|
|
This chapter describes provisioning IP on the Cisco IAD1101 and includes the following sections:
EMS uses static IP routes to define paths through the Cisco IAD1101 and across the network. You can assign static IP routes to direct IP traffic on the Ethernet interface, and any T1 lines configured for IP (IP over Frame Relay or IP over PPP).
A static IP route consists of the following information:
Figure 11-1 shows a sample network, with a Cisco IAD1101 connected to a router over a PPP link. To assign a static route from the Cisco IAD1101 to Host A, enter the following information:

To assign a static route, perform the following steps starting in node view:
Step 2 From the function bar on the left, click on the Datalink Route Configuration button. EMS launches the datalink route configuration window. (See Figure 11-2.)

Step 3 Set the following parameters in the data-link route configuration window:
Step 4 Click Add when finished.
Step 5 Click the Exit button (on the function bar) to return to the node view.
You can add as many routes as needed, but only one route can be the default route.
An access list is a sequential collection of permit and deny conditions that apply to IP addresses. EMS tests addresses against the conditions in an access list one by one. The first match determines whether the software accepts or rejects the address. Because the software stops testing conditions after the first match, the order of the conditions is critical. If no conditions match, the software rejects the address.
Access lists allow the Cisco IAD1101 to filter incoming or outgoing IP packets based on the following criteria:
![]() |
Note UDP ports 161 and 162 are used for management and alarm traffic, respectively. |
To provision access lists on the NE, perform the following steps starting in the NE provisioning window:

Step 2 Set the following fields to configure the access list:
Step 3 Click Add when finished.
Step 4 Repeat Step 2 and Step 3 to configure additional access lists. You can configure as many as 32 access lists.
Step 5 Click Enable/Disable Access Lists.
![]() |
Caution EMS rejects traffic on every interface that does not have an access list definition. Before you proceed, you must create at least one entry per interface to accept traffic, or the NE will reject all traffic on the unprovisioned interface, including management traffic. |
Step 6 Click Apply NE Enable to activate access lists.
![]() |
Caution Enabling access lists may prevent user traffic from entering or exiting the NE, including management traffic. |
Use the following buttons to modify or delete an access list.
![]() |
Caution Changes made to an access list entry take place immediately. Cisco Systems recommends that you disable access lists for the NE before making changes. |
Network Address Translation (NAT) is a feature that allows an organization's IP network to appear from the outside to use different IP address space than what it is actually using. Thus, NAT allows an organization with nonglobally routable addresses to connect to the Internet by translating those addresses into globally routable address space. NAT is described in RFC 1631.
NAT enables private IP internetworks that use nonregistered IP addresses to connect to the Internet. NAT is configured on the router at the border of a stub domain (referred to as the inside network) and a public network such as the Internet (referred to as the outside network). NAT translates the internal local addresses to globally unique IP addresses before sending packets to the outside network.
Figure 11-4 shows an example of NAT configured on a Cisco Integrated Access Device.

NAT offers two types of address translation, static and dynamic.
10.0.0.1 --> 11.0.0.5 10.0.0.2 --> 11.0.0.6 10.0.0.3 --> 11.0.0.7
10.0.0.1 --> 12.0.0.9 10.0.0.2 --> 12.0.0.9 10.0.0.3 --> 12.0.0.9
The following conditions apply to NAT provisioned on the Cisco IAD1101:
To provision NAT on the NE, perform the following steps starting in the NE provision window:

Step 2 Set the following fields to configure the network address translation:
Step 3 Click Add when finished.
Step 4 Repeat Step 2 and Step 3 to configure additional NAT entries. You can configure as many as 8 NAT entries.
Step 5 Click Enable/Disable NAT to activate NAT.
![]() |
Caution Enabling NAT may prevent user traffic from entering or exiting the Cisco IAD1101, including management traffic. |
Click a NAT entry in the list window, and use the following buttons to modify or delete a NAT entry:
![]() |
Note If a dynamic NAT entry is in use, you must uncheck the Enable NAT for NE box before deleting the NAT entry. |
On a Cisco IAD1101 with a static or dynamic NAT translation, an outside host can still gain access to an inside (untranslated) host address. To block outside access to the inside network, create a static NAT that translates inbound addresses into a "dummy" address, then create an access list that filters out the dummy address. See the "Access Lists" section for access list information and procedures.
The following task list is an example of using a "dummy" address, as described in the "Security with NAT" section on this page.
Step 2 Create a dynamic NAT entry to prevent direct outside access to 10.0.0.0/8. Use 99.0.0.1 as the dummy address.
Step 3 Create an access list entry that rejects all inbound traffic with IP address 99.0.0.1:
The Routing Information Protocol (RIP) is a distance-vector protocol that uses hop count as its metric. RIP sends routing-update messages at regular intervals, and also whenever the network topology changes. When a router receives a routing update that includes changes to an entry, it updates its routing table to reflect the new route.
![]() |
Note On a Cisco IAD1101 with a Frame Relay link, but without a PPP link, RIP does not advertise the node IP address over the Frame Relay link. To gain access to the Cisco IAD1101 over the Frame Relay link, use the Frame Relay address (not the node address) as the address for the Cisco IAD1101. This is not needed when both Frame Relay and PPP links exist on the Cisco IAD1101. |
To provision RIP on the NE, perform the following steps starting in the NE provision window:

Step 2 Click Enable RIP for NE.
Step 3 In the IP Interfaces list, select the interfaces to be provisioned for RIP.
![]() |
Note When you activate RIP on a Cisco IAD1101 interface, RIP advertises all directly-connected nodes over the interface. |
Step 4 Click Enable RIP.
Step 5 Select the Rx RIP Version1, 2, or "1 or 2".
Step 6 Select the Tx RIP VersionNone, 1, RIP1Compatible, or 2.
![]() |
Note RIP1Compatible is a version of RIPv2 that can be processed by a node using RIPv1. |
Step 7 Select the AuthenticationNone or Password.
Step 8 If password authentication is selected (RIPv2 only), enter the password in the Authentication Key field.
Step 9 Click Apply to provision RIP for the selected interfaces.
EMS maintains statistics for all IP activity on the Cisco IAD1101, including routing tables, interface activity, and Layer 4 protocol statistics.
To display IP statistics, perform the following steps starting from node view:

Step 2 Under Available IP Statistics, click the icon for the desired display. Statistic information and descriptions can be found in RFC1213 (Management Information Base for Network Management of TCP/IP-based internets: MIB-II).
Step 3 Use the following buttons to alter the display:
Step 4 Click Close to close the display.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Mon Sep 25 17:17:30 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.