User manual

Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
v
5.2.1 Establishing the configuration task ...................................................................................................5-4
5.2.2 Creating FR sub-interfaces................................................................................................................5-5
5.2.3 Creating X.25 sub-interfaces.............................................................................................................5-6
5.2.4 Creating ATM sub-interfaces.............................................................................................................5-7
5.2.5 Checking the configuration ...............................................................................................................5-7
5.3 Configuring the virtual template..................................................................................................................5-8
5.3.1 Establishing the configuration task ...................................................................................................5-8
5.3.2 Creating a VT....................................................................................................................................5-9
5.3.3 Setting maximum number of links supported by a VT......................................................................5-9
5.3.4 Checking the configuration .............................................................................................................5-10
5.4 Configuring virtual ethernet interfaces......................................................................................................5-11
5.4.1 Establishing the configuration task .................................................................................................5-11
5.4.2 Creating a VE interface...................................................................................................................5-12
5.4.3 Configuring a MAC address for a VE interface..............................................................................5-12
5.4.4 Checking the configuration .............................................................................................................5-13
5.5 Configuring a loopback interface..............................................................................................................5-13
5.5.1 Establishing the configuration task .................................................................................................5-13
5.5.2 Creating a loopback interface and configuring its IP address..........................................................5-14
5.5.3 Checking the configuration .............................................................................................................5-14
5.6 Configuring a null interface.......................................................................................................................5-15
5.6.1 Establishing the configuration task .................................................................................................5-15
5.6.2 Entering the null interface view ......................................................................................................5-15
5.6.3 Checking the configuration .............................................................................................................5-16
5.7 Configuration examples.............................................................................................................................5-16
5.7.1 Example for configuring the sub-interface......................................................................................5-16
5.7.2 Example for configuring the virtual template..................................................................................5-18
5.7.3 Example for configuring the loopback interface.............................................................................5-18
5.8 Troubleshooting.........................................................................................................................................5-20
6 PPP and MP configuration .......................................................................................................6-1
6.1 Introduction .................................................................................................................................................6-3
6.1.1 PPP....................................................................................................................................................6-3
6.1.2 MP.....................................................................................................................................................6-5
6.1.3 references ..........................................................................................................................................6-6
6.2 Encapsulating an interface with PPP and MRU negotiation........................................................................6-7
6.2.1 Establishing the configuration task ...................................................................................................6-7
6.2.2 Encapsulating the interface with PPP................................................................................................6-8
6.2.3 Enabling PPP MRU negotiation........................................................................................................6-8
6.2.4 Checking the configuration ...............................................................................................................6-9
6.3 Configuring unidirectional PAP ..................................................................................................................6-9
6.3.1 Establishing the configuration task ...................................................................................................6-9
6.3.2 Configuring a local router to authenticate iIts peer in PAP mode....................................................6-10