8 Table
of
Contents
18.5
Enabling an Interface to Receive RIP ...........................................................................................152
18.6
Specifying the Send RIP Version ..................................................................................................152
18.7
Specifying the Receive RIP Version .............................................................................................153
18.8
Enabling RIP Learning...................................................................................................................153
18.9
Enabling an Interface to Receive RIP ...........................................................................................154
18.10
Enabling RIP Announcing.........................................................................................................154
18.11
Enabling RIP Auto Summarization..........................................................................................155
18.12
Specifying The Default Route Metric.......................................................................................155
18.13
Enabling RIP Split-Horizon Processing...................................................................................156
18.14
Enabling The Poison Reverse Algorithm ................................................................................157
18.15
Enabling Holding Down Aged Routes....................................................................................157
18.16
Displaying RIP Configuration of an IP Interface....................................................................158
18.17
Displaying Global RIP Information .........................................................................................158
19
Access Control List Configuration ......................................................................160
19.1
About Access Control Lists ...........................................................................................................160
19.1.1
What Access Lists Do .............................................................................................................160
19.1.2
Why You Should Configure Access Lists............................................................................160
19.1.3
When to Configure Access Lists ...........................................................................................161
19.1.4
Features of Access Control Lists ...........................................................................................161
19.2
Software Configuration Guide Release 2.10 Task List...............................................................162
19.3
Map Out the Goals of the Access Control List............................................................................162
19.4
Create an Access Control List Profile and Enter Configuration Mode ...................................162
19.5
Add a Filter Rule to the Current Access Control List Profile ...................................................163
19.6
Add an ICMP Filter Rule to the Current Access Control List Profile......................................164
19.7
Add a TCP, UDP or SCTP Filter Rule to the Current Access Control List Profile.................166
19.8
Bind and Unbind an Access Control List Profile to an IP Interface.........................................168
19.9
Display an Access Control List Profile ........................................................................................169
19.10
Debug an Access Control List Profile ......................................................................................169
19.11
Examples......................................................................................................................................171
19.11.1
Deny a Specific Subnet.......................................................................................................171
20
SNMP Configuration.............................................................................................172
20.1
Simple Network Management Protocol (SNMP) .......................................................................172
20.1.1
Background..............................................................................................................................172
20.1.2
SNMP Basic Components......................................................................................................172
20.1.3
SNMP Basic Commands ........................................................................................................173
20.1.4
SNMP Management Information Base (MIB) .....................................................................173
20.1.5
Network Management Framework......................................................................................173
20.2
Identification of the SmartNode 1000 and 2000 Series via SNMP ...........................................174
20.3
Warnings..........................................................................................................................................174
20.4
SNMP Tools.....................................................................................................................................174
20.5
SNMP Configuration Task List.....................................................................................................174
20.6
Setting Basic System Information.................................................................................................175
20.7
Setting Access Community Information .....................................................................................176
20.8
Setting Allowed Host Information...............................................................................................178
20.9
Specifying The Default SNMP Trap Target ................................................................................178
20.10
Displaying SNMP Related Information...................................................................................179
20.11
Using the AdventNet SNMP Utilities......................................................................................180
20.11.1
Using the MibBrowser .......................................................................................................180
20.11.2
Using the TrapViewer........................................................................................................181
20.12
Standard SNMP Version 1 Traps..............................................................................................183
20.13
SNMP Interface Traps................................................................................................................184
21
SNTP Client Configuration..................................................................................186
21.1
Introduction.....................................................................................................................................186
21.2
Software Configuration Guide Release 2.10 Task List...............................................................186
21.3
Selecting SNTP Time Servers ........................................................................................................186
Software Configuration Guide Release 2.10, Revision 1.00
Summary of Contents for SmartWare Release 2.10
Page 2: ...2 Legal Notice Software Configuration Guide Release 2 10 Revision 1 00...
Page 15: ...Terms and Definitions 15 Software Configuration Guide Release 2 10 Revision 1 00...
Page 218: ...218 PPP Configuration no shutdown Software Configuration Guide Release 2 10 Revision 1 00...
Page 272: ...272 Tone Configuration Software Configuration Guide Release 2 10 Revision 1 00...