User manual

Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (
30 March 2009) Nortel Networks Inc. i
Contents
5 Logical interface configuration ...............................................................................................5-1
5.1 Introduction...................................................................................................................................................5-2
5.1.1 Sub-interface overview ........................................................................................................................5-2
5.1.2 Virtual template and virtual access interface........................................................................................5-3
5.1.3 Virtual ethernet interface......................................................................................................................5-3
5.1.4 Loopback interface...............................................................................................................................5-4
5.1.5 Null interface .......................................................................................................................................5-4
5.2 Creating sub-interfaces..................................................................................................................................5-4
5.2.1 Establishing the configuration task ......................................................................................................5-4
5.2.2 Creating FR sub-interfaces...................................................................................................................5-5
5.2.3 Creating X.25 sub-interfaces................................................................................................................5-6
5.2.4 Creating ATM sub-interfaces ...............................................................................................................5-7
5.2.5 Checking the configuration..................................................................................................................5-7
5.3 Configuring the virtual template ...................................................................................................................5-8
5.3.1 Establishing the configuration task ......................................................................................................5-8
5.3.2 Creating a VT.......................................................................................................................................5-9
5.3.3 Setting maximum number of links supported by a VT ........................................................................5-9
5.3.4 Checking the configuration................................................................................................................5-10
5.4 Configuring virtual ethernet interfaces........................................................................................................5-11
5.4.1 Establishing the configuration task ....................................................................................................5-11
5.4.2 Creating a VE interface......................................................................................................................5-12
5.4.3 Configuring a MAC address for a VE interface.................................................................................5-12
5.4.4 Checking the configuration................................................................................................................5-13
5.5 Configuring a loopback interface................................................................................................................5-13
5.5.1 Establishing the configuration task ....................................................................................................5-13
5.5.2 Creating a loopback interface and configuring its IP address ............................................................5-14
5.5.3 Checking the configuration................................................................................................................5-14
5.6 Configuring a null interface ........................................................................................................................5-15
5.6.1 Establishing the configuration task ....................................................................................................5-15
5.6.2 Entering the null interface view.........................................................................................................5-15
5.6.3 Checking the configuration................................................................................................................5-16
5.7 Configuration examples ..............................................................................................................................5-16