Nortel DMS-10 PM3
Nortel DMS-10 PM3
Nortel DMS-10 PM3
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
1.0 Introduction
The Nortel Networks RAC8000 and RAC5399 are Remote Access Concentrators which
provide remote access to the Internet. The RACs provides modem as well as ISDN access
between the circuit switched network and an Internet service Provider Point of Presence
(POP). The RACs interfaces to the DMS-10 through a T1 (DS-1) 1.544Mbps facility,
using either T1 (A/B robbed bit signalling) or ISDN PRI format. The RAC provides 2 T1
ports with 48 digital modems capable of V.34/V.90, X2, K56, or ISDN using V120, PPP
of MLPP.
The Bay Networks RAC8000 and RAC5399 are similar devices and run essentially the
same software. The RAC8000 is 19 inch small rack mount unit which supports two T1
ports and has a single LAN output. The RAC 5399 is a plug in unit, blade, which resides
in a System 5000 Multi Service shelf. While the two units are physically different they are
functionally identical.
With the phenomenal growth of the Internet application such as work at home, telecommuting, SOHO, etc, the RAC fills a need for remote network access through the DMS-10.
The RAC product fit nicely modem based servers and the high capacity CVX1800.
This document is meant to augment the information provided in the DMS-10 NTPs and
the RAC documentation. The product respective documentation should be obtained and
understood before configuring the RAC8000 or RAC5399. A Windows NT is assumed to
be available for supporting the RAC. Installing a Windows NT Server requires a understanding beyond the scope of this document. A sufficient understanding of the process of
installing Windows NT is assumed. This document is meant to highlight pitfalls that were
discovered is lab setups to demonstrate this White Paper. In the DMS-10 lab a RAC was
configured to accept calls from both a DSI PRI and a DCM Trunk interface. A NT workstation was configured running the RAC boot software, Event Logging, and RADIUS
security. Analog modem V.90 and V.34 as well as ISDN BRI calls were demonstrated on
both interfaces.
2.0 Applications
Probably the most common application for a Remote Access Server is dial in access for a
Internet Service Provider. In this case the RAS provides an intelligent termination between
the circuit switched public network and the packet switched internet. Figure 1 shows a
typical configuration of a RAC interfacing with a DMS-10. The RAC has two WAN ports
which can be either ISDN PRI or T1 A/B signaling type. The output of the RAC is
10Base-T Ethernet which is connected to the IP network via a router.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
V.90
Modem
Windows NT
Boot Server
oop
gL
alo
An
+D
2B
ISDN
Terminal Adapter
DMS-10
Ethernet
10BaseT
PRI or
T1 Trunk
RAC
5399 or 8000
RADIUS
Authentication Server
Internet
or
Intranet
Router
The RAC provides only a limited security for the incoming calls. It is recommended that
a RADIUS (Remote Access Dial In User Service) Security be set up to control access to
the customers network. Another option is to use Bays Access Control Protocol security
using Windows NT or a UNIX server. In either case these devices provide excellent security allowing a central data base for controlling access as well as logging access. RADIUS
is recommended since it is considered an industry standard for dial in security.
In order to download the operating software into the RAC, a Windows NT PC will provide
the required file service. The RAC will boot off its own image if necessary, but it is recommended that a external server be provided so that the software can be upgraded when
required. The RAC can also use a UNIX device running TFTP for a boot device. The
UNIX solution will not be covered in this document.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
3.0 Administration
Initial configuration of the RAC must be done using a serial terminal connected to the
serial port on the back of the RAC. The unit comes without a IP address or Subnet mask.
In order for it to communicate on the network and boot, a IP address will need to be
assigned along with appropriate Subnet mask. If the device is to be booted off a external
device the boot devices address will need to be entered using this ROM monitor. If there is
no boot device available and the RAC is to be booted from its self, then self must be set.
Once the basic info has been established and the RAC is booted, the other parameters must
be loaded into the unit. The other parameters involve setting up the WAN (T1 parameters),
IP address for the ports, Security, Name Servers, etc. Administration can be accomplished
using the Command Line Interface (CLI) off the serial port or a telnet session to the RAC,
once the IP address has been set up. The unit can also be programmed using a Browser
based JAVA program. This requires special browser software to be installed on a NT or
UNIX server. The device can also be set up using the NA utility which can be installed in
Windows NT. NA allows a line by line, like CLI, session to be set up or a config file which
can be edited and then downloaded to the EEPROM on the RAC. Using NA allow you to
configure several RAC using a single config file edited slightly for each device if necessary. Only CLI will be covered in this white paper since it is the native setup language.
Once the RAC has been configured it will need to be rebooted to set the changes into its
operating system. If changes from the default settings on the WANs are made the unit will
need to be booted from a server to install the proper driver software.
4.0 Security
Dial Access should never be deployed with out a high level of security. The RADIUS
security server is the recommended security. The RADIUS server is a workstation which
is connected to the network being accessed, it does not have to be co-located with the
RAS. The RADIUS server then acts as a central point to administering dial up access. Its
basic job is to provide authorization for username and password and set access attributes.
The RADIUS server also can administer levels of access which includes type of access, IP
address assignment for the port, number of B-channels allowed for MLPP, as well as other
attributes. Anyone providing dial access should seriously consider providing a RADIUS
server.
5.0 Configuration
5.1 Introduction Windows NT setup
Windows NT provides a reasonably easy to use graphics interface to setup and support the
RAC. Windows NT also provides a solution to download the RAC with its software.
While the RAC is capable of downloading a software image from itself. Providing a external server allows the device to be upgraded easily. In addition if any of the WAN ports are
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
changed from T1 inband signaling to ISDN PRI signaling the WAN ports will need to be
loaded from a server, such as a windows NT, to change their personality. The NT Server
also serves to provide a repository for log messages coming from the RAC using its built
in event logging. The Windows NT server keeps configuration files, using NA, with all
the configuration information for the RAC. This allows the NT Server to download all the
settings for the RAC. This will allow a unit to be replaced with another RAC if maintenance is required in addition it allows other units to be cloned with the same or modified
information
Note: The Windows NT Server must have a NTFS formatted disk for the
Bay Remote Access tools to install.
Before setting up a PC for use with the Bay Networks software it must first be configured
to use the NTFS disk file format. The Bay software requires that NTFS be installed. The
file format FAT16 is not compatible. It should also be upgraded to service pack 3. The current version (Release 6) of Remote Access Tools for Windows NT will not load with
Service Pack 4, be sure and check with Bay Networks on compatibility prior to installing
Service Pack 4.
The NT server will also need to be a Domain Controller in order for Remote Access
Tools for Windows NT to load and work properly.
.
The Windows NT device can also be used as the RADIUS server using BaySecure software. This product provides a solid easy to setup software package. The Baysecure Radius
software allows administering user names and passwords, as well as establishing and
maintaining attributes.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
Since the RADIUS server will most likely be used to provide security for accessing the
Command Line Interface, an example is included for a typical user for CLI. In the case of
Figure 4 the user is CLI and no attributes should be included in the profile.
When a user accesses the RAC from either telnet or the console monitor the RAC will
request a authentication from the RADIUS server to insure the user is authorized. The profile in Figure 4 will be tested and the results returned to the RAC. If the username and
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
password match the assignment the user will be able to gain access. No attributes need to
be set.
FIGURE 4. Command Line Interface User
5.3.1 IP Pools
Setting up IP pools is not required if the RAS has IP addresses assigned per B channel.
(This is an option on the RAC WAN setup). In order to conserve IP addresses or to assign
specific blocks of IP addresses to user this function can be administered by the RADIUS
server.
The setup is easy to do using the IP pools option in the RADIUS Administrator. First a
block name will need to be assigned as in Figure 4. This is performed using the ADD button. Once named a optional description can be added. The address range is defined as a
origin address with a count of the number in the sequence. Several address origins and
counts can be added to the pool.
IP pools can also be assigned in the RAS Client setup, figure 2. Assigning them in the
RAS Client menu will use that pool for the whole RAS, not specific users as shown in figure 3.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
FIGURE 5. IP pools
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
TG
NUM
72
TGTP OUT
SIGT INB
64NC NO
PKTP DTRK
SITE BASE
TGDP DATA
RMB
< DATA sets the Trunk Loss to 0DB 412.10 and above.
YES
STPL WINK
TRNS MF
SDTM 5 SEC
GDTI 768 MSEC
IDLE MOST
DTSI 0
SYNC NO
ANI
YES
ASTR OFHK
ATMO CONN
2RID NO
EOAT NO
ATIC NO
HIT
5 SEC
4XCD NO
TRK
CAPB PE
03 5 05 01
CAPB PE
03 5 05 02
CAPB PE
03 5 05 03
CAPB PE
03 5 05 04
.....
.....
CAPB PE
03 5 05 24
In overlay trunk (TRK) set the TGDP option to DATA. Note that this is a new trunk padding, DATA, it available in 412.10 and is patchable in generics 411.20, 411.10, and
410.10. The DATA padding sets the pads in both directions to 0DB for all calls. This is
required if you want to terminate ISDN calls to the RAS using inband signalling and it
will help with 56Kbs V.90 calls. While V.90 calls will tolerate some loss padding, they do
not tolerate multiple pads well. If DATA is not available use DIOD.
Setting up the Route is also straight forward. Below is an example of a Route set for a
RAC:
ROUT 72
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
10
ALTR OVFL
TYPE EAS
UPGR NONE
CTYP NONE
TG
72
CHG
YES
OPR
NO
SDCN NOCO
COS
NONE
DEL
APFX NONE
CNTL ETHR
OVLP NO
PGNC NO
There is no need to send digits to the RAC. It is capable of auto-detecting the protocol
being terminated on it, for example ISDN 56Kbs bsor Modem, and PPP, MLPP. Some
other RAS devices need a special DN or a prefix (APFX) to indicate the protocol expected
for the termination. In some instances you may want to override his capability for special
CLI manual regarding Session Parameter Blocks or SPBs.
If you expect to send digits to the RAC you will need to set the dnis parameter in the
RAC WAN configuration. The dnis parameter sets the RAC to expect digits to be sent to
the trunk on a seizure. If dnis set to zero and numbers are sent, you will likely get a
TRK018 from the DMS-10. This is because the RAC will not wait for the digits and will
answer before the DMS-10 is done sending the digits.
Note: If digits are being sent to the RAC on a A/B bit Trunk, the WAN dnis
parameter on the RAC must be set with the number of digits. Otherwise
the RAC will answer before the number is sent resulting in a DMS-10
TRK018.
Once the Trunk Group and Route are set. The the chosen DN will need to be set to terminate on the trunk group. This can be done by either translating or by intercepting the DN
and sending it to a screen with the route to the trunk group.
5.4.2 ISDN PRI LTG Setup
PRI setup is nearly identical to setting up a DCM trunk. PRI requires you to set up a Line
Trunk Group (LTG) which is automatically done in overlay PRI when the PRI is assigned.
Below is an example of a typical LTG for a RAC.
TYP
LTG
NUM
APPL PRI
TGTP OUT
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
11
SITE BASE
RMB
NO
TRK
CAPB CE
01 1 04 1 01
CAPB CE
01 1 04 1 02
CAPB CE
01 1 04 1 03
CAPB CE
01 1 04 1 04
...
...
CAPB CE
01 1 04 1 23
With the LTG assigned a Route will need to be added to the LTG. This is done as in the
DCM example in Overlay ROUT. Below is an example of a ROUT in this case rout 601.
ROUT 601
ALTR BUSY
TYPE PRI
CTYP NONE
CHG
YES
LTG
DEL
APFX NONE
PGNC YES
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
12
Figure 6 illustrates the entry points to the various levels of the CLI monitor. Each level
provides different functions.
Note: The command line help is available at each level of CLI by typing
help or ?.
The ROM monitor provides the basic IP setup to configure the ethernet interface. In order
to get into the boot monitor it is necessary to put the RAC into a setup mode using a
front panel pushbutton. Refer to Bay documentation for this. The boot monitor allows
basic testing of the device prior to booting. In the ROM monitor the IP address must be set
along with the subnet mask and boot IP address if the RAC is to be booted off a network
device. If the RAC is to be stand alone the boot sequence will need to be modified so it
boots off of itself and does not try to boot off of the network. In order to leave ROM monitor a boot must be executed from the command line. This causes the RAC to load it operation code.
Once the Boot has been performed using the serial port the Console Monitor becomes
available. The entry point is the Console: monitor prompt. Type CLI to enter the
CLI monitor. CLI as shown in Figure 1 has several levels. If security has been enabled,
which is discussed later, a user and password will be needed. The first level indicated by
the annex: prompt provides only basic function. In order to move to where changes can
be made the operator must login as Super User (SU). The initial password is the IP address
assigned to the RAC in the ROM monitor. Once logged in the password should be updated
to a more secure choice. The Super User CLI indicated by the annex# prompt provides a
much larger choice of function. Figure 6 only shows a subset of the most useful commands.
The actual setup of the WANs and other important functions are handled in the Admin
portion of CLI. This level is selected by typing admin, once logged in as super user. This
will invoke the admin: prompt to be displayed. At this level the commands deal with setting, showing and resetting devices. Things which can be set, reset or shown are, port,
annex, wan, interface or modem. It is a good idea to show an interface prior to making any
changes since it will provide a guideline for the settings and their spelling. Ports are logical devices which manage data. The port types are:
ta- this port manages V.120, V.110, and X.25 calls
syn- this port manages PPP and MLPP calls
asy- this port manages asynchronous voice calls associated with digital modems.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
13
Functions
monitor::
addr
sequence
pingsend
configshow
stats
erase
ROM Monitor
boot
Type ROM
Serial Port
Entry Point
Functions
Console monitor:
info
- show configuration information for server
cli
- start CLI
9600 baud
8 bit no parity
Telnet
Entry Point
Monitor Entry
Point
rom
- return to ROM monitor
quit
- quit back to quiet console
syslog - show last syslog message
Type CLI
Note*2
Rotary
Functions
annex:
history
hangup
netstat
stats
su
telnet
who
Type CLI
Note*1
CLI
hangup
SU
Functions
Password=
ip adress*2
Super User
CLI
Type
ADMIN
quit
annex#
admin
boot
hangup
hosts
history
modem
netstat
passwd
route
stats
stty
su
telnet
wan
who
Functions
Administraton
admin : ?
help or ?: display this help screen
broadcast: send a broadcast message to a port or ports
modem: enter default modem set
Note*1 : If VCLI security is set a username and
reset: reset a port, interface or subsystem
password will be required.
show: display the current value of an eeprom parameter
Note*2 : If CLI security is set ausername and
interface: enter default interface set
password will be required.
set: modify the value of an eeprom parameter
Note*3 :The initial password for super User is the ipaddress
quit: terminate administration
assigned initially. It should be changed.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
14
A typical command would be show port all. This command will show all the port settings.
Annex commands deal with generic system items such as:
IP addresses
CLI and VCLI parameters
Name Servers
Security
Event Logging
Routing
SNMP Maintenance
Wan of course deals with the two T1 based WANs. In the WAN section the T1 characteristics are set up along with B channel parameters.
Following any changes it is necessary to reset the device or in some cases boot the RAC to
make the parameter change take effect.
5.5.2 Setting the Initial Parameters.
The initial parameters are set using the Console monitor in the ROM monitor portion or
the RAC. This information is covered in the publication Installing the Model 8000
Remote Access Concentrator. This document covers setting the RAC into its initial setup
mode, it also covers the requirements for the IP addresses and supplementary information.
Figure 7 gives a view of the parameters and their significance.
FIGURE 7. Initial Address Setup
This value sets the IP address the RAC will use for its connection
monitor:: addr
Enter Internet address [<uninitialized>]::
Internet address 47.39.240.40
Enter Subnet mask [255.255.255.0]::
47.39.240.40
47.39.240.00
This value is the submet mask for the subnet the RAC is on.
This address is address the RAC uses to communicate with a security
of file server.
47.39.240.99
47.39.240.1
This is the address of the file server which serves as the load file
host for the RAC.
This is the address of the file server which serves as the dump file
host for the RAC.
Gateway address for the RAC. Serves as a route as well as a gateway
it the RACs file server is on a different subnet.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
15
If the RAC is being re-deployed and was previously used somewhere else, it is a good
practice to erase the EEPROM and start over. By erasing the EEPROM you insure that
everything is cleared and the default settings are in place.
Once the IP addresses information has been entered, the config information should be
viewed. It is important to look at the WAN downloads that are resident in the unit. A typical view is shown in figure 8
FIGURE 8. ROM Monitor monitor: prompt type config
REVISION/CONFIGURATION INFORMATIONROM
Software Rev: 1124
Board ID: 64 Board Type: 8000
CPU Type: 486DX2
Ethernet Address: 00-80-2d-xx-xx-xx
Memory size: 8 Meg
EEPROM size: 65504
Flash size: 4 Meg Flash ID:0089
Available Interfaces (* = selected): ThickNet *Twisted Pair
WAN 1: PRI T1 USA CSU
Revision: VERSION A MGR=1.234b
WAN 2: CAS T1 CSU
Revision: VERSION CAS-E1T1 1.40
General Purpose Sync Port Interface: No Cable
Compression Card Rev: 0
SLC 1
SLC SRAM Size: 128 K
Modem Count: 31
Modem Rev: 0
SLC 2
SLC SRAM Size: 128 K
Modem Count: 31
Modem Rev: 0
The current personality load in the WANs needs to be noted if you do not plan on providing a external load server for the RAC. If there is not a planned external load server (Windows NT or UNIX) there is no way to change the WAN personalities. This is because new
code will need to be loaded into the WAN modules to reconfigure them.
Once it is determined if a external load server is required the boot sequence will need to be
set in the ROM Monitor. The choices are net or self. Self should be the first choice if
you expect to use the RAC in a stand alone mode.
Once the IP addresses are setup and the boot sequence has been set for your application it
is a good idea to test the network connection by pinging a known address on your IP network both on and off the subnet. If the ping succeeds its time to move on to booting the
RAC. If the ping fails the IP address settings need to be verified also the LAN connection
should be inspected. If the device you are pinging is on another subnet try a device that is
local.
Once the LAN is functional, boot the RAC. This will take several minutes. Log messages
will be displayed on the console monitor indicating the state of processes as they come
up.Theses messages are important, they provide a log of the processes starting up.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
16
Note: When a value has been changed from the default a * will
appear ned to the parameter.
The figures should be self explanatory in their setup. The following parameters will need
to be setup:
switch_type - sets ust1 for a trunk interface or ni2 for PRI.
line_code - set to AMI for ust1 or B8ZS for ni2.
build_out - sets the build_out for the distance between the DMS-10 and the RAC.
framing- set to D4 for ust1 or ESF for ni2.
remote_address - this parameter sets a unique IP address for each B channel. It is not
required if the RADIUS server or DHCP will be setting the IP addresses.
sigproto - this parameter is only valid for ust1. It sets the supervision for answering the
call.
The commands to set these parameters will be similar to the command to the show
command. With the exception of remote_address and sigproto. These commands control B channel conditions so the command is structured as set wan=1 b
remote_address 207.45.240.40 1 will set the first B channel of WAN 1 to IP
address 207.45.240.40 the next B channel to 207.45.240.41 till the last channel (23 channels for PRI or 24 channels for ust1).
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
17
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
y y y y y
Extended SuperFrame
Note: These settings are accessed in the Admin portion of CLI. The command line is set wan=W where wan is either 1 or 2,
then keyword follower by parameter. Example set wan=1 switch_type ni2. For B channel settings B must be included in the argument and
then an increment value for the paramenter. Example set wan=2 b remote_adress xxx.xxx.xxx 1.
remote_address: 0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
00-00-00-00-00-00
00-00-00-00-00-00
00-00-00-00-00-00
00-00-00-00-00-00
00-00-00-00-00-00
00-00-00-00-00-00
00-00-00-00-00-00
buildout: 0dB
num_b_channels: 0
framing: ESF
dnis: 0
digit_width: 0
digit_power_1: 0
busy_signal_bits: 11
auto_busyout_enable: N
switch_type:*"ni2"
fdl_type: att
analog_encoding: auto
line_code: B8ZS
ani: N
inter_digit: 0
digit_power_2: 0
local_phone_number: ""
callback_enable: N
Once the WANs are setup it is necessary to re-boot the RAC in order for the changes to
take effect. If the WAN switch_type has been changed the RAC will need to load a new
driver for the WAN port. This can take 5 to 10 minutes for the load to be completed. If the
RAC is set for self boot and the switch_type has been changed it will not take affect since
there is no download host.
18
buildout: 0dB
num_b_channels: 0
framing: D4
dnis: 0
digit_width: 0
digit_power_1: 0
busy_signal_bits: 11
auto_busyout_enable: N
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
Note: These settings are accessed in the Admin portion of CLI. The command line is set wan=W where wan is either 1 or 2,
then keyword follower by parameter. Example set wan=1 switch_type ust1. For B channel settings B must be included in the argument and
then an increment value for the paramenter. Example set wan=1 b sig_proto wink_out 1.
remote_address: 0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
switch_type:*"ust1"
fdl_type: att
analog_encoding: auto
line_code: AMI
ani: N
inter_digit: 0
digit_power_2: 0
local_phone_number: ""
callback_enable: N
Initially when you bring up the RAC there is no security set. It is a good idea to first test
the unit with all security off. This allows verification of the interfaces and allows you to
become familiar with the operation of the RAC. The following test should be tried:
Telnet - first telnet to the RAC and make sure you can log into it. This can be done
using a PC, which is on the network, and at the START prompt type telnet
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
19
Rotaries Defined:
cli
Enter Annex port name or number:
wan
General WAN Statistics
Interface #1
Interface #2
-----------------------------------------------------------------------------WAN Firmware Vers:
A MGR=1.234b
CAS-E1T1 1.40
WAN Type:
T1 CSU
CAS T1 CSU
WAN FDL Type:
ATT
ATT
Switch Type:
NI2
UST1
Analog Encoding:
mu_law
mu_law
WAN Interface Errors:
0
0
Accepted Incoming Calls:
0
15
Rejected Incoming Calls:
0
0
Accepted Outgoing Calls:
0
0
Rejected Outgoing Calls:
0
0
Normal Call Disconnects:
0
15
Abnormal Call Disconnects:
0
0
B Channels Currently Allocated:
0
15
Number Times WAN Fully Allocated: 0
0
WAN Interface #1 Information:
Frame errors
= 0
Code violations = 0
CRC errors
= 0
Errored blocks = 0
WAN Interface #2 Information:
Frame errors
= 0
Code violations = 0
CRC errors
= 0
Errored blocks = 0
annex#
This insures that the basic interface between the DMS-10 and the RAC is working and the
RAC is on the IP network.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
20
This command will display the information is figure 12. In order to set the parameters the
command structure
set annex enable_security y
format is used.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
21
Make sure that the secret is inputted exactly as it is in the RADIUS server and note that it
is case sensitive.
Note: RADIUS security will not take affect till the RAC has been
rebooted.
security_broadcast: Y
pref_secure2_host: 0.0.0.0
acp_key: "<unset>"
password:*"<set>"
lock_enable: Y
chap_auth_name: "chap"
auth_protocol:*radius
radius_acct1_host:*47.39.240.99
radius_auth1_port: 1645
radius_acct1_port: 1646
radius_auth1_secret:*"<set>"
radius_acct1_secret:*"<set>"
radius_auth_timeout: 4
radius_retries: 10
loose_source_route: Y
passwd_limit: 3
max_chap_chall_int: 0
enable_radius_acct: N
radius_acct2_host: 0.0.0.0
radius_auth2_port: 1645
radius_acct2_port: 1646
radius_auth2_secret: "<unset>"
radius_acct2_secret: "<unset>"
radius_acct_timeout: 4
radius_acct_level: standard
radius_port_encoding: device
radius_user_prompt: "Annex%susername%c"
radius_pass_prompt: "Annex%spassword%c"
compatibility_mode: BayNetworks
Note: The second RADIUS server is set up the same as the first.
Once the RADIUS server is set up the other services will need to have their security services turned on. The other services that can be controlled with RADIUS security are:
PPP and MP authentication
VCLI authentication
CLI authentication
Before setting up any services that use security, the RADIUS server should be setup with
accounts for the services that are being tested. It is best to first get RADIUS services
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
22
working with a simple security function such as VCLI. Using VCLI allows you to still
have console CLI access while you work out any bugs. See below.
Note: The interface will need to be reset inorder for the changes to take affect.
cli_prompt: "%a%c"
vcli_password: "<unset>"
From the figure above you can see that there are two levels of security. There is a annex
based password, vcli_password, for access to VCLI and also RADIUS capability which is
enabled through vcli_security. Table 1 shows the precedence between the two security
schemes.
TABLE 1. Precedence of VCLI Security
vcli_security
vcli_password
Host Security
status*
Action
no
unset
dont care
yes
set
up
yes
set
down
no
set
dont care
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
23
vcli_security
Host Security
status*
vcli_password
Action
yes
unset
up
yes
unset
down
* RADIUS security
Note: The interface will need to be reset inorder for the changes to take affect.
Host Security
cli_security
port_password
no
unset
dont care
yes
unset
up
yes
unset
down
yes
set
up
yes
set
down
Status*
Action
* RADIUS security
Note: The interface will need to be reset inorder for the changes to take affect.
24
FIGURE 14.
Figure 14 details all the important parameters that will need to be set for host based security to take affect. It is optional to provide a local username and password, since dial in
access should probably be denied when the redundant security servers are unavailable.
If address_origin is set to auth_server the RAC will use the Framed-IP-Addresses from
the RADIUS server over any assigned on a per B-Channel basis. This allows only users
with the Framed-IP-Address attribiute set to get a unique IP address. If you are using a BChannel dedicated IP addresses.
TABLE 3. Port Security Precedence
Host Security
status
port_security
port_password
yes
set
up
yes
unset
down
no
set
dont care
no
unset
dont care
yes
unset
down
Cant login
action
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
25
In order to monitor the syslog messages on the console terminal the user will need to be
logged out of CLI and the RAC must be in the default state for annex syslog. See figure
15 for the view of the syslog parameters.
Note: If you are in the console monitor in CLI and you want to view
syslog messages, type ha (hangup). This will allow console messages
to be outputted to the console, if no syslog host has been set.
If you choose logs can be sent to a external logging device. The event logs can be sent to a
Unix 4.3 BSD syslog daemon or the can be sent to a Windows NT server running the Bay
Annex syslogd services. Either syslog daemon are set up the same on the RAC.
Setup is simple, the parameters which control the syslog are in the annex syslog menu.
Figure 15 gives an overview of the parameters. The syslog_host IP address must be set to
the device doing the recording. The syslog_facility can likely be left to the default.
syslog_mask should be set to the minimum level of your requirements. Initially debug
might be your choice, but with the quantity of messages that are generated the buffers in
the syslogd device can easily be overflowed.
Table 4 shows the priority levels high emergency to low debug. When a priority has
been chosen that level plus all higher levels will be reported to the syslogd host.
TABLE 4. Priority Levels for the syslog_mask Parameter
Level
High
Name
Description
emergency
Hardware failures.
alert
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
26
Level
Name
Low
Description
critical
error
warning
notice
info
debug
Note: The RAC will need to be re-booted for logging changes to take effect.
Turning on debug will cause the log file to become filled up rapidly and the buffer might
be overrun quickly. Therefore, debug should only be used for short periods of time
while troubleshooting. Another option, is to turn sys logging off and have the messages
displayed on the serial console port.
5.5.10 Useful Commands for the RAC
The RAC provides a number of useful commands to observe connections as well as troubleshoot problem. Unfortunately there are so many commands and options the author
would like to highlight some that have proven to be very useful. These commands are covered in Bay Publication Managing Remote Access Concentrators Using Command Line
Interface section 16.
5.5.11 WAN
This command provides information on the status of the DS-1 links and B-Channels or
trunks. The Wan command is a super user command so you will have to log in as SU and
enter the password (either the IP address of one you assigned in passwd prompt).
The two most useful Wan commands are wan and wan b.
Below is an example of the wan command:
annex# wan
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
27
Additionally, if there are error conditions on the WANs they will be printed out for each
interface.
Another useful command is the wan b command. This will show the calls currently up
and what B-Channel they are asssigned to, see below.
annex# wan b
b
called_#
calling_#
br spb_name
time
port
-----------------------------------------------------------------------------12
vo auto_select
00:00:30 asy22
15
vo auto_select
01:18:11 asy38
------------------------------------------------------------------------------
5.5.11.1 Actcall
This superuser command displays the calls that are on the RAC. It can be issued specifying a device type or not. Below is an example of a actcall command with no device
specified:
annex# actcall
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
28
Called
number
Calling User
number
Call start
Duration
mm/dd|hh:mm:ss hh:mm:ss
I asy30
BJEG
01/06|23:09:33 00:12:37
I asy46
agteng
01/06|19:21:51 04:00:19
I syn11
didright
01/06|20:35:51 02:46:19
I syn13
didright
01/06|20:35:46 02:46:24
I mp75
didright
01/06|20:35:46 02:46:24
From the display you can see that the devices and available information is displayed.
Called and calling number would be displayed if they had been programmed on this interface. The interface above is a ust1 interface with no digits being forwarded.
Below is a actcall with a device specified:
annex# actcall mp75
Wan:0, channel: 0, User name: didright
Called number: , Calling number:
Called subaddress: , call bearer:
Call date: Tue Jan
The above actcall is of the MP bundle for two associated ISDN calls syn 11 and syn
13. Their connections information can also be retrieved using the actcall command
for syn11 and syn13 as below:
annex# actcall syn 11
CLI: Invalid argument.
annex# actcall syn11
Wan:1, channel:14, User name: didright
Called number: , Calling number:
Called subaddress: , call bearer: voice
Call date: Tue Jan
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
29
5754
frames received:
7906
5776
frames received:
5340
5.5.11.2 Who
The who command is used to display the users who are currently logged in. It is
accessed from the CLI prompt. It shows all the users connected to the RAC. It shows
which port they are connected. When security is turned on, PPP it will also show the username under the User column. It shows the time of the connection as well as the IP address
assigned to the connection. This is a very useful command to determine which and how
many users are connected. Additionally it shows MLPP calls which are indicated with 3
devices. In the example below syn45, syn48 and mp11 are one call which is a ISDN
MLPP call. The mp11 device is the composite of syn45 and syn48.
annex# who
Port
What User
Location
When
pts1
CLI
john
Ext456
7:29am
syn45 PPP
---
---
8:04am
[local]
syn48 PPP
---
---
8:04am
[local]
ctl1
CLI
---
---
8:04am
[local]
asy32 PPP
---
---
---
47.74.178.169
asy35 PPP
amcacct
---
---
asy41 PPP
hambulius
---
mp11
---
---
PPP
--8:04am
Idle
:18
Address
47.39.57.121
47.74.178.143
47.74.178.134
47.39.240.44
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
30
.
Note: User names will not show up, unless you have the appropriate
security turned on. For example for PPP names, PPP security must
be enabled.
5.5.11.2.1 Modem
This command is useful for interrogating the quality of connection of a particular user.
The modem command is available once you login as superuser. It is best to first use the
who command and determine the user you are interested in. The users identification will
be the asy number. For example a user amcacct is using asy35 can be queried by typing:
annex# modem -s35
asy30 States:
Rcv:
Rrn:
As you can see the modem command provides extensive information on the characteristics of the modem connection. This information can be very useful in verifying and troubleshooting a customers modem problems.
See Section 1 of the Remote Access Concentrator Software Reference for more Detail.
5.5.11.2.2 Netstat
Netstat is a very useful command. It can be confusing since it has 30 options. I wish to
cover a couple of the more useful commands. Refer to Bay Publication Managing
Remote Access Concentrators Using Command Line Interface section 16 for a complete
list.
5.5.11.2.3 PPP Statistics (netstat -ip)
Netstat -ip displays the connection parameters associated with the PPP session. It can be
used for both synchronous connections (ISDN) and asynchronous connections (analog
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
31
modem). It displays the status of the PPP link negotiations and can be useful in troubleshooting PPP establishment problems. Below is an example:
Bay_RAC8000# who
Port
What User
Location
When
pts1
CLI
cli
---
---
syn22 PPP
nortel
---
[local]
syn38 PPP
nortel
---
[local]
mp1
nortel
---
---
47.39.240.50
PPP
Idle
:20
Address
47.39.57.44
Current:
NCP Open
Prior:
NCP Opening
State
Current:
Prior:
Ack sent
Options
Local:
Remote:
MRU
1500
1500
MRRU
1500
1500
Short Sequence
On
Off
Endpoint Disc
3:00-80-2d-05-8f-7e
5:9129213464
State
Current:
Options
Local:
IP addresses
47.39.240.40
Compression
None
Prior:
Ack received
Remote:
[ANX]
47.39.240.50
[SECSERV]
None
The example above is a MLPP call over ISDN. As you can see it shows up as 3 devices.
One for each B-Channel and a MP device representing both B-Channels and the IP
address. You can also see that the PPP Link Control Protocol (LCP) is open and therefore
working. Similarly the Network Control Protocol (NCP) is open and therefore working.
The next example is a asy or modem connection:
annex# who
Port
Location
When
asy31 PPP
What User
nortel
---
pts1
CLI
cli
---
---
pts2
CLI
cli
---
---
Idle
Address
47.39.240.52
:30
47.39.57.44
47.39.57.121
Current:
State
Current:
NCP Open
Prior:
NCP Opening
Prior:
Ack received
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
32
Options
Local:
Remote:
MRU
1500
1500
Auth type
CHAP
None
ACFC
On
On
ACCM
00000000
000a0000
Magic
0x15634a10
0x000c2fe7
PFC
On
On
MRRU
1500
1500
Short Sequence
Off
Off
Endpoint Disc
0:0
0:0
Current:
Options
Local:
Open
Prior:
Ack received
Remote:
IP addresses
47.39.240.40
Compression
None
[ANX]
47.39.240.52
[SECSERV]
None
Local:
OUT_UP
Remote:
IN_INIT
Prior:
Closed
Current:
Closed
The asy printout is similar to the syn printout. If other protocols were declared in the PPP
setup (ppp_ncp prompt) they will be displayed. The setup for the RAC being displayed
has ppp_ncp set to ipcp and mp. If more protocols were selected the netstat -ip will show
their status.
5.5.11.2.4 Routing Tables (netstat -r)
This command will display the routing tables which reside in the RAC. These tables are
most likely constructed using RIP and building from information given by other routers.
The command serves to verify that routing information is being obtained from neighboring routers. The command is netstat -r, this will display the routing tables as below:
annex# netstat -r
Routing tables
Destination
NextHop
Flags Usage
UseCount
Mtr Interface
0 - 65534
65292.181
UHF
en0
IP default
47.39.240.1
UR
-9891
916
en0
47.39.48.0/20
47.39.240.1
UR
-10405
402
en0
47.39.52.55
47.39.240.1
UR
-10807
en0
47.39.52.56
47.39.240.1
UR
-10807
en0
47.39.224.0/20
47.39.240.1
UR
-10807
en0
47.39.240.0/20
UI
fixed
3279
en0
47.39.240.50
UI
fixed
mp1 (ppp)
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
33
47.45.128.0/20
47.39.240.1
UR
-10807
en0
47.79.64.0/20
47.39.240.1
UR
-10807
en0
47.117.128.0/20
47.39.240.1
UR
-10807
en0
47.194.32.0/20
47.39.240.1
UR
-10805
en0
127.0.0.0/8
UI
fixed
lo0
137.116.0.0/16
47.39.240.1
UR
-10807
en0
192.168.0.0/24
47.39.240.1
UR
-10807
en0
5.5.11.3 Statistics
The RAC continually produces statistics about it operation. The basic statistics is available
by simply typing stats while in CLI either as superuser or not. Below is a typical printout:
annex: stats
S/W: Remote Access X15.1.5
Memory: 8MB RAM 64KB EE 128KB SLC1 128KB SLC2 4MB FLSH
Boot from: 47.39.240.99
Date: unknown
Image: oper.64.enet
No name servers
Domain: <unknown>
Zone:
Tasking:
Mbufs:
Memory:
Ports:
Port type
Receive
Transmit
R Frames
T Frames
R Errors
T Errors
asy
9.5KB
8.9KB
219
215
syn
929 by
1.1KB
19
113
0 by
0 by
ctl
685.2KB
630.7KB
gsy
0 by
0 by
ta
Based on the printout you can see that the stats command provides useful basic uptime
information along with the version of software being executed.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
34
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
35
If you are interested in more that the current 15 minute interval the stats -T all command is
useful. This command will display 96 15 minute blocks to the console screen, indicating
the WAN status for the last 24 hours. Below is an abbreviated example:
WAN Interface 1:
Alarm History:
time unknown
NO SYNC
Current Alarms:
Circuit ID:
T1 info:
Loopback mode: no loopback
Current Statistics:
time unknown
Number of valid seconds: 249
Errored Seconds: 0
Severely Errored Seconds: 0
Bursty Errored Seconds(ESF only): 0
Unavailable Seconds: 0
Controlled Slip Seconds: 0
CRC6 Error Event(ESF only): 0
ESF Error Event(ESF only): 50
Severely Errored Framing Event: 0
Frame Sync Bit Error Event: 0
Out of Frame: 0
Loss of Frame Count: 0
Line Code Violation Event(BPV): 0
Controlled Slip Event: 0
Unavailable Signal State: Clear
Interval # 0 Statistics:
time unknown
Number of valid seconds: 900
Errored Seconds: 0
Severely Errored Seconds: 0
Bursty Errored Seconds(ESF only): 0
Unavailable Seconds: 0
Controlled Slip Seconds: 0
CRC6 Error Event(ESF only): 0
ESF Error Event(ESF only): 50
Severely Errored Framing Event: 0
Frame Sync Bit Error Event: 0
Out of Frame: 0
Loss of Frame Count: 0
Line Code Violation Event(BPV): 0
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
36
.
.
Interval # 95 Statistics:
time unknown
Number of valid seconds: 900
Errored Seconds: 0
Severely Errored Seconds: 0
Bursty Errored Seconds(ESF only): 0
Unavailable Seconds: 0
Controlled Slip Seconds: 0
CRC6 Error Event(ESF only): 0
ESF Error Event(ESF only): 7
Severely Errored Framing Event: 0
Frame Sync Bit Error Event: 0
Out of Frame: 0
Loss of Frame Count: 0
Line Code Violation Event(BPV): 0
Controlled Slip Event: 0
Unavailable Signal State: Clear
This command is very useful in troubleshooting outages that occurred in the last 24 hours.
5.5.11.5 Clearing Statistics
The clear command is similar to the other commands except the function is clear. The
command is in the form of stats -T [clear [history | statistics] | current | total | all]
[wan1|wan2]. The Clear command must be followed by either history or statistics and then
the associated WAN must be entered. The history option clears the 24 hour period while
the statistics option only clears the current record.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
37
6.0 Bibliography
Bay Networks, Managing Remote Access Concentrator Using Command Line Interface,
Marketing Release 6.0, May 1998.
Bay Networks, Remote Office Concentrator Software Reference, Marketing Release 6.0,
May 1998.
Bay Networks, Installing the Model 8000 Remote Office Concentrator, Marketing Release
5.1, September 1997.
Bay Networks, Installing and Configuring Remote Office Concentrator Software for Windows and Windows NT , Marketing Release 6.0, May 1998.
Bay Networks, Provisioning WAN Lines for Remote Access Concentrators, Marketing
Release 6.0, May 1998.
Bay Networks, Remote Access Software Version 6.0 Release Notes, Marketing Release
6.0, May 1998.
Bay Networks, Remote Annex Administrators Guide for Unix, Book A,B and C, Rev A,
Bay Networks, Release 5.1 Supplement for Remote Annexes, Marketing Release 5.1,
October 1997.
Bay Networks, BaySecure Access Control Administration Guide, Release 1.3,October
1997.
Nortel Networks, NTP 297-3401-311P2.
Configuring the Nortel Networks Remote Access Concentrators and the DMS-10 for Remote Access.March 31, 1999
38