cc/td/doc/product/dsl_prod/6700
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

IP Services

IP Services

This chapter describes provisioning IP on the Cisco IAD1101 and includes the following sections:

Static IP Routing

EMS uses static IP routes to define paths through the Cisco IAD1101 and across the network. You can assign static IP routes to direct IP traffic on the Ethernet interface, and any T1 lines configured for IP (IP over Frame Relay or IP over PPP).

A static IP route consists of the following information:

Figure 11-1 shows a sample network, with a Cisco IAD1101 connected to a router over a PPP link. To assign a static route from the Cisco IAD1101 to Host A, enter the following information:


Figure 11-1: Static IP Route Example


Assigning Static IP Routes

To assign a static route, perform the following steps starting in node view:


Step 1   From node view, double-click the node nameplate. EMS launches the NE provision window.

Step 2   From the function bar on the left, click on the Datalink Route Configuration button. EMS launches the datalink route configuration window. (See Figure 11-2.)


Figure 11-2: Datalink Route Configuration Window


Step 3   Set the following parameters in the data-link route configuration window:

Step 4   Click Add when finished.

Step 5   Click the Exit button (on the function bar) to return to the node view.


You can add as many routes as needed, but only one route can be the default route.

Access Lists

An access list is a sequential collection of permit and deny conditions that apply to IP addresses. EMS tests addresses against the conditions in an access list one by one. The first match determines whether the software accepts or rejects the address. Because the software stops testing conditions after the first match, the order of the conditions is critical. If no conditions match, the software rejects the address.

Access lists allow the Cisco IAD1101 to filter incoming or outgoing IP packets based on the following criteria:


Note   UDP ports 161 and 162 are used for management and alarm traffic, respectively.

Provisioning Access Lists

To provision access lists on the NE, perform the following steps starting in the NE provisioning window:


Step 1   Click IP Access Lists in the function bar. EMS launches the access list provisioning window. (See Figure 11-3.)


Figure 11-3: Provisioning IP Access Lists


Step 2   Set the following fields to configure the access list:

Step 3   Click Add when finished.

Step 4   Repeat Step 2 and Step 3 to configure additional access lists. You can configure as many as 32 access lists.

Step 5   Click Enable/Disable Access Lists.


Caution EMS rejects traffic on every interface that does not have an access list definition. Before you proceed, you must create at least one entry per interface to accept traffic, or the NE will reject all traffic on the unprovisioned interface, including management traffic.

Step 6   Click Apply NE Enable to activate access lists.


Caution Enabling access lists may prevent user traffic from entering or exiting the NE, including management traffic.


Modifying or Deleting Access Lists

Use the following buttons to modify or delete an access list.


Caution Changes made to an access list entry take place immediately. Cisco Systems recommends that you disable access lists for the NE before making changes.

Access List Example

Network Address Translation

Network Address Translation (NAT) is a feature that allows an organization's IP network to appear from the outside to use different IP address space than what it is actually using. Thus, NAT allows an organization with nonglobally routable addresses to connect to the Internet by translating those addresses into globally routable address space. NAT is described in RFC 1631.

NAT enables private IP internetworks that use nonregistered IP addresses to connect to the Internet. NAT is configured on the router at the border of a stub domain (referred to as the inside network) and a public network such as the Internet (referred to as the outside network). NAT translates the internal local addresses to globally unique IP addresses before sending packets to the outside network.

Figure 11-4 shows an example of NAT configured on a Cisco Integrated Access Device.


Figure 11-4: NAT Example


Static and Dynamic NAT

NAT offers two types of address translation, static and dynamic.

    10.0.0.1 --> 11.0.0.5
    10.0.0.2 --> 11.0.0.6
    10.0.0.3 --> 11.0.0.7
     
    
    10.0.0.1 --> 12.0.0.9
    10.0.0.2 --> 12.0.0.9
    10.0.0.3 --> 12.0.0.9
     
    

NAT Restrictions

The following conditions apply to NAT provisioned on the Cisco IAD1101:

Provisioning NAT

To provision NAT on the NE, perform the following steps starting in the NE provision window:


Step 1   Click IP Network Access Translation (NAT). EMS launches the NAT provisioning window. (See Figure 11-5.)


Figure 11-5: Provisioning NAT


Step 2   Set the following fields to configure the network address translation:

Step 3   Click Add when finished.

Step 4   Repeat Step 2 and Step 3 to configure additional NAT entries. You can configure as many as 8 NAT entries.

Step 5   Click Enable/Disable NAT to activate NAT.


Caution Enabling NAT may prevent user traffic from entering or exiting the Cisco IAD1101, including management traffic.


Modifying or Deleting NAT

Click a NAT entry in the list window, and use the following buttons to modify or delete a NAT entry:

Security with NAT

On a Cisco IAD1101 with a static or dynamic NAT translation, an outside host can still gain access to an inside (untranslated) host address. To block outside access to the inside network, create a static NAT that translates inbound addresses into a "dummy" address, then create an access list that filters out the dummy address. See the "Access Lists" section for access list information and procedures.

NAT and Access List Example

The following task list is an example of using a "dummy" address, as described in the "Security with NAT" section on this page.


Step 1   Provision the Cisco IAD1101 with a static NAT entry:

Step 2   Create a dynamic NAT entry to prevent direct outside access to 10.0.0.0/8. Use 99.0.0.1 as the dummy address.

Step 3   Create an access list entry that rejects all inbound traffic with IP address 99.0.0.1:

Routing Information Protocol

The Routing Information Protocol (RIP) is a distance-vector protocol that uses hop count as its metric. RIP sends routing-update messages at regular intervals, and also whenever the network topology changes. When a router receives a routing update that includes changes to an entry, it updates its routing table to reflect the new route.


Note   On a Cisco IAD1101 with a Frame Relay link, but without a PPP link, RIP does not advertise the node IP address over the Frame Relay link. To gain access to the Cisco IAD1101 over the Frame Relay link, use the Frame Relay address (not the node address) as the address for the Cisco IAD1101. This is not needed when both Frame Relay and PPP links exist on the Cisco IAD1101.

Provisioning RIP

To provision RIP on the NE, perform the following steps starting in the NE provision window:


Step 1   Click IP RIP Configuration. EMS launches the RIP provisioning window. (See Figure 11-6.)


Figure 11-6: Provisioning RIP


Step 2   Click Enable RIP for NE.

Step 3   In the IP Interfaces list, select the interfaces to be provisioned for RIP.


Note   When you activate RIP on a Cisco IAD1101 interface, RIP advertises all directly-connected nodes over the interface.

Step 4   Click Enable RIP.

Step 5   Select the Rx RIP Version1, 2, or "1 or 2".

Step 6   Select the Tx RIP VersionNone, 1, RIP1Compatible, or 2.


Note   RIP1Compatible is a version of RIPv2 that can be processed by a node using RIPv1.

Step 7   Select the Authentication—None or Password.

Step 8   If password authentication is selected (RIPv2 only), enter the password in the Authentication Key field.

Step 9   Click Apply to provision RIP for the selected interfaces.


Monitoring IP Statistics

EMS maintains statistics for all IP activity on the Cisco IAD1101, including routing tables, interface activity, and Layer 4 protocol statistics.

To display IP statistics, perform the following steps starting from node view:


Step 1   Select Objects > IP Statistics from the node view menu bar. EMS launches the IP statistics window (See Figure 11-7.)


Figure 11-7: IP Statistics Window


Step 2   Under Available IP Statistics, click the icon for the desired display. Statistic information and descriptions can be found in RFC1213 (Management Information Base for Network Management of TCP/IP-based internets: MIB-II).

Step 3   Use the following buttons to alter the display:

Step 4   Click Close to close the display.



hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Sep 25 17:17:30 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.