
11
IPLink Software Configuration Guide
Table of Contents
Deleting static IP routes
................................................................................................................................197
Displaying IP route information
...................................................................................................................198
Examples
.............................................................................................................................................................199
Basic static IP routing example
......................................................................................................................199
Changing the default UDP port range for RTP and RTCP
.................................................................................200
18
RIP configuration
........................................................................................................................................201
Introduction
........................................................................................................................................................202
Routing protocol
.................................................................................................................................................202
RIP configuration task list
...................................................................................................................................203
Enabling send RIP
........................................................................................................................................203
Enabling an interface to receive RIP
..............................................................................................................204
Specifying the send RIP version
....................................................................................................................204
Specifying the receive RIP version
.................................................................................................................205
Enabling RIP learning
...................................................................................................................................205
Enabling an interface to receive RIP
..............................................................................................................206
Enabling RIP announcing
.............................................................................................................................206
Enabling RIP auto summarization
................................................................................................................207
Specifying the default route metric
................................................................................................................207
Enabling RIP split-horizon processing
..........................................................................................................208
Enabling the poison reverse algorithm
...........................................................................................................208
Enabling holding down aged routes
..............................................................................................................209
Displaying RIP configuration of an IP interface
............................................................................................209
Displaying global RIP information
...............................................................................................................210
19
Access control list configuration
...................................................................................................................211
Introduction
........................................................................................................................................................212
About access control lists
.....................................................................................................................................212
What access lists do
.......................................................................................................................................212
Why you should configure access lists
...........................................................................................................212
When to configure access lists
.......................................................................................................................213
Features of access control lists
.......................................................................................................................213
Access control list configuration task list
..............................................................................................................214
Mapping out the goals of the access control list
.............................................................................................214
Creating an access control list profile and enter configuration mode
.............................................................215
Adding a filter rule to the current access control list profile
...........................................................................215
Adding an ICMP filter rule to the current access control list profile
..............................................................217
Adding a TCP, UDP or SCTP filter rule to the current access control list profile
.........................................219
Binding and unbinding an access control list profile to an IP interface
..........................................................221
Displaying an access control list profile
.........................................................................................................222
Debugging an access control list profile
.........................................................................................................222
Examples
.............................................................................................................................................................224
Denying a specific subnet
..............................................................................................................................224
20
SNMP configuration
....................................................................................................................................225
Introduction
........................................................................................................................................................226