0% found this document useful (0 votes)
287 views

Datacom DM2500

Uploaded by

sallomao3
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
287 views

Datacom DM2500

Uploaded by

sallomao3
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 116

ACCESS ROUTERS

Version 1.12.0

QUICK CONFIGURATION GUIDE

204.4305.05 - March 30, 2020


DM2500 - Quick Configuration Guide Contacts

Contacts

Technical Support

Datacom has available a support portal - DmSupport, to help the customers in use and config of our equipment.

Access to the DmSupport can be made through link: https://supportcenter.datacom.com.br

In this site the following are available: firmwares, technical datasheets, config guide, MIBs and manuals for down-
load. In addition, it allows opening of calls for assistance with our technical team.

Telephone Number: +55 51 3933-3122

We would like to highlight that our assistance through telephone support is available from Monday through Friday from
08:00 AM through 05:30 PM.

Important: For support assistance 24x7, please request a quotation to our sales department.

General Information

For any other additional information, please visit the https://www.datacom.com.br/en or call:

DATACOM

Rua América, 1000

92990-000 - Eldorado do Sul - RS - Brazil

+55 51 3933-3000

DATACOM 204.4305.05 - March 30, 2020 2


DM2500 - Quick Configuration Guide Product Documentation

Product Documentation
This document is part of a set of documents prepared to provide all necessary information about DATACOM products.

Software Platform

• Quick Configuration Guide - Provides instructions on how to set functionalities in a quick manner in the equipment

• Troubleshooting Guide - Provides instructions on how to analyze, identify and solve problems with the product

• Command Reference - Provides all the commands related to the product

• Release Notes - Provides instructions on the new functionalities, identified defects and compatibilities between
Software and Hardware

Hardware Platform

• Datasheet - Provides the Hardware and Software technical characteristics of product

• Installation Guide - Provides instructions on the procedures covering product installation

The availability of some documents can vary depending on the type of product.

Access https://supportcenter.datacom.com.br to locate the related documents or contact the Technical Support for
additional information.

DATACOM 204.4305.05 - March 30, 2020 3


DM2500 - Quick Configuration Guide Introduction to the document

Introduction to the document

About this Document

The present document is a set of instructions that provide a quick and objective explanation on the use of the functionalities
available in the product. It also covers the initial configs that are generally required immediately after installation of the
product.

This document was developed to be used as an eventual source for solution of technical issues, and for this reason its
sequential reading is not mandatory. However, if you are setting the equipment and is not familiar with the product,
reading of the document since the beginning is recommended.

It is presumed that the individual or individuals that manage any aspect of the product should have the basic knowledge of
Ethernet, network protocols and communication networks in general.

Audience

This guide is directed to network administrators, technicians or teams qualified to install, set, plan and maintain this
product.

Conventions

To facilitate understanding of the present manual, the following conventions were adopted:

Icons

Icon Type Description

Note The notes explain in a better manner a detail included in the text.

DATACOM 204.4305.05 - March 30, 2020 4


DM2500 - Quick Configuration Guide Introduction to the document

Icon Type Description

WEEE Directive Symbol (Applicable in the European Union and other European coun-
tries with separate collection systems). This symbol on the product or its packaging
indicates that this product must not be disposed of with other waste. Instead, it is your
responsibility to dispose of your waste equipment by handing it over to a designated
collection point for the recycling of waste electrical and electronic equipment. The
Note
separate collection and recycling of your waste equipment at the time of disposal
will help conserve natural resources and ensure that it is recycled in a manner that
protects human health and the environment. For more information about where you
can drop off your consumer waste equipment for recycling, please contact your local
city recycling office or the dealer from whom you originally purchased the product.

This symbols means that, case the procedure was not correctly followed, may exist
Warning
electrical shock risk.

Warning Represents laser radiation. It is necessary to avoid eye and skin exposure.

Warning Non-ionizing radiation emission.

This symbol means that this text is very important and, if the orientations were not
Caution
correct followed, it may cause damage or hazard.

Indicates that equipment, or a part is ESDS (Electrostatic Discharge Sensitive). It should


Caution
not be handled without grounding wrist strap or equivalent.

A warning icon requests special attention to the conditions that, if not avoided, may cause physical damages
to the equipment.

A caution icon requests special attention to the conditions that, if not avoided, may result in risk of death of
serious injury.

DATACOM 204.4305.05 - March 30, 2020 5


DM2500 - Quick Configuration Guide Table of Contents

Table of Contents
Contacts 2

Product Documentation 3

Introduction to the document 4

1 Starting 7
1.1 Installing and energizing the equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2 Accessing the equipment using the console port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.3 Accessing the equipment using a ethernet port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Accessing the equipment for the first time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

2 Basic Management 9
2.1 Firmware Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.2 Operation Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.2.1 Operational Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.2.2 Configuration Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3 Configuration Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3.1 Applying the Candidate Config to the Running Config . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3.2 Applying the Running Config to the Startup Configuration . . . . . . . . . . . . . . . . . . . . . . 12
2.3.3 Checking the Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.3.4 Restoring the Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.3.5 Restoring to the Factory Config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4 Configuration to a File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4.1 Exporting Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4.2 Importing Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4.3 Handling Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.4.4 Loading Configurations from a File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.5 Copying and pasting configuration commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.6 Configuration over SNMP protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.6.1 Applying a configuration via SNMP to running-config . . . . . . . . . . . . . . . . . . . . . . . . . 15

3 Equipment Management 16
3.1 Configuring a management interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.1.1 Management through an exclusive interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.1.2 Shared management in a physical interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.2 Configuring the hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.3 Configuring the banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.4 Configuring the system clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.5 Configuring the summertime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

DATACOM 204.4305.05 - March 30, 2020 6


DM2500 - Quick Configuration Guide TABLE OF CONTENTS

3.6 Configuring the NTP protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19


3.7 Configuring a syslog remote server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.8 Configuring the SNMP protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.8.1 Configuring the SNMPv2 protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.8.2 Configuring the SNMPv3 protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.8.3 SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

4 OAM 23
4.1 Setting the NetFlow/IPFIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.2 Macros and Watch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2.1 Macro . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2.2 Watch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2.3 Performing an action with Watch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.3 Setting the TWAMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.3.1 Setting the TWAMP Reflector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.3.2 Setting the TWAMP Sender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.3.3 IP SLA Object Tracking with TWAMP, Watch e Macro . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.3.4 TWAMP Comparator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
4.4 tcpdump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.5 Dump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.6 Show tech-support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.7 Monitor Bandwidth Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.7.1 Configuring the server mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.7.2 Configuring the client mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

5 Connectivity Tools 32
5.1 Ping and Ping6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
5.2 Traceroute and Traceroute6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
5.3 SSH Client and Telnet Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

6 Users Authentication 34
6.1 Change the default password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
6.2 Setting the Local Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
6.3 Setting the TACACS+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
6.4 Setting the RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

7 Interfaces 38
7.1 Setting the Ethernet Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
7.1.1 Setting speed and duplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
7.2 Setting the Loopback Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

DATACOM 204.4305.05 - March 30, 2020 7


DM2500 - Quick Configuration Guide Table of Contents

7.3 Setting the Bridge Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40


7.4 Setting the Bonding Interfaces (Aggregation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
7.4.1 Bonding Interface Static Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
7.4.2 Bonding Interface Dynamic Mode (LACP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

8 Connection Services 43
8.1 Setting the DHCPv4 Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
8.1.1 Configurando as opções do DHCPv4 Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
8.2 Setting the DHCPv6 Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
8.3 Setting the DHCPv4 Relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.4 Setting the DHCPv6 Relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.5 Setting the DHCPv4 Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
8.6 Setting the DHCPv6 Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
8.7 Setting the PPPoE Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

9 Routing 49
9.1 Setting the Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
9.1.1 Static Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
9.1.2 Routing between VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
9.1.3 Enabling ECMP in static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
9.2 Setting the PBR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
9.3 Setting the RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
9.4 Setting the RIPng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
9.5 Setting the OSPFv2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
9.5.1 Configuring a Virtual Link in OSPFv2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
9.5.2 Enabling ECMP in OSPFv2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
9.5.3 Setting LSA filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
9.5.4 Filtering of LSAs announced for other areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
9.5.5 Filtering of LSAs announced for the specified area . . . . . . . . . . . . . . . . . . . . . . . . . . 56
9.5.6 Filtering of LSAs using prefix-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
9.6 Setting the OSPFv3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
9.6.1 Enabling ECMP in OSPFv3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
9.6.2 LSA filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
9.7 Setting the BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
9.7.1 iBGP IPv4 neighbor configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
9.7.2 eBGP IPv4 neighbor configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
9.7.3 eBGP IPv4 neighbor configuration with loopbacks . . . . . . . . . . . . . . . . . . . . . . . . . . 61
9.7.4 iBGP IPv6 neighbor configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
9.7.5 eBGP IPv6 neighbor configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
9.7.6 eBGP IPv6 neighbor configuration with loopback . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

DATACOM 204.4305.05 - March 30, 2020 8


DM2500 - Quick Configuration Guide Table of Contents

9.7.7 Communities configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65


9.7.8 Enabling ECMP in BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
9.8 Setting the BFD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
9.8.1 BFD in static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
9.8.2 BFD in OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
9.8.3 BFD in OSPFv3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
9.8.4 BFD in BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
9.9 Setting the VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
9.9.1 Setting the VRRPv2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
9.9.2 Setting the VRRPv3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
9.9.3 Setting the VRRP Track Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
9.9.4 Setting the VRRP Track Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
9.9.5 Setting the VRRP Transition Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
9.10 Setting the PIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
9.10.1 Setting IGMP version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
9.11 Setting the VRF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
9.11.1 Setting the VRF lite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
9.12 Setting the ECMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
9.12.1 Load balance per packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
9.12.2 Load balance per flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
9.12.3 Disabling ECMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

10 QoS 83
10.1 Setting the Rate Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
10.2 Configuring classification, priorization and remarking of egress traffic . . . . . . . . . . . . . . . . . . . 84
10.2.1 Classification and priorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
10.2.2 Remarking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
10.2.3 Classifying locally generated packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
10.2.4 Classifying by address or port range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
10.3 Configuring DSCP remarking of ingress traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

11 Security 88
11.1 Configuring the SSH and Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
11.2 Configuring the NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
11.2.1 Source NAT (SNAT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
11.2.2 Destination NAT (DNAT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
11.3 Configuring the Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
11.3.1 Configuring ACL Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
11.3.2 Configuring the stateful Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
11.3.3 Firewall protections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

DATACOM 204.4305.05 - March 30, 2020 9


DM2500 - Quick Configuration Guide Table of Contents

12 Tunneling 100
12.1 Setting GRE tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
12.2 Setting IPv6 GRE tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
12.3 Setting site-to-site IPsec VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
12.4 Setting site-to-site VPNs IPsec with NAT Traversal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
12.5 Protecting a GRE Tunnel with IPsec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
12.6 Setting VPN IPsec with Virtual Tunnel Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

Legal Note 112

Warranty 112

DATACOM 204.4305.05 - March 30, 2020 10


DM2500 - Quick Configuration Guide 1 Starting

1 Starting
This chapter contains the following sections:

• Installing and energizing the equipment

• Accessing the equipment using the console port

• Accessing the equipment using a ethernet port

• Accessing the equipment for the first time

1.1 Installing and energizing the equipment

Please check the detailed instructions in the equipment Installation Guide.

1.2 Accessing the equipment using the console port

Accessing the equipment using the console port

Access to equipment CLI can be carried out through the console port. A serial cable is required. A terminal emulator such
as Hyper Terminal or similar is also needed. The terminal settings must be set as 9600 8N1.

1.3 Accessing the equipment using a ethernet port

Accessing the equipment using an Ethernet port

In the factory configuration, Ethernet interface eth1 is configured with IP address 192.168.0.25/24. SSHv2 and TELNET are
enabled by default.

It is possible to manage the equipment through any Ethernet interface. Additional configuration can be performed to allow
access through other interface and also do disable SSHv2 or TELNET protocols, if required.

1.4 Accessing the equipment for the first time

To login to the equipment for the first time, the admin user and admin default password must be used.

DATACOM 204.4305.05 - March 30, 2020 11


DM2500 - Quick Configuration Guide 1 Starting

dm2500 login: admin


Password: admin
dm2500:~$

For security purposes, it is highly recommended to change the equipment default password.

Please read the Users’ Authentication chapter to check on how to proceed to change the user password.

DATACOM 204.4305.05 - March 30, 2020 12


DM2500 - Quick Configuration Guide 2 Basic Management

2 Basic Management
This chapter contains the following sections:

• Firmware Update

• Operation Mode

• Configuration Types

• Configuration Files

• Copying and pasting configuration commands

• Configuration over SNMP protocol

2.1 Firmware Update

Contact DATACOM Technical support to check the firmware images available for download and installation
according to your products.

It will be necessary to use a PC with a TFTP, SCP or HTTP Server installed in order to download the firmware to the
equipment.

It is possible to check the firmware installed in the equipment using the show firmware command:

dm2500:~$ show firmware


Software:
Version Release Date State
----------------- --------------------- -----------------
1.4.2 2018-07-06 14:25:24 Active/Startup
1.4.0 2018-06-22 09:57:23 Inactive
State:
Active - Running firmware
Invalid - Partition is empty or corrupted
Inactive - Firmware is not running
Startup - Firmware to be used in the next boot

To download the firmware file through TFTP, use the following command:

firmware add tftp://172.22.107.11/pd3701-1.4.4.swu


Warning! This will overwrite 1.4.0.
Proceed with this operation? (Yes/No) [No] yes
1.4.4 loaded successfully in inactive partition.
Do you want to mark the new firmware as startup and reboot now? (Yes/No) [No] yes [Enter]

An automatic reboot will occur after the firmware update procedure.

If it is decided not to perform the firmware swap and reboot after the download, the user may execute the firmware swap
later:

DATACOM 204.4305.05 - March 30, 2020 13


DM2500 - Quick Configuration Guide 2 Basic Management

dm2500:~$ firmware swap


Do you want to swap the startup firmware partition? [Yes/No] [Yes] yes
1.4.4 is now the startup firmware partition.
Proceed with reboot? (Yes/No) [No] yes

The user may choose not to reboot the equipment after firmware download and activation to finish the upgrade at a later
time. To finish the firmware upgrade, the user should use the reboot command:

reboot

2.2 Operation Mode

DM2500 CLI supports the configuration and operational.

2.2.1 Operational Mode

After login in the equipment, the CLI is in the operational mode. In this mode it is possible to check the equipment
information, run connectivity tests and more. In this mode, it is not possible to modify the equipment configuration.

While in the operational mode, the CLI prompt will display as prefix the name of host followed by the $ character.

dm2500:~$

To check the list of possible operational commands, press the question mark ? or the [Tab] key in the
prompt.

It is possible to check some important information of the equipment in the operational mode using the following
commands:

Comando Descrição

show inventory Show equipment inventory

show environment Shows value of temperature sensors

show psu Shows power supply status

show firmware Shows firmware version

show configuration Shows current configuration of the equipment

show system cpu-utilization Shows CPU utilization

show system memory Shows memory usage

show system uptime Shows equipment uptime

DATACOM 204.4305.05 - March 30, 2020 14


DM2500 - Quick Configuration Guide 2 Basic Management

Comando Descrição

show system clock Shows equipment current time

show users Shows users connected to the equipment

It is possible to execute any command of the operational mode in the configuration mode adding the keyword run before
the command. Below there is an example:

run show configuration

2.2.2 Configuration Mode

To modify the configuration it is necessary to enter in the configuration mode through the following command:

configure

After entering in the configuration mode, the CLI prompt will exhibit the character as indicated below:

dm2500#

To exit the configuration mode, the user should use the following command:

dm2500# exit

2.3 Configuration Types

DM2500 has three configurations, the candidate, the startup and the running configuration, as explained below.

• Candidate configuration: While the user changes the configuration and do not commits it, the configuration
is temporarily saved as candidate. If the equipment is rebooted or the user quits the session, the candidate
configuration is lost.

• Running configuration: After the user commits the candidate configuration, it is applied to the running configura-
tion. If the equipment reboots, the running configuration is lost.

• Startup configuration: The startup configuratoin is loaded when the device boots. After the commit command, the
user should run the save command to save the running configuration to the startup configuration.

2.3.1 Applying the Candidate Config to the Running Config

To activate the candidate configuration, is necessary to copy it to the running configuration. The commit command
applies the candidate config to the running config.

DATACOM 204.4305.05 - March 30, 2020 15


DM2500 - Quick Configuration Guide 2 Basic Management

commit

The user can temporarily apply the candidate configuration. When executing the command commit-confirm, the
candidate config is applied. The user must execute the commit command to apply the config definitively. If the commit is
not execute, the configuration is rolled back after the default time of 10 minutes.

The default 10 minutos timeout can be changed, as shown below, where the timeout is set to 5 minutes.

commit-confirm 5

! Confirming the configuration commit


confirm

2.3.2 Applying the Running Config to the Startup Configuration

To save the running config to the startup config, the user should use the save command, which will save the configuration.
The configuration is saved by default in the config.boot file. The save command must be executed in the configuration
mode.
save
Saving configuration to ’config.boot’...
Done
[edit]

Discarding the Candidate Configuration

In the configuratoin mode, to discard all uncommited changes, the user can use the discard command.

discard

2.3.3 Checking the Configuration

The use can check the current configuration using the show configuration command.

show configuration

To check the candidate configuration, the user can execute the show command while in configuration mode.

show

The check the differences between the current configuration and the candidate one, the user should execute the command
compare.
compare

DATACOM 204.4305.05 - March 30, 2020 16


DM2500 - Quick Configuration Guide 2 Basic Management

2.3.4 Restoring the Configuration

To revert to the last commited configuration, the user should use the rollback command.

rollback
commit

To complete the rollback, a reboot is needed. Be aware that during this procedure, there will be a brief
service interruption.

2.3.5 Restoring to the Factory Config

To restore to the factory configuration, use the load default command.

The folloing procedure will erase the current configuration and load the factory config.

load default
commit

2.4 Configuration to a File

The user can save the candidate configuration without needing to commit it, as shown below, where the candidate config
is saved to the CANDIDATE-CONFIG file.
save CANDIDATE-CONFIG

2.4.1 Exporting Configuration Files

The user can export a configuration file to a SCP, FTP or TFTP server. The following command will send via TFTP protocol
the CONFIG_1 file to the server 172.1.1.1.
save tftp://172.1.1.1/CONFIG_1

2.4.2 Importing Configuration Files

The command below shows how to copy the configuration file config_1 from TFTP server 192.168.0.15 to the equipment.

The load command will erase the current configuration and replace it by the configuration in the file.

DATACOM 204.4305.05 - March 30, 2020 17


DM2500 - Quick Configuration Guide 2 Basic Management

configure
load tftp://192.168.0.15/config_1
commit

The merge command can also be used. It will merge the current configuration against the configuration present in the file.

configure
merge tftp://192.168.0.15/config_1
commit

2.4.3 Handling Files

To list all saved files, the user should use the show configuration files in the operational mode.

show configuration files

To show the content of a file, the user should use the command below in the operational mode.

show configuration files <file-name>

Do delete a file, use the command below.

delete configuration <file-name>

2.4.4 Loading Configurations from a File

The load command replaces the candidate configuration with the configuration in the specified file.

load <file-name>
commit

It is possible to merge the candidate configuration with the configuration in a saved file. The configuration commands in
the file will be merged to the candidate configuration or will replace it in case of conflict.

merge <file-name>
commit

2.5 Copying and pasting configuration commands

To paste a large number of configuration lines, the paste mode should be used. In the configuration mode, enter the paste
command. Then, the configuration commands can be pasted. To apply the configuration and exit the paste mode, enter
the commit command.

DATACOM 204.4305.05 - March 30, 2020 18


DM2500 - Quick Configuration Guide 2 Basic Management

Only configuration commands in the set or delete formats can be used.

In the example below, the user enters in the paste mode.

configure
paste

And then, the user pastes the configuration with the commit command at the end.

set system host-name DM2500-A


delete interfaces ethernet eth1 address
set interfaces ethernet eth2 address 10.0.0.1/24
set protocols static route 0.0.0.0/0 next-hop 10.0.0.254
commit

2.6 Configuration over SNMP protocol

The DM2500 allows to configure the equipment through SNMP protocol using the DATACOM-ROUTER-B-MIB MIB.

The user will be able to use text mode configuration files previously created and made available on a TFTP server.

The equipment must have management and SNMP previously configured. For more information, see the
chapter Configuring the SNMP protocol

2.6.1 Applying a configuration via SNMP to running-config

The following command sequence is supported only on computers running Linux operating system.

Suppose the user wants to apply the cfg-snmp-dm2500 configuration to the running-config of the DM2500 with IPv4
172.22.109.30 device via SNMP protocol using a TFTP server with IPv4 address 10.0.120.96.

Below is the command sequence for applying the cfg-snmp-dm2500 file configuration to running-config.

snmpset -v2c -c private 172.22.109.30 rtbConfigCopyFileName.0 s cfg-snmp-dm2500


snmpset -v2c -c private 172.22.109.30 rtbConfigCopyServerAddress.0 a 10.0.120.96
snmpset -v2c -c private 172.22.109.30 rtbConfigCopyDestFileType.0 i 1
snmpset -v2c -c private 172.22.109.30 rtbConfigCopyInitTransfer.0 i 2
snmpget -v2c -c private 172.22.109.30 rtbConfigCopyStatus.0

DATACOM 204.4305.05 - March 30, 2020 19


DM2500 - Quick Configuration Guide 3 Equipment Management

3 Equipment Management
This chapter will guide to user to perform equipment management configurations. This chapter contains the following
sessions:

• Configuring a management interface

• Configuring the hostname

• Configuring the banner

• Configuring the system clock

• Configuring the summertime

• Configuring the NTP protocol

• Configuring a remote syslog server

• Configuring the SNMP protocol

3.1 Configuring a management interface

The equipment can be management through any interface with a configured IP address.

It is described how to configure a management IP address in those interfaces.

It is possible to configure an interface with IPv4 or IPv6 address for equipment management.

The diagram below represents the network topology which will be used as base in this section.

Configuring a management interface

3.1.1 Management through an exclusive interface

This configuration mode is used when it is possible to use a dedicated ethernet interface for management. By default, the
IP address 192.168.0.25/24 is configured in the physical interface eth1.

In the procedure below, the default IP address is removed from eth1 and the new IP address 172.24.22.1/24 and gateway
172.24.22.254 are configured:

DATACOM 204.4305.05 - March 30, 2020 20


DM2500 - Quick Configuration Guide 3 Equipment Management

configure
delete interfaces ethernet eth1 address 192.168.0.25/24
set interfaces ethernet eth1 address 172.24.22.1/24
set system gateway-address 172.24.22.254
commit
save

3.1.2 Shared management in a physical interface

In this configuration mode, the management IP address is assigned to a VLAN making it possible to configure another
VLANs and their repective IP addresses in the same interface. By default, the IP address 192.168.0.25/24 is configured in
the physical interface eth1.

In the procedure below, the default IP address is removed from eth1 and the new IP address 172.24.22.1/24 and gateway
172.24.22.254 are configured in the VLAN 10:

configure
delete interfaces ethernet eth1 address 192.168.0.25/24
set interfaces ethernet eth1 vif 10 address 172.24.22.1/24
set system gateway-address 172.24.22.254
commit
save

3.2 Configuring the hostname

To configure the hostname DATACOM-ROUTER-R1, use the following commands:

configure
set system host-name DATACOM-ROUTER-R1
commit
save

3.3 Configuring the banner

The banner can be configured for pre-login and post-login.

The banner content must be configured in a single line and be between double-quotes (””).

It is possible to configure a multiline banner using the \n character to break lines.

The procedure below shows how to configure a pre-login banner:

DATACOM 204.4305.05 - March 30, 2020 21


DM2500 - Quick Configuration Guide 3 Equipment Management

configure
set system login banner pre-login "Access allowed only for\nauthorized personel."
commit
save

The procedure below shows how to configure a post-login bannter:

configure
set system login banner post-login "Welcome to DM2500\n"
commit
save

3.4 Configuring the system clock

The time and date configuration is important for log and events viewing. The use can set the system clock from the
operatinal mode. Configuration commit is not needed.

It is recomended the use of a NTP server for centralized clock synchronization.

The syntax to configure date and time is: Month|Day|Hour|Minute|Year.

The command below shows how to set date and time to 08-jun-2017 15:40.

set system clock 060815402017

To change the timezone to Brazil/East, use the command below:

configure
set system time-zone Brazil/East
commit
save

To check the equipment date and time, use the command show system clock:

show system clock

3.5 Configuring the summertime

When a timezone is configured, the summertime is automatically configuring according to that timezone standard. In case
it is necessary to change the timezone, the commands below can be used:

DATACOM 204.4305.05 - March 30, 2020 22


DM2500 - Quick Configuration Guide 3 Equipment Management

configure
set system clock summer-time recurring BRST month-to-start 11
set system clock summer-time recurring BRST month-to-end 2
set system clock summer-time recurring BRST time-to-start 00:00
set system clock summer-time recurring BRST time-to-end 00:00
set system clock summer-time recurring BRST week-day-to-start 1
set system clock summer-time recurring BRST week-day-to-end 1
set system clock summer-time recurring BRST week-to-start 1
set system clock summer-time recurring BRST week-to-end 4
commit
save

3.6 Configuring the NTP protocol

The NTP (Network Time Protocol) is used to synchronized the system clock to a remote server. That is important to log and
event visualization.

It is possible to configure NTP with IPv4 or IPv6 addresses.

The scenario below will be used to show the NTP configuration.

Configuring the NTP protocol

To configure the DM2500 as client of two NTP servers with IPv4 addresses 172.24.22.201 and 172.24.22.202, follow the
procedure below:

configure
set system ntp server 172.24.22.201
set system ntp server 172.24.22.202
commit
save

The following commands can be used to check the NTP protocol operation.

show ntp

3.7 Configuring a syslog remote server

According to RFC5424, syslog protocol is used to transport log messages to a centralized server. for instance, if a Ethernet
interface goes down, a message informing that status change will be sent to the server. That is important for log visualization

DATACOM 204.4305.05 - March 30, 2020 23


DM2500 - Quick Configuration Guide 3 Equipment Management

in an unique and centralized location. DM2500 does no support log severity. All logs are sent to the server once it is
configured.

It is possible to configure a Remote Syslog with IPv4 or IPv6 addresses.

The topology below is used to demonstrate the Remote Syslog configuration.

Configuring a syslog remote server

The following procedure shows how to configure the DM2500 as a Remote Syslog server client with IPv4 address 10.1.100.7:

configure
set system syslog host 10.1.100.7
commit
save

The commands bellow can be used for log viewing.

show log
show log tail
clear log

3.8 Configuring the SNMP protocol

SNMP is a protocol that helps network administrators to manage devices, identify and troubleshoot problems in the
network.

The SNMP protocol has three versions:

Command Description

The original SNMP version does not have any type of security, since it
SNMPv1
uses a plain text community for authentication.

This version was developed to fixed some v1 problems, but security is


SNMPv2
still ad issue since the plain text community is still used.

SNMPv3 supports encripted authentication and payload. Authentication


SNMPv3 can use SHA or MD5. Payload supports DES or AES encription. It is
recommended to use SNMPv3, mainly in non-trusted networks.

DATACOM 204.4305.05 - March 30, 2020 24


DM2500 - Quick Configuration Guide 3 Equipment Management

It is possible to configure the SNMP protocol with IPv4 or IPv6 addresses.

The topology bellow will be used to illustrate the SNMP protocol configuration.

Configuring the SNMP protocol

3.8.1 Configuring the SNMPv2 protocol

To enable the SNMPv2 protocol with private (rw) community for read or write and send traps to server 172.22.1.252, the
following procedure can be used:

configure
set service snmp community private authorization rw
set service snmp trap-target 172.22.1.252
commit
save

3.8.2 Configuring the SNMPv3 protocol

The SNMP protocol follows a hierarchical tree, due this a view shows from which branch is possible to
access the OIDs. For example: If configured root(1).iso(3).org(6).internet(1) access will be allowed to all OIDs
starting with 1.3.6.1, in other words, all OIDs supported by the equipment.

The example below shows the SNMPv3 configuration with packet payload encrypted using AES and user userv3 plus
password user1234 encrypted using SHA. The views configured allow only access to IF-MIB (1.3.6.1.2.1.2.2.1) and SysName
(1.3.6.1.2.1.1.5.0). The SNMP Traps are sent to 172.22.1.252 server.

configure
set service snmp v3 engineid ’0x80001f8880243d9cbd000000005e5d04ce’
set service snmp v3 user userv3 mode ro
set service snmp v3 user userv3 auth plaintext-key user1234
set service snmp v3 user userv3 auth type ’sha’
set service snmp v3 user userv3 privacy plaintext-key pass1234
set service snmp v3 user userv3 privacy type ’aes’
set service snmp v3 view OidView oid 1.3.6.1.2.1.1.5.0
set service snmp v3 view OidView oid 1.3.6.1.2.1.2.2.1
set service snmp v3 group ReadOnlyGroupAuthPriv seclevel priv
set service snmp v3 group ReadOnlyGroupAuthPriv mode ro
set service snmp v3 group ReadOnlyGroupAuthPriv view OidView

DATACOM 204.4305.05 - March 30, 2020 25


DM2500 - Quick Configuration Guide 3 Equipment Management

set service snmp v3 user userv3 engineid ’0x80001f8880243d9cbd000000005e5d04ce’


set service snmp v3 user userv3 group ReadOnlyGroupAuthPriv
set service snmp v3 trap-target 172.22.1.252 auth plaintext-key ’user1234’
set service snmp v3 trap-target 172.22.1.252 auth type ’sha’
set service snmp v3 trap-target 172.22.1.252 engineid ’23’
set service snmp v3 trap-target 172.22.1.252 user ’userv3’
commit
save

3.8.3 SNMP Traps

The SNMP agent also has the function of generating alerts (Traps). To send a SNMP Trap is necessary to configure at least
one group as shown below:

configure
set service snmp trap-enable config
set service snmp trap-enable cpu-core
set service snmp trap-enable cpu-overall
set service snmp trap-enable dying-gasp
set service snmp trap-enable link-up
set service snmp trap-enable link-down
set service snmp trap-enable login
set service snmp trap-enable memory
set service snmp trap-enable temperature
commit
save

DATACOM 204.4305.05 - March 30, 2020 26


DM2500 - Quick Configuration Guide 4 OAM

4 OAM
This chapter shows a group of Operations, Administration and Maintenance (OAM) functionalities that provide indication of
network failure, fault location, performance information, data functions and diagnostic. It contains the following sections:

• Setting the NetFlow/IPFIX

• Macros and Watch

• Setting the TWAMP

• Tcpdump

• Dump

• Show tech-support

• Monitor Bandwidth Test

4.1 Setting the NetFlow/IPFIX

Flow monitoring service allows gathering information of IP flows. The Router supports NetFlow versions 5, 9 and 10, where
the last version is also known as IPFIX (IP Flow Information Export) which is based on the IETF (Internet Engineering Task
Force) standard. This standard defines how the information of the IP flow are formatted and transferred from exporter
to collector, gathering information of IPv4 flows, as shown in the figure below. The exporter periodically gathers the
information related to the packets that flow through the router to a record. Then the exporter sends the record in a UDP
packet to the collector.

NetFlow/IPFIX Scenario

Considering that the user would like to monitor the flow of the eth1 and eth2 interfaces and wishes to upload this
information to the 10.0.120.102 server through the 4739 port using version 10 of the Netflow. The procedure below will
show how to execute this configuration:

configure
set service netflow destination 10.0.120.102 port ’4739’
set service netflow version ’10’
set service netflow interface ’eth1’
ser service netflow interface ’eth2’
commit

DATACOM 204.4305.05 - March 30, 2020 27


DM2500 - Quick Configuration Guide 4 OAM

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

It is possible configure NetFlow/IPFIX to provide a deterministic or random sampling for a subset of flow selecting only one
packet in a set of packets in a sequential order (n is parameter configurable by the user).
It is said that the sampling is deterministic if the user defines the sampling rate to 1 in each 100 packets, in this point the
NetFlow/IPFIX will examine the packets 1, 101, 201, 301 and so on.
In the random sampling mode, the input packets are selected in a randomly order so that one in each sequential n-packets
is selected in average for its processing.

configure
! Sampling rate to 1 in each 100 packets
set service netflow sampling-rate 100
! Sampling mode
set service netflow sampling-rate 100 mode deterministic
commit

Below are the main commands available to check the flow monitoring. If the user is at configuration level, it is necessary to
use the keyword run before the command

show netflow export


show netflow stats

4.2 Macros and Watch

This chapter introduces DM2500 tools for automating task execution, as well as the ability to create autorun scripts based
on the DM2500 feature status.

4.2.1 Macro

Macros are sets of CLI commands that can be executed by the user or through the Watch functionality of the DM2500.
Macro actions are performed in order, as if they were typed or performed by the operator.

The example below creates a macro to configure the NTP server:

set system macro 1 action 1 cli ’configure’


set system macro 1 action 2 cli ’set system ntp server 172.22.107.2’
set system macro 1 action 3 cli ’commit’
commit

To run the macro and configure the NTP server, use the command below:

system execute macro 1

4.2.2 Watch

Watch is a feature that allows the DM2500 to make decisions (macro executions) based on CLI command output. Watch
acts as an operator who executes commands on the equipment at predefined intervals, and from the output of these

DATACOM 204.4305.05 - March 30, 2020 28


DM2500 - Quick Configuration Guide 4 OAM

commands proactively performs certain actions.

The example below performs a PING for an IPv4 every 10 seconds, looks for the 0 received expression on the command
return, and logs with the result of this operation.

set system watch 1 cli ’ping 10.0.120.96 count 1’


set system watch 1 interval ’10’
set system watch 1 match 1 regex ’0 received’
set system watch 1 ’log’
set system watch 1 ’enabled’
commit

To check the watch logs, run the following command:

show log watch

4.2.3 Performing an action with Watch

Once you have a Macro defined, you can run it using Watch. The steps below will demonstrate an application running via
Watch.

In the example below Watch will monitor the status of VRRP on the eth5 interface and will change the hostname of the
equipment for MASTER-ROUTER or BACKUP-ROUTER based on VRRP status.

Macro configuration:

set system macro 9 action 1 cli ’configure’


set system macro 9 action 2 cli ’set system host-name MASTER-ROUTER’
set system macro 9 action 3 cli ’commit’
set system macro 10 action 1 cli ’configure’
set system macro 10 action 2 cli ’set system host-name BACKUP-ROUTER’
set system macro 10 action 3 cli ’commit’
commit

Watch configuration:

set system watch 1 cli ’show vrrp interface eth5 group 1’


set system watch 1 ’enabled’
set system watch 1 interval ’10’
set system watch 1 ’log’
set system watch 1 match 1 regex ’MASTER’
set system watch 1 match 1 execute macro ’9’
set system watch 1 match 1 else execute macro ’10’
commit

Every 10 seconds the equipment will execute the command show vrrp interface eth5 and search for the keyword
MASTER. If the keyword is found, macro 9 will be executed, otherwise macro 10 will be executed.

4.3 Setting the TWAMP

The TWAMP (Two-Way Active Measurement Protocol) protocol measures the network performance parameters as latency,
jitter and loss of packets. Implementation of the TWAMP server is based on the specifications described in the RFC 5357.
The server solution architecture in the TWAMP defines the following logical components:

DATACOM 204.4305.05 - March 30, 2020 29


DM2500 - Quick Configuration Guide 4 OAM

• Session Reflector: Insert information to the test packets received and send them back.

• Server: Manages several TWAMP sessions.

The client solution architecture in the TWAMP defines the following logical components:

• Session Sender: Creates and sends TWAMP test packets to the Session-Reflector.

• Control Client: Sends requests to the TWAMP server in order to establish new sessions.

TWAMP Arquiteture

The TWAMP in the DM2500 has some restrictions as indicated in the note below:

• Up to 10 monitoring sessions are supported.

• No support to authentication/encryption exist.

• The reflector is capable to hear one single control port at each time.

The scenario below will be used to show the TWAMP configuration.

TWAMP Scenario

4.3.1 Setting the TWAMP Reflector

Considering that the user would like to configure a Sender and Reflector communicating through the 15000 port (default is
862). The procedure below will show how to execute this configuration:

configure
set interfaces ethernet eth1 address 10.10.20.250/24
set service twamp reflector port 15000
commit

DATACOM 204.4305.05 - March 30, 2020 30


DM2500 - Quick Configuration Guide 4 OAM

4.3.2 Setting the TWAMP Sender

configure
set interfaces ethernet eth1 address 10.10.10.250/24
set service twamp sender session 1 port 15000
set service twamp sender session 1 destination-ip 20.20.20.250
set service twamp sender session 1 source-ip 10.10.10.250
set service twamp sender session 1 time-interval 10
set service twamp sender session 1 session-duration 120
set service twamp sender session 1 packet-size 1280
set service twamp sender session 1 enable
commit

In the sender it is possible to configure the option to have measurements in a unidirectional manner.

configure
set service twamp sender session 1 one-way-results
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

It is possible to configure the TWAMP Sender as well as Reflector with support to IPv6, basically the change
in the configuration are the addresses that instead of being IPv4 will be IPv6.

Below are the main commands available to check the TWAMP. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show twamp reflector


show twamp reflector clients
show twamp sender session [ <1-10> ]
show twamp sender session [ <1-10> ] details
show twamp sender session [ <1-10> ] details two-way
show twamp sender session [ <1-10> ] details far-end
show twamp sender session [ <1-10> ] details near-end
show twamp debug [ all | tail [ <number> ] ]

4.3.3 IP SLA Object Tracking with TWAMP, Watch e Macro

TWAMP can act as a network monitor and generate path quality information between one or more routers. In conjunction
with the features Watch and Macro, it is possible to create an application to act as IP SLA on the network.

Scenario TWAMP IP SLA

Given the scenario in the figure above, imagine that the network administrator wants to monitor the latency of network
packets between R1 and R2, and network between R1 and R3. For this, two TWAMP sessions between R1 and R2 and

DATACOM 204.4305.05 - March 30, 2020 31


DM2500 - Quick Configuration Guide 4 OAM

between R1 and R3.

Router 1 Configuration:

set service twamp sender session 1 ’enable’


set service twamp sender session 1 session-duration ’10’
set service twamp sender session 1 time-interval ’10’
set service twamp sender session 1 source-ip ’25.12.0.1’
set service twamp sender session 1 destination-ip ’25.12.0.2’
set service twamp sender session 2 ’enable’
set service twamp sender session 2 session-duration ’10’
set service twamp sender session 2 time-interval ’10’
set service twamp sender session 2 source-ip ’25.13.0.1’
set service twamp sender session 2 destination-ip ’25.13.0.3’
commit

In R2 and R3 just enable the reflector that will process to reflect packets back to R1:

set service twamp reflector


commit

To verify TWAMP operation on R1, use the following commands:

show twamp sender session 1


show twamp sender session 2

4.3.4 TWAMP Comparator

Given the previous scenario where R1 with IP 33.33.33.31 can reach R4 with IP 33.33.33.34 by two paths, one going through
R2 and the other going through R3. If R1 is running TWAMP by monitoring paths R1, R2, and R1, R3, Watch can force IP
33.33.33.31 traffic to pass through the best path according to TWAMP data results and metrics.

To simplify Watch rules its possible configure TWAMP session comparator on R1:

! Enables comparator 1 for TWAMP sections 1 and 2


set service twamp sender comparator 1 sessions ’1’
set service twamp sender comparator 1 sessions ’2’
! Assigns 100 (maximum) weight for packet loss
set service twamp sender comparator 1 weights loss ’100’
! Assigns weight 10 to delays
set service twamp sender comparator 1 weights max-delay ’10’
commit

Setting the weights parameter serves to prioritize the compared parameters.

The comparator fetches the results of the TWAMP 1 and 2 session and returns the (Best session):

show twamp sender comparator 1


Session 1
Status: Enabled/Running
Test: 4151
Max delay: 0.29 ms
Avg delay: 0.21 ms
Max jitter: 0.12 ms
Avg jitter: 0.02 ms

DATACOM 204.4305.05 - March 30, 2020 32


DM2500 - Quick Configuration Guide 4 OAM

Loss ratio: 0.000000 % (weight: 100)


Calculated weight: 100
Session 2
Status: Enabled/Running
Test: 4170
Max delay: 0.27 ms (weight: 10)
Avg delay: 0.21 ms
Max jitter: 0.07 ms
Avg jitter: 0.03 ms
Loss ratio: 0.000000 % (weight: 100)
Calculated weight: 110
Best session: 2

With TWAMP configured and working in conjunction with the session comparator, the commands to configure Watch are:

set system watch 1 cli ’show twamp sender comparator 1’


set system watch 1 interval ’10’
! If you find ’Best session: 2’ run macro 2
set system watch 1 match 1 regex ’Best session: 2’
set system watch 1 match 1 execute macro ’2’
! If you find ’Best session: 1’ run macro 1
set system watch 1 match 2 regex ’Best session: 1’
set system watch 1 match 2 execute macro ’1’
commit

Every 10 seconds the equipment will execute show twamp sender comparator 1 and look for Best session: 2 or Best
session: 1 taking an action accordingly.

The action to force R1 traffic to go through the best way from the data and metrics of TWAMP results will change the
destination route metric for R1 to reach R2 using Macros.

Configuration of Macros that will be used to configure static routes in R1.

! Configure route for path R1, R2, and R4:


set system macro 1 action 1 cli ’configure’
set system macro 1 action 2 cli ’set protocols static route 33.33.33.4/32next-hop 25.12.0.2 distance 1’
set system macro 1 action 3 cli ’set protocols static route 33.33.33.4/32next-hop 25.13.0.3 distance 2’
set system macro 1 action 4 cli ’commit’
! Configure route for path R1, R3 and R4:
set system macro 2 action 1 cli ’configure’
set system macro 2 action 2 cli ’set protocols static route 33.33.33.4/32next-hop 25.13.0.3 distance 1’
set system macro 2 action 3 cli ’set protocols static route 33.33.33.4/32next-hop 25.12.0.2 distance 2’
set system macro 2 action 4 cli ’commit’
commit

4.4 tcpdump

The tcpdump is a packet capture resource that allows the network administrators to capture received and/or sent packets
by the equipment and analyze them locally or save them and export them for analysis using a tool such as the Wireshark.
To activate and capture packets, use the debug tcpdump command in the user mode.

dm2500:~$ debug tcpdump interface <interface> save-to-file count 100

The capture generated will be saved in the capture. pcap file and to export it to a TFTP server the user should use the
following command:

dm2500:~$ copy tcpdump-capture to tftp://172.22.107.11

DATACOM 204.4305.05 - March 30, 2020 33


DM2500 - Quick Configuration Guide 4 OAM

4.5 Dump

The dump command is a diagnostic tool that generates an encrypted file requested by DATACOM support when the user
opens a ticket.

The user should use the dump command in the user mode.

dm2500:~$ dump

The command will generate a binary file with the date and time of the day, and the user can export it to a TFTP server.

DM2500:~$ copy dump ?


Possible completions:
dump_20181106092150.bin Copy from local dump file
DM2500:~$ copy dump dump_20181106092150.bin to tftp://172.22.107.11
######################################################################## 100.0%

4.6 Show tech-support

The show tech-support command is a diagnostic tool that provides several important information to debug problems that
occur in equipment operation.

The user should use the show tech-support command in the user mode.

dm2500:~$ show tech-support

The following show commands are automatically executed through the show tech-support command.

show firmware
show inventory
show environment
show psu
show config tree
show log dhcp

4.7 Monitor Bandwidth Test

The monitor bandwidth-test feature is a diagnostic tool which allow throughput test between client and server using
Iperf3 application. The DM2500 supports client and server modes using IPv4 and IPv6 addresses.

4.7.1 Configuring the server mode

The 5201 TCP port is used in server mode.

DATACOM 204.4305.05 - March 30, 2020 34


DM2500 - Quick Configuration Guide 4 OAM

Only TCP Throughput test is supported.

The server supports IPv4 and IPv6 connections.

Configuring the DM2500 to wait for a client connection:

monitor bandwidth-test accept

Configuring the DM2500 to wait for a client connection in VRF:

monitor bandwidth-test vrf <vrf_name> accept

4.7.2 Configuring the client mode

The client supports IPv4 and IPv6 connections.

Configuring the DM2500 to connect to Iperf server:

monitor bandwidth-test initiate <ip_address>

Configuring the DM2500 to connect to Iperf server in VRF:

monitor bandwidth-test vrf <vrf_name> initiate <ip_address>

DATACOM 204.4305.05 - March 30, 2020 35


DM2500 - Quick Configuration Guide 5 Connectivity Tools

5 Connectivity Tools
The DM2500 offers some tools to check the network connectivity as well as to access equipment as from DM2500 itself.

The user should use the keyword run before the command if it is in the config mode.

This chapter contains the following sections:

• Ping and Ping6

• Traceroute and Traceroute6

• SSH Client and Telnet Client

5.1 Ping and Ping6

The ping command is a common method to check the connectivity of the equipment with the other equipment or to test a
specific protocol.

To execute a ping with IPv4 address, follow the procedure below:

ping 5.178.41.1
PING 5.178.41.1 (5.178.41.1) 56(84) bytes of data.
64 bytes from 5.178.41.1: icmp_seq=1 ttl=61 time=2.15 ms
64 bytes from 5.178.41.1: icmp_seq=2 ttl=61 time=2.06 ms
64 bytes from 5.178.41.1: icmp_seq=3 ttl=61 time=2.12 ms
64 bytes from 5.178.41.1: icmp_seq=4 ttl=61 time=2.27 ms
64 bytes from 5.178.41.1: icmp_seq=5 ttl=61 time=2.07 ms
--- 5.178.41.1 ping statistics ---
5 packets transmitted, 5 received, 0% packet loss, time 4005ms
rtt min/avg/max/mdev = 2.065/2.139/2.272/0.074 ms

To execute a ping with IPv6 address, follow the procedure below:

ping6 2002:c0a8:fe05::6
PING 2002:c0a8:fe05::6(2002:c0a8:fe05::6) 56 data bytes
64 bytes from 2002:c0a8:fe05::6: icmp_seq=1 ttl=62 time=7.94 ms
64 bytes from 2002:c0a8:fe05::6: icmp_seq=2 ttl=62 time=4.66 ms
64 bytes from 2002:c0a8:fe05::6: icmp_seq=3 ttl=62 time=5.05 ms
64 bytes from 2002:c0a8:fe05::6: icmp_seq=4 ttl=62 time=5.00 ms
64 bytes from 2002:c0a8:fe05::6: icmp_seq=5 ttl=62 time=6.84 ms
--- 2002:c0a8:fe05::6 ping statistics ---
5 packets transmitted, 5 received, 0% packet loss, time 4005ms
rtt min/avg/max/mdev = 4.664/5.903/7.948/1.274 ms

5.2 Traceroute and Traceroute6

The traceroute command is a method to execute the network diagnosis informing the hop-by-hop connectivity through
which the pack is passing until the final destination.

To execute a traceroute with IPv4 address, follow the procedure below:

DATACOM 204.4305.05 - March 30, 2020 36


DM2500 - Quick Configuration Guide 5 Connectivity Tools

traceroute 5.178.41.1
traceroute to 5.178.41.1 (5.178.41.1), 30 hops max, 38 byte packets
1 192.168.48.3 (192.168.48.3) 2.029 ms 4.345 ms 1.751 ms
2 192.168.48.1 (192.168.48.1) 2.842 ms 2.488 ms 3.226 ms
3 192.168.254.22 (192.168.254.22) 3.582 ms 3.403 ms 3.622 ms
4 192.168.84.22 (192.168.84.22) 2.306 ms 1.802 ms 2.264 ms
5 5.178.41.1 (5.178.41.1) 2.219 ms 1.651 ms 54.376 ms

To execute a traceroute with IPv6 address, follow the procedure below:

traceroute6 2002:c0a8:fe05::6
traceroute to 2002:c0a8:fe05::6 (2002:c0a8:fe05::6) from 1997::c0a8:3002,
30 hops max, 16 byte packets
1 1997::c0a8:3001 (1997::c0a8:3001) 13.877 ms 2.298 ms 2.249 ms
2 2001::c0a8:3001 (2001::c0a8:3001) 3.64 ms 2.969 ms 2.869 ms
3 2002:c0a8:fe05::6 (2002:c0a8:fe05::6) 4.444 ms 3.624 ms 5.787 ms

5.3 SSH Client and Telnet Client

It is possible to access other equipment using SSH and TELNET protocols as from an equipment with DM2500.

To access an equipment with IPv4 192.168.1.254 address through the SSH, the user should use the command below,
specifying the user to be authenticated, in this example, the admin user:

ssh [email protected]

To access an equipment with IPv4 192.168.1.254 address through the TELNET the user should use the command
mentioned below:
telnet 192.168.1.254

DATACOM 204.4305.05 - March 30, 2020 37


DM2500 - Quick Configuration Guide 6 Users Authentication

6 Users Authentication
Only one user account is configured by default in the DM2500. The user is the admin with the admin password and has the
admin privilege level.

This chapter contains the following sections:

• Change the default password

• Setting the Local Users

• Setting the TACACS+

• Setting the RADIUS

6.1 Change the default password

For security reasons, it is highly recommended change the admin user default password of the equipment.

To change the admin user default password, follow the steps below:

configure
set system login user admin authentication plaintext-password new-password
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

6.2 Setting the Local Users

The next steps will indicate how to configure a new user called “joao” with “joao1234” password and “admin” adminis-
trator privileges.

configure
set system login user joao authentication plaintext-password joao1234
set system login user joao level ’admin’
commit

The next steps will show how to delete the user “joao”.

configure
delete system login user joao
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the equipment users. If the user is at the config level, use the keyword
run before the command is required.

DATACOM 204.4305.05 - March 30, 2020 38


DM2500 - Quick Configuration Guide 6 Users Authentication

show system login user

6.3 Setting the TACACS+

The TACACS+ (Terminal Access Controller Access-Control System) is a protocol based on the AAA (Authentication, Autho-
rization Accounting) template that provides the authentication, authorization and accounting services in a safe manner
with encryption of the entire packet. This encryption depends on a secret key shared in each device. The authentication
methods supported are PAP (Password Authentication Protocol), CHAP (Challenge Handshake Authentication Protocol)
and ASCII (American Standard Code for Information Interchange).

The scenario below will be used to demonstrate TACACS+ configuration.

TACACS+

To configure the TACACS+, the user should specify the address of the server and the secret key to be used to authenticate
the users. It is recommended to write the secret key between simple quotation marks to allow usage of special characters.
Suppose the user wants to set up ascii authentication, authorization, and accounting with two TACACS+ servers, one IPv4
and one IPv6. The IPv4 server has the address 10.1.100.7 and the IPv6 server has the address 2019:1234::1, both with the
secret key pass1234.

The TACACS+ IPv4 server will have authentication priority over the TACACS+ IPv6 server if both are
configured.

The procedure below shows how to execute this configuration:

config
configure
set system login tacplus-server host 10.1.100.7 secret ’pass1234’
set system login tacplus-server host 2019:1234::1 secret ’pass1234’
set system login tacplus-server authentication-type ’ascii’
set system login tacplus-server authorization
set system login tacplus-server accounting
commit

After performing this configuration, authentication will take place on the basis of TACACS+. If authentication on the
TACACS+ server fails, authentication will occur on the local base.

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

DATACOM 204.4305.05 - March 30, 2020 39


DM2500 - Quick Configuration Guide 6 Users Authentication

Below are the main commands available to check the equipment users. If the user is at the config level, use the keyword
run before the command is required.

show tacacs
show tacacs debug

6.4 Setting the RADIUS

The RADIUS (Remote Authentication Dial In User Service) is a protocol that protects the networks against unauthorized
access and is based on the AAA template that provides the authentication, authorization and accounting services. The
RADIUS client, in this case the DM2500, sends authentication requests to a central RADIUS server that contains all the
authentication information of the user and of access to the network service.

The scenario below will be used to demonstrate RADIUS configuration.

RADIUS

It is not possible to configure the RADIUS with IPv6 addressing.

To configure the RADIUS, the user should specify the address of the server and the secret key to be used to authenticate
the users. It is recommended to write the secret key between simple quotation marks to allow usage of special characters.
Let’s suppose that the user would like to configure the authentication, authorization and accounting of two RADIUS servers
that have 192.168.1.1 and 172.22.107.4 IPv4 addresses, both with the secret key pass1234. The procedure below shows how
to execute this configuration:

configure
set system login radius-server host 192.168.1.1 port ’1812’
set system login radius-server host 192.168.1.1 secret ’pass1234’
set system login radius-server host 192.168.1.1 timeout ’2’
set system login radius-server host 172.22.107.4 port ’1812’
set system login radius-server host 172.22.107.4 secret ’pass1234’
set system login radius-server host 172.22.107.4 timeout ’2’
commit

It is not allowed to configure RADIUS and TACACS+ servers simultaneously.

DATACOM 204.4305.05 - March 30, 2020 40


DM2500 - Quick Configuration Guide 6 Users Authentication

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the equipment users. If the user is at the config level, use the keyword
run before the command is required.

show radius
show log radius

DATACOM 204.4305.05 - March 30, 2020 41


DM2500 - Quick Configuration Guide 7 Interfaces

7 Interfaces
This chapter shall indicate how to configure the interfaces available in the equipment.

When defining more than one IPv4/IPv6 address in the interface, it is recommended to use the address-
secondary parameter. Otherwise, the primary address (address that was defined with the address parameter)
will be overwritten.

• Setting the Ethernet Interface

• Setting the Loopback Interface

• Setting the Bridge Interface

• Setting the Bonding Interface (LAG)

7.1 Setting the Ethernet Interfaces

By default, all the Ethernet interfaces are deactivated, except the eth1 interface, that has the management
IP in the standard configuration.

To activate administratively an Ethernet interface, the user should use the procedure below.

configure
delete interfaces ethernet eth2 disable
commit

To deactivate administratively an Ethernet interface, the user should use the procedure below.

configure
set interfaces ethernet eth2 disable
commit

Interfaces that are not configured remain deactivated and do not appear in the show configuration. It is possible to remove
the entire configuration of an Ethernet interface through the following procedure:

configure
delete interfaces ethernet eth2
commit

7.1.1 Setting speed and duplex

In DM2500 all ethernet interfaces have auto-negotiation mode enabled by default. In this mode, the interface speed and
duplex negotiation occurs automatically, taking into account the remote link.

It is possible to change the configuration of the interface to work in forced mode. The procedure below shows how to
configure an interface to work in forced mode at a speed of 100 Mbps full-duplex.

DATACOM 204.4305.05 - March 30, 2020 42


DM2500 - Quick Configuration Guide 7 Interfaces

Both sides of the link (local and remote) must be configured in the same way.

configure
set interfaces ethernet eth7 speed 100
set interfaces ethernet eth7 duplex full
commit

Following the example above, if the interface uses an optical link, the parameter 100fx.

configure
set interfaces ethernet eth7 speed 100fx
set interfaces ethernet eth7 duplex full
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the Ethernet interfaces. If the user is at configuration level, it is necessary
to use the keyword run before the command

show interfaces ethernet


show interfaces counters
show interfaces utilization bandwidth
show interfaces utilization packets

7.2 Setting the Loopback Interface

A loopback interface is a virtual interface only for software that emulates a physical interface and allows the router to
“connect” to itself. The routed packets for the loopback interface are routed again to the router and processed locally. The
packets routed by the loopback interface, but not assigned to the loopback interface, are discarded.

It is possible to configure up to four loopback interfaces (lo1 to lo4)

Let’s suppose that the user would like to create two loopback interfaces, the lo1 and the lo2 with IPv4 and IPv6 addresses.
The procedure below indicates how to execute this configuration.

configure
set interfaces loopback lo1 address 192.168.255.105/32
set interfaces loopback lo1 address-secondary 192.168.254.105/32
set interfaces loopback lo2 address 177.66.5.1/24
set interfaces loopback lo2 address 2400:c0ca:beef::1/64
commit

To continue a configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the Ethernet interfaces. If the user is at configuration level, it is necessary
to use the keyword run before the command

DATACOM 204.4305.05 - March 30, 2020 43


DM2500 - Quick Configuration Guide 7 Interfaces

show interfaces
show interfaces loopback

7.3 Setting the Bridge Interface

Bridge configuration allows connection of several network segments (in general LAN segments) at level of layer 2 (switching).

As the Bridge occurs in layer 2 and the IP addresses are relevant only in layer 3 (routing, the network layer),
the IP addresses are not allowed in the interfaces that are being connected.

The Ethernet interface and the VLANs interfaces can be added directly to a Bridge

Let’s suppose that the user would like to create a bridge br1 with IPv4 and IPv6 addresses to connect the Ethernet eth2,
eth3 and eth4 interfaces. The procedure below shows how to execute this configuration.

configure
set interfaces bridge br1 address 192.168.10.2/24
set interfaces bridge br1 address 2018:c0ca:cafe::2/64
set interfaces ethernet eth2 bridge-group bridge br1
set interfaces ethernet eth3 bridge-group bridge br1
set interfaces ethernet eth4 bridge-group bridge br1
commit

Below are the main commands available to check the Ethernet interfaces. If the user is at configuration level, it is necessary
to use the keyword run before the command.

show bridge

7.4 Setting the Bonding Interfaces (Aggregation)

IEEE 802.3ad Link Aggregation allows to create a logical interface containing one or more physical interfaces. Aggregating
multiple links or physical interfaces creates a single point-to-point logical link (LAG). LAG makes it possible to split flows
between physical interfaces, effectively increasing bandwidth. Another advantage of link aggregation is the increased
availability of the communication link between the two devices, if one of the physical interfaces fails, the LAG will continue
to carry traffic through the remaining interfaces.

DATACOM 204.4305.05 - March 30, 2020 44


DM2500 - Quick Configuration Guide 7 Interfaces

Example of scenário with ling aggregation

As interfaces Bonding do DM2500 suportam três modos de balanceamento do tráfego de saída, chamados de Hash Policy:
The DM2500 Bonding interfaces support three outgoing traffic balancing modes, called Hash Policy:

• layer2: Use MAC addresses to generate the hash (802.3ad).

• layer2+3: Combine MAC address and IP address to make hash.

• layer3+4: Combine IP address and port to make hash.

7.4.1 Bonding Interface Static Mode

The next steps will demonstrate how to configure bonding interface in static mode using two (2) Ethernet interfaces,
totaling a possible bandwidth of 2Gbps.

configure
set interfaces bonding bond8 address ’192.168.53.1/24’
set interfaces bonding bond8 description ’INTF-BONDING’
set interfaces bonding bond8 hash-policy ’layer2’
! Setting static mode
set interfaces bonding bond8 mode ’xor-hash’
set interfaces ethernet eth7 bond-group ’bond8’
set interfaces ethernet eth8 bond-group ’bond8’
commit

7.4.2 Bonding Interface Dynamic Mode (LACP)

Link Aggregation Control Protocol (LACP) is a protocol used to ensure end-to-end aggregate interface (LAG) connectivity. It
detects and protects the network against a variety of misconfigurations, ensuring that links are only aggregated into one
bundle if they are configured and wired consistently. LACP can be configured in two ways:

• Active Mode Ativo (Active): The device immediately sends LACP messages (LACP PDUs) when the interface is
activated.

• Passive Mode (Passive): Puts an interface into a passive negotiation state, where the interface waits for remote
PDUs to send to initiate Link Aggregation negotiation and establishment.

If at least one endpoint is set to active, the LAG can be formed assuming a successful negotiation of the other parameters.

The next steps will demonstrate how configure bonding interface in dynamic mode using two (2) Ethernet interfaces,
totaling a possible bandwidth of 2Gbps.

DATACOM 204.4305.05 - March 30, 2020 45


DM2500 - Quick Configuration Guide 7 Interfaces

configure
set interfaces bonding bond8 address ’192.168.53.1/24’
set interfaces bonding bond8 description ’INTF-BONDING’
set interfaces bonding bond8 hash-policy ’layer2’
set interfaces bonding bond8 lacp-rate ’slow’
! Setting dinamic mode
set interfaces bonding bond8 mode ’802.3ad’
set interfaces ethernet eth7 bond-group ’bond8’
set interfaces ethernet eth8 bond-group ’bond8’
commit

Below are the main commands available to check the Ethernet interfaces. If the user is at configuration level, it is necessary
to use the keyword run before the command.

show interfaces bonding


show interfaces bonding <bondX>
show interfaces bonding <bondX> brief
show interfaces bonding <bondX> slaves
show interfaces bonding <bondX> status

DATACOM 204.4305.05 - March 30, 2020 46


DM2500 - Quick Configuration Guide 8 Connection Services

8 Connection Services
Some internet access providers require the use of PPPoE (Point-to-Point Protocol over Ethernet) for connection to Internet.
They can also use the DHCP (Dynamic Host Configuration Protocol) protocol to execute the dynamic assignment of IP
addresses, DNS, gateway, among others. This chapter shall indicate how to configure these services in the DM2500.

This chapter contais this follow sections:

• Setting the DHCPv4 Server

• Setting the DHCPv6 Server

• Setting the DHCPv4 Relay

• Setting the DHCPv6 Relay

• Setting the DHCPv4 Client

• Setting the DHCPv6 Client

• Setting the PPPoE Client

8.1 Setting the DHCPv4 Server

The DM2500 offers the DHCPv4 server functionality. Through this resource the equipment can distribute in a dynamic
manner IPv4 addresses to other elements connected in the same sub-network.

Considering that the user would like to configure a DHCPv4 server in the 10.10.10.0/24 using the address range 10.10.10.5
through 10.10.20. Also it would like that a server identified by a specific MAC receives the 10.10.10.2 address and that the
validity of the IPs granted through the renewal process has a duration of 24 hours.

The next steps will indicate how to execute these configurations.

DNS server sent by DHCP server should be the same as you have in your network, in example below is used
the Google public DNS.

configure
set interfaces ethernet eth3 address ’10.10.10.1/24’
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 lease 86400
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 dns-server
8.8.8.8
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 default-router
10.10.10.1
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 start 10.10.10.5
stop 10.10.10.20
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 domain-name
dhcp-internal
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 static-mapping
SERVER-10-2 ip-address 10.10.10.2
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 static-mapping
SERVER-10-2 mac-address 00:04:df:cc:3a:04
commit

To continue a configuration after an eventual reboot, the user must use the save command after the commit command.

Below are the main commands available to check the DHCP Server. If the user is at configuration level, it is necessary to

DATACOM 204.4305.05 - March 30, 2020 47


DM2500 - Quick Configuration Guide 8 Connection Services

use the keyword run before the command

show dhcp server leases


show dhcp server statistics

8.1.1 Configurando as opções do DHCPv4 Server

The DM2500 support some DHCPv4 options predefined and configuration by code, allowing any DHCPv4 options to be
configured. For more information about codes and format accepted for each code, please see the RFC 2132.
The next steps will show some examples of how to execute these configurations:

SMTP server predefined option configuration:

configure
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 smtp-server
172.22.103.32
commit

LPR Server (code 9) configuration with a IPv4 address:

configure
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 option 9 ipv4
172.22.103.32
commit

LPR Server (code 9) configuration with two IPv4 addresses (172.22.103.32 and 172.22.103.40):

configure
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 option 9
hex ac:16:67:20:ac:16:67:28
commit

Hostname (code 12) configuration:

configure
set service dhcp-server shared-network-name DM2500-NETWORK subnet 10.10.10.0/24 option 12
ascii DM2500-6GT
commit

8.2 Setting the DHCPv6 Server

The DM2500 offers the DHCPv6 server functionality. Through this resource the equipment can distribute in a dynamic
manner IPv6 addresses to other elements connected in the same sub-network.

The next steps will show how to configure the service to provide IPv6 addresses in the 2001:C0A8:5600::/64 network with
validity of the addresses for renewal of 24 hours and a host identified by the UID receiving de 2001:c0a8:5600::10 address.

configure
set interfaces ethernet eth3 address ’2001:C0A8:5600::1/64’
set service dhcpv6-server shared-network-name systemTest subnet 2001:C0A8:5600::/64 address-range
prefix ’2001:C0A8:5600::/64’
set service dhcpv6-server shared-network-name systemTest subnet 2001:C0A8:5600::/64 domain-search
’dhcp-internal’
set service dhcpv6-server shared-network-name systemTest subnet 2001:C0A8:5600::/64 lease-time

DATACOM 204.4305.05 - March 30, 2020 48


DM2500 - Quick Configuration Guide 8 Connection Services

default ’86400’
set service dhcpv6-server shared-network-name systemTest subnet 2001:C0A8:5600::/64 name-server
’2001::2’
set service dhcpv6-server shared-network-name systemTest subnet 2001:C0A8:5600::/64 static-mapping
teste identifier ’00:01:00:01:5b:cd:f6:b7:00:aa:00:00:00:0a’
set service dhcpv6-server shared-network-name systemTest subnet 2001:C0A8:5600::/64 static-mapping
teste ipv6-address ’2001:c0a8:5600::10’
commit

To continue a configuration after an eventual reboot, the user must use the save command after the commit command.

Below are the main commands available to check the DHCP Server. If the user is at configuration level, it is necessary to
use the keyword run before the command.

show dhcpv6 server leases


show dhcpv6 server status

8.3 Setting the DHCPv4 Relay

The DM2500 offers the DHCPv4 Relay functionality to forward DHCP requests from a given network to a DHCP server
present in another network. Each interface involved in the DHCPv4 Relay should be configured. Thus, for example, if the
requests are incoming in the eth0 interface and the DHCPv4 server specified in the configuration is accessed through the
eth1 interface, the eth0 as well as the eth1 should be configured for the DHCP Relay.

Considering that the user would like to configure a DHCPv4 Relay to forward the DHCP requests from clients that are in the
10.10.10.0/24 network to the DHCPv4 server that is in another network with the 10.20.30.1/24 address. The next steps will
show how to execute these configurations.

configure
set interfaces ethernet eth0 address ’10.10.10.1/24’
set interfaces ethernet eth1 address ’10.100.100.1/30’
set service dhcp-relay interface ’eth1’
set service dhcp-relay interface ’eth0’
set service dhcp-relay server ’10.20.30.1’
set service dhcp-relay relay-options relay-agents-packets ’discard’
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the functionality. If the user is at configuration level, it is necessary to
use the keyword run before the command.

show log dhcp

8.4 Setting the DHCPv6 Relay

The DHCPv6 Relay receives the requests sent by DHCPv6 clients and forwards them to DHCPv6 servers. As the client
request packets and the retransmitted requests are transported in IPv6 multicast packets, the user must specify the
interfaces where the relay will receive the request and the interfaces in which it should retransmit these requests.

DATACOM 204.4305.05 - March 30, 2020 49


DM2500 - Quick Configuration Guide 8 Connection Services

Considering that the user would like to configure a DHCPv6 Relay to forward the DHCP requests from clients that are in the
2605:ef80:240::1/64 network to a DHCPv6 server that is in another network with the 2600::c0a8:2d01 address.
The next steps will indicate how to execute these configurations.

configure
set interfaces ethernet eth0 address ’2605:ef80:240::1/64’
set interfaces ethernet eth1 ipv6 address eui64 ’2404:6800:4001::/64’
set service dhcpv6-relay listen-interface ’eth0’
set service dhcpv6-relay upstream-interface eth1 address ’2600::c0a8:2d01’
commit

As operation of DHCPv6 Relay is different from the DHCPv4 Relay, it is necessary configure the Router Advertisement in the
interface that is receiving the requests.

configure
set interfaces ethernet eth0 ipv6 router-advert managed-flag ’true’
set interfaces ethernet eth0 ipv6 router-advert other-config-flag ’true’
set interfaces ethernet eth0 ipv6 router-advert prefix 2605:ef80:240::/64 autonomous-flag ’true’
set interfaces ethernet eth0 ipv6 router-advert prefix 2605:ef80:240::/64 on-link-flag ’true’
set interfaces ethernet eth0 ipv6 router-advert send-advert ’true’
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the DHCP Server. If the user is at configuration level, it is necessary to
use the keyword run before the command.

show log dhcp

8.5 Setting the DHCPv4 Client

It is possible to configure a DHCPv4 client linked to an Ethernet interface for the dynamic assignment of IPv4 address
according to determination of a DHCPv4 server.

Considering that the user would like to obtain the IPv4 address through the eth4 interface.
The next steps will indicate how to execute these configurations.

configure
set interfaces ethernet eth4 address dhcp
commit

To persist the configuration after an eventual reboot, the user must use the save command after the commit command.

Below are the main commands available to check the DHCP Client. If the user is at configuration level, it is necessary to use
the keyword run before the command

show dhcp client leases


show interfaces ethernet

DATACOM 204.4305.05 - March 30, 2020 50


DM2500 - Quick Configuration Guide 8 Connection Services

8.6 Setting the DHCPv6 Client

It is possible to configure a DHCPv6 client in an Ethernet interface for dynamic assignment of IPv6 according to determination
of a DHCPv6 server.

Considering that the user would like that the IPv6 address of the eth4 Ethernet interface be assigned in a dynamic manner
as from a DHCPv6 server connected to it.
The next steps will indicate how to execute these configurations.

configure
set interfaces ethernet eth4 address dhcpv6
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the DHCPv6. If the user is at configuration level, it is necessary to use the
keyword run before the command

show interfaces

8.7 Setting the PPPoE Client

The PPPoE (Point-to-Point Protocol over Ethernet) encapsulation for an Ethernet interface is defined in RFC2516. This type
of interface is used to connect itself to a point of the network with support to PPPoE. With the PPPoE encapsulation, the
local and remote IP addresses can be negotiated automatically instead of explicitly specified by the user. Per default, the
negotiation is carried out automatically if the addresses are not specified.

The PPPoE session can only be configured to operate with IPv4 addresses, and it is possible to configure up
to 15 PPPoE interfaces.

Considering that the user would like to establish a PPPoE session using the pppoe 15 interface which is associated with the
eth1 Ethernet interface. The next steps will indicate how to execute these configurations.

configure
set interfaces pppoe 15 user-id [email protected]
set interfaces pppoe 15 password d4t4c0m
set interface ethernet eth1 pppoe 15
commit

The TCP MSS (Maximum Segment Size) is 1460 bytes on interfaces with 1500 bytes MTU (Maximum Transmission Unit).
The PPPoE needs 8 of 1460 bytes to encapsulate the data, due this the TCP packets with 1460 bytes are fragmented or
discarded in router. One way to fix this issue is to adjust the MSS using the commands below:

configure
set interfaces ethernet eth1 policy route ’MSS’
set policy route MSS description ’TCP_MSS’
set policy route MSS rule 1 protocol ’tcp’

DATACOM 204.4305.05 - March 30, 2020 51


DM2500 - Quick Configuration Guide 8 Connection Services

set policy route MSS rule 1 set tcp-mss ’1452’


set policy route MSS rule 1 tcp flags ’SYN’
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the PPPoE Client. If the user is at configuration level, it is necessary to
use the keyword run before the command.

show interfaces
show interfaces pppoe
show interfaces pppoe <interface pppoe> log

DATACOM 204.4305.05 - March 30, 2020 52


DM2500 - Quick Configuration Guide 9 Routing

9 Routing
Routing is the process of forwarding packets to their destination using network address. Routing is executed by devices
capable of exchanging the required information in order to create tables containing path information to reach the
destination, using dynamic routing protocols or inputs assigned manually.
The dynamic routing protocols, such as the OSPF, have the required information from the neighboring devices in order to
create their routing table, used to define the location where the traffic will be sent.
As alternatives to the dynamic methods, there are static routes. The static routes are viable in routers that have few
networks and fewer paths to destination.
The information received through the routing protocols are added in a table called RIB (Routing Information Base) which
is the base for calculation of the best path. The calculation of the route is the FIB (Forwarding Information Base) that
contains the information that the devices use to route the traffic.

This chapter contains the following sections:

• Setting the Routing

• Setting the PBR

• Setting the RIP

• Setting the RIPng

• Setting the OSPFv2

• Setting the OSPFv3

• Setting the BGP

• Setting the BFD

• Setting the VRRP

• Setting the PIM

• Setting the VRF

• Setting the ECMP

9.1 Setting the Routing

9.1.1 Static Routing

The static routing has as objective to forward packets between different networks with manual configuration of routes by
the network administrators. By default, different VLANs do not communicate between themselves, as they are in exclusive
broadcast domains. In order to execute communication between two VLANs, it is necessary to use a router.

DATACOM 204.4305.05 - March 30, 2020 53


DM2500 - Quick Configuration Guide 9 Routing

9.1.2 Routing between VLANs

In order to communicate between two VLANs, a router or a form of routing must be used on the device itself. Routing
between VLANs enables this communication. The network associated with the L3 interface is inserted into the routing
table and can be accessed by other networks.

The scenario below will be used to show configuration of static routing between VLANs.

Setting Static Routing and Routing Between VLANs

Considering that the user would like to allow routing between VLAN 100 and VLAN 200 in the eth1 Ethernet interface and
VLAN 2 in the eth2 interface to be used as default static route where the gateway has the IPv4 10.10.0.1/30 address.
The next steps will show how to execute these configurations.

configure
set interfaces ethernet eth1 vif 100 address 192.168.100.1/24
set interfaces ethernet eth1 vif 200 address 192.168.200.1/24
set interfaces ethernet eth2 vif 2 address 10.10.0.2/30
set system gateway-address 10.10.0.1
commit

9.1.3 Enabling ECMP in static routes

ECMP is automatically enabled for static routes if it is enabled globally. There is no specific ECMP configuration for static
routes.

For more details on the ECMP load balancing modes, consult session Setting the ECMP.

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the routes. If the user is at configuration level, it is necessary to use the
keyword run before the command

show ip route

DATACOM 204.4305.05 - March 30, 2020 54


DM2500 - Quick Configuration Guide 9 Routing

9.2 Setting the PBR

Policy-based routing PBR allows the user to use rules to classify the traffic based on its attributes and apply a processing
according to its classification and to route selectively the IP packets, for example for an alternative hop. All the packets
received in an interface are considered for policy based routing, as long as the interface is assigned to a routing policy.
When no routing policy is applied, the routing decisions are taken using the main routing table of the system. The PBR
policies can be applied to interfaces of the data plane for incoming traffic, but not to loopback, tunnel or bridge interfaces.
In the DM2500 the user cannot apply the PBR policies to packets locally generated.
The scenario below will be used to show configuration of the PBR.

Setting the PBR

Considering that the user would like to configure a PBR policy in VLANs 10 and 20 that are configured in the eth1 interface,
so that the traffic originated in 192.168.10.0/24 network can be forwarded by the next 192.168.100.1 hop which is reachable
through the eth2 interface, and also so that the traffic originated in the 192.168.20.0/24 network can be forwarded by the
next 192.168.200.1 hop which is reachable through the eth3 interface.

The next steps will indicate how to execute these configurations.

configure
set interface ethernet eth1 vif 10 address 192.168.10.1/24
set interface ethernet eth1 vif 20 address 192.168.20.1/24
set interface ethernet eth2 address 192.168.100.2/30
set interface ethernet eth3 address 192.168.200.2/30
set policy route PBR-LAN rule 10 destination address 0.0.0.0/0
set policy route PBR-LAN rule 10 source address 192.168.10.0/24
set policy route PBR-LAN rule 10 set table 10
set policy route PBR-LAN rule 20 destination address 0.0.0.0/0
set policy route PBR-LAN rule 20 source address 192.168.20.0/24
set policy route PBR-LAN rule 20 set table 20
set interfaces ethernet eth1 policy route PBR-LAN
set protocols static table 10 route 0.0.0.0/0 next-hop 192.168.100.1
set protocols static table 20 route 0.0.0.0/0 next-hop 192.168.200.1
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the PBR. If the user is at configuration level, it is necessary to use the
keyword run before the command

DATACOM 204.4305.05 - March 30, 2020 55


DM2500 - Quick Configuration Guide 9 Routing

show policy route


show ip route

9.3 Setting the RIP

The RIP (Routing Information Protocol) is a dynamic routing protocol adequate for small size and homogeneous networks.
It is classified as an interior gateway protocol (IGP) and uses a distance vector algorithm. RIP defines the best path,
counting the hops until destination. The maximum number of hops is 15 (16 is considered an infinite distance), resulting in
RIP being not adequate for large size networks.
The scenario below will be used to show configuration of the RIP.

Setting the RIP

Considering that the user would like to configure a RIP session through the eth2 interface and through the IPv4 10.0.40.1/30
address and also wishes to advertise the 10.0.30.0/24 network which is connected by eth4.
The next steps will indicate how to execute these configurations.

configure
set interfaces ethernet eth2 address 10.0.40.1/30
set interfaces ethernet eth4 address 10.0.30.1/24
set protocols rip network 10.0.30.0/24
set protocols rip interface eth2
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the RIP. If the user is at configuration level, it is necessary to use the
keyword run before the command

show ip route
show ip rip status
show ip rip
debug rip

9.4 Setting the RIPng

The RIPng (Routing Information Protocol next generation) is a dynamic routing protocol adequate for small size and
homogeneous IPV6 networks. It is classified as an interior gateway protocol (IGP) and uses a distance vector routing
algorithm. The RIPng defines the best path, counting hops until destination. The maximum number of hops is 15 (16 is
considered an infinite distance), resulting in RIPng not being adequate for large size networks. RIPng is an extension of the
RIP version 2 for IPv6.
The scenario below will be used to show configuration of the RIPng.

DATACOM 204.4305.05 - March 30, 2020 56


DM2500 - Quick Configuration Guide 9 Routing

Setting the RIPng

Considering that the user would like to configure a RIPng session through the eth2 interface and through the IPv6
2001:cafe:1::1/64 address and also wishes to advertise the 2001:cafe:4::/64 network which is connected by eth4.
The next steps will indicate how to execute these configurations.

configure
set interfaces ethernet eth2 address 2001:cafe:1::1/64
set interfaces ethernet eth4 address 2001:cafe:4::1/64
set protocols ripng network 2001:cafe:4::/64
set protocols ripng interface eth2
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the RIPng. If the user is at configuration level, it is necessary to use the
keyword run before the command

show ipv6 route


show ipv6 ripng status
show ipv6 ripng
debug ripng

9.5 Setting the OSPFv2

The OSPFv2 (Open Shortest Path First version 2) is the IGP (Internal Gateway Protocol) described by RFC 2328 (version 2)
for routing of IPv4 addresses. This protocol is used within a same AS (Autonomous System), justifying its denomination as
Internal. It is based on the Dijkstra algorithm that calculates the shortest path to each destination based on the costs of
each link.
The scenario below will be used to show configuration of the OSPFv2.

Setting the OSPFv2

It is recommended to use the loopback interface instead of physical interfaces due to the stability, as these
are always actives.

Considering that the user would like to execute an OSPF session in the 8048 area with network-type of the point-topoint

DATACOM 204.4305.05 - March 30, 2020 57


DM2500 - Quick Configuration Guide 9 Routing

type through the following configurations:


- DM2500: Interface eth1 in VLAN 503 with IPv4 192.168.72.5/30 address and loopback interface with IPv4 192.168.255.41/32
being used as router-id in the OSPFv2 in the 0 area. The DM2500 shall also advertise the 192.168.64.0/22 network in which
it is connected by the eth3 interface:

configure
set interfaces loopback lo address 192.168.255.41/32
set interfaces ethernet eth1 vif 503 address 192.168.72.5/30
set interfaces ethernet eth1 vif 503 ip ospf network point-to-point
set interfaces ethernet eth3 address 192.168.64.1/22
set protocols ospf area 8048 network 192.168.255.41/32
set protocols ospf area 8048 network 192.168.72.4/30
set protocols ospf area 8048 network 192.168.64.0/22
set protocols ospf log-adjacency-changes detail
set protocols ospf parameters abr-type standard
set protocols ospf parameters router-id 192.168.255.41
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the OSPFv2. If the user is at configuration level, it is necessary to use the
keyword run before the command

show ip ospf
show ip ospf neighbors
debug ospf

9.5.1 Configuring a Virtual Link in OSPFv2

For an OSPF scenario to work correctly, all areas of protocol must be connected directly to Area 0 (backbone) of OSPF.
However, there are situations where the router of other OSPF areas can not connect physically to some Area Border
Router (ABR) of Area 0. To solve this problem, a virtual link can be configured between these routers simulating a direct
connection.

The scenario below will be used to show Virtual Link configuration in OSPFv2.

Configuring a Virtual Link in OSPFv2

Considering that the user would like to connect Area 20 to Area 0 through of Area 10. A Virtual Link will be configured
between the ABRs of Area 0 (DM25-1) and Area 20 (DM25-2).

DM25-1

DATACOM 204.4305.05 - March 30, 2020 58


DM2500 - Quick Configuration Guide 9 Routing

configure
set interfaces ethernet eth1 address ’192.168.10.1/30’
set interfaces ethernet eth2 address ’192.168.0.1/28’
set interfaces loopback lo1 address ’1.1.1.1/32’
set protocols ospf area 0 network ’192.168.0.0/28’
set protocols ospf area 0 network ’1.1.1.1/32’
set protocols ospf area 0 area-type ’normal’
set protocols ospf area 10 network ’192.168.10.0/30’
set protocols ospf area 10 area-type ’normal’
set protocols ospf area 10 virtual-link ’2.2.2.2’
set protocols ospf log-adjacency-changes ’detail’
set protocols ospf parameters abr-type ’standard’
set protocols ospf parameters router-id ’1.1.1.1’
commit

DM25-2
configure
set interfaces ethernet eth1 address ’192.168.10.2/30’
set interfaces ethernet eth2 address ’192.168.20.1/24’
set interfaces loopback lo1 address ’2.2.2.2/32’
set protocols ospf area 10 network ’192.168.10.0/30’
set protocols ospf area 10 network ’2.2.2.2/32’
set protocols ospf area 10 area-type ’normal’
set protocols ospf area 20 network ’192.168.20.0/24’
set protocols ospf area 10 virtual-link ’1.1.1.1’
set protocols ospf log-adjacency-changes ’detail’
set protocols ospf parameters abr-type ’standard’
set protocols ospf parameters router-id ’2.2.2.2’
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the Virtual Link. If the user is at configuration level, it is necessary to use
the keyword run before the command

show ip ospf
show ip ospf neighbors
debug ospf

9.5.2 Enabling ECMP in OSPFv2

ECMP is automatically enabled in OSPFv2 if it is enabled globally. There is no specific ECMP configuration for OSPF.

For more details on the ECMP load balancing modes, consult session Setting the ECMP.

9.5.3 Setting LSA filtering

The LSA filtering extends the capacity of an ABR that is executing the OSPFv2 protocol to filter LSAs of type 3 between
different OSPF areas. This resource allows that only specified prefixes are sent from an area to another area and restricts
all the other prefixes. This type of filtering per area can be applied out of a specific area, in a specific area, or within and out
of OSPF areas at the same time.
The following cases show the user how to configure filtering of LSAs in different manners:

DATACOM 204.4305.05 - March 30, 2020 59


DM2500 - Quick Configuration Guide 9 Routing

9.5.4 Filtering of LSAs announced for other areas

Considering that the user would like to filter LSAs of type 3 (Summary) which are advertised to other areas of intra-area
routes.
The following configuration with a short explanation shows how this type of filtering can be executed.

configure
set policy access-list 5 rule 1 action ’permit’
set policy access-list 5 rule 1 source inverse-mask ’0.0.255.255’
set policy access-list 5 rule 1 source network ’10.10.0.0’
set protocols ospf area 0 network ’192.168.254.0/30’
set protocols ospf area 5 network ’10.0.0.0/8’
set protocols ospf area 5 export-list 5
set protocols ospf parameters router-id ’192.168.255.55’
commit

In the example above, any intra-area route of area 5 and of the 10.10.0.0/16 range (for example, 10.10.1.0/24 and
10.10.2.128/30) will be advertised for other areas as a LSA Summary, of Type 3 but any others (for example, 10.11.0.0/16 or
10.128.30.16/30) no. This configuration is relevant only if the router is an ABR for the specified area.

9.5.5 Filtering of LSAs announced for the specified area

Considering that the user would like to filter LSAs of type 3 (Summary) being advertised to within the specified area.
The following configuration with a short explanation shows how this type of filtering can be executed.

configure
set policy access-list 5 rule 1 action ’permit’
set policy access-list 5 rule 1 source inverse-mask ’0.0.255.255’
set policy access-list 5 rule 1 source network ’10.20.0.0’
set protocols ospf area 0 network ’192.168.254.0/30’
set protocols ospf area 5 network ’10.0.0.0/8’
set protocols ospf area 5 import-list 5
set protocols ospf parameters router-id ’192.168.255.55’
commit

In the example above, any route advertised within the area 5 and of the 10.20.0.0/16 range will be advertised in the area as
LSAs of type 3, but any other no. This configuration is relevant only if the router is an ABR for the specified area.

9.5.6 Filtering of LSAs using prefix-list

Filtering of LSAs of type 3 (Summary) can be also configured as in the previous examples, but using the prefix-lists and
specifying the direction of filtering (inbound or outbound). The following configuration shows how this type of filtering can
be executed.
configure
set policy prefix-list Deny-Route-192 rule 1 action ’deny’
set policy prefix-list Deny-Route-192 rule 1 le ’32’
set policy prefix-list Deny-Route-192 rule 1 prefix ’192.168.20.0/24’
set policy prefix-list Deny-Route-192 rule 2 action ’permit’
set policy prefix-list Deny-Route-192 rule 2 le ’32’
set policy prefix-list Deny-Route-192 rule 2 prefix ’0.0.0.0/0’
set protocols ospf area 0 network ’192.168.254.0/30’
set protocols ospf area 5 network ’10.0.0.0/8’
set protocols ospf area 5 filter-list out ’Deny-Route-192’
set protocols ospf parameters router-id ’192.168.255.55’

DATACOM 204.4305.05 - March 30, 2020 60


DM2500 - Quick Configuration Guide 9 Routing

commit

The example above allows filtering of a route with prefix 192.168.20.0/24 which is being propagated in area 5, but which
currently is being passed over for all OSPF domains. For this reason, a filter-list is configured in the ABR with area 5 and
with the help of the prefix-list the user will be able to execute blocking of 192.168.20.0/24 prefix.

9.6 Setting the OSPFv3

The OSPFv3 (Open Shortest Path First version 3) is the IGP (Internal Gateway Protocol) described by RFC 5340 for routing of
IPv6 addresses. As it is an IGP, it is a protocol used within a same AS (Autonomous System). It is based on the Dijkstra
algorithm, which calculates the shortest path to each destination based on the costs of each link.
The scenario below will be used to show configuration of the OSPFv3.

Setting the OSPFv3

In the example below, a neighbor IPv6 of the point-to-point type in eth1.150 interface will be configured. The loopback of
the DM2500 will have the IPv6 2001:db8:ffff::1/128 address and also the IPv4 177.66.5.1/32 address. The IPv4 address of
the loopback will be used as router-id of the OSPFv3. The loopback lo1 interface will be configured as passive, as the
adjacencies through it shall not be formed. The eth2 interface will have the IPv6 2001:db8:100::1/64 address and shall not
form any OSPFv3 adjacency. Its network will be redistributed to the OSPFv3 through the redistribute connected command.

configure
set interfaces loopback lo1 address 2001:db8:ffff::1/128
set interfaces loopback lo1 address 177.66.5.1/32
set interfaces loopback lo1 ipv6 ospfv3 passive
set interfaces ethernet eth1 vif 150 address 2001:db8::1/64
set interfaces ethernet eth1 vif 150 ipv6 ospfv3 network point-to-point
set interfaces ethernet eth2 address 2001:db8:100::1/64
set protocols ospf parameters router-id 177.66.5.1
set protocols ospfv3 area 0 interface lo1
set protocols ospfv3 area 0 interface eth1.150
set protocols ospfv3 redistribute connected
commit

9.6.1 Enabling ECMP in OSPFv3

ECMP is automatically enabled in OSPFv3 if it is enabled globally. There is no specific ECMP configuration for OSPF.

For more details on the ECMP load balancing modes, consult session Setting the ECMP.

DATACOM 204.4305.05 - March 30, 2020 61


DM2500 - Quick Configuration Guide 9 Routing

9.6.2 LSA filtering

In the scenario below, the DM2500 has interfaces in two different OSPFv3 areas. Interface eth1 is in area 0 and interface
eth2 is in area 1. Considering both areas are normal areas, LSAs received in area 0 are advertised to area 1. In this scenario,
there is no LSA filtering. LSAs are advertised from one area to another area.

OSPFv3 scenario without LSA filtering

configure
set interfaces loopback lo1 address 2001:db8::1/128
set interfaces loopback lo1 address 177.66.0.1/32
set interfaces loopback lo1 ipv6 ospfv3 passive
set interfaces ethernet eth1 2001:db8:100::1/64
set interfaces ethernet eth1 ipv6 ospfv3 network point-to-point
set interfaces ethernet eth2 address 2001:db8:200::1/64
set interfaces ethernet eth2 ipv6 ospfv3 network point-to-point
set protocols ospfv3 parameters router-id 177.66.0.1
set protocols ospfv3 area 0 interface lo1
set protocols ospfv3 area 0 interface eth1
set protocols ospfv3 area 1 interface eth2
commit

In case it is no desired that all LSAs in area 0 are advertised to area 1, it is possible to configure import or export lists in the
areas.

The equipment must be a ABR (area border router) to be able to filter LSAs.

One way to filter LSAs is to configure an import-list in area 1. In the example below, an IPv6 access-list is configured
rejecting any networks within the prefix 2001:db8:ffff::/48. That ACL is applied as import-list in area 1, making that LSAs
containing those networks are not imported to the area.

LSA filtering

DATACOM 204.4305.05 - March 30, 2020 62


DM2500 - Quick Configuration Guide 9 Routing

configure
set policy access-list6 reject-lsas rule 10 action ’deny’
set policy access-list6 reject-lsas rule 10 source network ’2001:db8:ffff::/48’
set policy access-list6 reject-lsas rule 100 action ’permit’
set policy access-list6 reject-lsas rule 100 source ’any’
set protocols ospfv3 area 1 import-list reject-lsas
commit

Another way to filter LSAs is to configure a export-list in area 0. LSAs received in area 0 will not be advertised to any other
areas.
configure
set protocols ospfv3 area 0 export-list reject-lsas
commit

To persist the configuration after a reboot, the user should use the save command in the configuration mode.

Below are the main commands available to check the OSPFv3. If the user is at configuration level, it is necessary to use the
keyword run before the command

show ipv6 ospf


show ipv6 ospf neighbors
debug ospfv3

9.7 Setting the BGP

BGP (Border Gateway Protocol) is used for routing information exchange between AS’s (Autonomous Systems) in the
Internet. When a session is established with a different AS, the session is called eBGP (external BGP). When the session is
established with the same AS, it is called iBGP (internal BGP).

9.7.1 iBGP IPv4 neighbor configuration

The following topology will be used to show the BGP configuration with both neighbors in the same AS. In that case, it is a
iBGP (internal BGP) session. An iBGP session should be established between the loopback interfaces of both equipment.
An IGP like OSPF is needed for the equipment to have connectivity to each other’s loopback address.

iBGP IPv4 neighbor configuration

The following configuration parameters will be used:

• AS number: 27686

• Loopback 192.168.0.1/32

DATACOM 204.4305.05 - March 30, 2020 63


DM2500 - Quick Configuration Guide 9 Routing

• Interface eth5, VLAN 377, IPv4 address 192.168.84.1/30

• Interface eth2, IPv4 address 150.185.128.1/19

• Connected routes redistribution


configure
set interfaces loopback address 192.168.0.1/32
set interfaces ethernet eth5 vif 377 address 192.168.84.1/30
set interfaces ethernet eth2 address 150.185.128.1/19
set protocols ospf area 0 network ’192.168.0.1/32’
set protocols ospf area 0 network ’192.168.84.0/30’
set protocols bgp 27686 neighbor 192.168.0.2 nexthop-self
set protocols bgp 27686 neighbor 192.168.0.2 soft-reconfiguration inbound
set protocols bgp 27686 neighbor 192.168.0.2 remote-as 27686
set protocols bgp 27686 neighbor 192.168.0.2 update-source 192.168.0.1
set protocols bgp 27686 redistribute connected
set protocols bgp 27686 parameters log-neighbor-changes
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show ip bgp summary


show ip bgp neighbors
debug bgp

9.7.2 eBGP IPv4 neighbor configuration

The following topology will be used to show the BGP configuration with neighbors in different AS’s. In that case, it is a eBGP
(external BGP) session. For eBGP sessions, usually it is used the physical interface addresses for neighbor establishment
and not the loopback addresses, as in iBGP configuration.

eBGP IPv4 neighbor configuration

The following configuration parameters will be used:

• Local AS number: 27686

• Remote AS number: 232318

• Interface eth5, VLAN 377, IPv4 address 192.168.84.1/30

• Interface eth2, IPv4 address 150.185.128.1/19

• Connected routes redistribution

DATACOM 204.4305.05 - March 30, 2020 64


DM2500 - Quick Configuration Guide 9 Routing

configure
set interfaces ethernet eth5 vif 377 address 192.168.84.1/30
set interfaces ethernet eth2 address 150.185.128.1/19
set protocols bgp 27686 neighbor 192.168.84.2 nexthop-self
set protocols bgp 27686 neighbor 192.168.84.2 soft-reconfiguration inbound
set protocols bgp 27686 neighbor 192.168.84.2 remote-as 232318
set protocols bgp 27686 neighbor 192.168.84.2 update-source 192.168.84.1
set protocols bgp 27686 redistribute connected
set protocols bgp 27686 parameters log-neighbor-changes
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show ip bgp summary


show ip bgp neighbors
debug bgp

9.7.3 eBGP IPv4 neighbor configuration with loopbacks

The following topology will be used to show the BGP configuration with neighbors in different AS’s. In that case, it is a
eBGP (external BGP) session.

In this example, the BGP session is established between the loopback interfaces. For the equipment be able to reach the
neighbor’s loopback interface, it is necessary to configure a static route.

Since the session establishment does not happen on directly connected interfaces, the ebgp-multihop parameter must be
set. In this example, ebgp-multihop is set to 2, meaning that the packets are passing through two routing domains to reach
the neighbor IP address.

eBGP IPv4 neighbor configuration with loopbacks

The following configuration parameters will be used:

• Local AS number: 27686

• Remote AS number: 232318

• Loopback: 192.168.0.1/32

• Neighbor loopback: 192.168.0.2/32

• Interface eth5, VLAN 377, IPv4 address 192.168.84.1/30

• Interface eth2, IPv4 address 150.185.128.1/19

DATACOM 204.4305.05 - March 30, 2020 65


DM2500 - Quick Configuration Guide 9 Routing

configure
set interfaces loopback address 192.168.0.1/32
set interfaces ethernet eth5 vif 377 address 192.168.84.1/30
set interfaces ethernet eth2 address 150.185.128.1/19
set protocols bgp 27686 neighbor 192.168.0.2 nexthop-self
set protocols bgp 27686 neighbor 192.168.0.2 soft-reconfiguration inbound
set protocols bgp 27686 neighbor 192.168.0.2 remote-as 232318
set protocols bgp 27686 neighbor 192.168.0.2 update-source 192.168.0.1
set protocols bgp 27686 neighbor 192.168.0.2 ebgp-multihop 2
set protocols bgp 27686 parameters log-neighbor-changes
set protocols static route 192.168.0.2/32 next-hop 192.168.84.2
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show ip bgp summary


show ip bgp neighbors
debug bgp

9.7.4 iBGP IPv6 neighbor configuration

The following topology will be used to show the BGP configuration with both neighbors in the same AS. In that case, it is a
iBGP (internal BGP) session. An iBGP session should be established between the loopback interfaces of both equipment.
An IGP like OSPFv3 is needed for the equipment to have connectivity to each other’s loopback address.

iBGP IPv6 neighbor configuration

The following configuration parameters will be used:

• AS number: 27686

• Loopback: 2001:db8::1/128

• Neighbor loopback: 2001:db8::2/128

• Interface eth5, VLAN 377, IPv6 address 2001::1/64

• Interface eth2, IPv6 address 2001:cafe::1/48

• Connected routes redistribution


configure
set interfaces loopback address 2001:db8::1/128
set interfaces ethernet eth2 address 2001:cafe::1/48
set interfaces ethernet eth2 ipv6 ospfv3 network point-to-point
set interfaces ethernet eth5 vif 377 address 2001::1/64
set protocols ospfv3 area 0 interface eth2.101
set protocols ospfv3 area 0 interface loopback
set protocols ospfv3 parameters router-id 192.168.0.1

DATACOM 204.4305.05 - March 30, 2020 66


DM2500 - Quick Configuration Guide 9 Routing

set protocols bgp 27686 neighbor 2001:db8::2 address-family ipv6-unicast soft-reconfiguration’inbound’


set protocols bgp 27686 neighbor 2001:db8::2 remote-as 27686
set protocols bgp 27686 neighbor 2001:db8::2 update-source 2001:db8::1
set protocols bgp 27686 address-family ipv6-unicast redistribute connected
set protocols bgp 27686 parameters log-neighbor-changes
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the OSPFv2. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show ip bgp summary


show ip bgp neighbors
debug bgp

9.7.5 eBGP IPv6 neighbor configuration

The following topology will be used to show the BGP configuration with neighbors in different AS’s. In that case, it is a eBGP
(external BGP) session. For eBGP sessions, usually it is used the physical interface addresses for neighbor establishment
and not the loopback addresses, as in iBGP configuration.

eBGP IPv6 neighbor configuration

The following configuration parameters will be used:

• Local AS number: 27686

• Remote AS number: 232318

• Interface eth5, VLAN 377, IPv4 address 2001::1/64

• Interface eth2, IPv4 address 2001:cafe::1/48

• Connected routes redistribution


configure
set interfaces ethernet eth2 address 2001:cafe::1/48
set interfaces ethernet eth5 vif 377 address 2001::1/64
set protocols bgp 27686 neighbor 2001::2 address-family ipv6-unicast soft-reconfiguration ’inbound’
set protocols bgp 27686 neighbor 2001::2 remote-as 232318
set protocols bgp 27686 neighbor 2001::2 update-source 2001::1
set protocols bgp 27686 address-family ipv6-unicast redistribute connected
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

DATACOM 204.4305.05 - March 30, 2020 67


DM2500 - Quick Configuration Guide 9 Routing

show ipv6 bgp summary


show ipv6 bgp neighbors
debug bgp

9.7.6 eBGP IPv6 neighbor configuration with loopback

The following topology will be used to show the BGP configuration with neighbors in different AS’s. In that case, it is a
eBGP (external BGP) session.

In this example, the BGP session is established between the loopback interfaces. For the equipment be able to reach the
neighbor’s loopback interface, it is necessary to configure a static route.

The ebgp-multihop parameter is used to allow a BGP session to be established between routers that are more than one
hop away from each other. The ebgp-multihop default value is 1. That means it is possible to establish a session only
between routers that are directly connected.

In this case, despite the routers being directly connected, DM2500 demands that the ebgp-multihop parameter be
configured with a value greater than 1 to allow the eBGP session established between loopbacks.

eBGP IPv6 neighbor configuration with loopbacks

The following configuration parameters will be used:

• Local AS number: 27686

• Remote AS number: 232318

• Loopback: 2001:db8::1/128

• Neighbor loopback: 2001:db8::2/128

• Interface eth5, VLAN 377, IPv4 address 2001::1/64

• Interface eth2, IPv4 address 2001:cafe::1/48

configure
set interfaces loopback address 2001:db8::1/128
set interfaces ethernet eth2 address 2001:cafe::1/48
set interfaces ethernet eth5 vif 377 address 2001::1/64
set protocols bgp 27686 neighbor 2001:db8::2 address-family ipv6-unicast soft-reconfiguration ’inbound’
set protocols bgp 27686 neighbor 2001:db8::2 remote-as 232318
set protocols bgp 27686 neighbor 2001:db8::2 update-source 2001:db8::1
set protocols bgp 27686 neighbor 2001:db8::2 ebgp-multihop 2
set protocol static route6 2001:db8::2/128 next-hop 2001::2
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

DATACOM 204.4305.05 - March 30, 2020 68


DM2500 - Quick Configuration Guide 9 Routing

Below are the main commands available to check the feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show ipv6 bgp summary


show ipv6 bgp neighbors
debug bgp

9.7.7 Communities configuration

The topology below will be used to show how to configure BGP communities.

Communities configuration

configure
set interfaces ethernet eth1 address 192.168.84.5/30
set interfaces ethernet eth2 address 192.168.84.1/30
set protocols bgp 27686 neighbor 192.168.84.6 nexthop-self
set protocols bgp 27686 neighbor 192.168.84.6 soft-reconfiguration inbound
set protocols bgp 27686 neighbor 192.168.84.6 remote-as 3549
set protocols bgp 27686 neighbor 192.168.84.6 update-source 192.168.84.5
set protocols bgp 27686 neighbor 192.168.84.2 nexthop-self
set protocols bgp 27686 neighbor 192.168.84.2 soft-reconfiguration inbound
set protocols bgp 27686 neighbor 192.168.84.2 remote-as 232318
set protocols bgp 27686 neighbor 192.168.84.2 update-source 192.168.84.1
commit

The received prefixes from ASN 3549 are readvertised to ASN 232318. Prefix 203.0.0.13/24 is marked with community
3549:1000 before being readvertised.

set policy prefix-list asn3549-203_0_0_13 rule 1 action ’permit’


set policy prefix-list asn3549-203_0_0_13 rule 1 prefix ’203.0.0.13/24’
set policy route-map adv-to-asn232318 rule 10 action ’permit’
set policy route-map adv-to-asn232318 rule 10 match ip address prefix-list ’asn3549-203_0_0_13’
set policy route-map adv-to-asn232318 rule 10 set community ’3549:1000’
set policy route-map adv-to-asn232318 rule 20 action ’permit’
set bgp 27686 neighbor 192.168.84.2 route-map export ’adv-to-asn232318’

Two prefixes are received from ASN 232318. One of the prefixes, 198.51.100.0/24, it received with community 27686:501.
DM2500 is configured in a way that prefixes with that community are readvertised with 2 ASNs prepend.

set policy community-list 1 rule 1 action ’permit’


set policy community-list 1 rule 1 regex ’27686:501’
set policy route-map adv-to-asn3549 rule 10 action ’permit’
set policy route-map adv-to-asn3549 rule 10 match community community-list 1
set policy route-map adv-to-asn3549 rule 10 set as-path-prepend ’27686 27686’

DATACOM 204.4305.05 - March 30, 2020 69


DM2500 - Quick Configuration Guide 9 Routing

set policy route-map adv-to-asn3549 rule 20 action ’permit’


set bgp 27686 neighbor 192.168.84.6 route-map export ’adv-to-asn3549’

9.7.8 Enabling ECMP in BGP

ECMP can be enabled in BGP defining the maximum number of equal cost paths for the same destination that can be used.
In the configuration below, four maximum paths are defined for iBGP and eBGP. That means BGP can install up to fours
different routes for the same destination if they have the same cost.

configure
set protocols bgp 27686 maximum-paths ebgp 4
set protocols bgp 27686 maximum-paths ibgp 4

For more details on the ECMP load balancing modes, consult session Setting the ECMP.

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show ip bgp community <community>


show ip bgp community-list <list-id>

9.8 Setting the BFD

The BFD (Bidirectional Forwarding Detection) is a protocol for link continuity failure detection between two equipment. It
can be enabled for static routes, BGP or OSPF protocols. It enables that the referred protocols converge quickly when a
failure occurs in the link path between the equipment.

For each link or path that is monitored by the BFD, a session is created.

The following BFD parameters can be configured for each interface:

• Minrx (Desired Minimum Receive Interval) It is the minimum interval in microseconds, between BFD control
packets received that the system needs at the current moment.

• Mintx (Required Minimum Transmit Interval) – It is the minimum interval in microseconds, between BFD control
packets transmitted that the system would like to use at the current moment.

• Multipler (Detection Multiplier) – The interval negotiated covering transmission of control packet, multiplied by
this variable, this will be the detection time for the BFD session.

set protocols bfd interface <interface> mintx <50-10000>


set protocols bfd interface <interface> minrx <50-10000>
set protocols bfd interface <interface> multiplier <3-255>

DATACOM 204.4305.05 - March 30, 2020 70


DM2500 - Quick Configuration Guide 9 Routing

These configurations are global per interface, this means, all the sessions created in a given interface will be
configured with the values input in this interface.

The BFD sessions operate only in the single-hop mode.

There is no support for the “Echo mode” and “Demand Mode” modes

9.8.1 BFD in static routes

The BFD can be configured in the static routes for all the interfaces, a specific interface or only for a static route.

It is only possible to enable the BFD in a static route if an interface with IP exists in the same network of the
IP configured as “next-hop” of the Static Route.

To activate the BFD in all the static routes and in all the interfaces, the user should execute the following procedure:

configure
set protocols static bfd all-interfaces
commit

To activate the BFD only in the static routes of a specific interface, the user should execute the following procedure:

configure
set protocols static bfd interface <interface>
commit

To activate the BFD only in one specific static route, the user should execute the following procedure:

configure
set protocols static route <network/mask> next-hop <next-hop-ip> bfd
commit

The scenario below will be used to show configuration of the BFD enabled in static routes.

Static route with BFD

DATACOM 204.4305.05 - March 30, 2020 71


DM2500 - Quick Configuration Guide 9 Routing

Assuming the scenario above, the next steps will show how to configure the BFD in static routes:

configure
! Configuration DM25_1
set interfaces ethernet eth1 address 1.1.1.1/24
set interfaces ethernet eth2 address 10.10.10.1/24
set protocols static route 20.20.20.0/24 next-hop 1.1.1.2
set protocols static route 20.20.20.0/24 next-hop 1.1.1.2 bfd
! Configuration DM25_2
set interfaces ethernet eth1 address 1.1.1.2/24
set interfaces ethernet eth2 address 20.20.20.2/24
set protocols static route 10.10.10.0/24 next-hop 1.1.1.1
set protocols static route 10.10.10.0/24 next-hop 1.1.1.2 bfd
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

9.8.2 BFD in OSPF

The BFD can be configured in the OSPFv2 for all the interfaces or for a specific interface. To activate the BFD in all the
interfaces participant of the OSPF, the user should execute the following configuration:

configure
set protocols ospf bfd all-interfaces
commit

To activate the BFD in only one interface participant of the OSPF, the user should execute the following configuration:

configure
set protocols ospf bfd interface <interface>
commit

The scenario below will be used to show configuration of the BFD with OSPF.

OSPF with BFD

Below is an example of BFD configuration with OSPF based on the scenario mentioned above:

configure
! Configuration DM25_1
set interfaces ethernet eth1 address ’1.1.1.1/24’
set interfaces loopback lo address ’10.0.0.1/32’
set protocols ospf area 1 network ’10.0.0.1/32’
set protocols ospf area 1 network ’1.1.1.0/24’
set protocols ospf bfd interface eth1
! Configuration DM25_2
set interfaces ethernet eth1 address ’1.1.1.2/24’
set interfaces loopback lo address ’10.0.0.2/32’
set protocols ospf area 1 network ’10.0.0.2/32’
set protocols ospf area 1 network ’1.1.1.0/24’
set protocols ospf bfd interface eth1
commit

DATACOM 204.4305.05 - March 30, 2020 72


DM2500 - Quick Configuration Guide 9 Routing

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

9.8.3 BFD in OSPFv3

The BFD can be configured in the OSPFv3 protocol for all interfaces or for a specific interface. To activate the BFD in all the
interfaces participant of the OSPFv3 protocol, the user should execute the following configuration:

configure
set protocols ospfv3 bfd all-interfaces
commit

To activate the BFD in only one interface participant of the OSPFv3, the user should execute the following configuration:

configure
set protocols ospfv3 bfd interface <interface>
commit

The scenario below will be used to show the BFD with OSPFv3 configuration.

OSPFv3 with BFD

Below is an example of BFD configuration with OSPFv3 based on the above scenario:

configure
! Configuration in DM25_1
set interfaces ethernet eth1 address ’2001:db8:ff::1/64’
set interfaces loopback lo1 address ’2001:db8::1/128’
set protocols ospfv3 area 0 interface eth1
set protocols ospfv3 area 0 interface lo1
set protocols ospfv3 bfd interface eth1
! Configuration in DM25_2
set interfaces ethernet eth1 address ’2001:db8:ff::2/64’
set interfaces loopback lo1 address ’2001:db8::2/128’
set protocols ospfv3 area 0 interface eth1
set protocols ospfv3 area 0 interface lo1
set protocols ospfv3 bfd interface eth1
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

9.8.4 BFD in BGP

The BFD can be configured by a neighbor BGP through the “fall-over” command according to the procedure described
below:
configure
set protocols bgp <bgp_id> neighbor <neighbor_ip> fall-over bfd
commit

DATACOM 204.4305.05 - March 30, 2020 73


DM2500 - Quick Configuration Guide 9 Routing

The scenario below will be used to show configuration of the BFD enabled with BGP.

BGP in BFD

Below is an example of BFD configuration with BGP based on the scenario mentioned above:

configure
! Configuration DM25_1
set interfaces ethernet eth1 address 1.1.1.1/24
set interfaces loopback lo address 10.0.0.1/32
set protocols bgp 1 neighbor 1.1.1.2 remote-as 2
set protocols bgp 1 redistribute connected
set protocols bgp 1 neighbor 1.1.1.2 fall-over bfd
! Configuration DM25_2
set interfaces ethernet eth1 address 1.1.1.2/24
set interfaces loopback lo address 10.0.0.2/32
set protocols bgp 2 neighbor 1.1.1.1 remote-as 1
set protocols bgp 2 redistribute connected
set protocols bgp 2 neighbor 1.1.1.1 fall-over bfd
commit

It is possible to use BFD with BGP IPv4 and IPv6 neighbors as well.

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the BFD. If the user is at configuration level, it is necessary to use the
keyword run before the command

show bfd
show bfd session
show bfd session detail

9.9 Setting the VRRP

The Virtual Router Redundancy Protocol (VRRP) works for Gateway redundancy in a network, with the objective of two or
more routers sharing the same virtual IP in active/backup mode (by default).

For other devices on the network, VRRP allows the gateway to be viewed as a single device.

VRRP is quite simple in its basic function: a Router is elected the Master and is responsible for routing network traffic to
devices that have Virtual IP as their gateway. The second router called Backup only monitors bus VRRP packets. When the
Master equipment ceases to function, the Backup equipment assumes its functions as Master.

On the DM2500, VRRP is supported on both physical interfaces and VLAN interfaces.

DATACOM 204.4305.05 - March 30, 2020 74


DM2500 - Quick Configuration Guide 9 Routing

The router configured with a higher priority will be elected initially as Master. If all the routers have the
same priority, the router with the highest IP address will be elected as Master.

It is recommended to enable the preemption function that will allow that the router that was master prior
to the failure, upon returning from the failure, assumes again the master position.

9.9.1 Setting the VRRPv2

The DM2500 has support for the VRRPv2 version with IPv4 addressing, described by the RFCs 2338 and 3768.

The scenario below will be used to show configuration of the VRRP.

VRRPv2

Assuming the scenario according to the diagram above, we have the following example to configure the VRRP Master:

configure
set interfaces ethernet eth2 address ’192.168.253.105/24’
set interfaces ethernet eth2 vrrp vrrp-group 254 authentication password ’d4t4c0m’
set interfaces ethernet eth2 vrrp vrrp-group 254 authentication type ’ah’
set interfaces ethernet eth2 vrrp vrrp-group 254 preempt ’true’
set interfaces ethernet eth2 vrrp vrrp-group 254 priority ’200’
set interfaces ethernet eth2 vrrp vrrp-group 254 virtual-address ’192.168.253.41’
set interfaces ethernet eth4 vif 4056 address ’192.168.45.105/24’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 authentication password ’d4t4c0m’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 authentication type ’ah’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 preempt ’true’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 priority ’200’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 virtual-address ’192.168.45.1’
commit

Assuming the scenario according to the diagram above, we have the following example to configure the VRRP Backup:

configure
set interfaces ethernet eth2 address ’192.168.253.106/24’
set interfaces ethernet eth2 vrrp vrrp-group 254 version 2
set interfaces ethernet eth2 vrrp vrrp-group 254 authentication password ’d4t4c0m’
set interfaces ethernet eth2 vrrp vrrp-group 254 authentication type ’ah’
set interfaces ethernet eth2 vrrp vrrp-group 254 preempt ’true’
set interfaces ethernet eth2 vrrp vrrp-group 254 priority ’200’
set interfaces ethernet eth2 vrrp vrrp-group 254 virtual-address ’192.168.253.41’
set interfaces ethernet eth4 vif 4056 address ’192.168.45.106/24’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 version 2

DATACOM 204.4305.05 - March 30, 2020 75


DM2500 - Quick Configuration Guide 9 Routing

set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 authentication password ’d4t4c0m’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 authentication type ’ah’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 preempt ’true’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 priority ’200’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 virtual-address ’192.168.45.1’
commit

The next example is based on the previous example, including all the interfaces in a synchronization group so that, if one of
the interfaces in the Master fails in any of the VRRP groups, all the interfaces that control the Master become interfaces in a
backup router.

Master
configure
set interfaces ethernet eth2 vrrp vrrp-group 254 sync-group ’DATACOM_SYNC’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 sync-group ’DATACOM_SYNC’
commit

Backup

configure
set interfaces ethernet eth2 vrrp vrrp-group 254 sync-group ’DATACOM_SYNC’
set interfaces ethernet eth4 vif 4056 vrrp vrrp-group 255 sync-group ’DATACOM_SYNC’
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the VRRP. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show vrrp
show vrrp detail
show vrrp interfaces <interface>
show vrrp statistics
show vrrp sync-group

9.9.2 Setting the VRRPv3

The VRRP protocol version 3 (v3) offers support to IPv4 and IPv6 addresses described by the RFCs 5798, while the VRRP
version 2 (v2) supports only IPv4 addresses.

On the DM2500, VRRPv3 is supported on physical interfaces, and VLAN interfaces.

Version 3 of the VRRP has no support to authentication.

The scenario below will be used to show configuration of the VRRPv3.

DATACOM 204.4305.05 - March 30, 2020 76


DM2500 - Quick Configuration Guide 9 Routing

VRRPv3

Configuration of VRRP version 3 protocol will be shown using as base the scenario above.

Master
configure
set interfaces ethernet eth2 address ’2018::2/64’
set interfaces ethernet eth2 vrrp vrrp-group 21 version ’3’
set interfaces ethernet eth2 vrrp vrrp-group 21 preempt ’true’
set interfaces ethernet eth2 vrrp vrrp-group 21 priority ’200’
set interfaces ethernet eth2 vrrp vrrp-group 21 virtual-address ’2018::1’
set interfaces ethernet eth2 vrrp vrrp-group 21 virtual-link-local ’auto-configuration’
set interfaces ethernet eth4 vif 2477 address ’2477::2/64’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 version ’3’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 preempt ’true’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 priority ’200’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 virtual-address ’2477::1’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 virtual-link-local ’auto-configuration’
commit

Backup

configure
set interfaces ethernet eth2 address ’2018::3/64’
set interfaces ethernet eth2 vrrp vrrp-group 21 version ’3’
set interfaces ethernet eth2 vrrp vrrp-group 21 preempt ’true’
set interfaces ethernet eth2 vrrp vrrp-group 21 priority ’100’
set interfaces ethernet eth2 vrrp vrrp-group 21 virtual-address ’2018::1’
set interfaces ethernet eth2 vrrp vrrp-group 21 virtual-link-local ’auto-configuration’
set interfaces ethernet eth4 vif 2477 address ’2477::3/64’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 version ’3’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 preempt ’true’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 priority ’100’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 virtual-address ’2477::1’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 virtual-link-local ’auto-configuration’
commit

The next example is based on the previous example, including all the interfaces in a synchronization group so that, if one of
the interfaces in the Master fails in any of the VRRP groups, all the interfaces that control the Master become interfaces in a
backup router.

Master
configure
set interfaces ethernet eth2 vrrp vrrp-group 21 sync-group ’DTC_SYNC’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 sync-group ’DTC_SYNC’
commit

Backup

DATACOM 204.4305.05 - March 30, 2020 77


DM2500 - Quick Configuration Guide 9 Routing

configure
set interfaces ethernet eth2 vrrp vrrp-group 21 sync-group ’DTC_SYNC’
set interfaces ethernet eth4 vif 2477 vrrp vrrp-group 22 sync-group ’DTC_SYNC’
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the VRRPv3. If the user is at configuration level, it is necessary to use the
keyword run before the command

show vrrp
show vrrp detail
show vrrp interface <interface>
show vrrp statistics
show vrrp sync-group

9.9.3 Setting the VRRP Track Interface

There are scenarios where the VRRP Master router is still active, but cannot forward packets because the outgoing interface
(such as the Internet for example) goes down. The DM2500 allows to configure the track for the VRRP process to monitor
any object, which may be the state of the interface (Up/Down) or to monitor the state of a route, thus reducing the VRRP
priority based on one condition.

The VRRP Track Interface monitors the interface state (Up/Down) and reduces the priority of the VRRP router if the interface
changes its state to down.

VRRP Track Interface is supported for both IPv4 and IPv6.

If the router is the IP address owner (the address configured in interface is the same as the virtual address),
the priority will be always 255 and it will not be decremented by tracking.

The scenario below will be used to demonstrate the configuration of the VRRP Track Interface.

VRRP Track Interface

DATACOM 204.4305.05 - March 30, 2020 78


DM2500 - Quick Configuration Guide 9 Routing

The setting below will be used to demonstrate the reduction of the Master Router VRRP priority so that when the output
link configured with track interface drops, the Backup Router will become the Master.

Master
configure
set interfaces ethernet eth4 address ’192.168.253.1/24’
set interfaces ethernet eth4 vrrp vrrp-group 254 preempt ’true’
set interfaces ethernet eth4 vrrp vrrp-group 254 priority ’200’
set interfaces ethernet eth4 vrrp vrrp-group 254 virtual-address ’192.168.253.254’
! Setting the track-interface on failure will reduce the VRRP priority to 150
set interfaces ethernet eth4 vrrp vrrp-group 254 track-interface eth2 weight ’50’
commit

Backup

configure
set interfaces ethernet eth4 address ’192.168.253.2/24’
set interfaces ethernet eth4 vrrp vrrp-group 254 preempt ’true’
set interfaces ethernet eth4 vrrp vrrp-group 254 priority ’180’
set interfaces ethernet eth4 vrrp vrrp-group 254 virtual-address ’192.168.253.254’
commit

When the Master Router eth2 interface fails, the VRRP track will identify the fault and thus reduce the Master Router VRRP
priority, thus the Backup Router will become the Master.

9.9.4 Setting the VRRP Track Route

VRRP Track Route monitors the state of any route and reduces the priority of the VRRP router if the route is no longer
reachable.

VRRP Track Interface is supported for IPv4 only

The scenario below will be used to demonstrate the VRRP Track Route configuration.

VRRP Track Route

The setting below will be used to demonstrate reducing the Master Router VRRP priority so that when route 8.8.8.8 is not
reached, the Backup Router will become the Master.

Master

DATACOM 204.4305.05 - March 30, 2020 79


DM2500 - Quick Configuration Guide 9 Routing

configure
set interfaces ethernet eth4 address ’192.168.253.1/24’
set interfaces ethernet eth4 vrrp vrrp-group 254 preempt ’true’
set interfaces ethernet eth4 vrrp vrrp-group 254 priority ’200’
set interfaces ethernet eth4 vrrp vrrp-group 254 virtual-address ’192.168.253.254’
! Setting the track-route on failure will reduce the VRRP priority to 150
set interfaces ethernet eth4 vrrp vrrp-group 254 track-route IPv4 target ’8.8.8.8’
set interfaces ethernet eth4 vrrp vrrp-group 254 track-route IPv4 weight ’50’
commit

9.9.5 Setting the VRRP Transition Scripts

Transition scripts can help you implement various adjustments, such as starting and stopping services, or even modifying
the DM2500 configuration in the VRRP transition. This setting will cause the VRRP process to call a script that will execute
as configured during VRRP transitions.

VRRP Transition Scripts only support actions on IPSec tunnels.

The VRRP states that are monitored to trigger scripts are:

• backup: VRRP state transition action for backup.

• fault: VRRP state transition action for fault.

• master: State transition action from VRRP to master.

The actions that scripts can perform based on VRRP states are:

• ipsec-start: Starts IPSec on VRRP state transition.

• ipsec-restart: Restarts IPSec on VRRP state transition.

• ipsec-stop: Stop IPSec on VRRP state transition.

The configuration below will be used to demonstrate IPSec tunnel process stop after the VRRP state changes to backup and
IPSec tunnel process starts when VRRP change to master.

Master:
configure
set interfaces ethernet eth4 address ’192.168.253.1/24’
set interfaces ethernet eth4 vrrp vrrp-group 254 preempt ’true’
set interfaces ethernet eth4 vrrp vrrp-group 254 priority ’200’
set interfaces ethernet eth4 vrrp vrrp-group 254 virtual-address ’192.168.253.254’
! Configuring transition-scripts in case the state changes to backup will stop IPSec
set interfaces ethernet eth4 vrrp vrrp-group 254 run-transition-scripts
backup ’ipsec-stop’
! Configuring transition-scripts, in case the state changes to master will start IPSec
set interfaces ethernet eth4 vrrp vrrp-group 254 run-transition-scripts
master ’ipsec-start’
commit

DATACOM 204.4305.05 - March 30, 2020 80


DM2500 - Quick Configuration Guide 9 Routing

9.10 Setting the PIM

PIM (Protocol Independent Multicast) is a family of protocols with objective to support forwarding of multicast packets.
These protocols use the routes learned to create a multicast flow path, no depending of any specific routing protocol.
There are some PIM family protocols, like: PIM SM (Sparse Mode), PIM SSM (Source-Specific Multicast), PIM DM (Dense
Mode) and Bidirectional PIM. These protocols basically differentiated in the path construction mode of multicast flow.

Only are supported the PIM SM and PIM SSM modes.

The scenario below will be used to shows the configuration of PIM SM with static RP, PIM SSM and OSPF.

PIM

The configuration of the PIM protocol will be demonstrated using the scenario above.

EQUIPMENT-A

configure
set protocols ospf log-adjacency-changes
set protocols ospf area 0 network 192.168.10.0/30
set protocols ospf area 0 network 192.168.50.0/24
set protocols ospf area 0 network 10.10.10.10/32
set protocols ospf parameters router-id 10.10.10.10
set protocols pim rp-address 20.20.20.20
set interfaces loopback lo1 address 10.10.10.10/32
set interfaces loopback lo1 ip pim enable
set interfaces ethernet eth1 address 192.168.10.1/30
set interfaces ethernet eth1 ip ospf network broadcast
set interfaces ethernet eth1 ip pim enable
set interfaces ethernet eth2 address 192.168.50.1/24
set interfaces ethernet eth2 ip pim enable
commit

EQUIPMENT-B

configure
set protocols ospf log-adjacency-changes
set protocols ospf area 0 network 192.168.10.0/30
set protocols ospf area 0 network 192.168.60.0/24
set protocols ospf area 0 network 20.20.20.20/32
set protocols ospf parameters router-id 20.20.20.20
set protocols pim rp-address 20.20.20.20
set interfaces loopback lo1 address 20.20.20.20/32
set interfaces loopback lo1 ip pim enable
set interfaces ethernet eth1 address 192.168.10.2/30
set interfaces ethernet eth1 ip ospf network broadcast
set interfaces ethernet eth1 ip pim enable
set interfaces ethernet eth2 address 192.168.60.1/24
set interfaces ethernet eth2 ip pim enable

DATACOM 204.4305.05 - March 30, 2020 81


DM2500 - Quick Configuration Guide 9 Routing

commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

configure
show pim
show pim route-cache
commit

9.10.1 Setting IGMP version

IGMP version 3 is the default configuration of this equipment, but if necessary it is possible change the IGMP version using
the commands bellow.

IGMP version 3 supports PIM SM and PIM SSM and IGMP version 2 supports only PIM SM.

Change IGMP protocol version to 2:

configure
set interfaces ethernet eth1 ip pim igmp v2
commit

Change IGMP protocol version to 3:

configure
set interfaces ethernet eth1 ip pim igmp v3
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

9.11 Setting the VRF

VRF (Virtual Routing and Forwarding) is a feature that allows different routing instances in the same equipment.

Only are supported the creation of three VRFs in the product.

Some features are not supported in VRFs. For more details on unsupported features, see the document
DM2500 Release Notes.

DATACOM 204.4305.05 - March 30, 2020 82


DM2500 - Quick Configuration Guide 9 Routing

9.11.1 Setting the VRF lite

VRF lite is a basic version of VRF and does not support MPLS signaling.

The scenario below will be used to illustrate the configuration of the VRF lite.

Traffic isolation between customers with VRFs

There must not be communication between clients 1 and 2. Therefore, two VRFs will be configured to isolate the routing
tables and the traffic between them. The following specifications will be used:

VRF CLI1

• Interface in VLAN 10 with IPv4 address 192.168.10.1/24

• Interface in VLAN 100 with IPv4 address 192.168.100.1/24

VRF CLI2

• Interface in VLAN 20 with IPv4 address 192.168.20.1/24

• Interface in VLAN 200 with IPv4 address 192.168.200.1/24

The next steps will indicate how to execute these configurations.

configure
set vrf CLI1 interfaces ethernet eth1 vif 10 address 192.168.10.1/24
set vrf CLI1 interfaces ethernet eth2 vif 100 address 192.168.100.1/24
set vrf CLI2 interfaces ethernet eth5 vif 20 address 192.168.20.1/24
set vrf CLI2 interfaces ethernet eth6 vif 200 address 192.168.200.1/24
commit

The scenario below will be used to demonstrate the configuration of equipment management outside a VRF and a service
VRF with IP address overlapping.

VRF with overlapping IP address

DATACOM 204.4305.05 - March 30, 2020 83


DM2500 - Quick Configuration Guide 9 Routing

There is no communication between the management network on the eth1 interface and the CLI1 data VRF on the eth6
interface. Both interfaces use the same IP address.

The following specifications will be used:

MANAGEMENT

• eth1 interface with IPv4 address 192.168.0.1/24

VRF CLI1

• eth6 interface with IPv4 address 192.168.0.1/24

The next steps will indicate how to execute these configurations.

configure
set interfaces ethernet eth1 address 192.168.0.1/24
set vrf CLI1 interfaces ethernet eth2 address 192.168.0.1/24
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show vrf <vrf name> interfaces


show vrf <vrf name> ip route

9.12 Setting the ECMP

ECMP (Equal Cost Multi-Path) allows that flows or packets to the same destination can be transmitted across multiple
paths of equal cost.

The load balance can be realized per packets or per flow.

9.12.1 Load balance per packet

In packet mode, load-balance does not take into account flows. Packets are load-balanced in a round-robin way between
the available next-hops.

Configuration for IPv4:

configure
set system ip ecmp packets
commit

Configuration for IPv6:

configure
set system ipv6 ecmp packets
commit

DATACOM 204.4305.05 - March 30, 2020 84


DM2500 - Quick Configuration Guide 9 Routing

9.12.2 Load balance per flow

The flow load balancing can be realized in two ways: ports-unaware and ports-aware.

In ports-unaware mode, TCP/UDP ports are not taked into account when identifying the flow.

Configuration for IPv4:

configure
set system ip ecmp ports-unaware
commit

Configuration for IPv6:

configure
set system ipv6 ecmp ports-unaware
commit

In ports-aware mode, TCP/UDP ports are taken into account in the flow identification.

Configuration for IPv4:

configure
set system ip ecmp ports-aware
commit

Configuration for IPv6:

configure
set system ipv6 ecmp ports-aware
commit

9.12.3 Disabling ECMP

To disable the ECMP, follow the configuration below.

Configuration for IPv4:

configure
set system ip ecmp disabled
commit

Configuration for IPv6:

configure
set system ipv6 ecmp disabled
commit

ECMP confirmation can also be performed in VRFs. The previously shown configuration commands can be
executed in the VRF context, as in set vrf <vrf-name> system ip ecmp ... or set vrf <vrf-name> system
ipv6 ecmp ...

DATACOM 204.4305.05 - March 30, 2020 85


DM2500 - Quick Configuration Guide 9 Routing

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Consult the specific protocol sessions to check on how to enable ECMP on it.

DATACOM 204.4305.05 - March 30, 2020 86


DM2500 - Quick Configuration Guide 10 QoS

10 QoS
QoS (Quality of Service) is a set of mechanisms and algorithms used to classify and prioritize traffic. The main objective is
to assure that services that require transmission quality in the network (latency, jitter and bandwidth), for example, voice
over IP (VoIP) and multicast, operate as expected.

This chapter contais the follow sections:

• Setting the Rate Limit

• Configuring classification, priorization and remarking of egress traffic

• Configuring DSCP remarking of ingress traffic

10.1 Setting the Rate Limit

The Rate limit is the functionality that limits the maximum rate of traffic that an interface or VLAN can sent (out) or received
(in).

The scenario below will be used to show configuration of the Rate Limit.

Scenario Rate Limit

The next steps will show how to configure the access to Internet with traffic limited at the input and at the output through
the DM2500 band control mechanisms with asymmetric characteristic from the point of view of user. Considering that the
user would like to obtain the download rate of 50 Mbps and upload of 10 Mbps, using the eth1 interface for the access and
the o uplink in the eth2 Internet with the VLAN 300.

configure
set traffic-policy rate-control WAN_OUT bandwidth 10mbit
set interfaces ethernet eth2 vif 300 traffic-policy out WAN_OUT
set traffic-policy limiter WAN_IN default bandwidth 50mbit
set interfaces ethernet eth2 vif 300 traffic-policy in WAN_IN
commit

A limiter by default does not take into account L2 overhead in traffic limiting. To consider L2 overhead in traffic limiting for
single tagged packets, configure as shown below.

configure
set traffic-policy limiter WAN_IN default bandwidth 50mbit
set traffic-policy limiter WAN_IN default account-layer2-overhead single-tagged
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

DATACOM 204.4305.05 - March 30, 2020 87


DM2500 - Quick Configuration Guide 10 QoS

10.2 Configuring classification, priorization and remarking of egress traffic

10.2.1 Classification and priorization

The classification and prioritization of outgoing traffic are useful to assure that given types of traffic are prioritized to the
detriment of others in situations in which a traffic jam occurs in the outgoing traffic. The scenario below will be used to
show configuration of these mechanisms.

Classification and prioritization

The following configuration classifies packets in four categories, as described below. The packets are routed to eth2 uplink
interface, which is a 10Mbps Internet link.

• Class 2 to control packets and VoIP signaling (SIP). IPv4 packets coming from the eth3 interface with DSCP 26 will
have a reserve of 10% of the bandwidth.

• Class 3 to VoIP media packets (RTP). IPv4 packets coming from the eth3 interface with DSCP 46 will have a reserve of
35% of the bandwidth and maximum of 35% of the bandwidth.

• Class 4 to streaming data. Packets coming from the eth1 interface through the IPv4 10.0.0.25 will have a reserve of
30% of the bandwidth.

• Class default to internet data and other types of traffic. Exceeding packets will be remarked with DSCP 0 (default).

configure
set traffic-policy shaper WAN_SHAPER bandwidth 10mbit
set traffic-policy shaper WAN_SHAPER class 2 description ‘SIP Traffic’
set traffic-policy shaper WAN_SHAPER class 2 match SIP ip dscp 26
set traffic-policy shaper WAN_SHAPER class 2 bandwidth 10%
set traffic-policy shaper WAN_SHAPER class 2 ceiling 100%
set traffic-policy shaper WAN_SHAPER class 2 priority 0
set traffic-policy shaper WAN_SHAPER class 2 queue-type drop-tail
set traffic-policy shaper WAN_SHAPER class 3 description ‘RTP Traffic’
set traffic-policy shaper WAN_SHAPER class 3 match RTP ip dscp 46
set traffic-policy shaper WAN_SHAPER class 3 bandwidth 35%
set traffic-policy shaper WAN_SHAPER class 3 ceiling 35%
set traffic-policy shaper WAN_SHAPER class 3 priority 1
set traffic-policy shaper WAN_SHAPER class 3 queue-type drop-tail
set traffic-policy shaper WAN_SHAPER class 4 description ‘Streaming’
set traffic-policy shaper WAN_SHAPER class 4 match IP25 ip source address 10.0.0.25/27
set traffic-policy shaper WAN_SHAPER class 4 bandwidth 30%
set traffic-policy shaper WAN_SHAPER class 4 ceiling 100%
set traffic-policy shaper WAN_SHAPER class 4 priority 2
set traffic-policy shaper WAN_SHAPER class 4 queue-type fair-queue
set traffic-policy shaper WAN_SHAPER default description ‘Internet’

DATACOM 204.4305.05 - March 30, 2020 88


DM2500 - Quick Configuration Guide 10 QoS

set traffic-policy shaper WAN_SHAPER default bandwidth 25%


set traffic-policy shaper WAN_SHAPER default ceiling 100%
set traffic-policy shaper WAN_SHAPER default priority 3
set traffic-policy shaper WAN_SHAPER default queue-type fair-queue
set traffic-policy shaper WAN_SHAPER default set-dscp ’default’
set traffic-policy shaper WAN_SHAPER default set-dscp-excess ’default’
set interfaces ethernet eth2 traffic-policy out WAN_SHAPER
commit

10.2.2 Remarking

It is also possible to remark the DSCP values of the output packet. In the example below, class 3 packets have DSCP
remarked.
set traffic-policy shaper WAN_SHAPER class 3 set-dscp EF

10.2.3 Classifying locally generated packets

To classify and remark packets generated by the DM2500 itself, it is needed to configure a policy to mark the packet with a
tag. In the shaper, a match in that tag is made so the locally generated packet can be classified and remarked. Locally
generated packets include ICMP, ARP, protocol control packets and others.

In the configuration below, packets generated by the DM2500 are marked with tag 5 through the policy local-route. In the
shaper, it is performed a match in mark 5 and the packet DSCP is remarked with value 48 (CS6).

To do not check other policy route rules after a rule has been matched, it is necessary use the mode stop.

set policy route mypolicyroute rule 10 set mark ’5’


set policy route mypolicyroute rule 10 set mode stop
set traffic-policy shaper WAN_SHAPER class 5 match mark 5
set traffic-policy shaper WAN_SHAPER class 5 set-dscp cs6
set interfaces ethernet eth2 traffic-policy out WAN_SHAPER
set interfaces ethernet eth2 policy local-route mypolicyroute

10.2.4 Classifying by address or port range

It is possible to classify packets by an address range or port range. Before classification, the packets in the specified ranges
must be marked by a policer in the ingress interface. After that, a shaper can classify the packets in the egress interface.

In to previously presented topology, packets with source address between 10.0.0.1 and 10.0.0.5, and ports between 1000
and 1400 are marked with tag 1 by a policer and then, are classified by a shaper.

To do not check other policy route rules after a rule has been matched, it is necessary use the mode stop.

DATACOM 204.4305.05 - March 30, 2020 89


DM2500 - Quick Configuration Guide 10 QoS

set policy route myrange rule 10 source address 10.0.0.1-10.0.0.5


set policy route myrange rule 10 source port 1000-1400
set policy route myrange rule 10 set mark 1
set policy route myrange rule 10 set mode stop
set interface ethernet eth1 policy route myrange
set traffic-policy shaper WAN_SHAPER class 5 match mark 1
set traffic-policy shaper WAN_SHAPER class 5 bandwidth 10%
set traffic-policy shaper WAN_SHAPER class 5 ceiling 100%
set traffic-policy shaper WAN_SHAPER class 5 priority 4
set traffic-policy shaper WAN_SHAPER class 5 queue-type fair-queue
set interfaces ethernet eth2 traffic-policy out WAN_SHAPER

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below is the main command available to check the shaper applied in the interfaces. If the user is at configuration level, it is
necessary to use the keyword run before the command.

show queueing
show queueing ethernet <interface>

10.3 Configuring DSCP remarking of ingress traffic

The DSCP markdown of the packets allows the equipment to define a new DSCP priority value based on criteria such as IP
address, transportation protocol (UDP/TCP) or MAC address. This resource can be used to assure that the packet receives
the adequate handling by other network elements after being forwarded by the router.

Considering that the user would like to mark the DSCP 18 (AF21) of the Telnet, SSH and Syslog type packets that ingress in
the eth1 interface through VLAN 200. The procedure below shows how to execute this configuration:

To do not check other policy route rules after a rule has been matched, it is necessary use the mode stop.

configure
set policy route DSCP-REMARK rule 1 set dscp 18
set policy route DSCP-REMARK rule 1 destination port syslog
set policy route DSCP-REMARK rule 1 protocol udp
set policy route DSCP-REMARK rule 1 set mode stop
set policy route DSCP-REMARK rule 2 set dscp 18
set policy route DSCP-REMARK rule 2 destination port telnet
set policy route DSCP-REMARK rule 2 protocol tcp
set policy route DSCP-REMARK rule 2 set mode stop
set policy route DSCP-REMARK rule 3 set dscp 18
set policy route DSCP-REMARK rule 3 destination port ssh
set policy route DSCP-REMARK rule 3 protocol tcp_udp
set policy route DSCP-REMARK rule 3 set mode stop
set interfaces ethernet eth1 vif 200 policy route DSCP-REMARK
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the DSCP markdown. If the user is at configuration level, it is necessary
to use the keyword run before the command.

DATACOM 204.4305.05 - March 30, 2020 90


DM2500 - Quick Configuration Guide 10 QoS

show policy route


show policy route statistics

DATACOM 204.4305.05 - March 30, 2020 91


DM2500 - Quick Configuration Guide 11 Security

11 Security
Maintain the security in the network consists in adopting access policies, monitoring of resources and protection of the
equipment in order to avoid attacks.

This chapter describes how to configure some security functionalities and resources available in the DM2500.

• Configuring the SSH and Telnet

• Configuring the NAT

• Configuring the Firewall

11.1 Configuring the SSH and Telnet

The SSH (Secure Shell) and TELNET are protocols used for access to the equipment terminal. Both are enabled in the
equipment factory configuration. It is recommended to deactivate the TELNET if it is not used, as it is a protocol less safe as
related to the SSH.

The next steps will show how to deactivate the TELNET protocol.

configure
delete service telnet
commit

If deemed necessary, it is possible to change the ports and enabled addresses to access the services. Considering that the
user would like to change the TELNET port from the 23 to port 2323 and accepting connections only from the IPs 10.10.10.5
and 10.10.10.6 addresses. And, for the SSH the port will be changed from the 22 to port 2222 and will accept only the
packets from 10.10.10.5 address.

The procedure below will show how to execute these configurations:

configure
set service telnet port 2323
set service telnet listen-address 10.10.10.5
set service telnet listen-address 10.10.10.6
set service ssh port 2222
set service ssh listen-address 10.10.10.5
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show system login users

11.2 Configuring the NAT

The NAT (Network Address Translation) has as objective the translation of the internal addresses of a local network for a
public network. In addition of providing security upon hiding details of the stations and devices connected to the internal

DATACOM 204.4305.05 - March 30, 2020 92


DM2500 - Quick Configuration Guide 11 Security

network, it also has as objective to mitigate the exhaustion of public IPv4 addresses through reuse of internal addresses.

Configuring the NAT

11.2.1 Source NAT (SNAT)

The SNAT (Source NAT) is the most common form to use the NAT. This functionality changes the source IP address (and
optionally also the TCP/UDP port) of a packet that is routed in the DM2500. The change of IP address occurs after the
decision about the packet routing that has already been executed.

The scenario below will be used to show configuration of the SNAT.

Configuring the SNAT

Considering that the user would like to change the address of a packet of the 10.0.0.0/8 network to a public address
90.80.70.60 and which destination is the eth2 interface.

The next steps will indicate how to execute these configurations.

configure
set nat source rule 10 source address 10.10.0.0/8
set nat source rule 10 translation address 90.80.70.60
set nat source rule 10 outbound-interface eth2
commit

It is possible to use the Symmetric NAT feature that changes the origin TCP/UDP port to a random one. To utilize the
Symmetric NAT feature, use the "translation port" command ass shown below:

configure
set nat source rule 10 source address 10.10.0.0/8
set nat source rule 10 translation address 90.80.70.60
set nat source rule 10 outbound-interface eth2
set nat source rule 10 translation port ’random’
commit

DATACOM 204.4305.05 - March 30, 2020 93


DM2500 - Quick Configuration Guide 11 Security

In an alternative manner, if the public network address is defined dynamically it is possible to use the masquerade
parameter for the translation address. Thus, the NAT will use the eth2 interface address as source address:

configure
set nat source rule 10 source address 10.10.0.0/8
set nat source rule 10 translation address masquerade
set nat source rule 10 outbound-interface eth2
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show nat source rules


show nat source statistics
show nat source translations
clear nat source counters

11.2.2 Destination NAT (DNAT)

The DNAT (Destination NAT), also known as Port Forwarding is a translation mechanism of IP addresses and destination
ports, which has as objective to redirect packets with destination of the public network of an address and port specific for
an internal network. The change of destination address occurs before it is routed internally by the equipment.

The scenario below will be used to show configuration of the DNAT.

Configuring the DNAT

Considering that the user wishes to change the address and destination port of TCP or UDP packets of public network with
90.80.70.60 address and port 80 to the 10.10.10.3 internal address and port 8080 and which source is the eth2 interface.

The next steps will indicate how to execute these configurations.

configure
set nat destination rule 10 destination address 90.80.70.60
set nat destination rule 10 destination port 80
set nat destination rule 10 protocol tcp_udp
set nat destination rule 10 translation address 10.10.0.3
set nat destination rule 10 translation port 8080
set nat destination rule 10 inbound-interface eth2
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

DATACOM 204.4305.05 - March 30, 2020 94


DM2500 - Quick Configuration Guide 11 Security

show nat destination rules


show nat destination statistics
show nat destination translations
clear nat destination counters

11.3 Configuring the Firewall

This chapter shows the ACL Firewall and stateful Firewall configuration.

11.3.1 Configuring ACL Firewall

The ACL (Access Control List) Firewall is stateless, in other words, do not consider the TCP state or ICMP and UDP sessions.

ACL Firewall support IPv4 and IPv6 address, also is supported in VRF.

The example of ACL Firewall configuration have a LAN (Local Area Network) or Inside interface and WAN (Wide Area
Network) or Outside interface.

ACL Firewall

The ACL Firewall support three packets direction:

• in: Input packets in interface

• out: Output packets in interface

• local: Packets destined to router

Each interface can have only one rule set in each direction for IPv4 or IPv6 packets.

DATACOM 204.4305.05 - March 30, 2020 95


DM2500 - Quick Configuration Guide 11 Security

Configuring ACL between LAN and WAN

To deny LAN and WAN services should use the in to filter input packets in interface and out to filter output packets in
interface.

Example to deny SMTP and SMTPs services from WAN by any IPv4 or IPv6 address, other services are allowed:

configure
set firewall name BLOCK_IPV4_SERVICES default-action accept
set firewall name BLOCK_IPV4_SERVICES rule 1 action drop
set firewall name BLOCK_IPV4_SERVICES rule 1 destination port smtp
set firewall name BLOCK_IPV4_SERVICES rule 1 protocol tcp
set firewall name BLOCK_IPV4_SERVICES rule 2 action drop
set firewall name BLOCK_IPV4_SERVICES rule 2 destination port smtps
set firewall name BLOCK_IPV4_SERVICES rule 2 protocol tcp
set firewall ipv6-name BLOCK_IPV6_SERVICES default-action accept
set firewall ipv6-name BLOCK_IPV6_SERVICES rule 1 action drop
set firewall ipv6-name BLOCK_IPV6_SERVICES rule 1 destination port smtp
set firewall ipv6-name BLOCK_IPV6_SERVICES rule 1 protocol tcp
set firewall ipv6-name BLOCK_IPV6_SERVICES rule 2 action drop
set firewall ipv6-name BLOCK_IPV6_SERVICES rule 2 destination port smtps
set firewall ipv6-name BLOCK_IPV6_SERVICES rule 2 protocol tcp
commit

To apply the IPv4 and IPv6 rule set in WAN interface (eth4) use the commands below:

configure
set interfaces ethernet eth4 firewall in name BLOCK_IPV4_SERVICES
set interfaces ethernet eth4 firewall in ipv6-name BLOCK_IPV6_SERVICES
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show firewall summary

Configuring the management ACL

To deny packets destined to router will be used the local direction. The management services or routing protocols are
examples of services filtered by local.

Example to allow access to services below from LAN and WAN, other services are denied:

• SNMP: rule 1 to allow packets for get/set SNMP OIDs.

• Telnet: rule 2 to allow Telnet packets.

• SSH: rule 3 to allow SSH packets.

• Tacacs: rule 4 to allow Tacacs packets.

• OSPF: rule 5 to allow OSPF packets.

• SNMP Traps: It is not necessary create a rule due not exists packet destined to the equipment.

DATACOM 204.4305.05 - March 30, 2020 96


DM2500 - Quick Configuration Guide 11 Security

• Syslog: It is not necessary create a rule due not exists packet destined to the equipment.

configure
set firewall name IPV4_MGMT default-action drop
set firewall name IPV4_MGMT rule 1 action accept
set firewall name IPV4_MGMT rule 1 destination port snmp
set firewall name IPV4_MGMT rule 1 protocol udp
set firewall name IPV4_MGMT rule 2 action accept
set firewall name IPV4_MGMT rule 2 destination port telnet
set firewall name IPV4_MGMT rule 2 protocol tcp
set firewall name IPV4_MGMT rule 3 action accept
set firewall name IPV4_MGMT rule 3 destination port ssh
set firewall name IPV4_MGMT rule 3 protocol tcp
set firewall name IPV4_MGMT rule 4 action ’accept’
set firewall name IPV4_MGMT rule 4 protocol ’tcp’
set firewall name IPV4_MGMT rule 4 source port ’tacacs’
set firewall name IPV4_MGMT rule 5 action ’accept’
set firewall name IPV4_MGMT rule 5 protocol ’ospf’
set firewall ipv6-name IPV6_MGMT default-action drop
set firewall ipv6-name IPV6_MGMT rule 1 action accept
set firewall ipv6-name IPV6_MGMT rule 1 destination port snmp
set firewall ipv6-name IPV6_MGMT rule 1 protocol udp
set firewall ipv6-name IPV6_MGMT rule 2 action accept
set firewall ipv6-name IPV6_MGMT rule 2 destination port telnet
set firewall ipv6-name IPV6_MGMT rule 2 protocol tcp
set firewall ipv6-name IPV6_MGMT rule 3 action accept
set firewall ipv6-name IPV6_MGMT rule 3 destination port ssh
set firewall ipv6-name IPV6_MGMT rule 3 protocol tcp
set firewall ipv6-name IPV6_MGMT rule 4 action ’accept’
set firewall ipv6-name IPV6_MGMT rule 4 protocol ’tcp’
set firewall ipv6-name IPV6_MGMT rule 4 source port ’tacacs’
set firewall ipv6-name IPV6_MGMT rule 5 action ’accept’
set firewall ipv6-name IPV6_MGMT rule 5 protocol ’ospf’
commit

To apply the MGMT rule set in LAN interface (eth1) and Wan interface (eth4) use the commands below:

configure
set interfaces ethernet eth1 firewall local name IPV4_MGMT
set interfaces ethernet eth4 firewall local name IPV4_MGMT
set interfaces ethernet eth1 firewall local ipv6-name IPV6_MGMT
set interfaces ethernet eth4 firewall local ipv6-name IPV6_MGMT
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show firewall summary

Configuring ACLs by groups

The ACL Firewall supports the creation of groups eliminating the need to create a rule for each network, address or ports
making the configuration simple. Using the groups to manipulate these informations the configuration is done in groups
and not more in rules.

Using the Configuring the management ACL session as example is possible to change the rules to allow services only from
LAN networks in rules 1 to 4 and from WAN network in rule 5.

DATACOM 204.4305.05 - March 30, 2020 97


DM2500 - Quick Configuration Guide 11 Security

configure
set firewall group network-group IPV4_LAN_NETWORK network ’192.168.0.0/24’
set firewall group network-group IPV4_LAN_NETWORK network ’172.22.0.0/16’
set firewall group network-group IPV4_WAN_NETWORK network ’1.0.0.0/30’
set firewall name IPV4_MGMT rule 1 source group network-group ’IPV4_LAN_NETWORK’
set firewall name IPV4_MGMT rule 2 source group network-group ’IPV4_LAN_NETWORK’
set firewall name IPV4_MGMT rule 3 source group network-group ’IPV4_LAN_NETWORK’
set firewall name IPV4_MGMT rule 4 source group network-group ’IPV4_LAN_NETWORK’
set firewall name IPV4_MGMT rule 5 source group network-group ’IPV4_WAN_NETWORK’
set firewall group ipv6-network-group IPV6_LAN_NETWORK network ’2001:db8:AAAA::/64’
set firewall group ipv6-network-group IPV6_LAN_NETWORK network ’2001:db8:BBBB::/64’
set firewall group ipv6-network-group IPV6_WAN_NETWORK network ’2001::1/64’
set firewall ipv6-name IPV6_MGMT rule 1 source group ipv6-network-group ’IPV6_LAN_NETWORK’
set firewall ipv6-name IPV6_MGMT rule 2 source group ipv6-network-group ’IPV6_LAN_NETWORK’
set firewall ipv6-name IPV6_MGMT rule 3 source group ipv6-network-group ’IPV6_LAN_NETWORK’
set firewall ipv6-name IPV6_MGMT rule 4 source group ipv6-network-group ’IPV6_LAN_NETWORK’
set firewall ipv6-name IPV6_MGMT rule 5 source group ipv6-network-group ’IPV6_WAN_NETWORK’
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show firewall summary


show firewall group

11.3.2 Configuring the stateful Firewall

Stateful Firewall supports IPv4 and IPv6 address, also is supported in VRFs.

To do the same configuration showed in this chapter for IPv6 address it is necessary change the name to
ipv6-name in all configurations.

The example of stateful Firewall configuration have three tipical zones, LAN (Local Area Network) or Inside, WAN (Wide Area
Network) or Outside and DMZ (Demilitarized Zone).

DATACOM 204.4305.05 - March 30, 2020 98


DM2500 - Quick Configuration Guide 11 Security

Stateful Firewall

The stateful firewall use the TCP connection state to take an action over packets. The established are connections
previously established, for example an answer packet. The related are packets related to an existent connection, for
example: an ICMP IPv4 that is related to a connection, but it is not part of TCP connection, and invalid state are related to
invalid TCP connections, for example: an ICMP IPv4 related to inexistent connections.

The stateful Firewall also consider ICMP and UDP sessions althought they are connectionless protocols. Upon receiving a
first packet, a new connection is considered and after a timeout the connection is considered closed.

Configuring the Zone-Based Firewall

The configuration below apply the default action to drop in three zones. All the traffic flowing between the three zones will
be silent discarded.
configure
set firewall name DMZ-TO-LAN default-action ’drop’
set firewall name DMZ-TO-WAN default-action ’drop’
set firewall name LAN-TO-DMZ default-action ’drop’
set firewall name LAN-TO-WAN default-action ’drop’
set firewall name WAN-TO-DMZ default-action ’drop’
set firewall name WAN-TO-LAN default-action ’drop’
set zone-policy zone DMZ default-action ’drop’
set zone-policy zone DMZ from LAN firewall name ’LAN-TO-DMZ’
set zone-policy zone DMZ from WAN firewall name ’WAN-TO-DMZ’
set zone-policy zone DMZ interface ’eth2’
set zone-policy zone LAN default-action ’drop’
set zone-policy zone LAN from DMZ firewall name ’DMZ-TO-LAN’
set zone-policy zone LAN from WAN firewall name ’WAN-TO-LAN’
set zone-policy zone LAN interface ’eth1’
set zone-policy zone WAN default-action ’drop’
set zone-policy zone WAN from DMZ firewall name ’DMZ-TO-WAN’
set zone-policy zone WAN from LAN firewall name ’LAN-TO-WAN’
set zone-policy zone WAN interface ’eth4’
commit

Allowing services in the Zone-Based Firewall

Example to allow access the Web (HTTPs) and E-mail (POP3 and SMTP) services in DMZ servers from LAN and WAN:

Due to configuring the zones default action to drop, any packets related to other services will be discarded.

configure
set firewall name LAN-TO-DMZ rule 1 action ’accept’
set firewall name LAN-TO-DMZ rule 1 state ’established enable’
set firewall name LAN-TO-DMZ rule 1 state ’related enable’
set firewall name LAN-TO-DMZ rule 2 action ’drop’
set firewall name LAN-TO-DMZ rule 2 state ’invalid enable’
set firewall name LAN-TO-DMZ rule 3 action ’accept’
set firewall name LAN-TO-DMZ rule 3 state ’new enable’
set firewall name LAN-TO-DMZ rule 3 destination port ’https’
set firewall name LAN-TO-DMZ rule 3 protocol ’tcp’
set firewall name LAN-TO-DMZ rule 4 action ’accept’
set firewall name LAN-TO-DMZ rule 4 state ’new enable’
set firewall name LAN-TO-DMZ rule 4 destination port ’pop3s’
set firewall name LAN-TO-DMZ rule 4 protocol ’tcp’
set firewall name LAN-TO-DMZ rule 5 action ’accept’
set firewall name LAN-TO-DMZ rule 5 state ’new enable’

DATACOM 204.4305.05 - March 30, 2020 99


DM2500 - Quick Configuration Guide 11 Security

set firewall name LAN-TO-DMZ rule 5 destination port ’smtps’


set firewall name LAN-TO-DMZ rule 5 protocol ’tcp’
set firewall name DMZ-TO-LAN rule 1 action ’accept’
set firewall name DMZ-TO-LAN rule 1 state ’established enable’
set firewall name DMZ-TO-LAN rule 1 state ’related enable’
set firewall name DMZ-TO-LAN rule 2 action ’drop’
set firewall name DMZ-TO-LAN rule 2 state ’invalid enable’
set firewall name WAN-TO-DMZ rule 1 action ’accept’
set firewall name WAN-TO-DMZ rule 1 state ’established enable’
set firewall name WAN-TO-DMZ rule 1 state ’related enable’
set firewall name WAN-TO-DMZ rule 2 action ’drop’
set firewall name WAN-TO-DMZ rule 2 state ’invalid enable’
set firewall name WAN-TO-DMZ rule 3 action ’accept’
set firewall name WAN-TO-DMZ rule 3 state ’new enable’
set firewall name WAN-TO-DMZ rule 3 destination port ’https’
set firewall name WAN-TO-DMZ rule 3 protocol ’tcp’
set firewall name WAN-TO-DMZ rule 4 action ’accept’
set firewall name WAN-TO-DMZ rule 4 state ’new enable’
set firewall name WAN-TO-DMZ rule 4 destination port ’pop3s’
set firewall name WAN-TO-DMZ rule 4 protocol ’tcp’
set firewall name WAN-TO-DMZ rule 5 action ’accept’
set firewall name WAN-TO-DMZ rule 5 state ’new enable’
set firewall name WAN-TO-DMZ rule 5 destination port ’smtps’
set firewall name WAN-TO-DMZ rule 5 protocol ’tcp’
set firewall name DMZ-TO-WAN rule 1 action ’accept’
set firewall name DMZ-TO-WAN rule 1 state ’established enable’
set firewall name DMZ-TO-WAN rule 1 state ’related enable’
set firewall name DMZ-TO-WAN rule 2 action ’drop’
set firewall name DMZ-TO-WAN rule 2 state ’invalid enable’
commit

Example to allow access the Web (HTTP and HTTPs) services in WAN "Internet" from LAN:

Due to configuring the zones default action to drop, any packets related to other services will be discarded.

configure
set firewall name LAN-TO-WAN rule 1 action ’accept’
set firewall name LAN-TO-WAN rule 1 state ’established enable’
set firewall name LAN-TO-WAN rule 1 state ’related enable’
set firewall name LAN-TO-WAN rule 2 action ’drop’
set firewall name LAN-TO-WAN rule 2 state ’invalid enable’
set firewall name LAN-TO-WAN rule 3 action ’accept’
set firewall name LAN-TO-WAN rule 3 state ’new enable’
set firewall name LAN-TO-WAN rule 3 destination port ’http’
set firewall name LAN-TO-WAN rule 3 protocol ’tcp’
set firewall name LAN-TO-WAN rule 4 action ’accept’
set firewall name LAN-TO-WAN rule 4 state ’new enable’
set firewall name LAN-TO-WAN rule 4 destination port ’https’
set firewall name LAN-TO-WAN rule 4 protocol ’tcp’
set firewall name WAN-TO-LAN rule 1 action ’accept’
set firewall name WAN-TO-LAN rule 1 state ’established enable’
set firewall name WAN-TO-LAN rule 1 state ’related enable’
set firewall name WAN-TO-LAN rule 2 action ’drop’
set firewall name WAN-TO-LAN rule 2 state ’invalid enable’
commit

Configuring the Firewall in management

To protect the management traffic, i.e. the packets that are sent by or received by the DM2500 it is necessary to create a
zone with local-zone option.

In the example below is used the MGMT (management) zone with local-zone option:

DATACOM 204.4305.05 - March 30, 2020 100


DM2500 - Quick Configuration Guide 11 Security

configure
set zone-policy zone MGMT default-action ’drop’
set zone-policy zone MGMT local-zone
set zone-policy zone MGMT from LAN firewall name ’LAN-TO-MGMT’
set zone-policy zone MGMT from WAN firewall name ’WAN-TO-MGMT’
set zone-policy zone MGMT from DMZ firewall name ’DMZ-TO-MGMT’
commit

Allowing services in MGMT zone

Example to allow acess to the equipment management by SSH from any LAN IP address and OSPF from any WAN IP
address:

Due to configuring the zones default action to drop, any packets related to other services will be discarded.

configure
set firewall name LAN-TO-MGMT rule 1 action ’accept’
set firewall name LAN-TO-MGMT rule 1 state ’established enable’
set firewall name LAN-TO-MGMT rule 1 state ’related enable’
set firewall name LAN-TO-MGMT rule 2 action ’drop’
set firewall name LAN-TO-MGMT rule 2 state ’invalid enable’
set firewall name LAN-TO-MGMT rule 3 action ’accept’
set firewall name LAN-TO-MGMT rule 3 state ’new enable’
set firewall name LAN-TO-MGMT rule 3 destination port ’ssh’
set firewall name LAN-TO-MGMT rule 3 protocol ’tcp’
set firewall name WAN-TO-MGMT rule 1 action ’accept’
set firewall name WAN-TO-MGMT rule 1 state ’established enable’
set firewall name WAN-TO-MGMT rule 1 state ’related enable’
set firewall name WAN-TO-MGMT rule 2 action ’drop’
set firewall name WAN-TO-MGMT rule 2 state ’invalid enable’
set firewall name WAN-TO-MGMT rule 3 action ’accept’
set firewall name WAN-TO-MGMT rule 3 state ’new enable’
set firewall name WAN-TO-MGMT rule 3 protocol ’ospf’
set firewall name DMZ-TO-MGMT rule 1 action ’accept’
set firewall name DMZ-TO-MGMT rule 1 state ’established enable’
set firewall name DMZ-TO-MGMT rule 1 state ’related enable’
set firewall name DMZ-TO-MGMT rule 2 action ’drop’
set firewall name DMZ-TO-MGMT rule 2 state ’invalid enable’
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check this feature. If the user is at configuration level, it is necessary to use the
keyword run before the command.

show firewall summary


show zone-policy
show conntrack table ipv4
show conntrack table ipv6

11.3.3 Firewall protections

The Firewall support some global protections, that is, the action is valid to all configured zones.

DATACOM 204.4305.05 - March 30, 2020 101


DM2500 - Quick Configuration Guide 11 Security

By default only ICMP IPv4 send redirects are enabled, but it is possible to enable other protections if
necessary.

ICMP IPv4 Ping broadcast

To answer ICMP (Internet Control Message Protocol) IPv4 broadcast packets received:

configure
set firewall broadcast-ping enable
commit

To not answer the ICMP IPv4 broadcast received:


configure
set firewall broadcast-ping disable
commit

ICMP IPv4 redirect

To enable processing of IPv4 ICMP redirect received:

configure
set firewall receive-redirects enable
commit

To disable processing of IPv4 ICMP redirect received:

configure
set firewall receive-redirects disable
commit

To enable sending IPv4 ICMP redirect:

configure
set firewall send-redirects enable
commit

To disable sending IPv4 ICMP redirect:

configure
set firewall send-redirects disable
commit

IPv4 Source Routing

The IPv4 packet has an option to carry information about the path that it must follow to its destination.

To enable the processing of IPv4 packets that contains source-routing options:

DATACOM 204.4305.05 - March 30, 2020 102


DM2500 - Quick Configuration Guide 11 Security

configure
set firewall ip-src-route enable
commit

To disable the processing of IPv4 packets that contains source-routing options:

configure
set firewall ip-src-route disable
commit

RPF

The RPF (Reverse Patch Forwarding) is defined in RFC3074. The strict mode check if the equipment has a route to the
source IP address of the received packet through the same interface were the packet was received. If not the packet is
discarded:
configure
set firewall source-validation strict
commit

The RPF in loose mode check if source IP address received has a route in equipment. If not the packet is discarded:

configure
set firewall source-validation loose
commit

It is possible disable the RPF checking:

configure
set firewall source-validation disable
commit

DATACOM 204.4305.05 - March 30, 2020 103


DM2500 - Quick Configuration Guide 12 Tunneling

12 Tunneling
Tunneling consists in encapsulation of a protocol within another protocol to allow transparency and higher security during
data flowing the unsafe public networks or even in private networks.

This chapter contains the following sections:

• Setting GRE tunnels

• Setting Ipv6 GRE tunnels

• Setting site-to-site IPsec VPNs

• Setting site-to-site VPNs IPsec with NAT Traversal

• Protecting a GRE Tunnel with IPsec

• Setting VPN IPsec with Virtual Tunnel Interface

12.1 Setting GRE tunnels

The GRE (Generic Routing Encapsulation) is an IP packets encapsulation method through the IP infrastructure with the
objective to interconnect networks that communicate between themselves through a public infrastructure (in general the
Internet).
The scenario below will be used to describe how to configure a GRE tunnel.

GRE Tunnel Setup

Let’s suppose that the user would like to create a point-to-point GRE tunnel in the 35.35.35.0/ 31 network between the R1
and R2 equipment, both connected to the Internet with assigned fixed IPv4 addresses and different internal network
learned by OSPF.
The procedure below indicates how to execute this configuration:

Router 1 (R1)

configure
set interfaces loopback lo address 1.1.1.1/32
set interfaces ethernet eth1 address 192.168.5.1/24
set interfaces ethernet eth2 address 209.165.201.15/24
set interfaces tunnel tun0 address 35.35.35.1/31
set interfaces tunnel tun0 encapsulation gre
set interfaces tunnel tun0 local-ip 209.165.201.15
set interfaces tunnel tun0 remote-ip 201.122.120.3
set protocols ospf parameters router-id 1.1.1.1
set protocols ospf area 1 network 35.35.35.0/31

DATACOM 204.4305.05 - March 30, 2020 104


DM2500 - Quick Configuration Guide 12 Tunneling

set protocols ospf area 1 network 192.168.5.0/24


commit

Router 2 (R2)

configure
set interfaces loopback lo address 2.2.2.2/32
set interfaces ethernet eth1 address 192.168.3.1/24
set interfaces ethernet eth2 address 201.122.120.3/24
set interfaces tunnel tun0 address 35.35.35.2/31
set interfaces tunnel tun0 encapsulation gre
set interfaces tunnel tun0 local-ip 201.122.120.3
set interfaces tunnel tun0 remote-ip 209.165.201.15
set protocols ospf parameters router-id 2.2.2.2
set protocols ospf area 1 network 35.35.35.0/31
set protocols ospf area 1 network 192.168.3.0/24
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the GRE tunnels. If the user is at configuration level, it is necessary to use
the keyword run before the command.

show interfaces tunnel tun0

12.2 Setting IPv6 GRE tunnels

The GRE also can be used with IPv6 addressing in DM2500.


The scenario below will be used to describe how to configure an IPv6 GRE tunnel.

IPv6 GRE Tunnel Setup

Let’s suppose that the user would like to create a point-to-point IPv6 GRE tunnel in the fd01::1/64 network between the R1
and R2 equipment, both connected to the Internet with assigned fixed IPv6 addresses and different internal network
reached via static routes.
The procedure below indicates how to execute this configuration:

Router 1 (R1)

configure
set interfaces ethernet eth1 address ’fd00:1::1/64’
set interfaces ethernet eth8 address ’2001:1290:1::6/64’
set interfaces tunnel tun0 address ’fd01::1/64’
set interfaces tunnel tun0 encapsulation ’gre6’

DATACOM 204.4305.05 - March 30, 2020 105


DM2500 - Quick Configuration Guide 12 Tunneling

set interfaces tunnel tun0 local-ip ’2001:1290:1::6’


set interfaces tunnel tun0 mtu ’2000’
set interfaces tunnel tun0 remote-ip ’2001:1290:1:5::2’
set protocols static route6 ::/0 next-hop ’2001:1290:1::1’
commit

Router 2 (R2)

configure
set interfaces ethernet eth1 address ’fd00::1/64’
set interfaces ethernet eth8 address ’2001:1290:1:5::2/64’
set interfaces tunnel tun0 address ’fd01::2/64’
set interfaces tunnel tun0 encapsulation ’gre6’
set interfaces tunnel tun0 local-ip ’2001:1290:1:5::2’
set interfaces tunnel tun0 mtu ’2000’
set interfaces tunnel tun0 remote-ip ’2001:1290:1::6’
set protocols static route6 ::/0 next-hop ’2001:1290:1:5::1’
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the GRE tunnels. If the user is at configuration level, it is necessary to use
the keyword run before the command.

show interfaces tunnel tun0

12.3 Setting site-to-site IPsec VPNs

The IPsec (Internet Protocol Security) is a set of protocols defined by the IETF to assure a safe change of IPv4 packets
through unsafe networks (Internet). The protocol has mechanisms for checking of data integrity, assuring that it has not
been modified by an unauthorized individual, in addition of assuring the confidentiality, where only the authorized peers
can see the data, adopting encryption methods and control of access.

By default the DM2500 uses IKE (Internet Key Exchange) version 1 for automatic key management for
encryption.

The scenario below will be used to show configuration of the VPN IPsec.

VPN IPsec Setup

The DM2500 routers have LAN with IP addressing as shown in the figure above. IP addressing of the WAN routers is shown

DATACOM 204.4305.05 - March 30, 2020 106


DM2500 - Quick Configuration Guide 12 Tunneling

in the following configurations, as well as all the parameters used by the IPsec.
The procedure below indicates how to execute this configuration:

Router 1 (DM2500 6GT)

configure
set interfaces ethernet eth1 vif 800 address 80.80.80.2/24
set interfaces ethernet eth3 address 192.168.10.254/24
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’14’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec esp-group esp-grp-1 pfs ’dh-group14’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec site-to-site peer 80.80.80.1 authentication pre-shared-secret ’datacom123’
set vpn ipsec site-to-site peer 80.80.80.1 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 80.80.80.1 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 80.80.80.1 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 80.80.80.1 tunnel 1 local prefix ’192.168.10.0/24’
set vpn ipsec site-to-site peer 80.80.80.1 tunnel 1 remote prefix ’192.168.6.0/24’
set vpn ipsec site-to-site peer 80.80.80.1 local-address ’80.80.80.2’
set vpn ipsec ipsec-interfaces interface ’eth1.800’
set protocols static route 192.168.6.0/24 next-hop 80.80.80.1
commit

Router 2 (DM2500 4GT)

configure
set interfaces ethernet eth2 vif 800 address 80.80.80.1/24
set interfaces ethernet eth1 address 192.168.6.254/24
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’14’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec esp-group esp-grp-1 pfs dh-group14
set vpn ipsec esp-group esp-grp-1 proposal 1 hash sha1
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption aes256
set vpn ipsec site-to-site peer 80.80.80.2 authentication pre-shared-secret ’datacom123’
set vpn ipsec site-to-site peer 80.80.80.2 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 80.80.80.2 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 80.80.80.2 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 80.80.80.2 tunnel 1 local prefix 192.168.6.0/24
set vpn ipsec site-to-site peer 80.80.80.2 tunnel 1 remote prefix 192.168.10.0/24
set vpn ipsec site-to-site peer 80.80.80.2 local-address ’80.80.80.1’
set vpn ipsec ipsec-interfaces interface ’eth2.800’
set protocols static route 192.168.10.0/24 next-hop 80.80.80.2
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the VPNs IPsec. If the user is at configuration level, it is necessary to use
the keyword run before the command.

show vpn ipsec status


show vpn debug
show vpn debug detail
show vpn debug peer <endereço IP>

Alternatively to IPv4, the IPsec can be configured with IPv6 addressing.

The scenario below will be used to show configuration of the VPN IPsec with IPv6.

DATACOM 204.4305.05 - March 30, 2020 107


DM2500 - Quick Configuration Guide 12 Tunneling

VPN IPsec IPv6 Setup

The DM2500 routers have LAN with IPv6 addressing as shown in the figure above. IPv6 addressing of the WAN routers is
shown in the following configurations, as well as all the parameters used by the IPsec.
The procedure below indicates how to execute this configuration:

Router 1 (DM2500 6GT)

configure
set interfaces ethernet eth1 vif 104 address ’2804:130c::2/64’
set interfaces ethernet eth2 vif 101 address ’fd00::1/64’
set vpn ipsec esp-group esp-grp-1 pfs ’dh-group14’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’14’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec site-to-site peer 2804:130c::1 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 2804:130c::1 authentication pre-shared-secret ’d4t4c4m’
set vpn ipsec site-to-site peer 2804:130c::1 connection-type ’respond’
set vpn ipsec site-to-site peer 2804:130c::1 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 2804:130c::1 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 2804:130c::1 local-address ’2804:130c::2’
set vpn ipsec site-to-site peer 2804:130c::1 tunnel 1 id ’@respondTun1’
set vpn ipsec site-to-site peer 2804:130c::1 tunnel 1 allow-nat-networks ’disable’
set vpn ipsec site-to-site peer 2804:130c::1 tunnel 1 allow-public-networks ’disable’
set vpn ipsec site-to-site peer 2804:130c::1 tunnel 1 local prefix ’fd00::/64’
set vpn ipsec site-to-site peer 2804:130c::1 tunnel 1 remote prefix ’fd00:1::/64’
set vpn ipsec site-to-site peer 2804:130c::1 tunnel 1 remote-id ’@initiatorTun1’
set vpn ipsec ipsec-interfaces interface ’eth1.104’
set protocols static interface-route6 fd00:1::/64 next-hop-interface ’eth1.104’
commit

Router 2 (DM2500 4GT)

configure
set interfaces ethernet eth1 vif 104 address ’2804:130c::1/64’
set interfaces ethernet eth2 vif 101 address ’fd00:1::1/64’
set vpn ipsec esp-group esp-grp-1 pfs ’dh-group14’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’14’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec site-to-site peer 2804:130c::2 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 2804:130c::2 authentication pre-shared-secret ’d4t4c4m’
set vpn ipsec site-to-site peer 2804:130c::2 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 2804:130c::2 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 2804:130c::2 local-address ’2804:130c::1’
set vpn ipsec site-to-site peer 2804:130c::2 tunnel 1 id ’@initiatorTun1’
set vpn ipsec site-to-site peer 2804:130c::2 tunnel 1 allow-nat-networks ’disable’
set vpn ipsec site-to-site peer 2804:130c::2 tunnel 1 allow-public-networks ’disable’
set vpn ipsec site-to-site peer 2804:130c::2 tunnel 1 local prefix ’fd00:1::/64’
set vpn ipsec site-to-site peer 2804:130c::2 tunnel 1 remote prefix ’fd00::/64’
set vpn ipsec site-to-site peer 2804:130c::2 tunnel 1 remote-id ’@respondTun1’
set vpn ipsec ipsec-interfaces interface ’eth1.104’
set protocols static interface-route6 fd00::/64 next-hop-interface ’eth1.104’

DATACOM 204.4305.05 - March 30, 2020 108


DM2500 - Quick Configuration Guide 12 Tunneling

commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the VPNs IPsec. If the user is at configuration level, it is necessary to use
the keyword run before the command.

show vpn ipsec status


show vpn debug
show vpn debug detail
show vpn debug peer <endereço IP>

12.4 Setting site-to-site VPNs IPsec with NAT Traversal

The native IPsec packets are encapsulated using the ESP (Encapsulated Security Payload). In these packets, the IP
addresses are incorporated in the encapsulated packet. This causes problems when the IPsec packets should pass through
a device that makes NAT. When the NAT (Network Address Translation) occurs, the NAT device changes its own source IP
address (and sometimes the port number) to other IP address in the output packets. The NAT device hears a response and,
a response packet is received, the NAT device reverses the translation so that the input packet can reach the correct
destination. This allows that IP addresses within a private network are “hidden” to external networks. The NAT does
not operate well with the IPsec, because the IP addresses are incorporated in the encapsulated packet payload. Due to
several reasons, this means that the IPsec peer cannot be located behind a NAT device. The IPsec has a feature called NAT
Traversal (NAT-T, RFCs 3947 and 3948) that allows that each IPsec packet can be re-encapsulated in a UDP packet, which
can be handled correctly by the device configured with NAT. The NAT-T is executed on the IPsec. To support the NAT-T, the
device that makes NAT and has a firewall should be configured to allow the following configuration:
- IKE through UDP 500 port
- IPsec NAT-T through UDP 4500 port
- ESP Some NAT devices are already provided pre-configured with all this in a resource called “IPsec Passthrough”. However,
the IPsec Passthrough is incompatible with the NAT traversal. The devices with IPsec Passthrough recognize the IPsec UDP
packets and try in an incorrect manner to forward the packets. This corrupts the packets in such a manner that the NAT-T
no longer operates.
The scenario below will be used to show configuration of the VPN IPsec. with NAT-T

Scenario VPN IPsec with NAT-Traversal

The procedure below shows how the proposed scenarios can be configured:

Configuração – DM2500 4GT

DATACOM 204.4305.05 - March 30, 2020 109


DM2500 - Quick Configuration Guide 12 Tunneling

configure
set interfaces ethernet eth2 address 192.168.10.254/24
set interfaces ethernet eth3 address 190.100.10.210/24
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’14’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec esp-group esp-grp-1 pfs ’dh-group14’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec site-to-site peer 0.0.0.0 authentication pre-shared-secret ’datacom123’
set vpn ipsec site-to-site peer 0.0.0.0 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 0.0.0.0 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 0.0.0.0 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 0.0.0.0 tunnel 1 local prefix ’192.168.10.0/24’
set vpn ipsec site-to-site peer 0.0.0.0 tunnel 1 remote prefix ’192.168.60.0/24’
set vpn ipsec site-to-site peer 0.0.0.0 local-address ’190.100.10.210’
set vpn ipsec nat-traversal enable
set vpn ipsec nat-networks allowed-network 192.168.0.0/16 exclude 192.168.10.0/24
set vpn ipsec ipsec-interfaces interface ’eth3’
set protocols static route 192.168.60.0/24 next-hop 200.44.160.100
commit

An important change in this configuration is the peer address. It is defined as 0.0.0.0 to represent “any” IP address. As the
peer IP address is practically unknown, the DM2500 4GT shall not initiate the connections with the peer, it will only receive
connections from the peer.

Configuração – DM2500 6GT

configure
set interfaces ethernet eth8 address 192.168.0.1/24
set interfaces ethernet eth7 address 192.168.60.254/24
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’14’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes256’
set vpn ipsec esp-group esp-grp-1 pfs dh-group14
set vpn ipsec esp-group esp-grp-1 proposal 1 hash sha1
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption aes256
set vpn ipsec site-to-site peer 190.100.10.210 authentication pre-shared-secret ’datacom123’
set vpn ipsec site-to-site peer 190.100.10.210 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 190.100.10.210 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 190.100.10.210 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 190.100.10.210 tunnel 1 local prefix 192.168.60.0/24
set vpn ipsec site-to-site peer 190.100.10.210 tunnel 1 remote prefix 192.168.10.0/24
set vpn ipsec site-to-site peer 190.100.10.210 local-address ’192.168.0.1’
set vpn ipsec nat-traversal enable
set vpn ipsec nat-networks allowed-network 192.168.0.0/16 exclude 192.168.60.0/24
set vpn ipsec ipsec-interfaces interface ’eth8’
set protocols static route 192.168.10.0/24 next-hop 190.100.10.210
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the VPNs IPsec with NAT-Traversal. If the user is at configuration level, it
is necessary to use the keyword run before the command.

show vpn ipsec status


show vpn ipsec sa
show vpn ipsec sa detail
show vpn ike sa
show vpn debug peer <endereço IP>

12.5 Protecting a GRE Tunnel with IPsec

The GRE tunnels are not encrypted and do not provide any security due to use a simple key in clear text in our packets. This
means that the GRE tunnels, do not provide an adequate security to networks. At the same time, the tunnels based on

DATACOM 204.4305.05 - March 30, 2020 110


DM2500 - Quick Configuration Guide 12 Tunneling

policies of the IPsec, are unable to route directly non IP protocols or multicast, and the IPsec also has limitations from the
view of the operation. Use of tunnel interfaces together with IPsec VPN provides connections of routable tunnels between
gateways. For safe routable tunnels, the interfaces of GRE tunnel should be used together with an IPsec connection, so that
the IP tunnel can be protected by the IPsec tunnel.
The scenario below will be used to show configuration of the GRE tunnel protection with IPsec

Scenario Túnel GRE with IPsec

Considering that the user would like to configure a GRE tunnel between two DM2500 with IPsec protection between the
same end points.
The procedure below indicates how to execute this configuration:

Router 1 (DM2500 4GT)

configure
set interfaces ethernet eth2 address ’192.168.254.41/30’
set interfaces ethernet eth4 vif 4056 address ’192.168.45.1/24’
set interfaces tunnel tun1 remote-ip ’192.168.72.6’
set interfaces tunnel tun1 multicast ’enable’
set interfaces tunnel tun1 address ’192.168.191.1/30’
set interfaces tunnel tun1 local-ip ’192.168.254.41’
set interfaces tunnel tun1 encapsulation ’gre’
set vpn ipsec ike-group IKE-CLINK-BRM key-exchange ’ikev2’
set vpn ipsec ike-group IKE-CLINK-BRM lifetime ’3600’
set vpn ipsec ike-group IKE-CLINK-BRM proposal 10 hash ’sha1’
set vpn ipsec ike-group IKE-CLINK-BRM proposal 10 dh-group ’14’
set vpn ipsec ike-group IKE-CLINK-BRM proposal 10 encryption ’aes256’
set vpn ipsec esp-group ESP-CLINK-BRM lifetime ’1800’
set vpn ipsec esp-group ESP-CLINK-BRM pfs ’enable’
set vpn ipsec esp-group ESP-CLINK-BRM proposal 10 hash ’sha1’
set vpn ipsec esp-group ESP-CLINK-BRM proposal 10 encryption ’aes128’
set vpn ipsec esp-group ESP-CLINK-BRM mode ’transport’
set vpn ipsec site-to-site peer 192.168.72.6 authentication pre-shared-secret ’d4t4c0m’
set vpn ipsec site-to-site peer 192.168.72.6 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 192.168.72.6 ike-group ’IKE-CLINK-BRM’
set vpn ipsec site-to-site peer 192.168.72.6 tunnel 2018 protocol ’gre’
set vpn ipsec site-to-site peer 192.168.72.6 tunnel 2018 esp-group ’ESP-CLINK-BRM’
set vpn ipsec site-to-site peer 192.168.72.6 local-address ’192.168.254.41’
set vpn ipsec site-to-site peer 192.168.72.6 connection-type ’initiate’
set vpn ipsec ipsec-interfaces interface ’eth2’
set protocols static route 192.168.64.0/22 next-hop ’192.168.191.2’
commit

Router 2 (DM2500 6GT)

configure
set interfaces ethernet eth1 vif 503 address ’192.168.72.6/30’
set interfaces ethernet eth3 vif 2020 address ’192.168.64.1/22’
set interfaces tunnel tun1 remote-ip ’192.168.254.41’
set interfaces tunnel tun1 multicast ’enable’
set interfaces tunnel tun1 address ’192.168.191.2/30’
set interfaces tunnel tun1 local-ip ’192.168.72.6’
set interfaces tunnel tun1 encapsulation ’gre’
set vpn ipsec ike-group IKE-CLINK-BRM key-exchange ’ikev2’
set vpn ipsec ike-group IKE-CLINK-BRM lifetime ’3600’
set vpn ipsec ike-group IKE-CLINK-BRM proposal 10 hash ’sha1’
set vpn ipsec ike-group IKE-CLINK-BRM proposal 10 dh-group ’14’
set vpn ipsec ike-group IKE-CLINK-BRM proposal 10 encryption ’aes256’
set vpn ipsec esp-group ESP-CLINK-BRM lifetime ’1800’
set vpn ipsec esp-group ESP-CLINK-BRM pfs ’enable’
set vpn ipsec esp-group ESP-CLINK-BRM proposal 10 hash ’sha1’
set vpn ipsec esp-group ESP-CLINK-BRM proposal 10 encryption ’aes128’

DATACOM 204.4305.05 - March 30, 2020 111


DM2500 - Quick Configuration Guide 12 Tunneling

set vpn ipsec esp-group ESP-CLINK-BRM mode ’transport’


set vpn ipsec site-to-site peer 192.168.254.41 authentication pre-shared-secret ’d4t4c0m’
set vpn ipsec site-to-site peer 192.168.254.41 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 192.168.254.41 ike-group ’IKE-CLINK-BRM’
set vpn ipsec site-to-site peer 192.168.254.41 tunnel 2018 protocol ’gre’
set vpn ipsec site-to-site peer 192.168.254.41 tunnel 2018 esp-group ’ESP-CLINK-BRM’
set vpn ipsec site-to-site peer 192.168.254.41 local-address ’192.168.72.6’
set vpn ipsec site-to-site peer 192.168.254.41 connection-type ’initiate’
set vpn ipsec ipsec-interfaces interface ’eth1.503’
set protocols static route 192.168.45.0/24 next-hop ’192.168.191.1’
commit

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the tunnels and VPNs. If the user is at configuration level, it is necessary
to use the keyword run before the command.

show interfaces tunnel tun1


show vpn ipsec status
show vpn debug
show vpn debug detail
show vpn debug peer <endereço IP>

12.6 Setting VPN IPsec with Virtual Tunnel Interface

IPsec with Virtual Tunnel Interfaces (VTIs) provide a routable interface type for establishing IPsec tunnels and an easy way
to define protection between sites to form an overlay network. IPsec VTIs simplify configuration of IPsec for protection of
remote links and simplify network management.

In the DM2500 there is no support for scenarios with high availablility or load balancing using tunnels with
VTI.

Scenario IPsec with VTI

Note that in an IPsec scenario with VTI, the local tunnel X and tunnel X remote configuration is not used within the
IPsec peer. The vti bind configuration is used inside the peer and the traffic to be encrypted must be forwarded to a VTI
interface that is associated with IPSec.

VTI interfaces have the IP address config, but this does not perform any type of encapsulation in the packet (different from
GRE). The IPsec peer address and the local-address must be the addresses of physical interfaces (WANs), not the addresses
of VTIs.

DATACOM 204.4305.05 - March 30, 2020 112


DM2500 - Quick Configuration Guide 12 Tunneling

Suppose the user wants to configure a tunnel with 1400 bytes MTU (Maximum Transmission Unit) using VTI interfaces
between two DM2500s with IPsec protection. The following procedure demonstrates how to perform this configuration.

The MTU of the VTI interface must be less than the MTU of the physical interface through which the encrypted
packets will be sent. In the example below, VTI has MTU of 1400 and eth4 has MTU of 1500. In this case there
is a difference of 100 bytes, enough for the overhead that IPsec adds and to avoid fragmentation on the eth2
interface.

Router R1 (DM2500)

configure
set interfaces ethernet eth3 address ’192.168.1.1/16’
set interfaces ethernet eth4 address ’192.168.3.1/24’
set interfaces ethernet eth4 mtu ’1500’
set interfaces vti vti1 address ’11.11.11.1/30’
set interfaces vti vti1 description ’IPsec-IPv4’
set interfaces vti vti1 mtu ’1400’
set protocols static interface-route 192.167.0.0/16 next-hop-interface ’vti1’
set vpn ipsec esp-group esp-grp-1 compression ’disable’
set vpn ipsec esp-group esp-grp-1 lifetime ’28800’
set vpn ipsec esp-group esp-grp-1 mode ’tunnel’
set vpn ipsec esp-group esp-grp-1 pfs ’enable’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection action ’hold’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection interval ’30’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection timeout ’120’
set vpn ipsec ike-group ike-grp-1 key-exchange ’ikev2’
set vpn ipsec ike-group ike-grp-1 lifetime ’28800’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’2’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ipsec-interfaces interface ’eth4’
set vpn ipsec site-to-site peer 192.168.3.2 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 192.168.3.2 authentication pre-shared-secret ’mysecret123’
set vpn ipsec site-to-site peer 192.168.3.2 connection-type ’respond’
set vpn ipsec site-to-site peer 192.168.3.2 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 192.168.3.2 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 192.168.3.2 local-address ’192.168.3.1’
set vpn ipsec site-to-site peer 192.168.3.2 vti bind ’vti1’
set vpn ipsec site-to-site peer 192.168.3.2 vti esp-group ’esp-grp-1’
commit
save

Router R2 (DM2500)

configure
set interfaces ethernet eth3 address ’192.167.2.1/16’
set interfaces ethernet eth4 address ’192.168.3.2/24’
set interfaces ethernet eth4 mtu ’1500’
set interfaces vti vti1 address ’11.11.11.2/30’
set interfaces vti vti1 description ’IPsec-IPv4’
set interfaces vti vti1 mtu ’1400’
set protocols static interface-route 192.168.0.0/16 next-hop-interface ’vti1’
set vpn ipsec esp-group esp-grp-1 compression ’disable’
set vpn ipsec esp-group esp-grp-1 lifetime ’28800’
set vpn ipsec esp-group esp-grp-1 mode ’tunnel’
set vpn ipsec esp-group esp-grp-1 pfs ’enable’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection action ’hold’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection interval ’30’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection timeout ’120’
set vpn ipsec ike-group ike-grp-1 key-exchange ’ikev2’
set vpn ipsec ike-group ike-grp-1 lifetime ’28800’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’2’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ipsec-interfaces interface ’eth4’
set vpn ipsec site-to-site peer 192.168.3.1 authentication mode ’pre-shared-secret’

DATACOM 204.4305.05 - March 30, 2020 113


DM2500 - Quick Configuration Guide 12 Tunneling

set vpn ipsec site-to-site peer 192.168.3.1 authentication pre-shared-secret ’mysecret123’


set vpn ipsec site-to-site peer 192.168.3.1 connection-type ’initiate’
set vpn ipsec site-to-site peer 192.168.3.1 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 192.168.3.1 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 192.168.3.1 local-address ’192.168.3.2’
set vpn ipsec site-to-site peer 192.168.3.1 vti bind ’vti1’
set vpn ipsec site-to-site peer 192.168.3.1 vti esp-group ’esp-grp-1’
commit
save

Alternatively to IPv4, the IPsec can be configured with IPv6 addressing.

The scenario below will be used to show configuration of the VPN IPSec with IPv6 using VTI interface.

Scenario IPsec with VTI

The procedure below indicates how to execute this configuration:

Router R1 (DM2500)

configure
set interfaces ethernet eth3 address ’2001:f0ca::1/64’
set interfaces ethernet eth4 address ’2001:b0ca::1/64’
set interfaces vti vti2 address ’fc00:1111::1/126’
set interfaces vti vti2 description ’IPsec-IPv6’
set protocols static interface-route6 2001:f0ca::/64 next-hop-interface ’vti2’
set vpn ipsec esp-group esp-grp-1 compression ’disable’
set vpn ipsec esp-group esp-grp-1 lifetime ’28800’
set vpn ipsec esp-group esp-grp-1 mode ’tunnel’
set vpn ipsec esp-group esp-grp-1 pfs ’enable’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection action ’hold’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection interval ’30’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection timeout ’120’
set vpn ipsec ike-group ike-grp-1 key-exchange ’ikev2’
set vpn ipsec ike-group ike-grp-1 lifetime ’28800’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’2’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ipsec-interfaces interface ’eth4’
set vpn ipsec site-to-site peer 2001:b0ca::2 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 2001:b0ca::2 authentication pre-shared-secret ’mysecret123’
set vpn ipsec site-to-site peer 2001:b0ca::2 connection-type ’respond’
set vpn ipsec site-to-site peer 2001:b0ca::2 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 2001:b0ca::2 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 2001:b0ca::2 local-address ’2001:b0ca::1’
set vpn ipsec site-to-site peer 2001:b0ca::2 vti bind ’vti2’
set vpn ipsec site-to-site peer 2001:b0ca::2 vti esp-group ’esp-grp-1’
commit
save

Router R2 (DM2500)

DATACOM 204.4305.05 - March 30, 2020 114


DM2500 - Quick Configuration Guide 12 Tunneling

configure
set interfaces ethernet eth3 address ’2001:ba1a::1/64’
set interfaces ethernet eth4 address ’2001:b0ca::2/64’
set interfaces vti vti2 address ’fc00:1111::2/126’
set interfaces vti vti2 description ’IPsec-IPv6’
set protocols static interface-route6 2001:ba1a::/64 next-hop-interface ’vti2’
set vpn ipsec esp-group esp-grp-1 compression ’disable’
set vpn ipsec esp-group esp-grp-1 lifetime ’28800’
set vpn ipsec esp-group esp-grp-1 mode ’tunnel’
set vpn ipsec esp-group esp-grp-1 pfs ’enable’
set vpn ipsec esp-group esp-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec esp-group esp-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection action ’hold’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection interval ’30’
set vpn ipsec ike-group ike-grp-1 dead-peer-detection timeout ’120’
set vpn ipsec ike-group ike-grp-1 key-exchange ’ikev2’
set vpn ipsec ike-group ike-grp-1 lifetime ’28800’
set vpn ipsec ike-group ike-grp-1 proposal 1 dh-group ’2’
set vpn ipsec ike-group ike-grp-1 proposal 1 encryption ’aes128’
set vpn ipsec ike-group ike-grp-1 proposal 1 hash ’sha1’
set vpn ipsec ipsec-interfaces interface ’eth4’
set vpn ipsec site-to-site peer 2001:b0ca::1 authentication mode ’pre-shared-secret’
set vpn ipsec site-to-site peer 2001:b0ca::1 authentication pre-shared-secret ’mysecret123’
set vpn ipsec site-to-site peer 2001:b0ca::1 connection-type ’initiate’
set vpn ipsec site-to-site peer 2001:b0ca::1 default-esp-group ’esp-grp-1’
set vpn ipsec site-to-site peer 2001:b0ca::1 ike-group ’ike-grp-1’
set vpn ipsec site-to-site peer 2001:b0ca::1 local-address ’2001:b0ca::2’
set vpn ipsec site-to-site peer 2001:b0ca::1 vti bind ’vti2’
set vpn ipsec site-to-site peer 2001:b0ca::1 vti esp-group ’esp-grp-1’
commit
save

To persist the configuration after an eventual reboot, the user should use the save command after the commit command.

Below are the main commands available to check the tunnels and VPNs. If the user is at configuration level, it is necessary
to use the keyword run before the command.

show interfaces vti


show vpn ipsec status
show vpn debug
show vpn debug detail
show vpn debug peer <endereço IP>

DATACOM 204.4305.05 - March 30, 2020 115


DM2500 - Quick Configuration Guide Legal Note

Legal Note

In spite the fact that all the precautions were taken in development of the present document, DATACOM shall not be held
responsible for eventual errors or omissions as well as no obligation is assumed due to damages resulting from the use of
the information included in this guide. The specifications provided in this manual shall be subject to changes with no prior
notification and are not acknowledged as any type of contract.

© 2020 DATACOM - All rights reserved.

Warranty

DATACOM’s products are covered by a warranty against manufacturing defects during a minimum period of 12 (twelve)
months including the legal term of 90 days, as from the date of issue of the supply Nota Fiscal (Invoice).

Our warranty is standard counter warranty, this means, for exercise of the warranty, the customer should send the product
to DATACOM Authorized Technical Assistance with paid freight. The return freight of the equipment will be DATACOM
responsibility.

To obtain additional information, see our warranty policy in https://www.datacom.com.br/en.

Telephone Number: +55 51 3933-3094

DATACOM 204.4305.05 - March 30, 2020 116

You might also like