|
|
Developed by the Xerox Corporation, the XNS protocols are designed to be used across a variety of communication media, processors, and office applications. Ungermann-Bass, Inc. (now a part of Tandem Computers) adopted XNS in developing its Net/One XNS routing protocol. Standard XNS routing uses the RIP update packets and the hop-count metric. Ungermann-Bass Net/One uses hello packets and a path-delay metric.
This chapter describes the commands to configure both standard XNS routing and Ungermann-Bass Net/One XNS routing. You can also configure Cisco routers to interoperate with Ungermann-Bass routers. For XNS configuration information and examples, refer to the "Configuring XNS" chapter in the Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS, and XNS Configuration Guide.
![]() |
Note Not all Cisco access servers support XNS. For more information, refer to the release notes for the release you are running. |
To define an extended XNS access list, use the extended version of the access-list command in global configuration mode. To remove an extended access list, use the no form of this command.
access-list access-list-number {deny | permit} protocol [source-network [.source-host [source-network-mask.source-host-mask]]] source-socket [destination-network [.destination-host [destination-network-mask.destination-host-mask] destination-socket[/pep]]]![]() |
Note If network masks are used, then all fields are required, except the destination socket and the destination Packet Exchange Protocol (PEP) type. |
Syntax Description
access-list-number Number of the access list. This is a decimal number from 500 to 599. deny Denies access if the conditions are matched. permit Permits access if the conditions are matched. protocol Number of an XNS protocol, in decimal. See the documentation accompanying your host's XNS implementation for a list of protocol numbers. source-network (Optional) Number of the network from which the packet is being sent. This is a 32-bit decimal number. A network number of -1 matches all networks. You can omit leading zeros from the network number. Note that you enter the network number in decimal, and this number is expressed in decimal format in Cisco's configuration files and routing tables. However, the Cisco IOS software internally converts the network number into hexadecimal. This means, for instance, that a network analyzer will display the network number in hexadecimal. .source-host (Optional) Host on source-network from which the packet is being sent. This is a 48-bit hexadecimal value represented as a dotted triplet of 4-digit hexadecimal numbers (xxxx.xxxx.xxxx). source-network-mask (Optional) Mask to be applied to source-network. The mask is a 32-bit decimal number. The mask must immediately be followed by a period, which must in turn immediately be followed by source-host-mask. .source-host-mask (Optional) Mask to be applied to source-host. This is a 48-bit value represented as a dotted triplet of four-digit hexadecimal numbers (xxxx.xxxx.xxxx). Place ones in the bit positions you want to mask. source-socket Number of the socket from which the packet is being sent. This is a 16-bit decimal value. See the documentation accompanying your host's XNS implementation for a list of socket numbers. destination-network (Optional) Number of the network to which the packet is being sent. This is a 32-bit decimal number. A network number of -1 matches all networks. You can omit leading zeros from the network number. Note that you enter the network number in decimal, and this number is expressed in decimal format in Cisco's configuration files and routing tables. However, the Cisco IOS software internally converts the network number into hexadecimal. This means, for instance, that a network analyzer will display the network number in hexadecimal. .destination-host (Optional) Host on destination-network to which the packet is being sent. This is a 48-bit hexadecimal value represented as a dotted triplet of four-digit hexadecimal numbers (xxxx.xxxx.xxxx). destination-network-mask (Optional) Mask to be applied to destination-network. The mask is a 32-bit decimal number. The mask must immediately be followed by a period, which must in turn immediately be followed by destination-host-mask. .destination-host-mask (Optional) Mask to be applied to destination-host. This is a 48-bit value represented as a dotted triplet of four-digit hexadecimal numbers (xxxx.xxxx.xxxx). Place ones in the bit positions you want to mask. destination-socket (Optional) Number of the socket to which the packet is being sent. This is a 16-bit decimal value. See the documentation accompanying your host's XNS implementation for a list of socket numbers. /pep (Optional) Packet Exchange Protocol (PEP) type. PEP is a connectionless-oriented protocol that uses XNS Type 4 initial domain part (IDP) frames.
Defaults
No access lists are defined.
Command Modes
Global configuration
Command History
10.0 This command was introduced. 11.0 The /pep argument was added.
Release
Modification
Usage Guidelines
Extended XNS access lists filter on protocol type. All other parameters are optional.
Use the xns access-group command to assign an access list to an interface. You can apply only one extended or one standard access list to an interface. The access list filters all outgoing packets on the interface.
Examples
The following example shows two ways to allow protocol type 20 on any socket (from a certain make of machine) on network 10 to access any hosts on networks 1000 to 1015 on any socket. The access-list commands were issued without using the network mask option.
access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1000 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1001 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1002 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1003 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1004 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1005 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1006 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1007 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1008 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1009 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1010 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1011 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1012 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1013 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1014 0 access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1015 0
In the following example, the access-list command performs the same operation, but in a much shorter time, because the netmask option is used:
access-list 505 permit 20 10.0000.0C00.0000 0000.0000.FFFF 0 1000.0000.0000.0000 15.FFFF.FFFF.FFFF 0
Related Commands
Defines a standard XNS access list. Applies a generic filter to an interface. Controls which networks are added to the routing table.
Command
Description
To define a standard XNS access list, use the standard version of the access-list command in global configuration mode. To remove a standard access list, use the no form of this command.
access-list access-list-number {deny | permit} source-network [.source-address [source-address-mask]] [destination-network [.destination-address [destination-address-mask]]]
Syntax Description
access-list-number Number of the access list. This is a decimal number from 400 to 499. deny Denies access if the conditions are matched. permit Permits access if the conditions are matched. source-network Number of the network from which the packet is being sent. This is a 32-bit decimal number. You can omit leading zeros. A network number of -1 matches all networks. Note that you enter the network number in decimal, and this number is expressed in decimal format in Cisco's configuration files and routing tables. However, the Cisco IOS software internally converts the network number into hexadecimal. This means, for instance, that a network analyzer will display the network number in hexadecimal. .source-address (Optional) Host on source-network from which the packet is being sent. This is a 48-bit hexadecimal value represented as a dotted triplet of four-digit hexadecimal numbers (xxxx.xxxx.xxxx). source-address-mask (Optional) Mask to be applied to source-address. This is a 48-bit value represented as a dotted triplet of four-digit hexadecimal numbers (xxxx.xxxx.xxxx). Place ones in the bit positions you want to mask. destination-network (Optional) Number of the network to which the packet is being sent. This is a 32-bit decimal number. A network number of -1 matches all networks. You can omit leading zeros from the network number. Note that you enter the network number in decimal, and this number is expressed in decimal format in Cisco's configuration files and routing tables. However, the Cisco IOS software internally converts the network number into hexadecimal. This means, for instance, that a network analyzer will display the network number in hexadecimal. .destination-address (Optional) Host on destination-network to which the packet is being sent. This is a 48-bit hexadecimal value represented as a dotted triplet of four-digit hexadecimal numbers (xxxx.xxxx.xxxx). destination-address-mask (Optional) Mask to be applied to destination-address. This is a 48-bit value represented as a dotted triplet of four-digit hexadecimal numbers (xxxx.xxxx.xxxx). Place ones in the bit positions you want to mask.
Defaults
No access lists are defined.
Command Modes
Global configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
Standard XNS access lists filter on the source network only. All other parameters are optional. This means that you cannot use them to prevent traffic from going to or coming from specific hosts.
Use the xns access-group command to assign an access list to an interface. You can apply only one extended or one standard access list to an interface. The access list filters all outgoing packets on the interface.
Examples
The following example denies access to packets from source network 1 that are destined for
network 2. It permits all other traffic.
access-list 400 deny 1 2
access-list 400 permit -1 -1
The following example adds masks for the source and destination networks:
access-list 400 deny 1.0011.1622.0015 0000.0000.0000 2.301D3.020C.0022
0000.00ff.ffff
access-list 400 permit -1 0000.0000.0000 -1 0000.0000.0000
Related Commands
ping (privileged) Diagnoses basic network connectivity on AppleTalk, CLNS, IP, Novell, Apollo, VINES, DECnet, or XNS networks. Applies a generic filter to an interface. Controls which networks are added to the routing table.
Command
Description
To display the contents of the XNS fast-switching cache, use the show xns cache command in EXEC mode.
show xns cacheSyntax Description
This command has no arguments or keywords.
Command Modes
User EXEC
Command History
10.0 This command was introduced.
Release
Modification
Examples
The following is sample output from the show xns cache command:
Router# show xns cache XNS routing cache version is 23 Destination Interface MAC Header * 2.0000.00c0.1234 Ethernet1 000000C0123400000C00D8DB0600
Table 59 describes the fields shown in the display.
| Field | Description |
|---|---|
XNS routing cache version is 23 | Number identifying the fast-switching cache table. It increments each time the table changes. |
Destination | Destination network for this packet. Valid entries are marked by an asterisk (*). |
Interface | Router interface through which this packet is transmitted. |
MAC Header | First bytes of this packet's MAC header. |
Related Commands
Enables XNS fast switching.
Command
Description
To display the status of the XNS interfaces configured in the Cisco IOS software and the parameters configured on each interface, use the show xns interface command in EXEC mode.
show xns interface [type number]
Syntax Description
type (Optional) Interface type. It can be one of the following types: asynchronous, dialer, Ethernet (IEEE 802.3), loopback, null, serial, or tunnel. number (Optional) Interface number.
Command Modes
EXEC
Command History
10.0 This command was introduced.
Release
Modification
Examples
The following is sample output from the show xns interface command:
Router# show xns interface Ethernet 0 is up, line protocol is up XNS address is 60.0000.0c00.1d23 xns encapsulation is ARPA Helper address is 912.ffff.ffff.ffff Outgoing address list is not set Input filter list is not set Output filter list is not set Router filter list is not set Update timer is not set XNS fast-switching enabled Ethernet 1 is administratively down, line protocol is down XNS protocol processing disabled Serial 1 is up, line protocol is up XNS protocol processing disabled
Table 60 describes the fields shown in the display.
| Field | Description |
|---|---|
Ethernet 0 is up | Type of interface and whether it is currently active and inserted into the network (up) or inactive and not inserted (down). |
line protocol is up | Indicates whether the software processes that handle the line protocol believe that the interface is usable (that is, whether keepalives are successful). |
XNS address | Network and host number of the local router interface. |
xns encapsulation | Type of encapsulation configured on the interface. |
Helper address | Address of a target XNS server or network to which broadcast XNS packets are forwarded, as configured with the xns helper-address command. |
Outgoing address list | Indicates whether an access list has been enabled with the access-list command. |
Input filter list | Number of the input filter applied to the interface with the command. |
Output filter list | Number of the output filter applied to the interface with the command. |
Router filter list | Number of the router filter applied to the interface with the command. |
Update timer | How often the Cisco IOS software sends RIP updates, as configured with the command. |
XNS fast-switching | Indicates whether XNS fast switching is enabled (default) or disabled for this interface. |
administratively down | Hardware has been taken down by an administrator. |
Related Commands
Defines an extended XNS access list. ping (privileged) Diagnoses basic network connectivity on AppleTalk, CLNS, IP, Novell, Apollo, VINES, DECnet, or XNS networks. Forwards broadcast packets to a specified server. Controls which networks are added to the routing table. Controls the list of networks included in routing updates sent out an interface. Controls the routers from which packets are accepted. Sets the XNS routing update timers.
Command
Description
To display the contents of the XNS routing table, use the show xns route command in EXEC mode.
show xns route [network]
Syntax Description
network (Optional) Number of the network that the route is to. This is a 32-bit decimal number. You can omit leading zeros.
Command Modes
EXEC
Command History
10.0 This command was introduced.
Release
Modification
Examples
The following is sample output from the show xns route command:
Router# show xns route Codes: R - RIP derived, C - connected, S - static, 1 learned routes Maximum allowed path(s) are/is 1 C Net 14 is directly connected, 0 uses, Ethernet0 C Net 15 is directly connected, 0 uses, Ethernet1 R Net 16 [1/0] via 14.0000.0c00.3e3b, 10 sec, 0 uses, Ethernet0
Table 61 describes the fields shown in the display.
| Field | Description |
|---|---|
Codes | Codes defining how the route was learned. |
R | Route learned from a RIP update. |
C | Directly connected network. |
S | Statically defined route via the command. |
learned routes | Number of routes learned from RIP updates. |
Maximum allowed paths | Maximum number of paths for which the Cisco IOS software has been configured with the command. |
Net 14 | XNS network number. |
is directly connected | Indicates that the network is directly connected to the router. |
uses | Fair estimate of the number of times a route gets used. It actually indicates the number of times the route has been selected for use prior to operations such as access list filtering. |
Ethernet0 | Possible interface through which you can reach the remote network via the specified router. |
[1/0] | Delay/Metric. The delay is the delay between sending routing updates. The metric is the XNS metric used in making routing decisions. |
via | Address of a router that is the next hop to the remote network. |
sec | Number of seconds since information about this network was last heard. |
Related Commands
Sets the maximum number of paths the Cisco IOS software uses when sending packets. Adds a static route to the XNS routing table.
Command
Description
To display information about the number and type of XNS packets transmitted and received by the Cisco IOS software, use the show xns traffic command in EXEC mode.
show xns trafficSyntax Description
This command has no arguments or keywords.
Command Modes
EXEC
Command History
10.0 This command was introduced.
Release
Modification
Examples
The following is sample output from the show xns traffic command:
Router# show xns traffic Rec: 3968 total, 0 format errors, 0 checksum errors, 0 bad hop count, 3968 local destination, 0 multicast Bcast: 2912 received, 925 sent Sent: 5923 generated, 500 forwarded, 0 encapsulation failed, 0 not routable Errors: 10 received, 20 sent Echo: Recd: 100 requests, 89 replies Sent: 20 requests, 20 replies Unknown: 5 packets
Table 62 describes significant fields shown in the display.
| Field | Description |
|---|---|
Rec: | Description of the XNS packets received. |
3968 total | Total number of packets received. |
0 format errors | Number of bad packets discarded (for example, packets with a corrupted header). |
0 checksum errors | Number of packets discarded because they contained checksum errors. |
0 bad hop count | Number of packets discarded because their hop count exceeded 16 (that is, the packets timed out). |
3968 local destination | Number of packets sent to the local broadcast address or specifically to the router. |
0 multicast | Number of packets received that were addressed to multiple destinations. |
Bcast: | Number of broadcast packets received and sent. |
Sent: | Description of the XNS packets the router has sent. |
5923 generated | Number of packets transmitted that it generated itself. |
500 forwarded | Number of packets transmitted that it forwarded from other sources. |
0 encapsulation failed | Number of packets the router was unable to encapsulate. |
0 not routable | Number of times the router could not locate in the routing table a route to the destination. |
Errors: | Number of packets sent and received that contained errors. |
Echo: | Number of ping packets received and sent, and the number of replies it received. |
Unknown: | Number of packets the router was unable to forward, for example, because of a misconfigured helper address or because no route was available. |
To apply a generic filter to an interface, use the xns access-group command in interface configuration mode. To remove the access list, use the no form of this command.
xns access-group access-list-number
Syntax Description
access-list-number Number of the access list. All outgoing packets defined with either standard or extended access lists and forwarded through the interface are filtered by the entries in this access list. For standard access lists, access-list-number is a decimal number from 400 to 499. For extended access lists, access-list-number is a decimal number from 500 to 599.
Defaults
No generic filters are applied by default.
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
The xns access-group command applies a generic filter to an interface. These filters control which packets are sent out an interface based on the packet's source and destination addresses, XNS protocol type, and source and destination socket numbers. You use the access-list (XNS extended) and ping (privileged) commands to specify the filtering conditions.
You can apply only one filter to an interface.
Examples
The following example applies the access list 500 to Ethernet interface 0:
interface ethernet 0 xns access-group 500
Related Commands
Defines an extended XNS access list. ping (privileged) Diagnoses basic network connectivity on AppleTalk, CLNS, IP, Novell, Apollo, VINES, DECnet, or XNS networks.
Command
Description
To select the type of encapsulation used on a Token Ring interface, use the xns encapsulation command in interface configuration mode. To disable the encapsulation, use the no form of this command.
xns encapsulation {snap | ub | 3com}
Syntax Description
snap 802.2 LLC encapsulation. This is the default encapsulation type. Use this encapsulation type with IBM Token Ring networks. ub Ungermann-Bass encapsulation. 3com 3Com encapsulation. Use this encapsulation type when older 3Com Corporation products are present on the network.
Defaults
snap
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
You must specify this command on an interface if you want a Token Ring interface to forward XNS packets.
Some 3Com 3+ hosts do not recognize Token Ring packets with the source-route bridging routing information field (RIF) set. You can work around this discrepancy by using the no multiring xns interface configuration command on Token Ring interfaces that are used for 3Com XNS routing. For more information, refer to the "Source-Route Bridging Commands" chapter in the Cisco IOS Bridging and IBM Networking Command Reference.
Examples
The following example uses Ungermann-Bass-style encapsulation when forwarding Token Ring packets across an interface:
interface tokenring 0 xns network 23 xns encapsulation ub
Related Commands
multiring Enables collection and use of RIF information. Receives RIP updates. Enables Ungermann-Bass Net/One routing.
Command
Description
To flood broadcast packets whose destination address is -1.FFFF.FFFF.FFFF, use the xns flood broadcast allnets command in interface configuration mode. To disable this type of flooding, use the no form of this command.
xns flood broadcast allnetsSyntax Description
This command has no arguments or keywords.
Defaults
Disabled
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
The xns flood broadcast allnets command configures all-nets flooding. In this type of routing, all broadcast packets are sent to all networks (as indicated by the network address -1) and to all host on those networks (as indicated by the host address FFFF.FFFF.FFFF).
You can specify a network address of -1 only with the xns flood broadcast commands. In all other commands, it is an invalid address.
Flooding is applied to the packets received on an interface.
It is most closely in accordance with the XNS specification to flood packets with destinations of
-1.FFFF.FFFF.FFFF and destinations of -1.specific-host, but not to flood packets with destinations of 0.FFFF.FFFF.FFFF.
Examples
The following example configures the interface to flood broadcast packets:
interface ethernet 0 xns network 20 xns broadcast allnets
Related Commands
Floods packets whose destinations address is 0.FFFF.FFFF.FFFF. Floods packets whose destination address is -1.specific-host. Receives RIP updates.
Command
Description
To flood packets whose destinations address is 0.FFFF.FFFF.FFFF, use the xns flood broadcast net-zero command in interface configuration mode. To disable this type of flooding, use the no form of this command.
xns flood broadcast net-zeroSyntax Description
This command has no arguments or keywords.
Defaults
Disabled
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
The xns flood broadcast net-zero command sends broadcast packets to all hosts (as indicated by the host address FFFF.FFFF.FFFF) on the local network (as indicated by the network address 0). This broadcast configuration is required in some 3Com environments.
Flooding is applied to the packets received on an interface.
Examples
The following example sends broadcast packets destined for the local network to all hosts on that network:
interface ethernet 0 xns network 20 xns flood broadcast net-zero
Related Commands
Floods broadcast packets whose destination address is -1.FFFF.FFFF.FFFF. Floods packets whose destination address is -1.specific-host. Receives RIP updates.
Command
Description
To flood packets whose destination address is -1.specific-host, use the xns flood specific allnets command in interface configuration mode. To disable this type of flooding, use the no form of this command.
xns flood specific allnetsSyntax Description
This command has no arguments or keywords.
Defaults
Disabled
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
The xns flood specific allnets command forwards broadcast packets as MAC-layer broadcasts so that they can be picked up and further flooded by other routers.
You can specify a network address of -1 only with the xns flood broadcast commands. In all other commands, it is an invalid address.
Flooding is applied to the packets received on an interface.
It is most closely in accordance with the XNS specification to flood packets with destinations of
-1.FFFF.FFFF.FFFF and destinations of -1.specific-host, but not to flood packets with destinations of 0.FFFF.FFFF.FFFF.
Examples
The following example floods packets with destinations of -1.specific-host:
interface ethernet 0 xns network 20 xns flood broadcast specific allnets
Related Commands
Floods broadcast packets whose destination address is -1.FFFF.FFFF.FFFF. Floods packets whose destination address is -1.specific-host. Receives RIP updates.
Command
Description
To forward packets of a specific XNS protocol to a helper address, use the xns forward-protocol command in global configuration mode. To disable the forwarding of these packets, use the no form of this command.
xns forward-protocol protocol
Syntax Description
protocol Number of an XNS protocol, in decimal. See the documentation accompanying your host's XNS implementation for a list of protocol numbers.
Defaults
Disabled
Command Modes
Global configuration
Command History
10.0 This command was introduced.
Release
Modification
Examples
The following example forwards packets of protocol type 2 to the specified helper address:
xns forward-protocol 2 interface ethernet 0 xns helper-address 26.FFFF.FFFF.FFFF
Related Commands
Forwards broadcast packets to a specified server.
Command
Description
To receive RIP updates, use the xns hear-rip command in interface configuration mode. To disable the receipt of RIP updates, use the no form of this command.
xns hear-rip [access-list-number]
Syntax Description
access-list-number (Optional) Number of the access list. This list defines the routes the Cisco IOS software is to learn through standard RIP. The list is applied to individual routes within the RIP packet, not to the address of the packet's sender. For standard access lists, access-list-number is a decimal number from 400 to 499. For extended access lists, access-list-number is a decimal number from 500 to 599.
Defaults
Disabled
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
Delay metrics are computed as if each hop mentioned by the RIP update were a 9.6-kbps serial link. Ordinarily, the result is that the Cisco IOS software prefers an all-Ungermann-Bass path over an all-RIP path. If you want the software to learn only certain routes through standard RIP, specify an access list number as an argument to the xns hear-rip command. The software will then learn from RIP packets only routes to networks permitted by the access list. Note that the access list is applied to individual routes within the RIP packet, not to the address of the packet's sender.
In an Ungermann-Bass environment, you should configure all interfaces with the xns flood broadcast allnets and xns flood specific allnets commands. You should not configure them with the xns flood broadcast net-zero command. You should configure Token Ring interfaces that are directly connected to Ungermann-Bass nodes with the xns encapsulation ub command.
Examples
In the following example, serial interface 0 receives RIP updates:
interface serial 0 xns network 24 xns hear-rip
Related Commands
Floods broadcast packets whose destination address is -1.FFFF.FFFF.FFFF. Floods packets whose destinations address is 0.FFFF.FFFF.FFFF. Floods packets whose destination address is -1.specific-host. Enables Ungermann-Bass Net/One routing.
Command
Description
To forward broadcast packets to a specified server, use the xns helper-address command in interface configuration mode. To disable this function, use the no form of this command.
xns helper-address network.host
Syntax Description
network Network on which the target XNS server resides. This is a 32-bit decimal number. .host Host number of the target XNS server. This is a 48-bit hexadecimal value represented as a dotted triplet of four-digit hexadecimal numbers (xxxx.xxxx.xxxx). The host must be directly connected to one of the router's directly attached networks. A number of FFFF.FFFF.FFFF indicates all hosts on the specified network.
Defaults
Disabled
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
Routers normally block all broadcast requests and do not forward them to other network segments. This is done to prevent the degradation of performance over the entire network. The xns helper-address command allows broadcasts to be forwarded to other networks. This is useful when a network segment does not have a server capable of handling broadcasts. This command enables you to forward the broadcasts to a server, network, or networks that can process them. Incoming unrecognized broadcast packets that match the access list created with the xns helper-list command (if it is present) are forwarded.
When a packet is helpered, the Cisco IOS software changes its destination address to be the configured helper address, and the packet is routed toward that address. The host at the helper address is expected to process the packet and (usually) to reply to the packet's sender. A helper address can be a directed broadcast address, in which case the helpered packet will be forwarded to a remote network and rebroadcast there.
You can specify multiple xns helper-address commands on a given interface.
Examples
In the following example, the server at address 0000.0c00.23fe receives all broadcasts on network 51:
xns helper-address 51.0000.0c00.23fe
Related Commands
Forwards packets of a specific XNS protocol to a helper address.
Command
Description
To control which networks are added to the routing table, use the xns input-network-filter command in interface configuration mode. To remove the filter from the interface, use the no form of this command.
xns input-network-filter access-list-number
Syntax Description
access-list-number Number of the access list. All incoming packets defined with either standard or extended access lists are filtered by the entries in this access list. For standard access lists, access-list-number is a decimal number from 400 to 499. For extended access lists, it is a decimal number from 500 to 599.
Defaults
No networks are added to the routing table.
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
The xns input-network-filter command controls which networks are added to the routing table based on the networks learned in incoming XNS routing updates (RIP updates) on the interface.
You can issue only one xns input-network-filter command on each interface.
Examples
In the following example, access list 476 controls which networks are added to the routing table when RIP packets are received on Ethernet interface 1. Network 16 is the only network whose information will be added to the routing table. Routing updates for all other networks are implicitly denied and are not added to the routing table.
access-list 476 permit 16 interface ethernet 1 xns input-network-filter 476
Related Commands
Defines an extended XNS access list. ping (privileged) Diagnoses basic network connectivity on AppleTalk, CLNS, IP, Novell, Apollo, VINES, DECnet, or XNS networks. Controls the list of networks included in routing updates sent out an interface.
Command
Description
To set the maximum number of paths the Cisco IOS software uses when sending packets, use the xns maximum-paths command in global configuration mode. To restore the default value, use the no form of this command.
xns maximum-paths number
Syntax Description
number Maximum number of equal-cost paths from which the software chooses. It can be a number from 1 to 512. The default is 1.
Defaults
1 path
Command Modes
Global configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
A router can use multiple paths to reach an XNS destination to increase throughput in the network. By default, the router picks one best path and send all traffic on this path, but you can configure it to remember two or more paths that have equal costs (the cost metric is hop count for standard XNS RIP) and to balance the traffic load across all the available paths. (Note that when paths have differing costs, the device chooses lower-cost routes in preference to higher-cost routes.) Packets are distributed over the multiple paths in round-robin fashion on a packet-by-packet basis. That is, the first packet is sent along the first path, the second packet along the second path, and so on. If the final path is reached before all packets are sent, the next packet is sent to the first path, the next to the second path, and so on.
Limiting the number of equal-cost paths can save memory on routers with limited memory or with very large configurations. Additionally, in networks with a large number of multiple paths and systems with limited ability to cache out-of-sequence packets, performance might suffer when traffic is split between many paths.
Examples
In the following example, the router uses up to two alternate paths:
xns maximum-paths 2
Related Commands
Displays the contents of the XNS routing table.
Command
Description
To enable XNS routing on a particular interface by assigning a network number to the interface, use the xns network command in interface configuration mode. To disable XNS routing on an interface, use the no form of this command.
xns network number
Syntax Description
number Network number. This is a 32-bit decimal number. You can omit leading zeros.
Defaults
XNS routing is disabled.
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
Interfaces not enabled to run XNS ignore any XNS packets that they receive.
Every XNS interface must have a unique XNS network number.
Examples
The following example enables XNS routing, specifying that XNS networks 20 and 21 are connected to two of the router's Ethernet interfaces:
xns routing interface ethernet 0 xns network 20 interface ethernet 1 xns network 21
Related Commands
Displays the status of the XNS interfaces configured in the Cisco IOS software and the parameters configured on each interface. Enables XNS routing.
Command
Description
To control the list of networks included in routing updates sent out an interface, use the xns output-network-filter command in interface configuration mode. To remove the filter from the interface, use the no form of this command.
xns output-network-filter access-list-number
Syntax Description
access-list-number Number of the access list. All outgoing packets defined with either standard or extended access lists are filtered by the entries in this access list. For standard access lists, the access-list-number is a decimal number from 400 to 499. For extended access lists, it is a decimal number from 500 to 599.
Defaults
No list of networks is included in the routing updates sent out an interface.
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
The xns output-network-filter command controls which networks the Cisco IOS software advertises in its routing updates (RIP updates).
You can issue only one xns output-network-filter command on each interface.
Examples
In the following example, access list 496 controls which networks are specified in routing updates sent out serial interface 1. This configuration causes network 27 to be the only network advertised in routing updates sent on the defined serial interface.
access-list 496 permit 27 interface serial 1 xns output-network-filter 496
Related Commands
Controls which networks are added to the routing table. Controls the routers from which packets are accepted.
Command
Description
To add a static route to the XNS routing table, use the xns route command in global configuration mode. To remove a route from the routing table, use the no form of this command.
xns route network network.host
Syntax Description
network Network to which you want to establish a static route. This is a 32-bit decimal number. You can omit leading zeros. network.host Router to which to forward packets destined for the specified network. The argument network is a 32-bit decimal number. You can omit leading zeros. The argument host is the host number of the target router. This is a 48-bit value represented by a dotted triplet of four-digit hexadecimal numbers (xxxx.xxxx.xxxx).
Defaults
No static routes are added to the XNS routing table.
Command Modes
Global configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
The xns route command forwards packets destined for the specified network (network) to the specified router (network.host), regardless of whether that Cisco IOS software is sending dynamic routing information.
Static routes usually are not used in XNS environments, because nearly all XNS routers support dynamic routing via RIP. Dynamic routing is enabled by default in Cisco routers.
Be careful when assigning static routes. When links associated with static routes are lost, traffic may stop being forwarded, even though alternative paths might be available.
Examples
In the following example, the router at address 21.0456.acd3.1243 handles all traffic destined for network 25:
xns routing xns route 25 21.0456.acd3.1243
Related Commands
Displays the contents of the XNS routing table.
Command
Description
To enable XNS fast switching, use the xns route-cache command in interface configuration mode. To disable fast switching, use the no form of this command.
xns route-cacheSyntax Description
This command has no arguments or keywords.
Defaults
Enabled
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
XNS fast switching allows higher throughput by switching packets using a cache created by previous transit packets.
You might want to disable fast switching in two situations. One is if you want to save memory on the interface cards; fast-switching caches require more memory than those used for standard switching. The second situation is to avoid congestion on interface cards when a high-bandwidth interface is writing large amounts of information to a low-bandwidth interface.
Examples
The following example disables XNS fast switching for serial interface 1:
interface serial 1 no xns route-cache
Related Commands
Displays the contents of the XNS fast-switching cache.
Command
Description
To control the routers from which packets are accepted, use the xns router-filter command in interface configuration mode. To remove the filters from the interface, use the no form of this command.
xns router-filter access-list-number
Syntax Description
access-list-number Number of the access list. All incoming packets defined with either standard or extended access lists are filtered by the entries in this access list. For standard access lists, access-list-number is a decimal number from 400 to 499. For extended access lists, it is a decimal number from 500 to 599.
Defaults
No filters are applied to control the routers from which packets are accepted.
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
You can issue only one xns router-filter command on each interface.
Examples
In the following example, access list 466 controls the routers from which packets are accepted. For serial interface 0, only packets from the router at 26.0000.00c0.047d are accepted. All other packets are implicitly denied.
access-list 466 permit 26.0000.00c0.047d interface serial 0 xns router-filter 466
Related Commands
Controls which networks are added to the routing table. Controls the list of networks included in routing updates sent out an interface.
Command
Description
To enable XNS routing, use the xns routing command in global configuration mode. To disable XNS routing, use the no form of this command.
xns routing [address]
Syntax Description
address (Optional) Host number of the router. This is a 48-bit value represented by a dotted triplet of four-digit hexadecimal numbers (xxxx.xxxx.xxxx). It must not be a multicast address. If you omit address, the Cisco IOS software uses the address of the first IEEE-compliant (Token Ring, FDDI, or Ethernet) interface MAC address it finds in its interface list. The software uses the address 0123.4567.abcd for non-IEEE-compliant interfaces.
Defaults
Disabled
Command Modes
Global configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
The xns routing command enables the RIP service on the router.
Examples
The following example enables XNS routing:
xns routing
Related Commands
Enables XNS routing on a particular interface by assigning a network number to the interface.
Command
Description
To enable Ungermann-Bass Net/One routing, use the xns ub-emulation command in global configuration mode. To disable Net/One routing and restore standard routing mode, use the no form of this command.
xns ub-emulationSyntax Description
This command has no arguments or keywords.
Defaults
Disabled
Command Modes
Global configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
The xns ub-emulation command enables Ungermann-Bass Net/One routing. This means that hello packets and routing updates on all XNS interfaces are sent out in Ungermann-Bass format.
Net/One is a distance-vector, or Bellman-Ford, protocol and is similar to standard XNS RIP. The major difference between the two protocols is in the metrics used. Standard XNS RIP uses a hop count to determine the best route to distant networks and maintains information only about hop counts. The Ungermann-Bass protocol uses a path-delay metric and maintains information about both hop counts and its own metrics.
Ungermann-Bass routers generate standard RIP updates by extracting the hop-count values from the Ungermann-Bass routing protocol. When configured in Ungermann-Bass emulation mode, routers participate in this protocol and behave (insofar as routing protocols are concerned) like Ungermann-Bass routers.
You can use the xns hear-rip command to configure the Cisco IOS software to listen to standard RIP updates when in Ungermann-Bass emulation mode. When Cisco routers in Ungermann-Bass emulation mode receives a RIP packet, each route in that packet is treated as though it had come from an Ungermann-Bass routing packet. The hop count used is the actual hop count from the RIP packet. The delay metric used is computed by assuming that each hop is the longest-delay link used by Ungermann-Bass, which is a 9.6-kbps serial link. Information from RIP packets is used in creating outgoing Ungermann-Bass updates, and vice versa.
This command is never written to nonvolatile configuration memory. Instead, the equivalent individual commands are written.These are an xns ub-emulation command for the router, and xns hear-rip, xns flood broadcast allnets, no xns flood broadcast net-zero, and xns flood specific allnets commands for all interfaces on which XNS is enabled. The xns ub-routing command does not modify the encapsulation used on Token Ring interfaces.
Older versions of Cisco IOS software implemented a restricted version of the Ungermann-Bass routing protocol, and in certain configurations could create routing instability and forwarding loops. Before using Releases 8.3 and earlier in Ungermann-Bass environments, consult the 8.3 documentation for information about these restrictions.
Examples
The following example enables Net/One routing:
xns routing xns ub-emulation interface tokenring 0 xns network 23 xns encapsulation ub
Related Commands
Receives RIP updates.
Command
Description
To set the XNS routing update timers, use the xns update-time command in interface configuration mode. To restore the default value, use the no form of this command.
xns update-time interval
Syntax Description
interval Interval, in seconds, at which XNS routing updates are sent. The minimum interval is 10 seconds, and the maximum is 2493644 seconds, which is about 29 days. The default is 30 seconds.
Defaults
30 seconds
Command Modes
Interface configuration
Command History
10.0 This command was introduced.
Release
Modification
Usage Guidelines
The xns update-time command sets the routing update timer on a per-interface basis. To display the current value, use the show xns route command.
Routers exchange information about routes by sending broadcast messages when they are started up and shut down, and periodically while they are running. The xns update-time command enables you modify the periodic update interval.
You can set RIP timers only in a configuration in which all routers are Cisco routers. The timers should be the same for all devices connected to the network.
The update value you choose affects the internal XNS timers as follows:
This command has no effect on the Ungermann-Bass routing protocol.
Examples
The following example sets the routing update time to 20 seconds:
interface ethernet 0 xns network 20 xns update-time 20
Related Commands
Displays the contents of the XNS routing table.
Command
Description
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Mar 16 21:24:28 PST 2000
Copyright 1989 - 2000©Cisco Systems Inc.