Page 256 / 351 Scroll up to view Page 251 - 255
256
set ip ip-ppp [
vccn
] rip-send { off | v1 | v2 | v1-compat | v2-MD5 }
Specifies whether the Netopia Gateway unit should use Routing Information Protocol (RIP)
broadcasts to advertise its routing tables to routers on the other side of the PPP link. An
extension of the original Routing Information Protocol (RIP-1), RIP Version 2 (RIP-2)
expands the amount of useful information in the packets. While RIP-1 and RIP-2 share the
same basic algorithms, RIP-2 supports several new features. For example, inclusion of
subnet masks in RIP packets and implementation of multicasting instead of broadcasting.
This last feature reduces the load on hosts which do not support routing protocols. RIP-2
with MD5 authentication is an extension of RIP-2 that increases security by requiring an
authentication key when routes are advertised.
This command is only available when address mapping for the specified virtual circuit is
turned “off”.
If you specify
v2-MD5
, you must also specify a
rip-send-key
. Keys are ASCII strings with a
maximum of 31 characters, and must match the other router(s) keys for proper operation
of MD5 support.
set ip ip-ppp [
vccn
] rip-receive { off | v1 | v2 | v1-compat | v2-MD5 }
Specifies whether the Netopia Gateway should use Routing Information Protocol (RIP)
broadcasts to update its routing tables with information received from other routers on the
other side of the PPP link.
If you specify
v2-MD5
, you must also specify a
rip-receive-key
. Keys are ASCII strings
with a maximum of 31 characters, and must match the other router(s) keys for proper oper-
ation of MD5 support.
Page 257 / 351
257
CONFIG Commands
Static ARP Settings
Your Netopia Gateway maintains a dynamic Address Resolution Protocol (ARP) table to map
IP addresses to Ethernet (MAC) addresses. Your Netopia Gateway populates this ARP table
dynamically, by retrieving IP address/MAC address pairs only when it needs them. Option-
ally, you can define static ARP entries to map IP addresses to their corresponding Ethernet
MAC addresses. Unlike dynamic ARP table entries, static ARP table entries do not time
out.
You can configure as many as 16 static ARP table entries for a Netopia Gateway. Use the
following commands to add static ARP entries to the Netopia Gateway static ARP table:
set ip static-arp
ip-address
ip_address
Specifies the IP address for the static ARP entry. Enter an IP address in the
ip_address
argument in dotted decimal format. The
ip_address
argument cannot be 0.0.0.0.
set ip static-arp
ip-address
ip_address
hardware-address
MAC_address
Specifies the Ethernet hardware address for the static ARP entry. Enter an Ethernet hard-
ware address in the
MAC_address
argument in
nn.nn.nn.nn.nn.nn
(hexadecimal) for-
mat.
IGMP Forwarding
set ip igmp-forwarding [ off | on ]
Turns IP IGMP forwarding off or on. The default is off.
IPsec Passthrough
set ip ipsec-passthrough [ off | on ]
Turns IPsec client passthrough off or on. The default is on.
Page 258 / 351
258
IP Prioritization
set ip prioritize [ off | on ]
Allows you to support traffic that has the TOS bit set. This defaults to
off
.
Differentiated Services (DiffServ)
The commands in this section are supported beginning with Firmware Version 7.4.2.
set diffserv option [ off | on ]
Turns the DiffServ option
off
(default) or
on
.
on
enables the service and IP TOS bits are
used, even if no flows are defined. Consequently, if the end-point nodes provide TOS set-
tings from an application that can be interpreted as one of the supported states, the Gate-
way will handle it as if it actively marked the TOS field itself.
NOTE:
The Gateway itself will not override TOS bit settings made by the endpoints.
Support for source-provided IP TOS priorities within the Gateway is achieved
simply by turning the DiffServe option “on” and by setting the lohi-asymmetry
to adjust the behavior of the Gateway’s internal queues.
set diffserv lohi-ratio [ 60 - 100 percent ]
Sets a percentage between 60 and 100 used to regulate the level of packets allowed to be
pending in the low priority queue. The default is 92. It can be used in some degree to
adjust the relative throughput bandwidth for low- versus high-priority traffic.
Page 259 / 351
259
CONFIG Commands
set diffserv custom-flows name
name
protocol [ TCP | UDP | ICMP | other ]
direction [ outbound | inbound | both ]
start-port [ 0 - 49151 ]
end-port [ 0 - 49151 ]
inside-ip
inside-ip-addr
inside-ip-mask
inside-ip-netmask
outside-ip
outside-ip-addr
outside-ip-mask
outside-ip-netmask
qos [ off | assure | expedite ]
Defines or edits a custom flow. Select a
name
for the custom-flow from the
set
command.
The CLI will step into the newly-named or previously-defined flow for editing.
protocol
– Allows you to choose the IP protocol for the stream:
TCP
,
UDP
,
ICMP
, or
other
.
other
is appropriate for setting up flows on protocols with non-standard port definitions,
for example, IPSEC or PPTP. If you select
other
, an additional field,
numbered-proto-
col
will appear with a range of 0–255. Choose the protocol number from this field.
direction
– Allows you to choose whether to apply the marking and gateway queue
behavior for inbound packets, outbound packets, or to both. If the Gateway is used as
an “edge” gateway, its more important function is to mark the packets for high-priority
streams in the outbound direction.
start-port
/
end-port
– Allows you to specify a range of ports to check for a particular
flow, if the protocol selection is TCP or UDP.
inside-ip/mask
– If you want packets originating from a certain LAN IP address to be
marked, enter the IP address and subnet mask here. If you leave the address equal to
zero, this check is ignored for outbound packets. The check is always ignored for
inbound packets. The DiffServe queuing function must be applied ahead of NAT; and,
before NAT re-maps the inbound packets, all inbound packets are destined for the Gate-
way's WAN IP address.
outside-ip/mask
– If you want packets destined for and originating from a certain WAN
IP address to be marked, enter this address and subnet mask here. If you leave the
address equal to zero, the outside address check is ignored. For outbound flows, the
outside address is the destination IP address for the packets. For inbound packets, the
outside address is the source IP address for the packets.
Note:
When setting the Inside/Outside IP Address/Netmask settings, note that a netmask
value can be used to configure for a network rather than a single IP address.
Page 260 / 351
260
qos
– Allows you to specify the Quality of Service for the flow:
off
,
assure
, or
expedite
.
These are used both to mark the IP TOS byte and to distribute packets into the queues
as if they were marked by the source.
SIP Passthrough
set ip sip-passthrough [ on | off ]
Turns Session Initiation Protocol application layer gateway client passthrough on or off.
The default is
on
.
Session Initiation Protocol, is a signaling protocol for Internet conferencing, telephony,
presence, events notification and instant messaging.
Static Route Settings
A static route identifies a manually configured pathway to a remote network. Unlike
dynamic routes, which are acquired and confirmed periodically from other routers, static
routes do not time out. Consequently, static routes are useful when working with PPP,
since an intermittent PPP link may make maintenance of dynamic routes problematic.
You can configure as many as 32 static IP routes for a Netopia Gateway. Use the following
commands to maintain static routes to the Netopia Gateway routing table:
set ip static-routes
destination-network
net_address
Specifies the network address for the static route. Enter a network address in the
net_address
argument in dotted decimal format. The
net_address
argument cannot
be 0.0.0.0.
set ip static-routes
destination-network
net_address
netmask
netmask
Specifies the subnet mask for the IP network at the other end of the static route. Enter the
netmask
argument in dotted decimal format. The subnet mask associated with the desti-
nation network must represent the same network class (A, B, or C) or a lower class (such
as a class C subnet mask for class B network number) to be valid.

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top