delete interfaces ethernet eth1 address 192.168.0.25/24
set interfaces ethernet eth1 vif 10 address 172.24.22.1/24
set system gateway-address 172.24.22.254
commit
save
configure
set system host-name DATACOM-ROUTER-R1
commit
save
The banner content must be configured in a single line and be between double-quotes (””).
configure
set system login banner pre-login "Access allowed only for\nauthorized personel."
commit
save
configure
set system login banner post-login "Welcome to DM2500\n"
commit
save
The time and date configuration is important for log and events viewing. The use can set the system clock from the
operatinal mode. Configuration commit is not needed.
The command below shows how to set date and time to 08-jun-2017 15:40.
configure
set system time-zone Brazil/East
commit
save
To check the equipment date and time, use the command show system clock:
When a timezone is configured, the summertime is automatically configuring according to that timezone standard. In case
it is necessary to change the timezone, the commands below can be used:
configure
set system clock summer-time recurring BRST month-to-start 11
set system clock summer-time recurring BRST month-to-end 2
set system clock summer-time recurring BRST time-to-start 00:00
set system clock summer-time recurring BRST time-to-end 00:00
set system clock summer-time recurring BRST week-day-to-start 1
set system clock summer-time recurring BRST week-day-to-end 1
set system clock summer-time recurring BRST week-to-start 1
set system clock summer-time recurring BRST week-to-end 4
commit
save
The NTP (Network Time Protocol) is used to synchronized the system clock to a remote server. That is important to log and
event visualization.
To configure the DM2500 as client of two NTP servers with IPv4 addresses 172.24.22.201 and 172.24.22.202, follow the
procedure below:
configure
set system ntp server 172.24.22.201
set system ntp server 172.24.22.202
commit
save
The following commands can be used to check the NTP protocol operation.
show ntp
According to RFC5424, syslog protocol is used to transport log messages to a centralized server. for instance, if a Ethernet
interface goes down, a message informing that status change will be sent to the server. That is important for log visualization
in an unique and centralized location. DM2500 does no support log severity. All logs are sent to the server once it is
configured.
The following procedure shows how to configure the DM2500 as a Remote Syslog server client with IPv4 address 10.1.100.7:
configure
set system syslog host 10.1.100.7
commit
save
show log
show log tail
clear log
SNMP is a protocol that helps network administrators to manage devices, identify and troubleshoot problems in the
network.
Command Description
The original SNMP version does not have any type of security, since it
SNMPv1
uses a plain text community for authentication.
The topology bellow will be used to illustrate the SNMP protocol configuration.
To enable the SNMPv2 protocol with private (rw) community for read or write and send traps to server 172.22.1.252, the
following procedure can be used:
configure
set service snmp community private authorization rw
set service snmp trap-target 172.22.1.252
commit
save
The SNMP protocol follows a hierarchical tree, due this a view shows from which branch is possible to
access the OIDs. For example: If configured root(1).iso(3).org(6).internet(1) access will be allowed to all OIDs
starting with 1.3.6.1, in other words, all OIDs supported by the equipment.
The example below shows the SNMPv3 configuration with packet payload encrypted using AES and user userv3 plus
password user1234 encrypted using SHA. The views configured allow only access to IF-MIB (1.3.6.1.2.1.2.2.1) and SysName
(1.3.6.1.2.1.1.5.0). The SNMP Traps are sent to 172.22.1.252 server.
configure
set service snmp v3 engineid ’0x80001f8880243d9cbd000000005e5d04ce’
set service snmp v3 user userv3 mode ro
set service snmp v3 user userv3 auth plaintext-key user1234
set service snmp v3 user userv3 auth type ’sha’
set service snmp v3 user userv3 privacy plaintext-key pass1234
set service snmp v3 user userv3 privacy type ’aes’
set service snmp v3 view OidView oid 1.3.6.1.2.1.1.5.0
set service snmp v3 view OidView oid 1.3.6.1.2.1.2.2.1
set service snmp v3 group ReadOnlyGroupAuthPriv seclevel priv
set service snmp v3 group ReadOnlyGroupAuthPriv mode ro
set service snmp v3 group ReadOnlyGroupAuthPriv view OidView
The SNMP agent also has the function of generating alerts (Traps). To send a SNMP Trap is necessary to configure at least
one group as shown below:
configure
set service snmp trap-enable config
set service snmp trap-enable cpu-core
set service snmp trap-enable cpu-overall
set service snmp trap-enable dying-gasp
set service snmp trap-enable link-up
set service snmp trap-enable link-down
set service snmp trap-enable login
set service snmp trap-enable memory
set service snmp trap-enable temperature
commit
save
4 OAM
This chapter shows a group of Operations, Administration and Maintenance (OAM) functionalities that provide indication of
network failure, fault location, performance information, data functions and diagnostic. It contains the following sections:
• Tcpdump
• Dump
• Show tech-support
Flow monitoring service allows gathering information of IP flows. The Router supports NetFlow versions 5, 9 and 10, where
the last version is also known as IPFIX (IP Flow Information Export) which is based on the IETF (Internet Engineering Task
Force) standard. This standard defines how the information of the IP flow are formatted and transferred from exporter
to collector, gathering information of IPv4 flows, as shown in the figure below. The exporter periodically gathers the
information related to the packets that flow through the router to a record. Then the exporter sends the record in a UDP
packet to the collector.
NetFlow/IPFIX Scenario
Considering that the user would like to monitor the flow of the eth1 and eth2 interfaces and wishes to upload this
information to the 10.0.120.102 server through the 4739 port using version 10 of the Netflow. The procedure below will
show how to execute this configuration:
configure
set service netflow destination 10.0.120.102 port ’4739’
set service netflow version ’10’
set service netflow interface ’eth1’
ser service netflow interface ’eth2’
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
It is possible configure NetFlow/IPFIX to provide a deterministic or random sampling for a subset of flow selecting only one
packet in a set of packets in a sequential order (n is parameter configurable by the user).
It is said that the sampling is deterministic if the user defines the sampling rate to 1 in each 100 packets, in this point the
NetFlow/IPFIX will examine the packets 1, 101, 201, 301 and so on.
In the random sampling mode, the input packets are selected in a randomly order so that one in each sequential n-packets
is selected in average for its processing.
configure
! Sampling rate to 1 in each 100 packets
set service netflow sampling-rate 100
! Sampling mode
set service netflow sampling-rate 100 mode deterministic
commit
Below are the main commands available to check the flow monitoring. If the user is at configuration level, it is necessary to
use the keyword run before the command
This chapter introduces DM2500 tools for automating task execution, as well as the ability to create autorun scripts based
on the DM2500 feature status.
4.2.1 Macro
Macros are sets of CLI commands that can be executed by the user or through the Watch functionality of the DM2500.
Macro actions are performed in order, as if they were typed or performed by the operator.
To run the macro and configure the NTP server, use the command below:
4.2.2 Watch
Watch is a feature that allows the DM2500 to make decisions (macro executions) based on CLI command output. Watch
acts as an operator who executes commands on the equipment at predefined intervals, and from the output of these
The example below performs a PING for an IPv4 every 10 seconds, looks for the 0 received expression on the command
return, and logs with the result of this operation.
Once you have a Macro defined, you can run it using Watch. The steps below will demonstrate an application running via
Watch.
In the example below Watch will monitor the status of VRRP on the eth5 interface and will change the hostname of the
equipment for MASTER-ROUTER or BACKUP-ROUTER based on VRRP status.
Macro configuration:
Watch configuration:
Every 10 seconds the equipment will execute the command show vrrp interface eth5 and search for the keyword
MASTER. If the keyword is found, macro 9 will be executed, otherwise macro 10 will be executed.
The TWAMP (Two-Way Active Measurement Protocol) protocol measures the network performance parameters as latency,
jitter and loss of packets. Implementation of the TWAMP server is based on the specifications described in the RFC 5357.
The server solution architecture in the TWAMP defines the following logical components:
• Session Reflector: Insert information to the test packets received and send them back.
The client solution architecture in the TWAMP defines the following logical components:
• Session Sender: Creates and sends TWAMP test packets to the Session-Reflector.
• Control Client: Sends requests to the TWAMP server in order to establish new sessions.
TWAMP Arquiteture
The TWAMP in the DM2500 has some restrictions as indicated in the note below:
• The reflector is capable to hear one single control port at each time.
TWAMP Scenario
Considering that the user would like to configure a Sender and Reflector communicating through the 15000 port (default is
862). The procedure below will show how to execute this configuration:
configure
set interfaces ethernet eth1 address 10.10.20.250/24
set service twamp reflector port 15000
commit
configure
set interfaces ethernet eth1 address 10.10.10.250/24
set service twamp sender session 1 port 15000
set service twamp sender session 1 destination-ip 20.20.20.250
set service twamp sender session 1 source-ip 10.10.10.250
set service twamp sender session 1 time-interval 10
set service twamp sender session 1 session-duration 120
set service twamp sender session 1 packet-size 1280
set service twamp sender session 1 enable
commit
In the sender it is possible to configure the option to have measurements in a unidirectional manner.
configure
set service twamp sender session 1 one-way-results
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
It is possible to configure the TWAMP Sender as well as Reflector with support to IPv6, basically the change
in the configuration are the addresses that instead of being IPv4 will be IPv6.
Below are the main commands available to check the TWAMP. If the user is at configuration level, it is necessary to use the
keyword run before the command.
TWAMP can act as a network monitor and generate path quality information between one or more routers. In conjunction
with the features Watch and Macro, it is possible to create an application to act as IP SLA on the network.
Given the scenario in the figure above, imagine that the network administrator wants to monitor the latency of network
packets between R1 and R2, and network between R1 and R3. For this, two TWAMP sessions between R1 and R2 and
Router 1 Configuration:
In R2 and R3 just enable the reflector that will process to reflect packets back to R1:
Given the previous scenario where R1 with IP 33.33.33.31 can reach R4 with IP 33.33.33.34 by two paths, one going through
R2 and the other going through R3. If R1 is running TWAMP by monitoring paths R1, R2, and R1, R3, Watch can force IP
33.33.33.31 traffic to pass through the best path according to TWAMP data results and metrics.
To simplify Watch rules its possible configure TWAMP session comparator on R1:
The comparator fetches the results of the TWAMP 1 and 2 session and returns the (Best session):
With TWAMP configured and working in conjunction with the session comparator, the commands to configure Watch are:
Every 10 seconds the equipment will execute show twamp sender comparator 1 and look for Best session: 2 or Best
session: 1 taking an action accordingly.
The action to force R1 traffic to go through the best way from the data and metrics of TWAMP results will change the
destination route metric for R1 to reach R2 using Macros.
4.4 tcpdump
The tcpdump is a packet capture resource that allows the network administrators to capture received and/or sent packets
by the equipment and analyze them locally or save them and export them for analysis using a tool such as the Wireshark.
To activate and capture packets, use the debug tcpdump command in the user mode.
The capture generated will be saved in the capture. pcap file and to export it to a TFTP server the user should use the
following command:
4.5 Dump
The dump command is a diagnostic tool that generates an encrypted file requested by DATACOM support when the user
opens a ticket.
The user should use the dump command in the user mode.
dm2500:~$ dump
The command will generate a binary file with the date and time of the day, and the user can export it to a TFTP server.
The show tech-support command is a diagnostic tool that provides several important information to debug problems that
occur in equipment operation.
The user should use the show tech-support command in the user mode.
The following show commands are automatically executed through the show tech-support command.
show firmware
show inventory
show environment
show psu
show config tree
show log dhcp
The monitor bandwidth-test feature is a diagnostic tool which allow throughput test between client and server using
Iperf3 application. The DM2500 supports client and server modes using IPv4 and IPv6 addresses.
5 Connectivity Tools
The DM2500 offers some tools to check the network connectivity as well as to access equipment as from DM2500 itself.
The user should use the keyword run before the command if it is in the config mode.
The ping command is a common method to check the connectivity of the equipment with the other equipment or to test a
specific protocol.
ping 5.178.41.1
PING 5.178.41.1 (5.178.41.1) 56(84) bytes of data.
64 bytes from 5.178.41.1: icmp_seq=1 ttl=61 time=2.15 ms
64 bytes from 5.178.41.1: icmp_seq=2 ttl=61 time=2.06 ms
64 bytes from 5.178.41.1: icmp_seq=3 ttl=61 time=2.12 ms
64 bytes from 5.178.41.1: icmp_seq=4 ttl=61 time=2.27 ms
64 bytes from 5.178.41.1: icmp_seq=5 ttl=61 time=2.07 ms
--- 5.178.41.1 ping statistics ---
5 packets transmitted, 5 received, 0% packet loss, time 4005ms
rtt min/avg/max/mdev = 2.065/2.139/2.272/0.074 ms
ping6 2002:c0a8:fe05::6
PING 2002:c0a8:fe05::6(2002:c0a8:fe05::6) 56 data bytes
64 bytes from 2002:c0a8:fe05::6: icmp_seq=1 ttl=62 time=7.94 ms
64 bytes from 2002:c0a8:fe05::6: icmp_seq=2 ttl=62 time=4.66 ms
64 bytes from 2002:c0a8:fe05::6: icmp_seq=3 ttl=62 time=5.05 ms
64 bytes from 2002:c0a8:fe05::6: icmp_seq=4 ttl=62 time=5.00 ms
64 bytes from 2002:c0a8:fe05::6: icmp_seq=5 ttl=62 time=6.84 ms
--- 2002:c0a8:fe05::6 ping statistics ---
5 packets transmitted, 5 received, 0% packet loss, time 4005ms
rtt min/avg/max/mdev = 4.664/5.903/7.948/1.274 ms
The traceroute command is a method to execute the network diagnosis informing the hop-by-hop connectivity through
which the pack is passing until the final destination.
traceroute 5.178.41.1
traceroute to 5.178.41.1 (5.178.41.1), 30 hops max, 38 byte packets
1 192.168.48.3 (192.168.48.3) 2.029 ms 4.345 ms 1.751 ms
2 192.168.48.1 (192.168.48.1) 2.842 ms 2.488 ms 3.226 ms
3 192.168.254.22 (192.168.254.22) 3.582 ms 3.403 ms 3.622 ms
4 192.168.84.22 (192.168.84.22) 2.306 ms 1.802 ms 2.264 ms
5 5.178.41.1 (5.178.41.1) 2.219 ms 1.651 ms 54.376 ms
traceroute6 2002:c0a8:fe05::6
traceroute to 2002:c0a8:fe05::6 (2002:c0a8:fe05::6) from 1997::c0a8:3002,
30 hops max, 16 byte packets
1 1997::c0a8:3001 (1997::c0a8:3001) 13.877 ms 2.298 ms 2.249 ms
2 2001::c0a8:3001 (2001::c0a8:3001) 3.64 ms 2.969 ms 2.869 ms
3 2002:c0a8:fe05::6 (2002:c0a8:fe05::6) 4.444 ms 3.624 ms 5.787 ms
It is possible to access other equipment using SSH and TELNET protocols as from an equipment with DM2500.
To access an equipment with IPv4 192.168.1.254 address through the SSH, the user should use the command below,
specifying the user to be authenticated, in this example, the admin user:
To access an equipment with IPv4 192.168.1.254 address through the TELNET the user should use the command
mentioned below:
telnet 192.168.1.254
6 Users Authentication
Only one user account is configured by default in the DM2500. The user is the admin with the admin password and has the
admin privilege level.
For security reasons, it is highly recommended change the admin user default password of the equipment.
To change the admin user default password, follow the steps below:
configure
set system login user admin authentication plaintext-password new-password
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
The next steps will indicate how to configure a new user called “joao” with “joao1234” password and “admin” adminis-
trator privileges.
configure
set system login user joao authentication plaintext-password joao1234
set system login user joao level ’admin’
commit
The next steps will show how to delete the user “joao”.
configure
delete system login user joao
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the equipment users. If the user is at the config level, use the keyword
run before the command is required.
The TACACS+ (Terminal Access Controller Access-Control System) is a protocol based on the AAA (Authentication, Autho-
rization Accounting) template that provides the authentication, authorization and accounting services in a safe manner
with encryption of the entire packet. This encryption depends on a secret key shared in each device. The authentication
methods supported are PAP (Password Authentication Protocol), CHAP (Challenge Handshake Authentication Protocol)
and ASCII (American Standard Code for Information Interchange).
TACACS+
To configure the TACACS+, the user should specify the address of the server and the secret key to be used to authenticate
the users. It is recommended to write the secret key between simple quotation marks to allow usage of special characters.
Suppose the user wants to set up ascii authentication, authorization, and accounting with two TACACS+ servers, one IPv4
and one IPv6. The IPv4 server has the address 10.1.100.7 and the IPv6 server has the address 2019:1234::1, both with the
secret key pass1234.
The TACACS+ IPv4 server will have authentication priority over the TACACS+ IPv6 server if both are
configured.
config
configure
set system login tacplus-server host 10.1.100.7 secret ’pass1234’
set system login tacplus-server host 2019:1234::1 secret ’pass1234’
set system login tacplus-server authentication-type ’ascii’
set system login tacplus-server authorization
set system login tacplus-server accounting
commit
After performing this configuration, authentication will take place on the basis of TACACS+. If authentication on the
TACACS+ server fails, authentication will occur on the local base.
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the equipment users. If the user is at the config level, use the keyword
run before the command is required.
show tacacs
show tacacs debug
The RADIUS (Remote Authentication Dial In User Service) is a protocol that protects the networks against unauthorized
access and is based on the AAA template that provides the authentication, authorization and accounting services. The
RADIUS client, in this case the DM2500, sends authentication requests to a central RADIUS server that contains all the
authentication information of the user and of access to the network service.
RADIUS
To configure the RADIUS, the user should specify the address of the server and the secret key to be used to authenticate
the users. It is recommended to write the secret key between simple quotation marks to allow usage of special characters.
Let’s suppose that the user would like to configure the authentication, authorization and accounting of two RADIUS servers
that have 192.168.1.1 and 172.22.107.4 IPv4 addresses, both with the secret key pass1234. The procedure below shows how
to execute this configuration:
configure
set system login radius-server host 192.168.1.1 port ’1812’
set system login radius-server host 192.168.1.1 secret ’pass1234’
set system login radius-server host 192.168.1.1 timeout ’2’
set system login radius-server host 172.22.107.4 port ’1812’
set system login radius-server host 172.22.107.4 secret ’pass1234’
set system login radius-server host 172.22.107.4 timeout ’2’
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the equipment users. If the user is at the config level, use the keyword
run before the command is required.
show radius
show log radius
7 Interfaces
This chapter shall indicate how to configure the interfaces available in the equipment.
When defining more than one IPv4/IPv6 address in the interface, it is recommended to use the address-
secondary parameter. Otherwise, the primary address (address that was defined with the address parameter)
will be overwritten.
By default, all the Ethernet interfaces are deactivated, except the eth1 interface, that has the management
IP in the standard configuration.
To activate administratively an Ethernet interface, the user should use the procedure below.
configure
delete interfaces ethernet eth2 disable
commit
To deactivate administratively an Ethernet interface, the user should use the procedure below.
configure
set interfaces ethernet eth2 disable
commit
Interfaces that are not configured remain deactivated and do not appear in the show configuration. It is possible to remove
the entire configuration of an Ethernet interface through the following procedure:
configure
delete interfaces ethernet eth2
commit
In DM2500 all ethernet interfaces have auto-negotiation mode enabled by default. In this mode, the interface speed and
duplex negotiation occurs automatically, taking into account the remote link.
It is possible to change the configuration of the interface to work in forced mode. The procedure below shows how to
configure an interface to work in forced mode at a speed of 100 Mbps full-duplex.
Both sides of the link (local and remote) must be configured in the same way.
configure
set interfaces ethernet eth7 speed 100
set interfaces ethernet eth7 duplex full
commit
Following the example above, if the interface uses an optical link, the parameter 100fx.
configure
set interfaces ethernet eth7 speed 100fx
set interfaces ethernet eth7 duplex full
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the Ethernet interfaces. If the user is at configuration level, it is necessary
to use the keyword run before the command
A loopback interface is a virtual interface only for software that emulates a physical interface and allows the router to
“connect” to itself. The routed packets for the loopback interface are routed again to the router and processed locally. The
packets routed by the loopback interface, but not assigned to the loopback interface, are discarded.
Let’s suppose that the user would like to create two loopback interfaces, the lo1 and the lo2 with IPv4 and IPv6 addresses.
The procedure below indicates how to execute this configuration.
configure
set interfaces loopback lo1 address 192.168.255.105/32
set interfaces loopback lo1 address-secondary 192.168.254.105/32
set interfaces loopback lo2 address 177.66.5.1/24
set interfaces loopback lo2 address 2400:c0ca:beef::1/64
commit
To continue a configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the Ethernet interfaces. If the user is at configuration level, it is necessary
to use the keyword run before the command
show interfaces
show interfaces loopback
Bridge configuration allows connection of several network segments (in general LAN segments) at level of layer 2 (switching).
As the Bridge occurs in layer 2 and the IP addresses are relevant only in layer 3 (routing, the network layer),
the IP addresses are not allowed in the interfaces that are being connected.
The Ethernet interface and the VLANs interfaces can be added directly to a Bridge
Let’s suppose that the user would like to create a bridge br1 with IPv4 and IPv6 addresses to connect the Ethernet eth2,
eth3 and eth4 interfaces. The procedure below shows how to execute this configuration.
configure
set interfaces bridge br1 address 192.168.10.2/24
set interfaces bridge br1 address 2018:c0ca:cafe::2/64
set interfaces ethernet eth2 bridge-group bridge br1
set interfaces ethernet eth3 bridge-group bridge br1
set interfaces ethernet eth4 bridge-group bridge br1
commit
Below are the main commands available to check the Ethernet interfaces. If the user is at configuration level, it is necessary
to use the keyword run before the command.
show bridge
IEEE 802.3ad Link Aggregation allows to create a logical interface containing one or more physical interfaces. Aggregating
multiple links or physical interfaces creates a single point-to-point logical link (LAG). LAG makes it possible to split flows
between physical interfaces, effectively increasing bandwidth. Another advantage of link aggregation is the increased
availability of the communication link between the two devices, if one of the physical interfaces fails, the LAG will continue
to carry traffic through the remaining interfaces.
As interfaces Bonding do DM2500 suportam três modos de balanceamento do tráfego de saída, chamados de Hash Policy:
The DM2500 Bonding interfaces support three outgoing traffic balancing modes, called Hash Policy:
The next steps will demonstrate how to configure bonding interface in static mode using two (2) Ethernet interfaces,
totaling a possible bandwidth of 2Gbps.
configure
set interfaces bonding bond8 address ’192.168.53.1/24’
set interfaces bonding bond8 description ’INTF-BONDING’
set interfaces bonding bond8 hash-policy ’layer2’
! Setting static mode
set interfaces bonding bond8 mode ’xor-hash’
set interfaces ethernet eth7 bond-group ’bond8’
set interfaces ethernet eth8 bond-group ’bond8’
commit
Link Aggregation Control Protocol (LACP) is a protocol used to ensure end-to-end aggregate interface (LAG) connectivity. It
detects and protects the network against a variety of misconfigurations, ensuring that links are only aggregated into one
bundle if they are configured and wired consistently. LACP can be configured in two ways:
• Active Mode Ativo (Active): The device immediately sends LACP messages (LACP PDUs) when the interface is
activated.
• Passive Mode (Passive): Puts an interface into a passive negotiation state, where the interface waits for remote
PDUs to send to initiate Link Aggregation negotiation and establishment.
If at least one endpoint is set to active, the LAG can be formed assuming a successful negotiation of the other parameters.
The next steps will demonstrate how configure bonding interface in dynamic mode using two (2) Ethernet interfaces,
totaling a possible bandwidth of 2Gbps.
configure
set interfaces bonding bond8 address ’192.168.53.1/24’
set interfaces bonding bond8 description ’INTF-BONDING’
set interfaces bonding bond8 hash-policy ’layer2’
set interfaces bonding bond8 lacp-rate ’slow’
! Setting dinamic mode
set interfaces bonding bond8 mode ’802.3ad’
set interfaces ethernet eth7 bond-group ’bond8’
set interfaces ethernet eth8 bond-group ’bond8’
commit
Below are the main commands available to check the Ethernet interfaces. If the user is at configuration level, it is necessary
to use the keyword run before the command.
8 Connection Services
Some internet access providers require the use of PPPoE (Point-to-Point Protocol over Ethernet) for connection to Internet.
They can also use the DHCP (Dynamic Host Configuration Protocol) protocol to execute the dynamic assignment of IP
addresses, DNS, gateway, among others. This chapter shall indicate how to configure these services in the DM2500.
The DM2500 offers the DHCPv4 server functionality. Through this resource the equipment can distribute in a dynamic
manner IPv4 addresses to other elements connected in the same sub-network.
Considering that the user would like to configure a DHCPv4 server in the 10.10.10.0/24 using the address range 10.10.10.5
through 10.10.20. Also it would like that a server identified by a specific MAC receives the 10.10.10.2 address and that the
validity of the IPs granted through the renewal process has a duration of 24 hours.
DNS server sent by DHCP server should be the same as you have in your network, in example below is used
the Google public DNS.
configure
set interfaces ethernet eth3 address ’10.10.10.1/24’
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 lease 86400
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 dns-server
8.8.8.8
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 default-router
10.10.10.1
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 start 10.10.10.5
stop 10.10.10.20
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 domain-name
dhcp-internal
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 static-mapping
SERVER-10-2 ip-address 10.10.10.2
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 static-mapping
SERVER-10-2 mac-address 00:04:df:cc:3a:04
commit
To continue a configuration after an eventual reboot, the user must use the save command after the commit command.
Below are the main commands available to check the DHCP Server. If the user is at configuration level, it is necessary to
The DM2500 support some DHCPv4 options predefined and configuration by code, allowing any DHCPv4 options to be
configured. For more information about codes and format accepted for each code, please see the RFC 2132.
The next steps will show some examples of how to execute these configurations:
configure
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 smtp-server
172.22.103.32
commit
configure
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 option 9 ipv4
172.22.103.32
commit
LPR Server (code 9) configuration with two IPv4 addresses (172.22.103.32 and 172.22.103.40):
configure
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 option 9
hex ac:16:67:20:ac:16:67:28
commit
configure
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 option 12
ascii DM2500-6GT
commit
The DM2500 offers the DHCPv6 server functionality. Through this resource the equipment can distribute in a dynamic
manner IPv6 addresses to other elements connected in the same sub-network.
The next steps will show how to configure the service to provide IPv6 addresses in the 2001:C0A8:5600::/64 network with
validity of the addresses for renewal of 24 hours and a host identified by the UID receiving de 2001:c0a8:5600::10 address.
configure
set interfaces ethernet eth3 address ’2001:C0A8:5600::1/64’
set service dhcpv6-server shared-network-name systemTest subnet 2001:C0A8:5600::/64 address-range
prefix ’2001:C0A8:5600::/64’
set service dhcpv6-server shared-network-name systemTest subnet 2001:C0A8:5600::/64 domain-search
’dhcp-internal’
set service dhcpv6-server shared-network-name systemTest subnet 2001:C0A8:5600::/64 lease-time
default ’86400’
set service dhcpv6-server shared-network-name systemTest subnet 2001:C0A8:5600::/64 name-server
’2001::2’
set service dhcpv6-server shared-network-name systemTest subnet 2001:C0A8:5600::/64 static-mapping
teste identifier ’00:01:00:01:5b:cd:f6:b7:00:aa:00:00:00:0a’
set service dhcpv6-server shared-network-name systemTest subnet 2001:C0A8:5600::/64 static-mapping
teste ipv6-address ’2001:c0a8:5600::10’
commit
To continue a configuration after an eventual reboot, the user must use the save command after the commit command.
Below are the main commands available to check the DHCP Server. If the user is at configuration level, it is necessary to
use the keyword run before the command.
The DM2500 offers the DHCPv4 Relay functionality to forward DHCP requests from a given network to a DHCP server
present in another network. Each interface involved in the DHCPv4 Relay should be configured. Thus, for example, if the
requests are incoming in the eth0 interface and the DHCPv4 server specified in the configuration is accessed through the
eth1 interface, the eth0 as well as the eth1 should be configured for the DHCP Relay.
Considering that the user would like to configure a DHCPv4 Relay to forward the DHCP requests from clients that are in the
10.10.10.0/24 network to the DHCPv4 server that is in another network with the 10.20.30.1/24 address. The next steps will
show how to execute these configurations.
configure
set interfaces ethernet eth0 address ’10.10.10.1/24’
set interfaces ethernet eth1 address ’10.100.100.1/30’
set service dhcp-relay interface ’eth1’
set service dhcp-relay interface ’eth0’
set service dhcp-relay server ’10.20.30.1’
set service dhcp-relay relay-options relay-agents-packets ’discard’
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the functionality. If the user is at configuration level, it is necessary to
use the keyword run before the command.
The DHCPv6 Relay receives the requests sent by DHCPv6 clients and forwards them to DHCPv6 servers. As the client
request packets and the retransmitted requests are transported in IPv6 multicast packets, the user must specify the
interfaces where the relay will receive the request and the interfaces in which it should retransmit these requests.
Considering that the user would like to configure a DHCPv6 Relay to forward the DHCP requests from clients that are in the
2605:ef80:240::1/64 network to a DHCPv6 server that is in another network with the 2600::c0a8:2d01 address.
The next steps will indicate how to execute these configurations.
configure
set interfaces ethernet eth0 address ’2605:ef80:240::1/64’
set interfaces ethernet eth1 ipv6 address eui64 ’2404:6800:4001::/64’
set service dhcpv6-relay listen-interface ’eth0’
set service dhcpv6-relay upstream-interface eth1 address ’2600::c0a8:2d01’
commit
As operation of DHCPv6 Relay is different from the DHCPv4 Relay, it is necessary configure the Router Advertisement in the
interface that is receiving the requests.
configure
set interfaces ethernet eth0 ipv6 router-advert managed-flag ’true’
set interfaces ethernet eth0 ipv6 router-advert other-config-flag ’true’
set interfaces ethernet eth0 ipv6 router-advert prefix 2605:ef80:240::/64 autonomous-flag ’true’
set interfaces ethernet eth0 ipv6 router-advert prefix 2605:ef80:240::/64 on-link-flag ’true’
set interfaces ethernet eth0 ipv6 router-advert send-advert ’true’
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the DHCP Server. If the user is at configuration level, it is necessary to
use the keyword run before the command.
It is possible to configure a DHCPv4 client linked to an Ethernet interface for the dynamic assignment of IPv4 address
according to determination of a DHCPv4 server.
Considering that the user would like to obtain the IPv4 address through the eth4 interface.
The next steps will indicate how to execute these configurations.
configure
set interfaces ethernet eth4 address dhcp
commit
To persist the configuration after an eventual reboot, the user must use the save command after the commit command.
Below are the main commands available to check the DHCP Client. If the user is at configuration level, it is necessary to use
the keyword run before the command
It is possible to configure a DHCPv6 client in an Ethernet interface for dynamic assignment of IPv6 according to determination
of a DHCPv6 server.
Considering that the user would like that the IPv6 address of the eth4 Ethernet interface be assigned in a dynamic manner
as from a DHCPv6 server connected to it.
The next steps will indicate how to execute these configurations.
configure
set interfaces ethernet eth4 address dhcpv6
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the DHCPv6. If the user is at configuration level, it is necessary to use the
keyword run before the command
show interfaces
The PPPoE (Point-to-Point Protocol over Ethernet) encapsulation for an Ethernet interface is defined in RFC2516. This type
of interface is used to connect itself to a point of the network with support to PPPoE. With the PPPoE encapsulation, the
local and remote IP addresses can be negotiated automatically instead of explicitly specified by the user. Per default, the
negotiation is carried out automatically if the addresses are not specified.
The PPPoE session can only be configured to operate with IPv4 addresses, and it is possible to configure up
to 15 PPPoE interfaces.
Considering that the user would like to establish a PPPoE session using the pppoe 15 interface which is associated with the
eth1 Ethernet interface. The next steps will indicate how to execute these configurations.
configure
set interfaces pppoe 15 user-id [email protected]
set interfaces pppoe 15 password d4t4c0m
set interface ethernet eth1 pppoe 15
commit
The TCP MSS (Maximum Segment Size) is 1460 bytes on interfaces with 1500 bytes MTU (Maximum Transmission Unit).
The PPPoE needs 8 of 1460 bytes to encapsulate the data, due this the TCP packets with 1460 bytes are fragmented or
discarded in router. One way to fix this issue is to adjust the MSS using the commands below:
configure
set interfaces ethernet eth1 policy route ’MSS’
set policy route MSS description ’TCP_MSS’
set policy route MSS rule 1 protocol ’tcp’
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the PPPoE Client. If the user is at configuration level, it is necessary to
use the keyword run before the command.
show interfaces
show interfaces pppoe
show interfaces pppoe <interface pppoe> log
9 Routing
Routing is the process of forwarding packets to their destination using network address. Routing is executed by devices
capable of exchanging the required information in order to create tables containing path information to reach the
destination, using dynamic routing protocols or inputs assigned manually.
The dynamic routing protocols, such as the OSPF, have the required information from the neighboring devices in order to
create their routing table, used to define the location where the traffic will be sent.
As alternatives to the dynamic methods, there are static routes. The static routes are viable in routers that have few
networks and fewer paths to destination.
The information received through the routing protocols are added in a table called RIB (Routing Information Base) which
is the base for calculation of the best path. The calculation of the route is the FIB (Forwarding Information Base) that
contains the information that the devices use to route the traffic.
The static routing has as objective to forward packets between different networks with manual configuration of routes by
the network administrators. By default, different VLANs do not communicate between themselves, as they are in exclusive
broadcast domains. In order to execute communication between two VLANs, it is necessary to use a router.
In order to communicate between two VLANs, a router or a form of routing must be used on the device itself. Routing
between VLANs enables this communication. The network associated with the L3 interface is inserted into the routing
table and can be accessed by other networks.
The scenario below will be used to show configuration of static routing between VLANs.
Considering that the user would like to allow routing between VLAN 100 and VLAN 200 in the eth1 Ethernet interface and
VLAN 2 in the eth2 interface to be used as default static route where the gateway has the IPv4 10.10.0.1/30 address.
The next steps will show how to execute these configurations.
configure
set interfaces ethernet eth1 vif 100 address 192.168.100.1/24
set interfaces ethernet eth1 vif 200 address 192.168.200.1/24
set interfaces ethernet eth2 vif 2 address 10.10.0.2/30
set system gateway-address 10.10.0.1
commit
ECMP is automatically enabled for static routes if it is enabled globally. There is no specific ECMP configuration for static
routes.
For more details on the ECMP load balancing modes, consult session Setting the ECMP.
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the routes. If the user is at configuration level, it is necessary to use the
keyword run before the command
show ip route
Policy-based routing PBR allows the user to use rules to classify the traffic based on its attributes and apply a processing
according to its classification and to route selectively the IP packets, for example for an alternative hop. All the packets
received in an interface are considered for policy based routing, as long as the interface is assigned to a routing policy.
When no routing policy is applied, the routing decisions are taken using the main routing table of the system. The PBR
policies can be applied to interfaces of the data plane for incoming traffic, but not to loopback, tunnel or bridge interfaces.
In the DM2500 the user cannot apply the PBR policies to packets locally generated.
The scenario below will be used to show configuration of the PBR.
Considering that the user would like to configure a PBR policy in VLANs 10 and 20 that are configured in the eth1 interface,
so that the traffic originated in 192.168.10.0/24 network can be forwarded by the next 192.168.100.1 hop which is reachable
through the eth2 interface, and also so that the traffic originated in the 192.168.20.0/24 network can be forwarded by the
next 192.168.200.1 hop which is reachable through the eth3 interface.
configure
set interface ethernet eth1 vif 10 address 192.168.10.1/24
set interface ethernet eth1 vif 20 address 192.168.20.1/24
set interface ethernet eth2 address 192.168.100.2/30
set interface ethernet eth3 address 192.168.200.2/30
set policy route PBR-LAN rule 10 destination address 0.0.0.0/0
set policy route PBR-LAN rule 10 source address 192.168.10.0/24
set policy route PBR-LAN rule 10 set table 10
set policy route PBR-LAN rule 20 destination address 0.0.0.0/0
set policy route PBR-LAN rule 20 source address 192.168.20.0/24
set policy route PBR-LAN rule 20 set table 20
set interfaces ethernet eth1 policy route PBR-LAN
set protocols static table 10 route 0.0.0.0/0 next-hop 192.168.100.1
set protocols static table 20 route 0.0.0.0/0 next-hop 192.168.200.1
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the PBR. If the user is at configuration level, it is necessary to use the
keyword run before the command
The RIP (Routing Information Protocol) is a dynamic routing protocol adequate for small size and homogeneous networks.
It is classified as an interior gateway protocol (IGP) and uses a distance vector algorithm. RIP defines the best path,
counting the hops until destination. The maximum number of hops is 15 (16 is considered an infinite distance), resulting in
RIP being not adequate for large size networks.
The scenario below will be used to show configuration of the RIP.
Considering that the user would like to configure a RIP session through the eth2 interface and through the IPv4 10.0.40.1/30
address and also wishes to advertise the 10.0.30.0/24 network which is connected by eth4.
The next steps will indicate how to execute these configurations.
configure
set interfaces ethernet eth2 address 10.0.40.1/30
set interfaces ethernet eth4 address 10.0.30.1/24
set protocols rip network 10.0.30.0/24
set protocols rip interface eth2
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the RIP. If the user is at configuration level, it is necessary to use the
keyword run before the command
show ip route
show ip rip status
show ip rip
debug rip
The RIPng (Routing Information Protocol next generation) is a dynamic routing protocol adequate for small size and
homogeneous IPV6 networks. It is classified as an interior gateway protocol (IGP) and uses a distance vector routing
algorithm. The RIPng defines the best path, counting hops until destination. The maximum number of hops is 15 (16 is
considered an infinite distance), resulting in RIPng not being adequate for large size networks. RIPng is an extension of the
RIP version 2 for IPv6.
The scenario below will be used to show configuration of the RIPng.
Considering that the user would like to configure a RIPng session through the eth2 interface and through the IPv6
2001:cafe:1::1/64 address and also wishes to advertise the 2001:cafe:4::/64 network which is connected by eth4.
The next steps will indicate how to execute these configurations.
configure
set interfaces ethernet eth2 address 2001:cafe:1::1/64
set interfaces ethernet eth4 address 2001:cafe:4::1/64
set protocols ripng network 2001:cafe:4::/64
set protocols ripng interface eth2
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the RIPng. If the user is at configuration level, it is necessary to use the
keyword run before the command
The OSPFv2 (Open Shortest Path First version 2) is the IGP (Internal Gateway Protocol) described by RFC 2328 (version 2)
for routing of IPv4 addresses. This protocol is used within a same AS (Autonomous System), justifying its denomination as
Internal. It is based on the Dijkstra algorithm that calculates the shortest path to each destination based on the costs of
each link.
The scenario below will be used to show configuration of the OSPFv2.
It is recommended to use the loopback interface instead of physical interfaces due to the stability, as these
are always actives.
Considering that the user would like to execute an OSPF session in the 8048 area with network-type of the point-topoint
configure
set interfaces loopback lo address 192.168.255.41/32
set interfaces ethernet eth1 vif 503 address 192.168.72.5/30
set interfaces ethernet eth1 vif 503 ip ospf network point-to-point
set interfaces ethernet eth3 address 192.168.64.1/22
set protocols ospf area 8048 network 192.168.255.41/32
set protocols ospf area 8048 network 192.168.72.4/30
set protocols ospf area 8048 network 192.168.64.0/22
set protocols ospf log-adjacency-changes detail
set protocols ospf parameters abr-type standard
set protocols ospf parameters router-id 192.168.255.41
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the OSPFv2. If the user is at configuration level, it is necessary to use the
keyword run before the command
show ip ospf
show ip ospf neighbors
debug ospf
For an OSPF scenario to work correctly, all areas of protocol must be connected directly to Area 0 (backbone) of OSPF.
However, there are situations where the router of other OSPF areas can not connect physically to some Area Border
Router (ABR) of Area 0. To solve this problem, a virtual link can be configured between these routers simulating a direct
connection.
The scenario below will be used to show Virtual Link configuration in OSPFv2.
Considering that the user would like to connect Area 20 to Area 0 through of Area 10. A Virtual Link will be configured
between the ABRs of Area 0 (DM25-1) and Area 20 (DM25-2).
DM25-1
configure
set interfaces ethernet eth1 address ’192.168.10.1/30’
set interfaces ethernet eth2 address ’192.168.0.1/28’
set interfaces loopback lo1 address ’1.1.1.1/32’
set protocols ospf area 0 network ’192.168.0.0/28’
set protocols ospf area 0 network ’1.1.1.1/32’
set protocols ospf area 0 area-type ’normal’
set protocols ospf area 10 network ’192.168.10.0/30’
set protocols ospf area 10 area-type ’normal’
set protocols ospf area 10 virtual-link ’2.2.2.2’
set protocols ospf log-adjacency-changes ’detail’
set protocols ospf parameters abr-type ’standard’
set protocols ospf parameters router-id ’1.1.1.1’
commit
DM25-2
configure
set interfaces ethernet eth1 address ’192.168.10.2/30’
set interfaces ethernet eth2 address ’192.168.20.1/24’
set interfaces loopback lo1 address ’2.2.2.2/32’
set protocols ospf area 10 network ’192.168.10.0/30’
set protocols ospf area 10 network ’2.2.2.2/32’
set protocols ospf area 10 area-type ’normal’
set protocols ospf area 20 network ’192.168.20.0/24’
set protocols ospf area 10 virtual-link ’1.1.1.1’
set protocols ospf log-adjacency-changes ’detail’
set protocols ospf parameters abr-type ’standard’
set protocols ospf parameters router-id ’2.2.2.2’
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the Virtual Link. If the user is at configuration level, it is necessary to use
the keyword run before the command
show ip ospf
show ip ospf neighbors
debug ospf
ECMP is automatically enabled in OSPFv2 if it is enabled globally. There is no specific ECMP configuration for OSPF.
For more details on the ECMP load balancing modes, consult session Setting the ECMP.
The LSA filtering extends the capacity of an ABR that is executing the OSPFv2 protocol to filter LSAs of type 3 between
different OSPF areas. This resource allows that only specified prefixes are sent from an area to another area and restricts
all the other prefixes. This type of filtering per area can be applied out of a specific area, in a specific area, or within and out
of OSPF areas at the same time.
The following cases show the user how to configure filtering of LSAs in different manners:
Considering that the user would like to filter LSAs of type 3 (Summary) which are advertised to other areas of intra-area
routes.
The following configuration with a short explanation shows how this type of filtering can be executed.
configure
set policy access-list 5 rule 1 action ’permit’
set policy access-list 5 rule 1 source inverse-mask ’0.0.255.255’
set policy access-list 5 rule 1 source network ’10.10.0.0’
set protocols ospf area 0 network ’192.168.254.0/30’
set protocols ospf area 5 network ’10.0.0.0/8’
set protocols ospf area 5 export-list 5
set protocols ospf parameters router-id ’192.168.255.55’
commit
In the example above, any intra-area route of area 5 and of the 10.10.0.0/16 range (for example, 10.10.1.0/24 and
10.10.2.128/30) will be advertised for other areas as a LSA Summary, of Type 3 but any others (for example, 10.11.0.0/16 or
10.128.30.16/30) no. This configuration is relevant only if the router is an ABR for the specified area.
Considering that the user would like to filter LSAs of type 3 (Summary) being advertised to within the specified area.
The following configuration with a short explanation shows how this type of filtering can be executed.
configure
set policy access-list 5 rule 1 action ’permit’
set policy access-list 5 rule 1 source inverse-mask ’0.0.255.255’
set policy access-list 5 rule 1 source network ’10.20.0.0’
set protocols ospf area 0 network ’192.168.254.0/30’
set protocols ospf area 5 network ’10.0.0.0/8’
set protocols ospf area 5 import-list 5
set protocols ospf parameters router-id ’192.168.255.55’
commit
In the example above, any route advertised within the area 5 and of the 10.20.0.0/16 range will be advertised in the area as
LSAs of type 3, but any other no. This configuration is relevant only if the router is an ABR for the specified area.
Filtering of LSAs of type 3 (Summary) can be also configured as in the previous examples, but using the prefix-lists and
specifying the direction of filtering (inbound or outbound). The following configuration shows how this type of filtering can
be executed.
configure
set policy prefix-list Deny-Route-192 rule 1 action ’deny’
set policy prefix-list Deny-Route-192 rule 1 le ’32’
set policy prefix-list Deny-Route-192 rule 1 prefix ’192.168.20.0/24’
set policy prefix-list Deny-Route-192 rule 2 action ’permit’
set policy prefix-list Deny-Route-192 rule 2 le ’32’
set policy prefix-list Deny-Route-192 rule 2 prefix ’0.0.0.0/0’
set protocols ospf area 0 network ’192.168.254.0/30’
set protocols ospf area 5 network ’10.0.0.0/8’
set protocols ospf area 5 filter-list out ’Deny-Route-192’
set protocols ospf parameters router-id ’192.168.255.55’
commit
The example above allows filtering of a route with prefix 192.168.20.0/24 which is being propagated in area 5, but which
currently is being passed over for all OSPF domains. For this reason, a filter-list is configured in the ABR with area 5 and
with the help of the prefix-list the user will be able to execute blocking of 192.168.20.0/24 prefix.
The OSPFv3 (Open Shortest Path First version 3) is the IGP (Internal Gateway Protocol) described by RFC 5340 for routing of
IPv6 addresses. As it is an IGP, it is a protocol used within a same AS (Autonomous System). It is based on the Dijkstra
algorithm, which calculates the shortest path to each destination based on the costs of each link.
The scenario below will be used to show configuration of the OSPFv3.
In the example below, a neighbor IPv6 of the point-to-point type in eth1.150 interface will be configured. The loopback of
the DM2500 will have the IPv6 2001:db8:ffff::1/128 address and also the IPv4 177.66.5.1/32 address. The IPv4 address of
the loopback will be used as router-id of the OSPFv3. The loopback lo1 interface will be configured as passive, as the
adjacencies through it shall not be formed. The eth2 interface will have the IPv6 2001:db8:100::1/64 address and shall not
form any OSPFv3 adjacency. Its network will be redistributed to the OSPFv3 through the redistribute connected command.
configure
set interfaces loopback lo1 address 2001:db8:ffff::1/128
set interfaces loopback lo1 address 177.66.5.1/32
set interfaces loopback lo1 ipv6 ospfv3 passive
set interfaces ethernet eth1 vif 150 address 2001:db8::1/64
set interfaces ethernet eth1 vif 150 ipv6 ospfv3 network point-to-point
set interfaces ethernet eth2 address 2001:db8:100::1/64
set protocols ospf parameters router-id 177.66.5.1
set protocols ospfv3 area 0 interface lo1
set protocols ospfv3 area 0 interface eth1.150
set protocols ospfv3 redistribute connected
commit
ECMP is automatically enabled in OSPFv3 if it is enabled globally. There is no specific ECMP configuration for OSPF.
For more details on the ECMP load balancing modes, consult session Setting the ECMP.
In the scenario below, the DM2500 has interfaces in two different OSPFv3 areas. Interface eth1 is in area 0 and interface
eth2 is in area 1. Considering both areas are normal areas, LSAs received in area 0 are advertised to area 1. In this scenario,
there is no LSA filtering. LSAs are advertised from one area to another area.
configure
set interfaces loopback lo1 address 2001:db8::1/128
set interfaces loopback lo1 address 177.66.0.1/32
set interfaces loopback lo1 ipv6 ospfv3 passive
set interfaces ethernet eth1 2001:db8:100::1/64
set interfaces ethernet eth1 ipv6 ospfv3 network point-to-point
set interfaces ethernet eth2 address 2001:db8:200::1/64
set interfaces ethernet eth2 ipv6 ospfv3 network point-to-point
set protocols ospfv3 parameters router-id 177.66.0.1
set protocols ospfv3 area 0 interface lo1
set protocols ospfv3 area 0 interface eth1
set protocols ospfv3 area 1 interface eth2
commit
In case it is no desired that all LSAs in area 0 are advertised to area 1, it is possible to configure import or export lists in the
areas.
The equipment must be a ABR (area border router) to be able to filter LSAs.
One way to filter LSAs is to configure an import-list in area 1. In the example below, an IPv6 access-list is configured
rejecting any networks within the prefix 2001:db8:ffff::/48. That ACL is applied as import-list in area 1, making that LSAs
containing those networks are not imported to the area.
LSA filtering
configure
set policy access-list6 reject-lsas rule 10 action ’deny’
set policy access-list6 reject-lsas rule 10 source network ’2001:db8:ffff::/48’
set policy access-list6 reject-lsas rule 100 action ’permit’
set policy access-list6 reject-lsas rule 100 source ’any’
set protocols ospfv3 area 1 import-list reject-lsas
commit
Another way to filter LSAs is to configure a export-list in area 0. LSAs received in area 0 will not be advertised to any other
areas.
configure
set protocols ospfv3 area 0 export-list reject-lsas
commit
To persist the configuration after a reboot, the user should use the save command in the configuration mode.
Below are the main commands available to check the OSPFv3. If the user is at configuration level, it is necessary to use the
keyword run before the command
BGP (Border Gateway Protocol) is used for routing information exchange between AS’s (Autonomous Systems) in the
Internet. When a session is established with a different AS, the session is called eBGP (external BGP). When the session is
established with the same AS, it is called iBGP (internal BGP).
The following topology will be used to show the BGP configuration with both neighbors in the same AS. In that case, it is a
iBGP (internal BGP) session. An iBGP session should be established between the loopback interfaces of both equipment.
An IGP like OSPF is needed for the equipment to have connectivity to each other’s loopback address.
• AS number: 27686
• Loopback 192.168.0.1/32
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
The following topology will be used to show the BGP configuration with neighbors in different AS’s. In that case, it is a eBGP
(external BGP) session. For eBGP sessions, usually it is used the physical interface addresses for neighbor establishment
and not the loopback addresses, as in iBGP configuration.
configure
set interfaces ethernet eth5 vif 377 address 192.168.84.1/30
set interfaces ethernet eth2 address 150.185.128.1/19
set protocols bgp 27686 neighbor 192.168.84.2 nexthop-self
set protocols bgp 27686 neighbor 192.168.84.2 soft-reconfiguration inbound
set protocols bgp 27686 neighbor 192.168.84.2 remote-as 232318
set protocols bgp 27686 neighbor 192.168.84.2 update-source 192.168.84.1
set protocols bgp 27686 redistribute connected
set protocols bgp 27686 parameters log-neighbor-changes
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
The following topology will be used to show the BGP configuration with neighbors in different AS’s. In that case, it is a
eBGP (external BGP) session.
In this example, the BGP session is established between the loopback interfaces. For the equipment be able to reach the
neighbor’s loopback interface, it is necessary to configure a static route.
Since the session establishment does not happen on directly connected interfaces, the ebgp-multihop parameter must be
set. In this example, ebgp-multihop is set to 2, meaning that the packets are passing through two routing domains to reach
the neighbor IP address.
• Loopback: 192.168.0.1/32
configure
set interfaces loopback address 192.168.0.1/32
set interfaces ethernet eth5 vif 377 address 192.168.84.1/30
set interfaces ethernet eth2 address 150.185.128.1/19
set protocols bgp 27686 neighbor 192.168.0.2 nexthop-self
set protocols bgp 27686 neighbor 192.168.0.2 soft-reconfiguration inbound
set protocols bgp 27686 neighbor 192.168.0.2 remote-as 232318
set protocols bgp 27686 neighbor 192.168.0.2 update-source 192.168.0.1
set protocols bgp 27686 neighbor 192.168.0.2 ebgp-multihop 2
set protocols bgp 27686 parameters log-neighbor-changes
set protocols static route 192.168.0.2/32 next-hop 192.168.84.2
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
The following topology will be used to show the BGP configuration with both neighbors in the same AS. In that case, it is a
iBGP (internal BGP) session. An iBGP session should be established between the loopback interfaces of both equipment.
An IGP like OSPFv3 is needed for the equipment to have connectivity to each other’s loopback address.
• AS number: 27686
• Loopback: 2001:db8::1/128
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the OSPFv2. If the user is at configuration level, it is necessary to use the
keyword run before the command.
The following topology will be used to show the BGP configuration with neighbors in different AS’s. In that case, it is a eBGP
(external BGP) session. For eBGP sessions, usually it is used the physical interface addresses for neighbor establishment
and not the loopback addresses, as in iBGP configuration.
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
The following topology will be used to show the BGP configuration with neighbors in different AS’s. In that case, it is a
eBGP (external BGP) session.
In this example, the BGP session is established between the loopback interfaces. For the equipment be able to reach the
neighbor’s loopback interface, it is necessary to configure a static route.
The ebgp-multihop parameter is used to allow a BGP session to be established between routers that are more than one
hop away from each other. The ebgp-multihop default value is 1. That means it is possible to establish a session only
between routers that are directly connected.
In this case, despite the routers being directly connected, DM2500 demands that the ebgp-multihop parameter be
configured with a value greater than 1 to allow the eBGP session established between loopbacks.
• Loopback: 2001:db8::1/128
configure
set interfaces loopback address 2001:db8::1/128
set interfaces ethernet eth2 address 2001:cafe::1/48
set interfaces ethernet eth5 vif 377 address 2001::1/64
set protocols bgp 27686 neighbor 2001:db8::2 address-family ipv6-unicast soft-reconfiguration ’inbound’
set protocols bgp 27686 neighbor 2001:db8::2 remote-as 232318
set protocols bgp 27686 neighbor 2001:db8::2 update-source 2001:db8::1
set protocols bgp 27686 neighbor 2001:db8::2 ebgp-multihop 2
set protocol static route6 2001:db8::2/128 next-hop 2001::2
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
The topology below will be used to show how to configure BGP communities.
Communities configuration
configure
set interfaces ethernet eth1 address 192.168.84.5/30
set interfaces ethernet eth2 address 192.168.84.1/30
set protocols bgp 27686 neighbor 192.168.84.6 nexthop-self
set protocols bgp 27686 neighbor 192.168.84.6 soft-reconfiguration inbound
set protocols bgp 27686 neighbor 192.168.84.6 remote-as 3549
set protocols bgp 27686 neighbor 192.168.84.6 update-source 192.168.84.5
set protocols bgp 27686 neighbor 192.168.84.2 nexthop-self
set protocols bgp 27686 neighbor 192.168.84.2 soft-reconfiguration inbound
set protocols bgp 27686 neighbor 192.168.84.2 remote-as 232318
set protocols bgp 27686 neighbor 192.168.84.2 update-source 192.168.84.1
commit
The received prefixes from ASN 3549 are readvertised to ASN 232318. Prefix 203.0.0.13/24 is marked with community
3549:1000 before being readvertised.
Two prefixes are received from ASN 232318. One of the prefixes, 198.51.100.0/24, it received with community 27686:501.
DM2500 is configured in a way that prefixes with that community are readvertised with 2 ASNs prepend.
ECMP can be enabled in BGP defining the maximum number of equal cost paths for the same destination that can be used.
In the configuration below, four maximum paths are defined for iBGP and eBGP. That means BGP can install up to fours
different routes for the same destination if they have the same cost.
configure
set protocols bgp 27686 maximum-paths ebgp 4
set protocols bgp 27686 maximum-paths ibgp 4
For more details on the ECMP load balancing modes, consult session Setting the ECMP.
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
The BFD (Bidirectional Forwarding Detection) is a protocol for link continuity failure detection between two equipment. It
can be enabled for static routes, BGP or OSPF protocols. It enables that the referred protocols converge quickly when a
failure occurs in the link path between the equipment.
For each link or path that is monitored by the BFD, a session is created.
• Minrx (Desired Minimum Receive Interval) It is the minimum interval in microseconds, between BFD control
packets received that the system needs at the current moment.
• Mintx (Required Minimum Transmit Interval) – It is the minimum interval in microseconds, between BFD control
packets transmitted that the system would like to use at the current moment.
• Multipler (Detection Multiplier) – The interval negotiated covering transmission of control packet, multiplied by
this variable, this will be the detection time for the BFD session.
These configurations are global per interface, this means, all the sessions created in a given interface will be
configured with the values input in this interface.
There is no support for the “Echo mode” and “Demand Mode” modes
The BFD can be configured in the static routes for all the interfaces, a specific interface or only for a static route.
It is only possible to enable the BFD in a static route if an interface with IP exists in the same network of the
IP configured as “next-hop” of the Static Route.
To activate the BFD in all the static routes and in all the interfaces, the user should execute the following procedure:
configure
set protocols static bfd all-interfaces
commit
To activate the BFD only in the static routes of a specific interface, the user should execute the following procedure:
configure
set protocols static bfd interface <interface>
commit
To activate the BFD only in one specific static route, the user should execute the following procedure:
configure
set protocols static route <network/mask> next-hop <next-hop-ip> bfd
commit
The scenario below will be used to show configuration of the BFD enabled in static routes.
Assuming the scenario above, the next steps will show how to configure the BFD in static routes:
configure
! Configuration DM25_1
set interfaces ethernet eth1 address 1.1.1.1/24
set interfaces ethernet eth2 address 10.10.10.1/24
set protocols static route 20.20.20.0/24 next-hop 1.1.1.2
set protocols static route 20.20.20.0/24 next-hop 1.1.1.2 bfd
! Configuration DM25_2
set interfaces ethernet eth1 address 1.1.1.2/24
set interfaces ethernet eth2 address 20.20.20.2/24
set protocols static route 10.10.10.0/24 next-hop 1.1.1.1
set protocols static route 10.10.10.0/24 next-hop 1.1.1.2 bfd
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
The BFD can be configured in the OSPFv2 for all the interfaces or for a specific interface. To activate the BFD in all the
interfaces participant of the OSPF, the user should execute the following configuration:
configure
set protocols ospf bfd all-interfaces
commit
To activate the BFD in only one interface participant of the OSPF, the user should execute the following configuration:
configure
set protocols ospf bfd interface <interface>
commit
The scenario below will be used to show configuration of the BFD with OSPF.
Below is an example of BFD configuration with OSPF based on the scenario mentioned above:
configure
! Configuration DM25_1
set interfaces ethernet eth1 address ’1.1.1.1/24’
set interfaces loopback lo address ’10.0.0.1/32’
set protocols ospf area 1 network ’10.0.0.1/32’
set protocols ospf area 1 network ’1.1.1.0/24’
set protocols ospf bfd interface eth1
! Configuration DM25_2
set interfaces ethernet eth1 address ’1.1.1.2/24’
set interfaces loopback lo address ’10.0.0.2/32’
set protocols ospf area 1 network ’10.0.0.2/32’
set protocols ospf area 1 network ’1.1.1.0/24’
set protocols ospf bfd interface eth1
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
The BFD can be configured in the OSPFv3 protocol for all interfaces or for a specific interface. To activate the BFD in all the
interfaces participant of the OSPFv3 protocol, the user should execute the following configuration:
configure
set protocols ospfv3 bfd all-interfaces
commit
To activate the BFD in only one interface participant of the OSPFv3, the user should execute the following configuration:
configure
set protocols ospfv3 bfd interface <interface>
commit
The scenario below will be used to show the BFD with OSPFv3 configuration.
Below is an example of BFD configuration with OSPFv3 based on the above scenario:
configure
! Configuration in DM25_1
set interfaces ethernet eth1 address ’2001:db8:ff::1/64’
set interfaces loopback lo1 address ’2001:db8::1/128’
set protocols ospfv3 area 0 interface eth1
set protocols ospfv3 area 0 interface lo1
set protocols ospfv3 bfd interface eth1
! Configuration in DM25_2
set interfaces ethernet eth1 address ’2001:db8:ff::2/64’
set interfaces loopback lo1 address ’2001:db8::2/128’
set protocols ospfv3 area 0 interface eth1
set protocols ospfv3 area 0 interface lo1
set protocols ospfv3 bfd interface eth1
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
The BFD can be configured by a neighbor BGP through the “fall-over” command according to the procedure described
below:
configure
set protocols bgp <bgp_id> neighbor <neighbor_ip> fall-over bfd
commit
The scenario below will be used to show configuration of the BFD enabled with BGP.
BGP in BFD
Below is an example of BFD configuration with BGP based on the scenario mentioned above:
configure
! Configuration DM25_1
set interfaces ethernet eth1 address 1.1.1.1/24
set interfaces loopback lo address 10.0.0.1/32
set protocols bgp 1 neighbor 1.1.1.2 remote-as 2
set protocols bgp 1 redistribute connected
set protocols bgp 1 neighbor 1.1.1.2 fall-over bfd
! Configuration DM25_2
set interfaces ethernet eth1 address 1.1.1.2/24
set interfaces loopback lo address 10.0.0.2/32
set protocols bgp 2 neighbor 1.1.1.1 remote-as 1
set protocols bgp 2 redistribute connected
set protocols bgp 2 neighbor 1.1.1.1 fall-over bfd
commit
It is possible to use BFD with BGP IPv4 and IPv6 neighbors as well.
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the BFD. If the user is at configuration level, it is necessary to use the
keyword run before the command
show bfd
show bfd session
show bfd session detail
The Virtual Router Redundancy Protocol (VRRP) works for Gateway redundancy in a network, with the objective of two or
more routers sharing the same virtual IP in active/backup mode (by default).
For other devices on the network, VRRP allows the gateway to be viewed as a single device.
VRRP is quite simple in its basic function: a Router is elected the Master and is responsible for routing network traffic to
devices that have Virtual IP as their gateway. The second router called Backup only monitors bus VRRP packets. When the
Master equipment ceases to function, the Backup equipment assumes its functions as Master.
On the DM2500, VRRP is supported on both physical interfaces and VLAN interfaces.
The router configured with a higher priority will be elected initially as Master. If all the routers have the
same priority, the router with the highest IP address will be elected as Master.
It is recommended to enable the preemption function that will allow that the router that was master prior
to the failure, upon returning from the failure, assumes again the master position.
The DM2500 has support for the VRRPv2 version with IPv4 addressing, described by the RFCs 2338 and 3768.
VRRPv2
Assuming the scenario according to the diagram above, we have the following example to configure the VRRP Master:
configure
set interfaces ethernet eth2 address ’192.168.253.105/24’
set interfaces ethernet eth2 vrrp vrrp-group 254 authentication password ’d4t4c0m’
set interfaces ethernet eth2 vrrp vrrp-group 254 authentication type ’ah’
set interfaces ethernet eth2 vrrp vrrp-group 254 preempt ’true’
set interfaces ethernet eth2 vrrp vrrp-group 254 priority ’200’
set interfaces ethernet eth2 vrrp vrrp-group 254 virtual-address ’192.168.253.41’
set interfaces ethernet eth4 vif 4056 address ’192.168.45.105/24’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 authentication password ’d4t4c0m’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 authentication type ’ah’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 preempt ’true’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 priority ’200’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 virtual-address ’192.168.45.1’
commit
Assuming the scenario according to the diagram above, we have the following example to configure the VRRP Backup:
configure
set interfaces ethernet eth2 address ’192.168.253.106/24’
set interfaces ethernet eth2 vrrp vrrp-group 254 version 2
set interfaces ethernet eth2 vrrp vrrp-group 254 authentication password ’d4t4c0m’
set interfaces ethernet eth2 vrrp vrrp-group 254 authentication type ’ah’
set interfaces ethernet eth2 vrrp vrrp-group 254 preempt ’true’
set interfaces ethernet eth2 vrrp vrrp-group 254 priority ’200’
set interfaces ethernet eth2 vrrp vrrp-group 254 virtual-address ’192.168.253.41’
set interfaces ethernet eth4 vif 4056 address ’192.168.45.106/24’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 version 2
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 authentication password ’d4t4c0m’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 authentication type ’ah’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 preempt ’true’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 priority ’200’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 virtual-address ’192.168.45.1’
commit
The next example is based on the previous example, including all the interfaces in a synchronization group so that, if one of
the interfaces in the Master fails in any of the VRRP groups, all the interfaces that control the Master become interfaces in a
backup router.
Master
configure
set interfaces ethernet eth2 vrrp vrrp-group 254 sync-group ’DATACOM_SYNC’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 sync-group ’DATACOM_SYNC’
commit
Backup
configure
set interfaces ethernet eth2 vrrp vrrp-group 254 sync-group ’DATACOM_SYNC’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 sync-group ’DATACOM_SYNC’
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the VRRP. If the user is at configuration level, it is necessary to use the
keyword run before the command.
show vrrp
show vrrp detail
show vrrp interfaces <interface>
show vrrp statistics
show vrrp sync-group
The VRRP protocol version 3 (v3) offers support to IPv4 and IPv6 addresses described by the RFCs 5798, while the VRRP
version 2 (v2) supports only IPv4 addresses.
VRRPv3
Configuration of VRRP version 3 protocol will be shown using as base the scenario above.
Master
configure
set interfaces ethernet eth2 address ’2018::2/64’
set interfaces ethernet eth2 vrrp vrrp-group 21 version ’3’
set interfaces ethernet eth2 vrrp vrrp-group 21 preempt ’true’
set interfaces ethernet eth2 vrrp vrrp-group 21 priority ’200’
set interfaces ethernet eth2 vrrp vrrp-group 21 virtual-address ’2018::1’
set interfaces ethernet eth2 vrrp vrrp-group 21 virtual-link-local ’auto-configuration’
set interfaces ethernet eth4 vif 2477 address ’2477::2/64’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 version ’3’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 preempt ’true’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 priority ’200’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 virtual-address ’2477::1’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 virtual-link-local ’auto-configuration’
commit
Backup
configure
set interfaces ethernet eth2 address ’2018::3/64’
set interfaces ethernet eth2 vrrp vrrp-group 21 version ’3’
set interfaces ethernet eth2 vrrp vrrp-group 21 preempt ’true’
set interfaces ethernet eth2 vrrp vrrp-group 21 priority ’100’
set interfaces ethernet eth2 vrrp vrrp-group 21 virtual-address ’2018::1’
set interfaces ethernet eth2 vrrp vrrp-group 21 virtual-link-local ’auto-configuration’
set interfaces ethernet eth4 vif 2477 address ’2477::3/64’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 version ’3’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 preempt ’true’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 priority ’100’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 virtual-address ’2477::1’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 virtual-link-local ’auto-configuration’
commit
The next example is based on the previous example, including all the interfaces in a synchronization group so that, if one of
the interfaces in the Master fails in any of the VRRP groups, all the interfaces that control the Master become interfaces in a
backup router.
Master
configure
set interfaces ethernet eth2 vrrp vrrp-group 21 sync-group ’DTC_SYNC’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 sync-group ’DTC_SYNC’
commit
Backup
configure
set interfaces ethernet eth2 vrrp vrrp-group 21 sync-group ’DTC_SYNC’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 sync-group ’DTC_SYNC’
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the VRRPv3. If the user is at configuration level, it is necessary to use the
keyword run before the command
show vrrp
show vrrp detail
show vrrp interface <interface>
show vrrp statistics
show vrrp sync-group
There are scenarios where the VRRP Master router is still active, but cannot forward packets because the outgoing interface
(such as the Internet for example) goes down. The DM2500 allows to configure the track for the VRRP process to monitor
any object, which may be the state of the interface (Up/Down) or to monitor the state of a route, thus reducing the VRRP
priority based on one condition.
The VRRP Track Interface monitors the interface state (Up/Down) and reduces the priority of the VRRP router if the interface
changes its state to down.
If the router is the IP address owner (the address configured in interface is the same as the virtual address),
the priority will be always 255 and it will not be decremented by tracking.
The scenario below will be used to demonstrate the configuration of the VRRP Track Interface.
The setting below will be used to demonstrate the reduction of the Master Router VRRP priority so that when the output
link configured with track interface drops, the Backup Router will become the Master.
Master
configure
set interfaces ethernet eth4 address ’192.168.253.1/24’
set interfaces ethernet eth4 vrrp vrrp-group 254 preempt ’true’
set interfaces ethernet eth4 vrrp vrrp-group 254 priority ’200’
set interfaces ethernet eth4 vrrp vrrp-group 254 virtual-address ’192.168.253.254’
! Setting the track-interface on failure will reduce the VRRP priority to 150
set interfaces ethernet eth4 vrrp vrrp-group 254 track-interface eth2 weight ’50’
commit
Backup
configure
set interfaces ethernet eth4 address ’192.168.253.2/24’
set interfaces ethernet eth4 vrrp vrrp-group 254 preempt ’true’
set interfaces ethernet eth4 vrrp vrrp-group 254 priority ’180’
set interfaces ethernet eth4 vrrp vrrp-group 254 virtual-address ’192.168.253.254’
commit
When the Master Router eth2 interface fails, the VRRP track will identify the fault and thus reduce the Master Router VRRP
priority, thus the Backup Router will become the Master.
VRRP Track Route monitors the state of any route and reduces the priority of the VRRP router if the route is no longer
reachable.
The scenario below will be used to demonstrate the VRRP Track Route configuration.
The setting below will be used to demonstrate reducing the Master Router VRRP priority so that when route 8.8.8.8 is not
reached, the Backup Router will become the Master.
Master
configure
set interfaces ethernet eth4 address ’192.168.253.1/24’
set interfaces ethernet eth4 vrrp vrrp-group 254 preempt ’true’
set interfaces ethernet eth4 vrrp vrrp-group 254 priority ’200’
set interfaces ethernet eth4 vrrp vrrp-group 254 virtual-address ’192.168.253.254’
! Setting the track-route on failure will reduce the VRRP priority to 150
set interfaces ethernet eth4 vrrp vrrp-group 254 track-route IPv4 target ’8.8.8.8’
set interfaces ethernet eth4 vrrp vrrp-group 254 track-route IPv4 weight ’50’
commit
Transition scripts can help you implement various adjustments, such as starting and stopping services, or even modifying
the DM2500 configuration in the VRRP transition. This setting will cause the VRRP process to call a script that will execute
as configured during VRRP transitions.
The actions that scripts can perform based on VRRP states are:
The configuration below will be used to demonstrate IPSec tunnel process stop after the VRRP state changes to backup and
IPSec tunnel process starts when VRRP change to master.
Master:
configure
set interfaces ethernet eth4 address ’192.168.253.1/24’
set interfaces ethernet eth4 vrrp vrrp-group 254 preempt ’true’
set interfaces ethernet eth4 vrrp vrrp-group 254 priority ’200’
set interfaces ethernet eth4 vrrp vrrp-group 254 virtual-address ’192.168.253.254’
! Configuring transition-scripts in case the state changes to backup will stop IPSec
set interfaces ethernet eth4 vrrp vrrp-group 254 run-transition-scripts
backup ’ipsec-stop’
! Configuring transition-scripts, in case the state changes to master will start IPSec
set interfaces ethernet eth4 vrrp vrrp-group 254 run-transition-scripts
master ’ipsec-start’
commit
PIM (Protocol Independent Multicast) is a family of protocols with objective to support forwarding of multicast packets.
These protocols use the routes learned to create a multicast flow path, no depending of any specific routing protocol.
There are some PIM family protocols, like: PIM SM (Sparse Mode), PIM SSM (Source-Specific Multicast), PIM DM (Dense
Mode) and Bidirectional PIM. These protocols basically differentiated in the path construction mode of multicast flow.
The scenario below will be used to shows the configuration of PIM SM with static RP, PIM SSM and OSPF.
PIM
The configuration of the PIM protocol will be demonstrated using the scenario above.
EQUIPMENT-A
configure
set protocols ospf log-adjacency-changes
set protocols ospf area 0 network 192.168.10.0/30
set protocols ospf area 0 network 192.168.50.0/24
set protocols ospf area 0 network 10.10.10.10/32
set protocols ospf parameters router-id 10.10.10.10
set protocols pim rp-address 20.20.20.20
set interfaces loopback lo1 address 10.10.10.10/32
set interfaces loopback lo1 ip pim enable
set interfaces ethernet eth1 address 192.168.10.1/30
set interfaces ethernet eth1 ip ospf network broadcast
set interfaces ethernet eth1 ip pim enable
set interfaces ethernet eth2 address 192.168.50.1/24
set interfaces ethernet eth2 ip pim enable
commit
EQUIPMENT-B
configure
set protocols ospf log-adjacency-changes
set protocols ospf area 0 network 192.168.10.0/30
set protocols ospf area 0 network 192.168.60.0/24
set protocols ospf area 0 network 20.20.20.20/32
set protocols ospf parameters router-id 20.20.20.20
set protocols pim rp-address 20.20.20.20
set interfaces loopback lo1 address 20.20.20.20/32
set interfaces loopback lo1 ip pim enable
set interfaces ethernet eth1 address 192.168.10.2/30
set interfaces ethernet eth1 ip ospf network broadcast
set interfaces ethernet eth1 ip pim enable
set interfaces ethernet eth2 address 192.168.60.1/24
set interfaces ethernet eth2 ip pim enable
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
configure
show pim
show pim route-cache
commit
IGMP version 3 is the default configuration of this equipment, but if necessary it is possible change the IGMP version using
the commands bellow.
IGMP version 3 supports PIM SM and PIM SSM and IGMP version 2 supports only PIM SM.
configure
set interfaces ethernet eth1 ip pim igmp v2
commit
configure
set interfaces ethernet eth1 ip pim igmp v3
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
VRF (Virtual Routing and Forwarding) is a feature that allows different routing instances in the same equipment.
Some features are not supported in VRFs. For more details on unsupported features, see the document
DM2500 Release Notes.
VRF lite is a basic version of VRF and does not support MPLS signaling.
The scenario below will be used to illustrate the configuration of the VRF lite.
There must not be communication between clients 1 and 2. Therefore, two VRFs will be configured to isolate the routing
tables and the traffic between them. The following specifications will be used:
VRF CLI1
VRF CLI2
configure
set vrf CLI1 interfaces ethernet eth1 vif 10 address 192.168.10.1/24
set vrf CLI1 interfaces ethernet eth2 vif 100 address 192.168.100.1/24
set vrf CLI2 interfaces ethernet eth5 vif 20 address 192.168.20.1/24
set vrf CLI2 interfaces ethernet eth6 vif 200 address 192.168.200.1/24
commit
The scenario below will be used to demonstrate the configuration of equipment management outside a VRF and a service
VRF with IP address overlapping.
There is no communication between the management network on the eth1 interface and the CLI1 data VRF on the eth6
interface. Both interfaces use the same IP address.
MANAGEMENT
VRF CLI1
configure
set interfaces ethernet eth1 address 192.168.0.1/24
set vrf CLI1 interfaces ethernet eth2 address 192.168.0.1/24
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
ECMP (Equal Cost Multi-Path) allows that flows or packets to the same destination can be transmitted across multiple
paths of equal cost.
In packet mode, load-balance does not take into account flows. Packets are load-balanced in a round-robin way between
the available next-hops.
configure
set system ip ecmp packets
commit
configure
set system ipv6 ecmp packets
commit
The flow load balancing can be realized in two ways: ports-unaware and ports-aware.
In ports-unaware mode, TCP/UDP ports are not taked into account when identifying the flow.
configure
set system ip ecmp ports-unaware
commit
configure
set system ipv6 ecmp ports-unaware
commit
In ports-aware mode, TCP/UDP ports are taken into account in the flow identification.
configure
set system ip ecmp ports-aware
commit
configure
set system ipv6 ecmp ports-aware
commit
configure
set system ip ecmp disabled
commit
configure
set system ipv6 ecmp disabled
commit
ECMP confirmation can also be performed in VRFs. The previously shown configuration commands can be
executed in the VRF context, as in set vrf <vrf-name> system ip ecmp ... or set vrf <vrf-name> system
ipv6 ecmp ...
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Consult the specific protocol sessions to check on how to enable ECMP on it.
10 QoS
QoS (Quality of Service) is a set of mechanisms and algorithms used to classify and prioritize traffic. The main objective is
to assure that services that require transmission quality in the network (latency, jitter and bandwidth), for example, voice
over IP (VoIP) and multicast, operate as expected.
The Rate limit is the functionality that limits the maximum rate of traffic that an interface or VLAN can sent (out) or received
(in).
The scenario below will be used to show configuration of the Rate Limit.
The next steps will show how to configure the access to Internet with traffic limited at the input and at the output through
the DM2500 band control mechanisms with asymmetric characteristic from the point of view of user. Considering that the
user would like to obtain the download rate of 50 Mbps and upload of 10 Mbps, using the eth1 interface for the access and
the o uplink in the eth2 Internet with the VLAN 300.
configure
set traffic-policy rate-control WAN_OUT bandwidth 10mbit
set interfaces ethernet eth2 vif 300 traffic-policy out WAN_OUT
set traffic-policy limiter WAN_IN default bandwidth 50mbit
set interfaces ethernet eth2 vif 300 traffic-policy in WAN_IN
commit
A limiter by default does not take into account L2 overhead in traffic limiting. To consider L2 overhead in traffic limiting for
single tagged packets, configure as shown below.
configure
set traffic-policy limiter WAN_IN default bandwidth 50mbit
set traffic-policy limiter WAN_IN default account-layer2-overhead single-tagged
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
The classification and prioritization of outgoing traffic are useful to assure that given types of traffic are prioritized to the
detriment of others in situations in which a traffic jam occurs in the outgoing traffic. The scenario below will be used to
show configuration of these mechanisms.
The following configuration classifies packets in four categories, as described below. The packets are routed to eth2 uplink
interface, which is a 10Mbps Internet link.
• Class 2 to control packets and VoIP signaling (SIP). IPv4 packets coming from the eth3 interface with DSCP 26 will
have a reserve of 10% of the bandwidth.
• Class 3 to VoIP media packets (RTP). IPv4 packets coming from the eth3 interface with DSCP 46 will have a reserve of
35% of the bandwidth and maximum of 35% of the bandwidth.
• Class 4 to streaming data. Packets coming from the eth1 interface through the IPv4 10.0.0.25 will have a reserve of
30% of the bandwidth.
• Class default to internet data and other types of traffic. Exceeding packets will be remarked with DSCP 0 (default).
configure
set traffic-policy shaper WAN_SHAPER bandwidth 10mbit
set traffic-policy shaper WAN_SHAPER class 2 description ‘SIP Traffic’
set traffic-policy shaper WAN_SHAPER class 2 match SIP ip dscp 26
set traffic-policy shaper WAN_SHAPER class 2 bandwidth 10%
set traffic-policy shaper WAN_SHAPER class 2 ceiling 100%
set traffic-policy shaper WAN_SHAPER class 2 priority 0
set traffic-policy shaper WAN_SHAPER class 2 queue-type drop-tail
set traffic-policy shaper WAN_SHAPER class 3 description ‘RTP Traffic’
set traffic-policy shaper WAN_SHAPER class 3 match RTP ip dscp 46
set traffic-policy shaper WAN_SHAPER class 3 bandwidth 35%
set traffic-policy shaper WAN_SHAPER class 3 ceiling 35%
set traffic-policy shaper WAN_SHAPER class 3 priority 1
set traffic-policy shaper WAN_SHAPER class 3 queue-type drop-tail
set traffic-policy shaper WAN_SHAPER class 4 description ‘Streaming’
set traffic-policy shaper WAN_SHAPER class 4 match IP25 ip source address 10.0.0.25/27
set traffic-policy shaper WAN_SHAPER class 4 bandwidth 30%
set traffic-policy shaper WAN_SHAPER class 4 ceiling 100%
set traffic-policy shaper WAN_SHAPER class 4 priority 2
set traffic-policy shaper WAN_SHAPER class 4 queue-type fair-queue
set traffic-policy shaper WAN_SHAPER default description ‘Internet’
10.2.2 Remarking
It is also possible to remark the DSCP values of the output packet. In the example below, class 3 packets have DSCP
remarked.
set traffic-policy shaper WAN_SHAPER class 3 set-dscp EF
To classify and remark packets generated by the DM2500 itself, it is needed to configure a policy to mark the packet with a
tag. In the shaper, a match in that tag is made so the locally generated packet can be classified and remarked. Locally
generated packets include ICMP, ARP, protocol control packets and others.
In the configuration below, packets generated by the DM2500 are marked with tag 5 through the policy local-route. In the
shaper, it is performed a match in mark 5 and the packet DSCP is remarked with value 48 (CS6).
To do not check other policy route rules after a rule has been matched, it is necessary use the mode stop.
It is possible to classify packets by an address range or port range. Before classification, the packets in the specified ranges
must be marked by a policer in the ingress interface. After that, a shaper can classify the packets in the egress interface.
In to previously presented topology, packets with source address between 10.0.0.1 and 10.0.0.5, and ports between 1000
and 1400 are marked with tag 1 by a policer and then, are classified by a shaper.
To do not check other policy route rules after a rule has been matched, it is necessary use the mode stop.
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below is the main command available to check the shaper applied in the interfaces. If the user is at configuration level, it is
necessary to use the keyword run before the command.
show queueing
show queueing ethernet <interface>
The DSCP markdown of the packets allows the equipment to define a new DSCP priority value based on criteria such as IP
address, transportation protocol (UDP/TCP) or MAC address. This resource can be used to assure that the packet receives
the adequate handling by other network elements after being forwarded by the router.
Considering that the user would like to mark the DSCP 18 (AF21) of the Telnet, SSH and Syslog type packets that ingress in
the eth1 interface through VLAN 200. The procedure below shows how to execute this configuration:
To do not check other policy route rules after a rule has been matched, it is necessary use the mode stop.
configure
set policy route DSCP-REMARK rule 1 set dscp 18
set policy route DSCP-REMARK rule 1 destination port syslog
set policy route DSCP-REMARK rule 1 protocol udp
set policy route DSCP-REMARK rule 1 set mode stop
set policy route DSCP-REMARK rule 2 set dscp 18
set policy route DSCP-REMARK rule 2 destination port telnet
set policy route DSCP-REMARK rule 2 protocol tcp
set policy route DSCP-REMARK rule 2 set mode stop
set policy route DSCP-REMARK rule 3 set dscp 18
set policy route DSCP-REMARK rule 3 destination port ssh
set policy route DSCP-REMARK rule 3 protocol tcp_udp
set policy route DSCP-REMARK rule 3 set mode stop
set interfaces ethernet eth1 vif 200 policy route DSCP-REMARK
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the DSCP markdown. If the user is at configuration level, it is necessary
to use the keyword run before the command.
11 Security
Maintain the security in the network consists in adopting access policies, monitoring of resources and protection of the
equipment in order to avoid attacks.
This chapter describes how to configure some security functionalities and resources available in the DM2500.
The SSH (Secure Shell) and TELNET are protocols used for access to the equipment terminal. Both are enabled in the
equipment factory configuration. It is recommended to deactivate the TELNET if it is not used, as it is a protocol less safe as
related to the SSH.
The next steps will show how to deactivate the TELNET protocol.
configure
delete service telnet
commit
If deemed necessary, it is possible to change the ports and enabled addresses to access the services. Considering that the
user would like to change the TELNET port from the 23 to port 2323 and accepting connections only from the IPs 10.10.10.5
and 10.10.10.6 addresses. And, for the SSH the port will be changed from the 22 to port 2222 and will accept only the
packets from 10.10.10.5 address.
configure
set service telnet port 2323
set service telnet listen-address 10.10.10.5
set service telnet listen-address 10.10.10.6
set service ssh port 2222
set service ssh listen-address 10.10.10.5
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
The NAT (Network Address Translation) has as objective the translation of the internal addresses of a local network for a
public network. In addition of providing security upon hiding details of the stations and devices connected to the internal
network, it also has as objective to mitigate the exhaustion of public IPv4 addresses through reuse of internal addresses.
The SNAT (Source NAT) is the most common form to use the NAT. This functionality changes the source IP address (and
optionally also the TCP/UDP port) of a packet that is routed in the DM2500. The change of IP address occurs after the
decision about the packet routing that has already been executed.
Considering that the user would like to change the address of a packet of the 10.0.0.0/8 network to a public address
90.80.70.60 and which destination is the eth2 interface.
configure
set nat source rule 10 source address 10.10.0.0/8
set nat source rule 10 translation address 90.80.70.60
set nat source rule 10 outbound-interface eth2
commit
It is possible to use the Symmetric NAT feature that changes the origin TCP/UDP port to a random one. To utilize the
Symmetric NAT feature, use the "translation port" command ass shown below:
configure
set nat source rule 10 source address 10.10.0.0/8
set nat source rule 10 translation address 90.80.70.60
set nat source rule 10 outbound-interface eth2
set nat source rule 10 translation port ’random’
commit
In an alternative manner, if the public network address is defined dynamically it is possible to use the masquerade
parameter for the translation address. Thus, the NAT will use the eth2 interface address as source address:
configure
set nat source rule 10 source address 10.10.0.0/8
set nat source rule 10 translation address masquerade
set nat source rule 10 outbound-interface eth2
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
The DNAT (Destination NAT), also known as Port Forwarding is a translation mechanism of IP addresses and destination
ports, which has as objective to redirect packets with destination of the public network of an address and port specific for
an internal network. The change of destination address occurs before it is routed internally by the equipment.
Considering that the user wishes to change the address and destination port of TCP or UDP packets of public network with
90.80.70.60 address and port 80 to the 10.10.10.3 internal address and port 8080 and which source is the eth2 interface.
configure
set nat destination rule 10 destination address 90.80.70.60
set nat destination rule 10 destination port 80
set nat destination rule 10 protocol tcp_udp
set nat destination rule 10 translation address 10.10.0.3
set nat destination rule 10 translation port 8080
set nat destination rule 10 inbound-interface eth2
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
This chapter shows the ACL Firewall and stateful Firewall configuration.
The ACL (Access Control List) Firewall is stateless, in other words, do not consider the TCP state or ICMP and UDP sessions.
ACL Firewall support IPv4 and IPv6 address, also is supported in VRF.
The example of ACL Firewall configuration have a LAN (Local Area Network) or Inside interface and WAN (Wide Area
Network) or Outside interface.
ACL Firewall
Each interface can have only one rule set in each direction for IPv4 or IPv6 packets.
To deny LAN and WAN services should use the in to filter input packets in interface and out to filter output packets in
interface.
Example to deny SMTP and SMTPs services from WAN by any IPv4 or IPv6 address, other services are allowed:
configure
set firewall name BLOCK_IPV4_SERVICES default-action accept
set firewall name BLOCK_IPV4_SERVICES rule 1 action drop
set firewall name BLOCK_IPV4_SERVICES rule 1 destination port smtp
set firewall name BLOCK_IPV4_SERVICES rule 1 protocol tcp
set firewall name BLOCK_IPV4_SERVICES rule 2 action drop
set firewall name BLOCK_IPV4_SERVICES rule 2 destination port smtps
set firewall name BLOCK_IPV4_SERVICES rule 2 protocol tcp
set firewall ipv6-name BLOCK_IPV6_SERVICES default-action accept
set firewall ipv6-name BLOCK_IPV6_SERVICES rule 1 action drop
set firewall ipv6-name BLOCK_IPV6_SERVICES rule 1 destination port smtp
set firewall ipv6-name BLOCK_IPV6_SERVICES rule 1 protocol tcp
set firewall ipv6-name BLOCK_IPV6_SERVICES rule 2 action drop
set firewall ipv6-name BLOCK_IPV6_SERVICES rule 2 destination port smtps
set firewall ipv6-name BLOCK_IPV6_SERVICES rule 2 protocol tcp
commit
To apply the IPv4 and IPv6 rule set in WAN interface (eth4) use the commands below:
configure
set interfaces ethernet eth4 firewall in name BLOCK_IPV4_SERVICES
set interfaces ethernet eth4 firewall in ipv6-name BLOCK_IPV6_SERVICES
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
To deny packets destined to router will be used the local direction. The management services or routing protocols are
examples of services filtered by local.
Example to allow access to services below from LAN and WAN, other services are denied:
• SNMP Traps: It is not necessary create a rule due not exists packet destined to the equipment.
• Syslog: It is not necessary create a rule due not exists packet destined to the equipment.
configure
set firewall name IPV4_MGMT default-action drop
set firewall name IPV4_MGMT rule 1 action accept
set firewall name IPV4_MGMT rule 1 destination port snmp
set firewall name IPV4_MGMT rule 1 protocol udp
set firewall name IPV4_MGMT rule 2 action accept
set firewall name IPV4_MGMT rule 2 destination port telnet
set firewall name IPV4_MGMT rule 2 protocol tcp
set firewall name IPV4_MGMT rule 3 action accept
set firewall name IPV4_MGMT rule 3 destination port ssh
set firewall name IPV4_MGMT rule 3 protocol tcp
set firewall name IPV4_MGMT rule 4 action ’accept’
set firewall name IPV4_MGMT rule 4 protocol ’tcp’
set firewall name IPV4_MGMT rule 4 source port ’tacacs’
set firewall name IPV4_MGMT rule 5 action ’accept’
set firewall name IPV4_MGMT rule 5 protocol ’ospf’
set firewall ipv6-name IPV6_MGMT default-action drop
set firewall ipv6-name IPV6_MGMT rule 1 action accept
set firewall ipv6-name IPV6_MGMT rule 1 destination port snmp
set firewall ipv6-name IPV6_MGMT rule 1 protocol udp
set firewall ipv6-name IPV6_MGMT rule 2 action accept
set firewall ipv6-name IPV6_MGMT rule 2 destination port telnet
set firewall ipv6-name IPV6_MGMT rule 2 protocol tcp
set firewall ipv6-name IPV6_MGMT rule 3 action accept
set firewall ipv6-name IPV6_MGMT rule 3 destination port ssh
set firewall ipv6-name IPV6_MGMT rule 3 protocol tcp
set firewall ipv6-name IPV6_MGMT rule 4 action ’accept’
set firewall ipv6-name IPV6_MGMT rule 4 protocol ’tcp’
set firewall ipv6-name IPV6_MGMT rule 4 source port ’tacacs’
set firewall ipv6-name IPV6_MGMT rule 5 action ’accept’
set firewall ipv6-name IPV6_MGMT rule 5 protocol ’ospf’
commit
To apply the MGMT rule set in LAN interface (eth1) and Wan interface (eth4) use the commands below:
configure
set interfaces ethernet eth1 firewall local name IPV4_MGMT
set interfaces ethernet eth4 firewall local name IPV4_MGMT
set interfaces ethernet eth1 firewall local ipv6-name IPV6_MGMT
set interfaces ethernet eth4 firewall local ipv6-name IPV6_MGMT
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
The ACL Firewall supports the creation of groups eliminating the need to create a rule for each network, address or ports
making the configuration simple. Using the groups to manipulate these informations the configuration is done in groups
and not more in rules.
Using the Configuring the management ACL session as example is possible to change the rules to allow services only from
LAN networks in rules 1 to 4 and from WAN network in rule 5.
configure
set firewall group network-group IPV4_LAN_NETWORK network ’192.168.0.0/24’
set firewall group network-group IPV4_LAN_NETWORK network ’172.22.0.0/16’
set firewall group network-group IPV4_WAN_NETWORK network ’1.0.0.0/30’
set firewall name IPV4_MGMT rule 1 source group network-group ’IPV4_LAN_NETWORK’
set firewall name IPV4_MGMT rule 2 source group network-group ’IPV4_LAN_NETWORK’
set firewall name IPV4_MGMT rule 3 source group network-group ’IPV4_LAN_NETWORK’
set firewall name IPV4_MGMT rule 4 source group network-group ’IPV4_LAN_NETWORK’
set firewall name IPV4_MGMT rule 5 source group network-group ’IPV4_WAN_NETWORK’
set firewall group ipv6-network-group IPV6_LAN_NETWORK network ’2001:db8:AAAA::/64’
set firewall group ipv6-network-group IPV6_LAN_NETWORK network ’2001:db8:BBBB::/64’
set firewall group ipv6-network-group IPV6_WAN_NETWORK network ’2001::1/64’
set firewall ipv6-name IPV6_MGMT rule 1 source group ipv6-network-group ’IPV6_LAN_NETWORK’
set firewall ipv6-name IPV6_MGMT rule 2 source group ipv6-network-group ’IPV6_LAN_NETWORK’
set firewall ipv6-name IPV6_MGMT rule 3 source group ipv6-network-group ’IPV6_LAN_NETWORK’
set firewall ipv6-name IPV6_MGMT rule 4 source group ipv6-network-group ’IPV6_LAN_NETWORK’
set firewall ipv6-name IPV6_MGMT rule 5 source group ipv6-network-group ’IPV6_WAN_NETWORK’
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
Stateful Firewall supports IPv4 and IPv6 address, also is supported in VRFs.
To do the same configuration showed in this chapter for IPv6 address it is necessary change the name to
ipv6-name in all configurations.
The example of stateful Firewall configuration have three tipical zones, LAN (Local Area Network) or Inside, WAN (Wide Area
Network) or Outside and DMZ (Demilitarized Zone).
Stateful Firewall
The stateful firewall use the TCP connection state to take an action over packets. The established are connections
previously established, for example an answer packet. The related are packets related to an existent connection, for
example: an ICMP IPv4 that is related to a connection, but it is not part of TCP connection, and invalid state are related to
invalid TCP connections, for example: an ICMP IPv4 related to inexistent connections.
The stateful Firewall also consider ICMP and UDP sessions althought they are connectionless protocols. Upon receiving a
first packet, a new connection is considered and after a timeout the connection is considered closed.
The configuration below apply the default action to drop in three zones. All the traffic flowing between the three zones will
be silent discarded.
configure
set firewall name DMZ-TO-LAN default-action ’drop’
set firewall name DMZ-TO-WAN default-action ’drop’
set firewall name LAN-TO-DMZ default-action ’drop’
set firewall name LAN-TO-WAN default-action ’drop’
set firewall name WAN-TO-DMZ default-action ’drop’
set firewall name WAN-TO-LAN default-action ’drop’
set zone-policy zone DMZ default-action ’drop’
set zone-policy zone DMZ from LAN firewall name ’LAN-TO-DMZ’
set zone-policy zone DMZ from WAN firewall name ’WAN-TO-DMZ’
set zone-policy zone DMZ interface ’eth2’
set zone-policy zone LAN default-action ’drop’
set zone-policy zone LAN from DMZ firewall name ’DMZ-TO-LAN’
set zone-policy zone LAN from WAN firewall name ’WAN-TO-LAN’
set zone-policy zone LAN interface ’eth1’
set zone-policy zone WAN default-action ’drop’
set zone-policy zone WAN from DMZ firewall name ’DMZ-TO-WAN’
set zone-policy zone WAN from LAN firewall name ’LAN-TO-WAN’
set zone-policy zone WAN interface ’eth4’
commit
Example to allow access the Web (HTTPs) and E-mail (POP3 and SMTP) services in DMZ servers from LAN and WAN:
Due to configuring the zones default action to drop, any packets related to other services will be discarded.
configure
set firewall name LAN-TO-DMZ rule 1 action ’accept’
set firewall name LAN-TO-DMZ rule 1 state ’established enable’
set firewall name LAN-TO-DMZ rule 1 state ’related enable’
set firewall name LAN-TO-DMZ rule 2 action ’drop’
set firewall name LAN-TO-DMZ rule 2 state ’invalid enable’
set firewall name LAN-TO-DMZ rule 3 action ’accept’
set firewall name LAN-TO-DMZ rule 3 state ’new enable’
set firewall name LAN-TO-DMZ rule 3 destination port ’https’
set firewall name LAN-TO-DMZ rule 3 protocol ’tcp’
set firewall name LAN-TO-DMZ rule 4 action ’accept’
set firewall name LAN-TO-DMZ rule 4 state ’new enable’
set firewall name LAN-TO-DMZ rule 4 destination port ’pop3s’
set firewall name LAN-TO-DMZ rule 4 protocol ’tcp’
set firewall name LAN-TO-DMZ rule 5 action ’accept’
set firewall name LAN-TO-DMZ rule 5 state ’new enable’
Example to allow access the Web (HTTP and HTTPs) services in WAN "Internet" from LAN:
Due to configuring the zones default action to drop, any packets related to other services will be discarded.
configure
set firewall name LAN-TO-WAN rule 1 action ’accept’
set firewall name LAN-TO-WAN rule 1 state ’established enable’
set firewall name LAN-TO-WAN rule 1 state ’related enable’
set firewall name LAN-TO-WAN rule 2 action ’drop’
set firewall name LAN-TO-WAN rule 2 state ’invalid enable’
set firewall name LAN-TO-WAN rule 3 action ’accept’
set firewall name LAN-TO-WAN rule 3 state ’new enable’
set firewall name LAN-TO-WAN rule 3 destination port ’http’
set firewall name LAN-TO-WAN rule 3 protocol ’tcp’
set firewall name LAN-TO-WAN rule 4 action ’accept’
set firewall name LAN-TO-WAN rule 4 state ’new enable’
set firewall name LAN-TO-WAN rule 4 destination port ’https’
set firewall name LAN-TO-WAN rule 4 protocol ’tcp’
set firewall name WAN-TO-LAN rule 1 action ’accept’
set firewall name WAN-TO-LAN rule 1 state ’established enable’
set firewall name WAN-TO-LAN rule 1 state ’related enable’
set firewall name WAN-TO-LAN rule 2 action ’drop’
set firewall name WAN-TO-LAN rule 2 state ’invalid enable’
commit
To protect the management traffic, i.e. the packets that are sent by or received by the DM2500 it is necessary to create a
zone with local-zone option.
In the example below is used the MGMT (management) zone with local-zone option:
configure
set zone-policy zone MGMT default-action ’drop’
set zone-policy zone MGMT local-zone
set zone-policy zone MGMT from LAN firewall name ’LAN-TO-MGMT’
set zone-policy zone MGMT from WAN firewall name ’WAN-TO-MGMT’
set zone-policy zone MGMT from DMZ firewall name ’DMZ-TO-MGMT’
commit
Example to allow acess to the equipment management by SSH from any LAN IP address and OSPF from any WAN IP
address:
Due to configuring the zones default action to drop, any packets related to other services will be discarded.
configure
set firewall name LAN-TO-MGMT rule 1 action ’accept’
set firewall name LAN-TO-MGMT rule 1 state ’established enable’
set firewall name LAN-TO-MGMT rule 1 state ’related enable’
set firewall name LAN-TO-MGMT rule 2 action ’drop’
set firewall name LAN-TO-MGMT rule 2 state ’invalid enable’
set firewall name LAN-TO-MGMT rule 3 action ’accept’
set firewall name LAN-TO-MGMT rule 3 state ’new enable’
set firewall name LAN-TO-MGMT rule 3 destination port ’ssh’
set firewall name LAN-TO-MGMT rule 3 protocol ’tcp’
set firewall name WAN-TO-MGMT rule 1 action ’accept’
set firewall name WAN-TO-MGMT rule 1 state ’established enable’
set firewall name WAN-TO-MGMT rule 1 state ’related enable’
set firewall name WAN-TO-MGMT rule 2 action ’drop’
set firewall name WAN-TO-MGMT rule 2 state ’invalid enable’
set firewall name WAN-TO-MGMT rule 3 action ’accept’
set firewall name WAN-TO-MGMT rule 3 state ’new enable’
set firewall name WAN-TO-MGMT rule 3 protocol ’ospf’
set firewall name DMZ-TO-MGMT rule 1 action ’accept’
set firewall name DMZ-TO-MGMT rule 1 state ’established enable’
set firewall name DMZ-TO-MGMT rule 1 state ’related enable’
set firewall name DMZ-TO-MGMT rule 2 action ’drop’
set firewall name DMZ-TO-MGMT rule 2 state ’invalid enable’
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.
The Firewall support some global protections, that is, the action is valid to all configured zones.
By default only ICMP IPv4 send redirects are enabled, but it is possible to enable other protections if
necessary.
To answer ICMP (Internet Control Message Protocol) IPv4 broadcast packets received:
configure
set firewall broadcast-ping enable
commit
configure
set firewall receive-redirects enable
commit
configure
set firewall receive-redirects disable
commit
configure
set firewall send-redirects enable
commit
configure
set firewall send-redirects disable
commit
The IPv4 packet has an option to carry information about the path that it must follow to its destination.
configure
set firewall ip-src-route enable
commit
configure
set firewall ip-src-route disable
commit
RPF
The RPF (Reverse Patch Forwarding) is defined in RFC3074. The strict mode check if the equipment has a route to the
source IP address of the received packet through the same interface were the packet was received. If not the packet is
discarded:
configure
set firewall source-validation strict
commit
The RPF in loose mode check if source IP address received has a route in equipment. If not the packet is discarded:
configure
set firewall source-validation loose
commit
configure
set firewall source-validation disable
commit
12 Tunneling
Tunneling consists in encapsulation of a protocol within another protocol to allow transparency and higher security during
data flowing the unsafe public networks or even in private networks.
The GRE (Generic Routing Encapsulation) is an IP packets encapsulation method through the IP infrastructure with the
objective to interconnect networks that communicate between themselves through a public infrastructure (in general the
Internet).
The scenario below will be used to describe how to configure a GRE tunnel.
Let’s suppose that the user would like to create a point-to-point GRE tunnel in the 35.35.35.0/ 31 network between the R1
and R2 equipment, both connected to the Internet with assigned fixed IPv4 addresses and different internal network
learned by OSPF.
The procedure below indicates how to execute this configuration:
Router 1 (R1)
configure
set interfaces loopback lo address 1.1.1.1/32
set interfaces ethernet eth1 address 192.168.5.1/24
set interfaces ethernet eth2 address 209.165.201.15/24
set interfaces tunnel tun0 address 35.35.35.1/31
set interfaces tunnel tun0 encapsulation gre
set interfaces tunnel tun0 local-ip 209.165.201.15
set interfaces tunnel tun0 remote-ip 201.122.120.3
set protocols ospf parameters router-id 1.1.1.1
set protocols ospf area 1 network 35.35.35.0/31
Router 2 (R2)
configure
set interfaces loopback lo address 2.2.2.2/32
set interfaces ethernet eth1 address 192.168.3.1/24
set interfaces ethernet eth2 address 201.122.120.3/24
set interfaces tunnel tun0 address 35.35.35.2/31
set interfaces tunnel tun0 encapsulation gre
set interfaces tunnel tun0 local-ip 201.122.120.3
set interfaces tunnel tun0 remote-ip 209.165.201.15
set protocols ospf parameters router-id 2.2.2.2
set protocols ospf area 1 network 35.35.35.0/31
set protocols ospf area 1 network 192.168.3.0/24
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the GRE tunnels. If the user is at configuration level, it is necessary to use
the keyword run before the command.
Let’s suppose that the user would like to create a point-to-point IPv6 GRE tunnel in the fd01::1/64 network between the R1
and R2 equipment, both connected to the Internet with assigned fixed IPv6 addresses and different internal network
reached via static routes.
The procedure below indicates how to execute this configuration:
Router 1 (R1)
configure
set interfaces ethernet eth1 address ’fd00:1::1/64’
set interfaces ethernet eth8 address ’2001:1290:1::6/64’
set interfaces tunnel tun0 address ’fd01::1/64’
set interfaces tunnel tun0 encapsulation ’gre6’
Router 2 (R2)
configure
set interfaces ethernet eth1 address ’fd00::1/64’
set interfaces ethernet eth8 address ’2001:1290:1:5::2/64’
set interfaces tunnel tun0 address ’fd01::2/64’
set interfaces tunnel tun0 encapsulation ’gre6’
set interfaces tunnel tun0 local-ip ’2001:1290:1:5::2’
set interfaces tunnel tun0 mtu ’2000’
set interfaces tunnel tun0 remote-ip ’2001:1290:1::6’
set protocols static route6 ::/0 next-hop ’2001:1290:1:5::1’
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the GRE tunnels. If the user is at configuration level, it is necessary to use
the keyword run before the command.
The IPsec (Internet Protocol Security) is a set of protocols defined by the IETF to assure a safe change of IPv4 packets
through unsafe networks (Internet). The protocol has mechanisms for checking of data integrity, assuring that it has not
been modified by an unauthorized individual, in addition of assuring the confidentiality, where only the authorized peers
can see the data, adopting encryption methods and control of access.
By default the DM2500 uses IKE (Internet Key Exchange) version 1 for automatic key management for
encryption.
The scenario below will be used to show configuration of the VPN IPsec.
The DM2500 routers have LAN with IP addressing as shown in the figure above. IP addressing of the WAN routers is shown
in the following configurations, as well as all the parameters used by the IPsec.
The procedure below indicates how to execute this configuration:
configure
set interfaces ethernet eth1 vif 800 address 80.80.80.2/24
set interfaces ethernet eth3 address 192.168.10.254/24
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’14’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec esp-group esp-grp-1 pfs ’dh-group14’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec site-to-site peer 80.80.80.1 authentication pre-shared-secret ’datacom123’
set vpn ipsec site-to-site peer 80.80.80.1 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 80.80.80.1 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 80.80.80.1 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 80.80.80.1 tunnel 1 local prefix ’192.168.10.0/24’
set vpn ipsec site-to-site peer 80.80.80.1 tunnel 1 remote prefix ’192.168.6.0/24’
set vpn ipsec site-to-site peer 80.80.80.1 local-address ’80.80.80.2’
set vpn ipsec ipsec-interfaces interface ’eth1.800’
set protocols static route 192.168.6.0/24 next-hop 80.80.80.1
commit
configure
set interfaces ethernet eth2 vif 800 address 80.80.80.1/24
set interfaces ethernet eth1 address 192.168.6.254/24
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’14’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec esp-group esp-grp-1 pfs dh-group14
set vpn ipsec esp-group esp-grp-1 proposal 1 hash sha1
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption aes256
set vpn ipsec site-to-site peer 80.80.80.2 authentication pre-shared-secret ’datacom123’
set vpn ipsec site-to-site peer 80.80.80.2 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 80.80.80.2 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 80.80.80.2 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 80.80.80.2 tunnel 1 local prefix 192.168.6.0/24
set vpn ipsec site-to-site peer 80.80.80.2 tunnel 1 remote prefix 192.168.10.0/24
set vpn ipsec site-to-site peer 80.80.80.2 local-address ’80.80.80.1’
set vpn ipsec ipsec-interfaces interface ’eth2.800’
set protocols static route 192.168.10.0/24 next-hop 80.80.80.2
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the VPNs IPsec. If the user is at configuration level, it is necessary to use
the keyword run before the command.
The scenario below will be used to show configuration of the VPN IPsec with IPv6.
The DM2500 routers have LAN with IPv6 addressing as shown in the figure above. IPv6 addressing of the WAN routers is
shown in the following configurations, as well as all the parameters used by the IPsec.
The procedure below indicates how to execute this configuration:
configure
set interfaces ethernet eth1 vif 104 address ’2804:130c::2/64’
set interfaces ethernet eth2 vif 101 address ’fd00::1/64’
set vpn ipsec esp-group esp-grp-1 pfs ’dh-group14’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’14’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec site-to-site peer 2804:130c::1 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 2804:130c::1 authentication pre-shared-secret ’d4t4c4m’
set vpn ipsec site-to-site peer 2804:130c::1 connection-type ’respond’
set vpn ipsec site-to-site peer 2804:130c::1 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 2804:130c::1 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 2804:130c::1 local-address ’2804:130c::2’
set vpn ipsec site-to-site peer 2804:130c::1 tunnel 1 id ’@respondTun1’
set vpn ipsec site-to-site peer 2804:130c::1 tunnel 1 allow-nat-networks ’disable’
set vpn ipsec site-to-site peer 2804:130c::1 tunnel 1 allow-public-networks ’disable’
set vpn ipsec site-to-site peer 2804:130c::1 tunnel 1 local prefix ’fd00::/64’
set vpn ipsec site-to-site peer 2804:130c::1 tunnel 1 remote prefix ’fd00:1::/64’
set vpn ipsec site-to-site peer 2804:130c::1 tunnel 1 remote-id ’@initiatorTun1’
set vpn ipsec ipsec-interfaces interface ’eth1.104’
set protocols static interface-route6 fd00:1::/64 next-hop-interface ’eth1.104’
commit
configure
set interfaces ethernet eth1 vif 104 address ’2804:130c::1/64’
set interfaces ethernet eth2 vif 101 address ’fd00:1::1/64’
set vpn ipsec esp-group esp-grp-1 pfs ’dh-group14’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’14’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec site-to-site peer 2804:130c::2 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 2804:130c::2 authentication pre-shared-secret ’d4t4c4m’
set vpn ipsec site-to-site peer 2804:130c::2 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 2804:130c::2 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 2804:130c::2 local-address ’2804:130c::1’
set vpn ipsec site-to-site peer 2804:130c::2 tunnel 1 id ’@initiatorTun1’
set vpn ipsec site-to-site peer 2804:130c::2 tunnel 1 allow-nat-networks ’disable’
set vpn ipsec site-to-site peer 2804:130c::2 tunnel 1 allow-public-networks ’disable’
set vpn ipsec site-to-site peer 2804:130c::2 tunnel 1 local prefix ’fd00:1::/64’
set vpn ipsec site-to-site peer 2804:130c::2 tunnel 1 remote prefix ’fd00::/64’
set vpn ipsec site-to-site peer 2804:130c::2 tunnel 1 remote-id ’@respondTun1’
set vpn ipsec ipsec-interfaces interface ’eth1.104’
set protocols static interface-route6 fd00::/64 next-hop-interface ’eth1.104’
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the VPNs IPsec. If the user is at configuration level, it is necessary to use
the keyword run before the command.
The native IPsec packets are encapsulated using the ESP (Encapsulated Security Payload). In these packets, the IP
addresses are incorporated in the encapsulated packet. This causes problems when the IPsec packets should pass through
a device that makes NAT. When the NAT (Network Address Translation) occurs, the NAT device changes its own source IP
address (and sometimes the port number) to other IP address in the output packets. The NAT device hears a response and,
a response packet is received, the NAT device reverses the translation so that the input packet can reach the correct
destination. This allows that IP addresses within a private network are “hidden” to external networks. The NAT does
not operate well with the IPsec, because the IP addresses are incorporated in the encapsulated packet payload. Due to
several reasons, this means that the IPsec peer cannot be located behind a NAT device. The IPsec has a feature called NAT
Traversal (NAT-T, RFCs 3947 and 3948) that allows that each IPsec packet can be re-encapsulated in a UDP packet, which
can be handled correctly by the device configured with NAT. The NAT-T is executed on the IPsec. To support the NAT-T, the
device that makes NAT and has a firewall should be configured to allow the following configuration:
- IKE through UDP 500 port
- IPsec NAT-T through UDP 4500 port
- ESP Some NAT devices are already provided pre-configured with all this in a resource called “IPsec Passthrough”. However,
the IPsec Passthrough is incompatible with the NAT traversal. The devices with IPsec Passthrough recognize the IPsec UDP
packets and try in an incorrect manner to forward the packets. This corrupts the packets in such a manner that the NAT-T
no longer operates.
The scenario below will be used to show configuration of the VPN IPsec. with NAT-T
The procedure below shows how the proposed scenarios can be configured:
configure
set interfaces ethernet eth2 address 192.168.10.254/24
set interfaces ethernet eth3 address 190.100.10.210/24
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’14’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec esp-group esp-grp-1 pfs ’dh-group14’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec site-to-site peer 0.0.0.0 authentication pre-shared-secret ’datacom123’
set vpn ipsec site-to-site peer 0.0.0.0 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 0.0.0.0 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 0.0.0.0 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 0.0.0.0 tunnel 1 local prefix ’192.168.10.0/24’
set vpn ipsec site-to-site peer 0.0.0.0 tunnel 1 remote prefix ’192.168.60.0/24’
set vpn ipsec site-to-site peer 0.0.0.0 local-address ’190.100.10.210’
set vpn ipsec nat-traversal enable
set vpn ipsec nat-networks allowed-network 192.168.0.0/16 exclude 192.168.10.0/24
set vpn ipsec ipsec-interfaces interface ’eth3’
set protocols static route 192.168.60.0/24 next-hop 200.44.160.100
commit
An important change in this configuration is the peer address. It is defined as 0.0.0.0 to represent “any” IP address. As the
peer IP address is practically unknown, the DM2500 4GT shall not initiate the connections with the peer, it will only receive
connections from the peer.
configure
set interfaces ethernet eth8 address 192.168.0.1/24
set interfaces ethernet eth7 address 192.168.60.254/24
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’14’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec esp-group esp-grp-1 pfs dh-group14
set vpn ipsec esp-group esp-grp-1 proposal 1 hash sha1
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption aes256
set vpn ipsec site-to-site peer 190.100.10.210 authentication pre-shared-secret ’datacom123’
set vpn ipsec site-to-site peer 190.100.10.210 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 190.100.10.210 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 190.100.10.210 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 190.100.10.210 tunnel 1 local prefix 192.168.60.0/24
set vpn ipsec site-to-site peer 190.100.10.210 tunnel 1 remote prefix 192.168.10.0/24
set vpn ipsec site-to-site peer 190.100.10.210 local-address ’192.168.0.1’
set vpn ipsec nat-traversal enable
set vpn ipsec nat-networks allowed-network 192.168.0.0/16 exclude 192.168.60.0/24
set vpn ipsec ipsec-interfaces interface ’eth8’
set protocols static route 192.168.10.0/24 next-hop 190.100.10.210
commit
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the VPNs IPsec with NAT-Traversal. If the user is at configuration level, it
is necessary to use the keyword run before the command.
The GRE tunnels are not encrypted and do not provide any security due to use a simple key in clear text in our packets. This
means that the GRE tunnels, do not provide an adequate security to networks. At the same time, the tunnels based on
policies of the IPsec, are unable to route directly non IP protocols or multicast, and the IPsec also has limitations from the
view of the operation. Use of tunnel interfaces together with IPsec VPN provides connections of routable tunnels between
gateways. For safe routable tunnels, the interfaces of GRE tunnel should be used together with an IPsec connection, so that
the IP tunnel can be protected by the IPsec tunnel.
The scenario below will be used to show configuration of the GRE tunnel protection with IPsec
Considering that the user would like to configure a GRE tunnel between two DM2500 with IPsec protection between the
same end points.
The procedure below indicates how to execute this configuration:
configure
set interfaces ethernet eth2 address ’192.168.254.41/30’
set interfaces ethernet eth4 vif 4056 address ’192.168.45.1/24’
set interfaces tunnel tun1 remote-ip ’192.168.72.6’
set interfaces tunnel tun1 multicast ’enable’
set interfaces tunnel tun1 address ’192.168.191.1/30’
set interfaces tunnel tun1 local-ip ’192.168.254.41’
set interfaces tunnel tun1 encapsulation ’gre’
set vpn ipsec ike-group IKE-CLINK-BRM key-exchange ’ikev2’
set vpn ipsec ike-group IKE-CLINK-BRM lifetime ’3600’
set vpn ipsec ike-group IKE-CLINK-BRM proposal 10 hash ’sha1’
set vpn ipsec ike-group IKE-CLINK-BRM proposal 10 dh-group ’14’
set vpn ipsec ike-group IKE-CLINK-BRM proposal 10 encryption ’aes256’
set vpn ipsec esp-group ESP-CLINK-BRM lifetime ’1800’
set vpn ipsec esp-group ESP-CLINK-BRM pfs ’enable’
set vpn ipsec esp-group ESP-CLINK-BRM proposal 10 hash ’sha1’
set vpn ipsec esp-group ESP-CLINK-BRM proposal 10 encryption ’aes128’
set vpn ipsec esp-group ESP-CLINK-BRM mode ’transport’
set vpn ipsec site-to-site peer 192.168.72.6 authentication pre-shared-secret ’d4t4c0m’
set vpn ipsec site-to-site peer 192.168.72.6 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 192.168.72.6 ike-group ’IKE-CLINK-BRM’
set vpn ipsec site-to-site peer 192.168.72.6 tunnel 2018 protocol ’gre’
set vpn ipsec site-to-site peer 192.168.72.6 tunnel 2018 esp-group ’ESP-CLINK-BRM’
set vpn ipsec site-to-site peer 192.168.72.6 local-address ’192.168.254.41’
set vpn ipsec site-to-site peer 192.168.72.6 connection-type ’initiate’
set vpn ipsec ipsec-interfaces interface ’eth2’
set protocols static route 192.168.64.0/22 next-hop ’192.168.191.2’
commit
configure
set interfaces ethernet eth1 vif 503 address ’192.168.72.6/30’
set interfaces ethernet eth3 vif 2020 address ’192.168.64.1/22’
set interfaces tunnel tun1 remote-ip ’192.168.254.41’
set interfaces tunnel tun1 multicast ’enable’
set interfaces tunnel tun1 address ’192.168.191.2/30’
set interfaces tunnel tun1 local-ip ’192.168.72.6’
set interfaces tunnel tun1 encapsulation ’gre’
set vpn ipsec ike-group IKE-CLINK-BRM key-exchange ’ikev2’
set vpn ipsec ike-group IKE-CLINK-BRM lifetime ’3600’
set vpn ipsec ike-group IKE-CLINK-BRM proposal 10 hash ’sha1’
set vpn ipsec ike-group IKE-CLINK-BRM proposal 10 dh-group ’14’
set vpn ipsec ike-group IKE-CLINK-BRM proposal 10 encryption ’aes256’
set vpn ipsec esp-group ESP-CLINK-BRM lifetime ’1800’
set vpn ipsec esp-group ESP-CLINK-BRM pfs ’enable’
set vpn ipsec esp-group ESP-CLINK-BRM proposal 10 hash ’sha1’
set vpn ipsec esp-group ESP-CLINK-BRM proposal 10 encryption ’aes128’
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the tunnels and VPNs. If the user is at configuration level, it is necessary
to use the keyword run before the command.
IPsec with Virtual Tunnel Interfaces (VTIs) provide a routable interface type for establishing IPsec tunnels and an easy way
to define protection between sites to form an overlay network. IPsec VTIs simplify configuration of IPsec for protection of
remote links and simplify network management.
In the DM2500 there is no support for scenarios with high availablility or load balancing using tunnels with
VTI.
Note that in an IPsec scenario with VTI, the local tunnel X and tunnel X remote configuration is not used within the
IPsec peer. The vti bind configuration is used inside the peer and the traffic to be encrypted must be forwarded to a VTI
interface that is associated with IPSec.
VTI interfaces have the IP address config, but this does not perform any type of encapsulation in the packet (different from
GRE). The IPsec peer address and the local-address must be the addresses of physical interfaces (WANs), not the addresses
of VTIs.
Suppose the user wants to configure a tunnel with 1400 bytes MTU (Maximum Transmission Unit) using VTI interfaces
between two DM2500s with IPsec protection. The following procedure demonstrates how to perform this configuration.
The MTU of the VTI interface must be less than the MTU of the physical interface through which the encrypted
packets will be sent. In the example below, VTI has MTU of 1400 and eth4 has MTU of 1500. In this case there
is a difference of 100 bytes, enough for the overhead that IPsec adds and to avoid fragmentation on the eth2
interface.
Router R1 (DM2500)
configure
set interfaces ethernet eth3 address ’192.168.1.1/16’
set interfaces ethernet eth4 address ’192.168.3.1/24’
set interfaces ethernet eth4 mtu ’1500’
set interfaces vti vti1 address ’11.11.11.1/30’
set interfaces vti vti1 description ’IPsec-IPv4’
set interfaces vti vti1 mtu ’1400’
set protocols static interface-route 192.167.0.0/16 next-hop-interface ’vti1’
set vpn ipsec esp-group esp-grp-1 compression ’disable’
set vpn ipsec esp-group esp-grp-1 lifetime ’28800’
set vpn ipsec esp-group esp-grp-1 mode ’tunnel’
set vpn ipsec esp-group esp-grp-1 pfs ’enable’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection action ’hold’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection interval ’30’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection timeout ’120’
set vpn ipsec ike-group ike-grp-1 key-exchange ’ikev2’
set vpn ipsec ike-group ike-grp-1 lifetime ’28800’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’2’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ipsec-interfaces interface ’eth4’
set vpn ipsec site-to-site peer 192.168.3.2 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 192.168.3.2 authentication pre-shared-secret ’mysecret123’
set vpn ipsec site-to-site peer 192.168.3.2 connection-type ’respond’
set vpn ipsec site-to-site peer 192.168.3.2 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 192.168.3.2 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 192.168.3.2 local-address ’192.168.3.1’
set vpn ipsec site-to-site peer 192.168.3.2 vti bind ’vti1’
set vpn ipsec site-to-site peer 192.168.3.2 vti esp-group ’esp-grp-1’
commit
save
Router R2 (DM2500)
configure
set interfaces ethernet eth3 address ’192.167.2.1/16’
set interfaces ethernet eth4 address ’192.168.3.2/24’
set interfaces ethernet eth4 mtu ’1500’
set interfaces vti vti1 address ’11.11.11.2/30’
set interfaces vti vti1 description ’IPsec-IPv4’
set interfaces vti vti1 mtu ’1400’
set protocols static interface-route 192.168.0.0/16 next-hop-interface ’vti1’
set vpn ipsec esp-group esp-grp-1 compression ’disable’
set vpn ipsec esp-group esp-grp-1 lifetime ’28800’
set vpn ipsec esp-group esp-grp-1 mode ’tunnel’
set vpn ipsec esp-group esp-grp-1 pfs ’enable’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection action ’hold’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection interval ’30’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection timeout ’120’
set vpn ipsec ike-group ike-grp-1 key-exchange ’ikev2’
set vpn ipsec ike-group ike-grp-1 lifetime ’28800’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’2’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ipsec-interfaces interface ’eth4’
set vpn ipsec site-to-site peer 192.168.3.1 authentication mode ’pre-shared-secret’
The scenario below will be used to show configuration of the VPN IPSec with IPv6 using VTI interface.
Router R1 (DM2500)
configure
set interfaces ethernet eth3 address ’2001:f0ca::1/64’
set interfaces ethernet eth4 address ’2001:b0ca::1/64’
set interfaces vti vti2 address ’fc00:1111::1/126’
set interfaces vti vti2 description ’IPsec-IPv6’
set protocols static interface-route6 2001:f0ca::/64 next-hop-interface ’vti2’
set vpn ipsec esp-group esp-grp-1 compression ’disable’
set vpn ipsec esp-group esp-grp-1 lifetime ’28800’
set vpn ipsec esp-group esp-grp-1 mode ’tunnel’
set vpn ipsec esp-group esp-grp-1 pfs ’enable’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection action ’hold’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection interval ’30’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection timeout ’120’
set vpn ipsec ike-group ike-grp-1 key-exchange ’ikev2’
set vpn ipsec ike-group ike-grp-1 lifetime ’28800’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’2’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ipsec-interfaces interface ’eth4’
set vpn ipsec site-to-site peer 2001:b0ca::2 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 2001:b0ca::2 authentication pre-shared-secret ’mysecret123’
set vpn ipsec site-to-site peer 2001:b0ca::2 connection-type ’respond’
set vpn ipsec site-to-site peer 2001:b0ca::2 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 2001:b0ca::2 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 2001:b0ca::2 local-address ’2001:b0ca::1’
set vpn ipsec site-to-site peer 2001:b0ca::2 vti bind ’vti2’
set vpn ipsec site-to-site peer 2001:b0ca::2 vti esp-group ’esp-grp-1’
commit
save
Router R2 (DM2500)
configure
set interfaces ethernet eth3 address ’2001:ba1a::1/64’
set interfaces ethernet eth4 address ’2001:b0ca::2/64’
set interfaces vti vti2 address ’fc00:1111::2/126’
set interfaces vti vti2 description ’IPsec-IPv6’
set protocols static interface-route6 2001:ba1a::/64 next-hop-interface ’vti2’
set vpn ipsec esp-group esp-grp-1 compression ’disable’
set vpn ipsec esp-group esp-grp-1 lifetime ’28800’
set vpn ipsec esp-group esp-grp-1 mode ’tunnel’
set vpn ipsec esp-group esp-grp-1 pfs ’enable’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection action ’hold’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection interval ’30’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection timeout ’120’
set vpn ipsec ike-group ike-grp-1 key-exchange ’ikev2’
set vpn ipsec ike-group ike-grp-1 lifetime ’28800’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’2’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ipsec-interfaces interface ’eth4’
set vpn ipsec site-to-site peer 2001:b0ca::1 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 2001:b0ca::1 authentication pre-shared-secret ’mysecret123’
set vpn ipsec site-to-site peer 2001:b0ca::1 connection-type ’initiate’
set vpn ipsec site-to-site peer 2001:b0ca::1 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 2001:b0ca::1 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 2001:b0ca::1 local-address ’2001:b0ca::2’
set vpn ipsec site-to-site peer 2001:b0ca::1 vti bind ’vti2’
set vpn ipsec site-to-site peer 2001:b0ca::1 vti esp-group ’esp-grp-1’
commit
save
To persist the configuration after an eventual reboot, the user should use the save command after the commit command.
Below are the main commands available to check the tunnels and VPNs. If the user is at configuration level, it is necessary
to use the keyword run before the command.
Legal Note
In spite the fact that all the precautions were taken in development of the present document, DATACOM shall not be held
responsible for eventual errors or omissions as well as no obligation is assumed due to damages resulting from the use of
the information included in this guide. The specifications provided in this manual shall be subject to changes with no prior
notification and are not acknowledged as any type of contract.
Warranty
DATACOM’s products are covered by a warranty against manufacturing defects during a minimum period of 12 (twelve)
months including the legal term of 90 days, as from the date of issue of the supply Nota Fiscal (Invoice).
Our warranty is standard counter warranty, this means, for exercise of the warranty, the customer should send the product
to DATACOM Authorized Technical Assistance with paid freight. The return freight of the equipment will be DATACOM
responsibility.