Sign In
Upload
Manuals
Brands
Nokia Manuals
Cell Phone
Network Voyager
Nokia Network Voyager Manuals
Manuals and User Guides for Nokia Network Voyager. We have
2
Nokia Network Voyager manuals available for free PDF download: Reference Manual
Nokia Network Voyager Reference Manual (700 pages)
Brand:
Nokia
| Category:
Cell Phone
| Size: 3.73 MB
Table of Contents
Voyager Reference Guide
1
Table of Contents
5
Overview
9
Interface Overview
10
Configuring Network Devices
11
Configuring Ip Addresses
12
Configuring Tunnel Interfaces
16
Routing Overview
17
Routing Protocols
18
Redistributing Routes with Ospf
23
How to Use Voyager
25
Command-Line Utility Files
31
Monitoring and Configuring System Resources
33
Dynamic Monitoring
34
Monitoring System Health
45
Monitoring System Logs
45
Static Monitoring
48
Displaying the Kernel Forwarding Table
50
Displaying Route Settings
50
Displaying Interface Settings
50
Iclid Commands
52
Configuring Interfaces
65
Ethernet Interfaces
69
Gigabit Ethernet Interfaces
75
Virtual LAN Interfaces
80
FDDI Interfaces
84
ISDN Interfaces
89
Modifying a Rule
104
Isdn Network Configuration Example
107
Isdn Troubleshooting
113
Token Ring Interfaces
121
Token Ring Example
125
Point-To-Point Link over ATM
128
Atm Example
133
IP over ATM (Ipoa)
136
Ipoa Example
141
Serial (V.35 and X.21) Interfaces
143
Serial Interface Example
149
T1(With Built-In CSU/DSU) Interfaces
152
T1 Interface Example
161
E1 (with Built-In CSU/DSU) Interfaces
164
HSSI Interfaces
174
Unnumbered Interfaces
180
Cisco HDLC Protocol
188
Point-To-Point Protocol
189
Frame Relay Protocol
192
Loopback Interfaces
197
GRE Tunnels
198
Gre Tunnel Example
203
Ha Gre Tunnel Example
205
DVMRP Tunnels
209
Dvmrp Tunnel Example
211
ARP Table Entries
214
Configuring ARP for the ATM Interface
217
Voyager Reference Guide
217
Configuring Routing
221
OSPF (Open Shortest Path First)
224
Configuring Ospf
226
RIP (Routing Information Protocol)
230
Configuring Rip
233
Configuring Rip Timers
234
Rip Example
236
Protocol-Independent Multicast (PIM)
237
Disabling Pim
239
Debugging Pim
251
IGRP (Inter-Gateway Routing Protocol)
254
Generation of Exterior Routes
258
Aliased Interfaces
258
Igrp Aggregation
258
Configuring Igrp
259
DVMRP (Distance Vector Multicast Routing Protocol)
262
Configuring Dvmrp
263
IGMP (Internet Group Management Protocol)
264
Configuring Igmp
266
Static Routes
267
Adding and Managing Static Routes Example
272
Backup Static Routes
274
Route Aggregation
275
Route Aggregation Example
277
Route Rank
278
Rank Assignments
279
Routing Protocol Rank Example
280
BGP (Border Gateway Protocol)
281
Bgp Path Attributes
283
Bgp Interactions with Igps
285
Inbound Bgp Route Filters
286
Route Reflection
289
Ebgp Multihop Support
292
Route Dampening
293
Tcp Md5 Authentication
293
Bgp Memory Requirements
294
Bgp Neighbors Example
296
Path Filtering Based on Communities Example
300
Changing the Local Preference Value Example
305
Bgp Confederation Example
308
Route Reflector Example
311
Bgp Community Example
314
Adjusting Bgp Timers Example
321
Tcp Md5 Authentication Example
322
Bgp Route Dampening Example
323
Bgp Path Selection
325
Route Redistribution
325
Redistributing Ospf to Bgp Example
332
Inbound Route Filters
333
Bgp Route Inbound Policy Example
335
Bgp as Path Filtering Example
338
Configuring Traffic Management
339
Configuring Access Control List Rules
340
Configuring Clustering in IPSO
341
Example Cluster
342
Cluster Management
344
Cluster Terminology
345
Clustering Modes
349
Considerations for Clustering
350
Configuration Overview
355
Creating a Cluster
356
Configuring an Interface
357
Selecting the Cluster Mode
357
Configuring Firewall Monitoring
359
Making the Cluster Active
367
Adding a Node to a Cluster
368
Recommended Procedure
369
Joining a System to a Cluster
370
Managing a Cluster
371
Using Cluster Voyager
372
Synchronizing the Time on Cluster Nodes
380
Configuring Ntp
381
Configuring the Cluster in Voyager
389
Configuring the Internal and External Routers
391
Configuring Access Control Lists (ACL)
399
Packet Filtering Description
399
Traffic Queuing Description
400
Traffic Shaping Description
400
Configuring Access Control List Rules
404
Configuring Aggregation Classes
409
Configuring Queue Classes
412
Configuring ATM Qos
416
Configuring Common Open Policy Server
420
Configuring a Cops Client ID and Policy Decision Point
421
Configuring Security Parameters for a Cops Client ID
422
Assigning Roles to Specific Interfaces
423
Activating and Deactivating the Cops Client
424
Deleting a Client ID
425
Configuring Transparent Mode
432
Monitoring Transparent Mode Groups
445
Configuring Router Services
447
Bootp (Bootstrap Protocol) Relay
449
IP Broadcast Helper
451
Router Discovery
454
VRRP (Virtual Router Redundancy Protocol)
457
Authentication Methods
459
Setting a Virtual Mac Address for a Virtual Router
471
Ntp
484
Configuring System Functions
489
DNS Hostname Procedures
491
Configuring Disk Mirroring
492
Mail Relay
494
Configuring Mail Relay
495
Sending Mail
495
Failure Notification
496
Time and Date Procedures
497
Static Host Procedures
497
System Logging Procedures
498
Hostname Procedure
502
Managing Configuration Sets
503
Backing up and Restoring Files
505
Restoring Files from Locally Stored Backup Files
508
Scheduling Jobs through the Crontab File
512
Managing IPSO Images
513
Installing New IPSO Images
515
Managing Packages
518
Advanced System Tuning
521
Configuring Security and Access
523
Password Procedures
526
Group Procedures
530
Network Access Procedures
531
Services
541
Secure Shell (SSH)
543
Configuring Secure Shell Authorized Keys
548
Changing Secure Shell Key Pairs
549
Managing User Rsa and Dsa Identities
551
Tunneling Http over Ssh
552
Secure Socket Layer (SSL)
553
Authentication, Authorization, and Accounting (AAA)
558
Configuring Radius
567
Configuring Tacacs
570
Deleting an Aaa Authentication Server Configuration
573
Changing an Aaa Configuration
573
Deleting an Aaa Configuration
579
Cryptographic Acceleration
580
Ipsec Tunnels
581
Monitoring Cryptographic Acceleration
583
Ipsec Tunnels
584
Using Pki
589
Ipsec Implementation in Ipso
590
Ipsec Parameters
592
Creating an Ipsec Policy
594
Creating an Ipsec Tunnel Rule
602
Transport Rule
604
Ipsec Tunnel Rule Example
606
Ipsec Transport Rule Example
609
Removing an Ipsec Tunnel
612
Voyager Session Management
613
Configuring Session Timeouts
616
Configuring Fault Management
619
Fault Management Configuration
620
Configuring SNMP
625
Overview
626
Configuring SNMP V1 and V2
632
Interpreting SNMP Messages
641
SNMP V3
645
Configuring Asset Management
649
Asset Management Summary
649
Configuring Ipv6
651
Overview
652
Interfaces
654
Ipv6 and Ipv4 Compatibility
655
Configuring Ipv6 to Ipv4
656
Configuring Ipv6 over Ipv4
657
Configuring Ipv4 in Ipv6 Tunnels
658
Routing Configuration
660
Creating Ipv6 Aggregate Routes
661
Creating Redistributed Routes
661
Router Discovery
663
Traffic Management
665
Security and Access Configuration
666
Voyager Reference Guide
666
IPSO Process Management
669
Glossary
673
Index
687
Advertisement
Nokia Network Voyager Reference Manual (510 pages)
Nokia Network Voyager Reference Guide
Brand:
Nokia
| Category:
Software
| Size: 2.89 MB
Table of Contents
Table of Contents
5
About the Nokia Network Voyager Reference Guide
19
Conventions this Guide Uses
21
Notices
21
Text Conventions
21
Menu Items
22
Related Documentation
22
1 About Network Voyager
23
Software Overview
23
Logging in to Network Voyager
24
Logging off
24
Obtaining a Configuration Lock
25
Navigating in Network Voyager
26
Reloading Pages
26
Accessing Documentation and Help
26
Viewing Hardware and Software Information for Your System
28
2 Configuring Interfaces
29
Interface Overview
29
IP2250 Management Ports
30
Configuring Network Devices
30
Configuring IP Addresses
31
Interface Status
32
Configuring Tunnel Interfaces
33
Ethernet Interfaces
34
Configuring Ethernet Interfaces
34
Link Aggregation
35
Managing Link Aggregation Using SNMP
36
Configuring Switches for Link Aggregation
36
Static Link Aggregation
37
Link Aggregation on the IP2250
37
Configuring Link Aggregation
39
Gigabit Ethernet Interfaces
41
Point-To-Point over Ethernet
43
Configuring Pppoe
43
Configuring MSS Clamping
46
Virtual LAN Interfaces
46
FDDI Interfaces
49
ISDN Interfaces
51
Configuring Calling Line-Identification Screening
56
Dial-On-Demand Routing (DDR) Lists
58
ISDN Network Configuration Example
61
ISDN Troubleshooting
65
Token Ring Interfaces
71
Token Ring Example
73
Point-To-Point Link over ATM
75
ATM Example
78
IP over ATM (Ipoa)
79
Ipoa Example
82
Serial (V.35 and X.21) Interfaces
83
Serial Interface Example
87
T1(With Built-In CSU/DSU) Interfaces
88
T1 Interface Example
94
E1 (with Built-In CSU/DSU) Interfaces
96
HSSI Interfaces
103
Unnumbered Interfaces
107
Configuring Unnumbered Interfaces
107
Configuring OSPF over Unnumbered Interface
110
OSPF over Unnumbered Interfaces Using Virtual Links
110
Cisco HDLC Protocol
111
Point-To-Point Protocol
112
Frame Relay Protocol
114
Loopback Interfaces
117
GRE Tunnels
118
Configuring GRE Tunnels
118
GRE Tunnel Example
121
High Availability GRE Tunnels
122
HA GRE Tunnel Example
122
DVMRP Tunnels
125
DVMRP Tunnel Example
126
ARP Table Entries
128
Configuring ARP for ATM Interfaces
130
Transparent Mode
132
Limitations
132
Transparent Mode Processing Details
133
Configuring Transparent Mode in VPN Environments
134
Example of Transparent Mode
135
Configuring Transparent Mode
136
Monitoring Transparent Mode Groups
139
Transparent Mode and Check Point NGX
139
Virtual Tunnel Interfaces (FWVPN) for Route-Based VPN
140
Creating Virtual Tunnel Interfaces
142
3 Configuring System Functions
145
Configuring DHCP
145
Configuring DHCP Client Interfaces
146
DHCP Client Configuration
146
Configuring the DHCP Server
147
DHCP Server Configuration
148
Changing DHCP Service
149
Adding DHCP Address Pools
149
Enabling or Disabling DHCP Address Pools
150
Assigning a Fixed-IP Address to a Client
150
Creating DHCP Client Templates
151
Configuring Dynamic Domain Name System Service
153
Configuring the Domain Name Service
154
Configuring Disk Mirroring
154
Using an Optional Disk (Flash-Based Systems Only)
155
Mail Relay
156
System Failure Notification
157
Configuring Mail Relay
157
Sending Mail
158
Setting the System Time
158
Configuring Host Addresses
159
Configuring System Logging
160
Configuring Logging on Disk-Based Systems
160
Configuring Logging on Flash-Based Systems
161
Configuring Audit Logs
163
Remote Core Dump Server on Flash-Based Systems
165
Changing the Hostname
166
Managing Configuration Sets
166
Scheduling Jobs
167
Backing up and Restoring Files
168
Creating Backup Files
169
Transferring Backup Files
170
Restoring Files from Locally Stored Backup Files
172
Managing Nokia IPSO Images
173
Changing Current Image
173
Deleting Images
173
Installing New Images
174
Testing a New Image
175
Upgrading Nokia IPSO Images for a Cluster
176
Downgrading Nokia IPSO Images
176
Configuring Monitor Reports
177
Managing Packages
178
Installing and Enabling Packages
178
Advanced System Tuning
180
Tuning the TCP/IP Stack
180
Router Alert IP Option
181
4 Virtual Router Redundancy Protocol (VRRP)
183
VRRP Overview
183
How VRRP Works
183
Understanding Monitored-Circuit VRRP
186
Configuring VRRP
186
Selecting Configuration Parameters
187
Before You Begin
191
Configuring Monitored-Circuit VRRP
192
Configuring Vrrpv2
196
Configuring Check Point NGX for VRRP
197
Configuring VRRP Rules for Check Point NGX
199
Link Aggregation (IP2250 Systems Only)
201
Monitoring VRRP
201
Monitoring the Firewall State
203
Troubleshooting VRRP
203
General Configuration Considerations
203
Firewall Policies
204
Access Control Lists
204
Switched Environments
205
5 Configuring Clustering
207
IP Clustering Description
207
Using Flash-Based Platforms
207
Example Cluster
208
Cluster Management
209
Cluster Terminology
210
Clustering Modes
212
Considerations for Clustering
214
If You Do Not Use a Dedicated Primary Cluster Protocol Network
217
Upgrading IPSO in a Cluster
217
For All Upgrades
218
Upgrading from IPSO 3.7 or Later
218
Upgrading from IPSO 3.6
218
Creating and Configuring a Cluster
220
Configuration Overview
220
Creating a Cluster
220
Selecting the Cluster Mode
221
Configuring the Work Assignment Method
221
Configuring an Interface
222
Configuring Firewall Monitoring
223
Supporting Non-Check Point Gateways and Clients
223
Configuring Join-Time Shared Features
226
Making the Cluster Active
229
Adding a Node to a Cluster
229
Recommended Procedure
230
Joining a System to a Cluster
231
Managing a Cluster
231
Using Cluster Voyager
232
Synchronizing the Time on Cluster Nodes
239
Configuring Ntp
240
Configuring NGX for Clustering
241
Clustering Example (Three Nodes)
243
Configuring the Cluster in Voyager
244
Configuring the Internal and External Routers
245
Clustering Example with Non-Check Point VPN
246
6 Configuring SNMP
249
SNMP Overview
249
SNMP Proxy Support for Check Point MIB
252
Using the Check Point MIB
253
Using Cpsnmp_Start
253
Enabling SNMP and Selecting the Version
254
Configuring the System for SNMP
255
Setting an Agent Address
255
Configuring Traps
256
Interpreting Error Messages
260
Configuring Snmpv3
262
Request Messages
263
Managing SNMP Users
263
7 Configuring Ipv6
267
Ipv6 Overview
267
Interfaces
268
Ipv6 and Ipv4 Compatibility
270
Configuring Ipv6 in Ipv4 Tunnels
270
Configuring Ipv6 to Ipv4
271
Configuring Ipv6 over Ipv4
271
Configuring Ipv4 in Ipv6 Tunnels
272
Configuring an Ipv6 Default or Static Route
272
Routing Configuration
273
Configuring Ospfv3
273
Configuring Ripng
273
Creating Ipv6 Aggregate Routes
273
Creating Redistributed Routes
274
Router Discovery
275
Configuring Icmpv6 Router Discovery
275
VRRP for Ipv6
277
Configuring VRRP for Ipv6
277
Using Vrrpv3
278
Creating a Virtual Router to Back up Another VRRP Router Addresses Using Vrrpv3
278
Monitoring the Firewall State
279
Setting a Virtual MAC Address for a Virtual Router
280
Changing the IP Address List of a Virtual Router in Vrrpv3
281
Creating a Virtual Router in Monitored Circuit Mode for Ipv6
282
Setting Interface Dependencies for a Monitored Circuit Virtual Router for Ipv6
283
Changing the List of Addresses in a Monitored Circuit Virtual Router for Ipv6
284
Traffic Management
284
Security and Access Configuration
285
8 Managing Security and Access
287
Managing Passwords
287
Managing User Accounts
288
Adding and Deleting Users
289
Managing and Using S/Key
290
Managing Groups
292
Role-Based Administration
293
Managing Roles
294
Assigning Roles and Access Mechanisms to Users
295
Creating Cluster Administrator Users
296
Configuring Network Access and Services
297
Configuring a Modem on COM2, COM3, or COM4
298
Configuring Nokia Network Voyager Access
300
Configuring Basic Nokia Network Voyager Options
301
Generating and Installing SSL/TLS Certificates
302
Secure Shell (SSH)
304
Initial SSH Configuration
305
Configuring Advanced Options for SSH
306
Configuring Secure Shell Authorized Keys
308
Changing Secure Shell Key Pairs
309
Managing User RSA and DSA Identities
310
Tunneling HTTP over SSH
311
Network Voyager Session Management
311
Enabling Enabling or Disabling Session Management
312
Configuring Session Timeouts
312
Authentication, Authorization, and Accounting (AAA)
313
Creating an AAA Configuration
313
Configuring RADIUS
319
Configuring TACACS
321
Deleting an AAA Authentication Server Configuration
322
Changing an AAA Configuration
323
Deleting an AAA Configuration
327
Encryption Acceleration
327
Enabling Encryption Accelerator Cards
328
Monitoring Cryptographic Acceleration
328
Ipsec Tunnels (IPSO Implementation)
328
Using PKI
332
Ipsec Implementation in IPSO
332
Ipsec Parameters
334
Creating an Ipsec Policy
335
Creating an Ipsec Tunnel Rule
341
Transport Rule
342
Ipsec Tunnel Rule Example
344
Ipsec Transport Rule Example
346
Changing the Local/Remote Address or Local/Remote Endpoint of an Ipsec Tunnel
348
Removing an Ipsec Tunnel
348
Miscellaneous Security Settings
349
9 Configuring Routing
351
Routing Overview
351
Routing Protocols
351
Route Maps
353
Ospf
353
Types of Areas
354
Area Border Routers
355
High Availability Support for OSPF
355
Configuring OSPF
356
Rip
365
Rip 2
365
Rip 1
366
Virtual IP Address Support for VRRP
366
Configuring RIP
367
Configuring RIP Timers
368
Configuring Auto-Summarization
369
RIP Example
369
Pim
370
Configuring Virtual IP Support for VRRP
371
PIM Support for IP Clustering
371
Configuring Dense-Mode PIM
373
Disabling PIM
374
Setting Advanced Options for Dense-Mode PIM (Optional)
375
Configuring Sparse-Mode PIM
376
Configuring High-Availability Mode
377
Configuring this Router as a Candidate Bootstrap and Candidate Rendezvous Point
379
Configuring a PIM-SM Static Rendezvous Point
380
Setting Advanced Options for Sparse-Mode PIM (Optional)
381
Debugging PIM
383
Igrp
385
Generation of Exterior Routes
387
Aliased Interfaces
388
IGRP Aggregation
388
Configuring IGRP
388
Dvmrp
390
Configuring DVMRP
391
Configuring DVMRP Timers
391
Igmp
392
Configuring IGMP
393
Static Routes
394
Adding and Managing Static Routes Example
397
Backup Static Routes
398
Route Aggregation
398
Route Aggregation Example
400
Route Rank
401
Rank Assignments
401
Routing Protocol Rank Example
402
Bgp
403
Support for BGP-4
403
BGP Sessions (Internal and External)
404
BGP Path Attributes
404
BGP Multi-Exit Discriminator
406
BGP Interactions with Igps
406
Inbound BGP Route Filters
407
Redistributing Routes to BGP
407
Communities
407
Route Reflection
408
Confederations
409
EBGP Multihop Support
410
Route Dampening
411
TCP MD5 Authentication
411
BGP Support for Virtual IP for VRRP
412
BGP Support for IP Clustering
413
BGP Memory Requirements
413
BGP Neighbors Example
415
Path Filtering Based on Communities Example
418
BGP Multi Exit Discriminator Example
419
Changing the Local Preference Value Example
421
BGP Confederation Example
423
Route Reflector Example
426
BGP Community Example
428
EBGP Load Balancing Example: Scenario #1
430
EBGP Load Balancing Example: Scenario #2
432
Adjusting BGP Timers Example
433
TCP MD5 Authentication Example
434
BGP Route Dampening Example
435
BGP Path Selection
436
BGP-4++ Example
436
Route Redistribution
438
Redistributing Routes to BGP
439
Redistributing Routes to RIP and IGRP
440
Redistributing OSPF to BGP Example
443
Redistributing Routes with OSPF
444
Inbound Route Filters
445
BGP Route Inbound Policy Example
446
BGP as Path Filtering Example
448
10 Configuring Traffic Management
449
Traffic Management Overview
449
Packet Filtering Description
449
Traffic Shaping Description
449
Traffic Queuing Description
450
Configuring Access Control Lists
450
Configuring ACL Rules
452
Modifying a Rule
453
Configuring Aggregation Classes
455
Configuring Queue Classes
457
Configuring ATM Qos
459
Configuring Common Open Policy Server
461
Configuring a COPS Client ID and Policy Decision Point
462
Configuring Security Parameters for a COPS Client ID
462
Assigning Roles to Specific Interfaces
463
Activating and Deactivating the COPS Client
464
Changing the Client ID Associated with Specific Diffserv Configuration
464
Deleting a Client ID
464
Example: Rate Shaping
465
Example: Expedited Forwarding
466
11 Configuring Router Services
469
BOOTP/DHCP Relay
469
Configuring BOOTP/DHCP Relay
470
IP Broadcast Helper
471
Router Discovery
472
Router Discovery Overview
473
Configuring Router Discovery
473
Network Time Protocol (NTP)
475
Configuring NTP
476
12 Monitoring System Configuration and Hardware
479
Viewing System Utilization Statistics
479
CPU-Memory Live Utilization
479
Disk and Swap Space
480
Monitoring Process Utilization
480
IPSO Process Management
481
Generating Monitor Reports
482
Monitoring System Health
483
Monitoring System Logs
484
Viewing Cluster Status and Members
485
Viewing Routing Protocol Information
486
Displaying the Kernel Forwarding Table
486
Displaying Route Settings
486
Displaying Interface Settings
487
Hardware Monitoring
487
Using the Iclid Tool
488
Iclid Commands
488
Preventing Full Log Buffers and Related Console Messages
494
Index
497
Advertisement
Related Products
Nokia V-6016i
Nokia V1.04
Nokia PCS VI-3155I
Nokia Verizon
Nokia Verizon Lumia Icon
Nokia 8 V 5G UW
Nokia VCR 3704
Nokia VCR 3704 EE
Nokia VCR 3704 VPS
Nokia
Nokia Categories
Cell Phone
Headsets
Transceiver
Telephone
Handhelds
More Nokia Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL