Nortel Networks 8000 User Manual

Page 98

Attention! The text in this document has been recognized automatically. To view the original document, you can use the "Original mode".

Advertising
background image

Nortel Secure Router 8000 Series

Configuration -WAN Access

Contents

5 Logical interface configuration.....................................................................................5-1

5.1 Introduction.................................................................................................................................................. 5-2

5.1.1 Sub-interface overview....................................................................................................................... 5-2

5.1.2 Virtual template and virtual access interface...................................................................................... 5-3

5.1.3 Virtual ethernet interface.................................................................................................................... 5-3

5.1.4 Loopback interface..............................................................................................................................5-4

5.1.5 Null interface.......................................................................................................................................5-4

5.2 Creating sub-interfaces.................................................................................................................................5-4

5.2.1 Establishing the configuration task..................................................................................................... 5-4

5.2.2 Creating FR sub-interfaces................................................................................................................. 5-5

5.2.3 Creating X.25 sub-interfaces...............................................................................................................5-6

5.2.4 Creating ATM sub-interfaces..............................................................................................................5-7

5.2.5 Checking the configuration.................................................................................................................5-7

5.3 Configuring the virtual template.................................................................................................................. 5-8

5.3.1 Establishing the configuration task..................................................................................................... 5-8

5.3.2 Creating a VT......................................................................................................................................5-9

5.3.3 Setting maximum number of links supported by a VT........................................................................ 5-9

5.3.4 Checking the configuration...............................................................................................................5-10

5.4 Configuring virtual ethernet interfaces...................................................................................................... 5-11

5.4.1 Establishing the configuration task................................................................................................... 5-11

5.4.2 Creating a VE interface.....................................................................................................................5-12

5.4.3 Configuring a MAC address for a VE interface............................................................................... 5-12

5.4.4 Checking the configuration...............................................................................................................5-13

5.5 Configuring a loopback interface...............................................................................................................5-13

5.5.1 Establishing the configuration task................................................................................................... 5-13

5.5.2 Creating a loopback interface and configuring its IP address............................................................ 5-14

5.5.3 Checking the configuration...............................................................................................................5-14

5.6 Configuring a null interface....................................................................................................................... 5-15

5.6.1 Establishing the configuration task................................................................................................... 5-15

5.6.2 Entering the null interface view........................................................................................................ 5-15

5.6.3 Checking the configuration...............................................................................................................5-16

5.7 Configuration examples............................................................................................................................. 5-16

Issue 5.3 (30 March 2009)

Nortel Networks Inc.

i

Advertising