cx25 PDF
cx25 PDF
cx25 PDF
CHAPTER 13
CISCO CONFIDENTIAL
Note The ITU-T carries out the functions of the former Consultative Committee for International
Telegraph and Telephone (CCITT). The 1988 X.25 standard was the last published as a CCITT Recommendation. The first ITU-T Recommendation is the 1993 revision.
In addition to providing remote terminal access, our X.25 software provides transport for LAN protocolsIP, DECnet, XNS, ISO CLNS, AppleTalk, Novell IPX, Banyan VINES, and Apollo Domainand bridging. For information about these protocols, refer to the specific protocol chapters in the this manual.
FINAL DRAFT
LAPB Configuration Task List
CISCO CONFIDENTIAL
Briefly, the Cisco Systems X.25 software provides the following capabilities:
LAPB datagram transportLAPB is a protocol that operates at Level 2 (the data link layer) of the OSI reference model. It offers a reliable connection service for exchanging data (in units called frames) with one other host. The LAPB connection is configured to carry a single protocol or multiple protocols. Protocol datagrams (IP, DECnet, AppleTalk, and so forth) are carried over a reliable LAPB connection, or datagrams of several of these protocols are encapsulated in a proprietary protocol and carried over a LAPB connection. Cisco also implements transparent bridging over multiprotocol LAPB encapsulations on serial interfaces. X.25 datagram transportX.25 can establish connections with multiple hosts; these connections are called virtual circuits. Protocol datagrams (IP, DECnet, AppleTalk, and so forth) are encapsulated inside packets on an X.25 virtual circuit. Mappings between a hosts X.25 address and its datagram protocol addresses allow these datagrams to be routed through an X.25 network, thereby allowing an X.25 public data network (PDN) to transport LAN protocols. X.25 switchX.25 calls can be routed based on their X.25 addresses either between serial interfaces on the same router (local switching) or across an IP network to another router (X.25-over-TCP or XOT, previously called remote switching or tunneling). XOT encapsulates the X.25 packet level inside a TCP connection, allowing X.25 equipment to be connected via a TCP/IP-based network. Ciscos X.25 switching features provide a convenient way to connect X.25 equipment, but do not provide the specialized features and capabilities of an X.25 Public Data Network (PDN). PADUser sessions can be carried across an X.25 network using the Packet Assembly and Disassembly (PAD) protocols defined by the ITU-T Recommendations X.3 and X.29. QLLCThe router can use the QLLC protocol to carry SNA traffic through an X.25 network. Connection-Mode Network Service (CMNS)CMNS is a mechanism that uses OSI-based NSAP addresses to extend local X.25 switching to nonserial media (for example, Ethernet, FDDI, and Token Ring). This implementation provides the X.25 PLP over LLC2 to allow connections over nonserial interfaces. Ciscos CMNS implementation supports services defined in ISO Standards 8208 (packet level) and 8802-2 (frame level). DDN and BFE X.25The DDN-specified Standard Service is supported. The DDN X.25 Standard Service is the required protocol for use with DDN Packet-Switched Nodes (PSNs). The Defense Communications Agency (DCA) has certified Cisco Systems DDN X.25 Standard Service implementation for attachment to the Defense Data Network. Ciscos DDN implementation also includes Blacker Front End and Blacker Emergency Mode operation. X.25 MIBSubsets of the specifications in SNMP MIB Extension for X.25 LAPB (RFC 1381) and SNMP MIB Extension for the X.25 Packet Layer (RFC 1382) are supported. The LAPB XID Table X.25 Cleared Circuit Table, and X.25 Call Parameter Table are not implemented. All values are read-only. To use the X.25 MIB, refer to the Cisco Management Information Base (MIB) User Quick Reference publication, or the RFCs.
Our X.25 implementation does not support fast switching. Reference information about X.25 facility handling by the capabilities listed above is found in the X.25 Facility Handling section before the examples at the end of this chapter.
FINAL DRAFT
CISCO CONFIDENTIAL
Configure a LAPB Datagram Transport
The LAPB standards distinguish between two types of hosts: data terminal equipment (DTE), and data circuit-terminating equipment (DCE). At Level 2, or the data link layer in the OSI model, LAPB allows for orderly and reliable exchange of data between a DTE and a DCE. A router using LAPB encapsulation can act as a DTE or DCE device at the protocol level, which is distinct from the hardware DTE or DCE identity. Using LAPB under noisy conditions can result in greater throughput than HDLC encapsulation. When LAPB detects a missing frame, the router retransmits the frame instead of waiting for the higher layers to recover the lost information. This behavior is good only if the host timers are relatively slow. In the case of quickly expiring host timers, however, you will discover that LAPB is spending much of its time transmitting host retransmissions. If the line is not noisy, the lower overhead of HDLC encapsulation is more efficient than LAPB. When using long delay satellite links, for example, the lock-step behavior of LAPB makes HDLC encapsulation the better choice. To configure LAPB, complete the tasks in the following sections. The tasks in the first section are required; the remaining are optional.
Configure a LAPB Datagram Transport Modify LAPB Protocol Parameters Configure LAPB Priority and Custom Queuing Configure Transparent Bridging over Multiprotocol LAPB Monitor and Maintain LAPB and X.25
1. This command is documented in the Interface Commands chapter in the Router Products Command Reference publication.
To select an encapsulation and the protocol if using a single protocol, or to select the multiple protocol operation, perform one or more of the following tasks in interface configuration mode:
Task Enable encapsulation of a single protocol on the line using DCE operation. Enable encapsulation of a single protocol on the line using DTE operation. Enable use of multiple protocols on the line using DCE operation. Enable use of multiple protocols on the line using DTE operation. Command encapsulation lapb dce [protocol]1 encapsulation lapb [dte] [protocol]1 encapsulation lapb dce multi encapsulation lapb [dte] multi2, 3
1. Single protocol LAPB defaults to IP encapsulation. 2. Multi-LAPB does not support SRB bridging or TCP header compression, but does support transparent bridging. 3. Only protocols supported by a single protocol encapsulation are supported by multiprotocol LAPB encapsulation.
FINAL DRAFT
Modify LAPB Protocol Parameters
CISCO CONFIDENTIAL
For an example of configuring LAPB DCE operation, see the section Typical LAPB Configuration Example later in this chapter.
Table 13-1
LAPB Parameters Command lapb modulo modulus lapb k window-size lapb n1 bits Values or Ranges 8 or 128 1 (modulo minus 1) frames Bits (must be a multiple of 8) Default 8 7 Based on hardware MTU and protocol overhead 20 3000 0 (disabled) 0 (disabled)
Task (LAPB Parameter) Set the modulo. Set the window size (k). Set maximum bits per frame (N1).
Set count for sending frames (N2). Set the retransmission timer (T1). Set the hardware outage period. Set the idle link period (T4).
The LAPB modulo determines the operating mode. Modulo 8 (basic mode) is widely available, because it is required for all standard LAPB implementations and is sufficient for most links. Modulo 128 (extended mode) can achieve greater throughput on high-speed links that have a low error rate (some satellite links, for example) by increasing the number of frames that can be transmitted before waiting for acknowledgment (as configured by the LAPB window parameter, k). By its design, LAPBs k parameter can be at most one less than the operating modulo. Modulo 8 links can typically send seven frames before an acknowledgment must be received; modulo 128 links can set k to a value as large as 127. By default, LAPB links use the basic mode with a window of 7. When connecting to an X.25 network, use the N1 parameter value set by the network administrator. This value is the maximum number of bits in a LAPB frame, which determines the maximum size of an X.25 packet. When using LAPB over leased lines, the N1 parameter should be eight times the hardware maximum transmission unit (MTU) size plus any protocol overhead. The LAPB N1 range is dynamically calculated by the Cisco IOS software whenever an MTU change, an L2/L3 modulo change, or a compression change occurs on a LAPB interface.
Caution The LAPB N1 parameter provides little benefit beyond the interface MTU, and can easily
cause link failures if misconfigured. Cisco recommends that this parameter be left at its default value.
FINAL DRAFT
CISCO CONFIDENTIAL
Configure LAPB Priority and Custom Queuing
The transmit counter (N2) is the number of unsuccessful transmit attempts will be made before the link is declared down. The retransmission timer (T1) determines how long a transmitted frame can remain unacknowledged before the router polls for an acknowledgment. For X.25 networks, the router retransmission timer setting should match that of the network. For leased-line circuits, the T1 timer setting is critical because the design of LAPB assumes that a frame has been lost if it is not acknowledged within period T1. The timer setting must be large enough to permit a maximum-sized frame to complete one round trip on the link. If the timer setting is too small, the router will poll before the acknowledgment frame can return, which may result in duplicated frames and severe protocol problems. If the timer setting is too large, the router waits longer than necessary before requesting an acknowledgment, which reduces bandwidth. The LAPB standards define a timer to detect unsignaled link failures (T4). The T4 timer is reset every time a frame is received from the partner on the link. If the T4 timer expires, a Receiver Ready frame with the Poll bit set is sent to the partner, which is required to respond. If the partner does not respond, the standard polling mechanism is used to determine whether the link is down. The period of T4 must be greater than the period of T1. Another LAPB timer function allows brief hardware failures, while the protocol is up, without requiring a protocol reset. If a brief hardware outage occurs, the link will continue uninterrupted if the outage is cured before the specified hardware outage period expires. For an example of configuring the LAPB T1 timer, see the section Typical LAPB Configuration Example later in this chapter.
custom group to the interface, as described in the Managing the System chapter.
2 Perform the standard LAPB encapsulation tasks, as specified in the Configure a LAPB
FINAL DRAFT
Configure Transparent Bridging over Multiprotocol LAPB
CISCO CONFIDENTIAL
Note The lapb hold-queue command is no longer supported, but the same functionality is
1. This command is documented in the Interface Commands chapter of the Router Products Command Reference publication. 2. This command is documented in the IP Commands chapter of the Router Products Command Reference publication. 3. This command is documented in the Transparent Bridging Commands chapter of the Router Products Command Reference publication.
Note This feature requires use of the encapsulation lapb multi command. You cannot use the
encapsulation lapb protocol command with a bridge keyword to configure this feature.
For an example of configuring the transparent bridging over multiprotocol LAPB, see the section Transparent Bridging for Multiprotocol LAPB Encapsulation Example later in this chapter.
Configure an X.25 Interface Configure Additional X.25 Interface Parameters Modify LAPB Protocol Parameters Configure an X.25 Datagram Transport Configure Additional X.25 Datagram Transport Features Configure X.25 Routing Configure Additional X.25 Routing Features Configure CMNS Routing
FINAL DRAFT
Configure DDN or BFE X.25 Monitor and Maintain LAPB and X.25
CISCO CONFIDENTIAL
Configure an X.25 Interface
All of these features can coexist on an X.25 interface. Default parameters are provided for X.25 operation; however, you can change the settings to meet the needs of your X.25 network or as defined by your X.25 service supplier. We also provide additional configuration settings to optimize your X.25 usage.
Note If you connect a router to an X.25 network, use the parameters set by the network
administrator for the connection; these parameters will typically be those described in the Configure an X.25 Interface and Modify LAPB Protocol Parameters sections. Also, note that the X.25 Level 2 parameters described earlier in this chapter affect X.25 Level 3 operations.
Set the X.25 Mode Set the Virtual Circuit Ranges Set the Packet Numbering Modulo Set the X.121 Address Set the Default Flow Control Values
These tasks describe the parameters that are essential for correct X.25 behavior. The first task is required. The others might be required or optional, depending on what the router is expected to do and on the X.25 network. You can also configure other, less common parameters, as specified in the Configure Additional X.25 Interface Parameters section.
Typically a public data network will require attachment as a DTE. (This is distinct from the hardware interface DTE/DCE identity.)
Configuring X.25 and LAPB 13-7
FINAL DRAFT
Configure an X.25 Interface
CISCO CONFIDENTIAL
The default mode of operation is DTE, and the default encapsulation method is Ciscos pre-IETF method. If either DDN or BFE operation is needed, it must be explicitly configured. For an example of configuring X.25 DTE operation, see the section Typical X.25 Configuration Example later in this chapter.
The incoming-only, two-way, and outgoing-only ranges define the virtual circuit numbers over which a switched virtual circuit (SVC) can be established by placing an X.25 call, much like a telephone network establishes a switched voice circuit when a call is placed. The rules about DCE and DTE devices initiating calls are as follows:
Only the DCE device can initiate a call in the incoming-only range. Only the DTE device can initiate a call in the outgoing-only range. Both the DCE device and the DTE device can initiate a call in the two-way range.
(The ITU-T Recommendation defines incoming and outgoing in relation to the DTE/DCE interface role; Ciscos documentation uses the more intuitive sense. Unless the ITU-T sense is explicitly referenced, a call received from the interface is an incoming call and a call sent out the interface is an outgoing call.) There is no difference in the operation of the SVCs except the restrictions on which a device can initiate a call. These ranges can be used to prevent one side from monopolizing the virtual circuits, which can be useful for X.25 interfaces with a small total number of SVCs available. Six X.25 parameters define the upper and lower limit of each of the three SVC ranges. A PVC must be assigned a number less than the numbers assigned to the SVC ranges. An SVC range is not allowed to overlap another range.
Note Because the X.25 protocol requires the DTE and DCE to have identical virtual circuit ranges, if the interface is up, changes to the virtual circuit range limits will be held until the X.25 protocol RESTARTs the packet service.
FINAL DRAFT
CISCO CONFIDENTIAL
Configure an X.25 Interface
Each of these parameters can range from 1 to 4095, inclusive. Note that the values for these parameters must be the same on both ends of an X.25 link. For connection to a public data network (PDN), these values must be set to the values assigned by the network. An SVC range is unused if its lower and upper limits are set to 0; other than this use for marking unused ranges, virtual circuit 0 is not available. For an example of configuring virtual circuit ranges, see the section Virtual Circuit Ranges Example later in this chapter.
Note Because the X.25 protocol requires the DTE and DCE to have identical modulos, if the
interface is up, changes to the modulo will be held until the X.25 protocol restarts the packet service.
The X.25 modulo and the LAPB modulo are distinct, and each serves a different purpose. LAPB modulo 128 (or extended mode) can be used to achieve higher throughput across the DTE/DCE interface; it only affects the local point of attachment. X.25 PLP modulo 128 can be used to achieve higher end-to-end throughput for virtual circuits by allowing more data packets to be in-transit through the X.25 network.
FINAL DRAFT
Configure an X.25 Interface
CISCO CONFIDENTIAL
To set the X.121 address, perform the following task in interface configuration mode:
Task Set the X.121 address. Command x25 address x.121-address
For an example of configuring the X.25 interface address, see the section Typical X.25 Configuration Example later in this chapter.
Note Because the X.25 protocol requires the DTE and DCE to have identical default maximum packet sizes and default window sizes, changes made to the window and packet sizes when the interface is up will be held until the X.25 protocol RESTARTs the packet service.
For an example of setting the default window sizes, see the sections Typical X.25 Configuration Example and DDN X.25 Configuration Example later in this chapter.
FINAL DRAFT
CISCO CONFIDENTIAL
Configure Additional X.25 Interface Parameters
without explicitly negotiating its maximum packet sizes. Any PVC will also assume these default values unless different values are configured. To set the router default input and output maximum packet sizes, perform the following tasks in interface configuration mode:
Task Set the default input maximum packet size. Set the default output maximum packet size. Command x25 ips bytes x25 ops bytes
To send a packet larger than the agreed X.25 packet size over an X.25 virtual circuit, a router must break the packet into two or more X.25 packets with the M-bit (more data bit) set. The receiving device collects all packets in the M-bit sequence and reassembles them into the original packet. It is possible to define default packet sizes that cannot be supported by the lower layer (see the LAPB N1 parameter). However, the router will negotiate lower maximum packet sizes for all SVCs so the agreed sizes can be carried. The router will also refuse a PVC configuration if the resulting maximum packet sizes cannot be supported by the lower layer. For an example of setting the default maximum packet sizes, see the sections Typical X.25 Configuration Example and DDN X.25 Configuration Example later in this chapter.
Configure the X.25 Level 3 Timers Configure X.25 Addresses Establish a Default Virtual Circuit Protocol Disable Packet-Level Protocol Restarts
FINAL DRAFT
Configure Additional X.25 Interface Parameters Task Set DCE T13 Clear Indication.
CISCO CONFIDENTIAL
Command x25 t13 seconds
For an example of setting the retransmission timers, see the section DDN X.25 Configuration Example later in this chapter.
Understand Normal X.25 Addressing Understand X.25 Subaddresses Configure an Interface Alias Address Suppress or Replace the Calling Address Suppress the Called Address
FINAL DRAFT
Configure an Interface Alias Address
CISCO CONFIDENTIAL
Configure Additional X.25 Interface Parameters
You can supply alias X.121 addresses for an interface. This allows the interface to act as the destination host for calls that have a destination address that is neither the interfaces address, an allowed subaddress of the interface, nor the null address. Local processing (for example, IP encapsulation) can be performed only for incoming calls whose destination X.121 address matches the serial interface or alias of the interface. To configure an alias, perform the following task in global configuration mode:
Task Supply an alias X.121 address for the interface. Command x25 route [#position] x121-address-pattern [cud pattern] alias type number
FINAL DRAFT
Modify LAPB Protocol Parameters
CISCO CONFIDENTIAL
require they be treated as IP encapsulation connection requests, per RFC 877. To configure either PAD or IP encapsulation treatment of unidentified calls, perform the following task in interface configuration mode:
Task Establish a default virtual circuit protocol. Command x25 default {ip | pad}
Table 13-2
LAPB Parameters Command lapb modulo modulus lapb k window-size lapb n1 bits Values or Ranges 8 or 128 1 (modulo minus 1) frames 108832840 bits (must be a multiple of 8) Default 8 7 Based on hardware MTU and protocol overhead 20 3000 0 (disabled) 0 (disabled)
Task (LAPB Parameter) Set the modulo. Set the window size (k). Set maximum bits per frame (N1).
Set count for sending frames (N2). Set the retransmission timer (T1). Set the hardware outage period. Set the idle link period (T4).
The LAPB modulo determines the operating mode. Modulo 8 (basic mode) is widely available, because it is required for all standard LAPB implementations and is sufficient for most links. Modulo 128 (extended mode) can achieve greater throughput on high-speed links that have a low error rate (some satellite links, for example) by increasing the number of frames that can be transmitted before waiting for acknowledgment (as configured by the LAPB window parameter, k).
FINAL DRAFT
CISCO CONFIDENTIAL
Configure an X.25 Datagram Transport
By its design, LAPBs k parameter can be at most one less than the operating modulo. Modulo 8 links can typically send seven frames before an acknowledgment must be received; modulo 128 links can set k to a value as large as 127. By default, LAPB links use the basic mode with a window of 7. When connecting to an X.25 network, use the N1 parameter value set by the network administrator. This value is the maximum number of bits in a LAPB frame, which determines the maximum size of an X.25 packet. When using LAPB over leased lines, the N1 parameter should be eight times the hardware maximum transmission unit (MTU) size plus any protocol overhead. The transmit counter (N2) is the number of unsuccessful transmit attempts will be made before the link is declared down. The retransmission timer (T1) determines how long a transmitted frame can remain unacknowledged before the router polls for an acknowledgment. For X.25 networks, the router retransmission timer setting should match that of the network. For leased-line circuits, the T1 timer setting is critical because the design of LAPB assumes that a frame has been lost if it is not acknowledged within period T1. The timer setting must be large enough to permit a maximum-sized frame to complete one round trip on the link. If the timer setting is too small, the router will poll before the acknowledgment frame can return, which may result in duplicated frames and severe protocol problems. If the timer setting is too large, the router waits longer than necessary before requesting an acknowledgment, which reduces bandwidth. The LAPB standards define a timer to detect unsignaled link failures (T4). The T4 timer is reset every time a frame is received from the partner on the link. If the T4 timer expires, a Receiver Ready frame with the Poll bit set is sent to the partner, which is required to respond. If the partner does not respond, the standard polling mechanism is used to determine whether the link is down. The period of T4 must be greater than the period of T1. Another LAPB timer function allows brief hardware failures, while the protocol is up, without requiring a protocol reset. If a brief hardware outage occurs, the link will continue uninterrupted if the outage is cured before the specified hardware outage period expires. For an example of configuring the LAPB T1 timer, see the section Typical LAPB Configuration Example later in this chapter.
Figure 13-1
Router X
FINAL DRAFT
Configure an X.25 Datagram Transport
CISCO CONFIDENTIAL
Perform the tasks in the following sections, as necessary, to complete the X.25 configuration for your network needs:
Configure Subinterfaces Map Protocol Addresses to X.121 Addresses Establish an Encapsulation PVC Set X.25 TCP Header Compression Configure X.25 Bridging
The following sections describe how to perform these configuration tasks. Configuring the X.25 parameters and special features, including TCP header compression and X.25 bridging, are described in the section Configure Additional X.25 Datagram Transport Features later in this chapter.
Configure Subinterfaces
Subinterfaces are virtual interfaces that can be used to connect several networks to each other through a single physical interface. Subinterfaces are made available on our routers because routing protocols, especially those using the split horizon principle, may need help to determine which hosts need a routing update. The split horizon principle, which allows routing updates to be distributed to other routed interfaces except the interface on which the routing update was received, works well in a LAN environment in which other routers reached by the interface have already received the routing update. However, in a WAN environment using connection-oriented interfaces (like X.25 and Frame Relay), other routers reached by the same physical interface might not have received the routing update. Rather than forcing network administrators to connect routers by separate physical interfaces, we provide subinterfaces that are treated as separate interfaces. A network administrator can separate hosts into subinterfaces of a physical interface, the X.25 protocol is unaffected, and routing processes see each subinterface as a separate source of routing updates, so all subinterfaces are eligible to receive routing updates.
FINAL DRAFT
CISCO CONFIDENTIAL
Configure an X.25 Datagram Transport
Note Because of the complex operations dependent on a subinterface and its type, the router will
not allow a subinterfaces type to be changed, nor can a subinterface with the same number be established again once it has been deleted. Once a subinterface has been deleted, it takes a reload to remove all internal references. However, the deleted subinterface can be easily reconstituted using a different subinterface number.
1. This command is documented in the Interface Commands chapter of the Router Products Command Reference publication.
For an example of configuring an X.25 subinterface and using multiple encapsulation commands for a single destination address, see the Point-to-Point Subinterface Configuration Example section later in this chapter. For more general information about configuring subinterfaces, refer to the Configuring Interfaces chapter of this manual.
Note When configuring IP routing over X.25, you might need to make adjustments to
accommodate split horizon effects. Refer to the Configuring IP Routing Protocols chapter of this manual for details about how the router handles possible split horizon conflicts. By default, split horizon is enabled for X.25 networks.
FINAL DRAFT
Configure an X.25 Datagram Transport
CISCO CONFIDENTIAL
A router can be configured to use any of the available encapsulation methods with a particular host. Once an encapsulation virtual circuit is established using any method, sending and receiving a datagram is a simple process of fragmenting and reassembling the datagram into and from an X.25 complete packet sequence. An X.25 complete packet sequence is one or more X.25 data packets that have the More bit set in all but the last packet. A virtual circuit that can carry multiple protocols includes protocol identification data as well as the protocol data at the start of each complete packet sequence.
Protocol Identification
This section contains background material only. The various methods and protocols used in X.25 SVC encapsulation are identified in a specific field of the call packet; this field is defined by X.25 to carry Call User Data (CUD). Only PVCs do not use Call User Data to identify its encapsulation (since PVCs do not use the X.25 call setup procedures). The primary difference between the available Cisco and IETF encapsulation methods is the specific value used to identify a protocol. When any of the methods establishes a virtual circuit for carrying a single protocol, the protocol is identified in the call packet by using the CUD. When a virtual circuit is established to carry more than one protocol (only available using the RFC 1356 methodology), a protocol identification field precedes the datagram encapsulated in the X.25 data packet; every datagram exchanged over that virtual circuit has its protocol identified. Table 13-3 summarizes the values used in the Call User Data field to identify protocols.
Table 13-3
Protocol Identification in the Call User Data Field Cisco Protocol Identifier 0xD4 0xD2 0xC0 00 80 0xD5 0x81 0xD8 0xD0 0xCC C42 IETF RFC 1356 Protocol Identifier 0x80 (5-byte SNAP encoding1) 0x80 (5-byte SNAP encoding) 0x80 (5-byte SNAP encoding) (Not implemented) 0x813 0x00 (5-byte SNAP encoding)4 0x80 (5-byte SNAP encoding) 0xCC5 or 0x80 (5-byte SNAP encoding) 0x80 (5-byte SNAP encoding) 0x016 (Not available) 0x80 (5-byte SNAP encoding) 0x00
Protocol Apollo Domain AppleTalk Banyan VINES Bridging ISO CLNS Compressed TCP DECnet IP
1. SNAP encoding is defined from the Assigned Numbers RFC; Ciscos implementation recognizes only the IETF OUI 0x00 00 00 followed by a two-byte Ethernet protocol type. 2. The use of 0xC0 00 80 C4 for Banyan VINES is defined by Banyan. 3. The use of 0x81 for CLNS is compatible with ISO/IEC 8473-3:1994. 4. Compressed TCP traffic has two types of datagrams, so IETF encapsulation requires a multiprotocol virtual circuit.
FINAL DRAFT
CISCO CONFIDENTIAL
Configure an X.25 Datagram Transport
5. The use of 0xCC for IP is backwards-compatible with RFC 877. 6. The use of 0x01 for PAD is defined by ITU-T Recommendation X.29.
Once a multiprotocol virtual circuit has been established, datagrams on the virtual circuit have protocol identification data before the actual protocol data; the protocol identification values are the same used by RFC 1356 in the CUD field for an individual protocol.
Note IP datagrams can be identified using a 1-byte identification (0xCC) or a 6-byte identification (0x80 followed by the 5-byte SNAP encoding). The 1-byte encoding is used by default, although the SNAP encoding can be configured.
As an example, if you are encapsulating IP over a given X.25 interface, you should define an IP address for the interface and, for each of the desired destination hosts, map the hosts IP address to its X.121 address.
Note You can map an X.121 address to as many as nine protocol addresses, but each protocol can
FINAL DRAFT
Configure an X.25 Datagram Transport
CISCO CONFIDENTIAL
An individual host map can use the given keyword to specify the following protocols:
apolloApollo Domain appletalkAppleTalk bridgeBridging clnsOSI Connectionless Network Service compressedtcpTCP header compression decnetDECnet ipIP ipxNovell IPX padPacket Assembler/Disassembler qllcIBMs QLLC vinesBanyan VINES xnsXNS
Each mapped protocol takes a datagram address except bridging (all bridged datagrams are sent to all bridge maps on an interface) and CLNS (which uses the mapped X.121 address as the SNPA, which is referenced by a clns neighbor command); the configured datagram protocol(s) and their relevant address are mapped to the destination hosts X.121 address. All protocols that are supported for RFC 1356 operation can be specified in a single map (bridging and QLLC are not supported for RFC 1356 encapsulation). If IP and TCP header compression are both specified, the same IP address must be given for both protocols. When setting up the address map, you can include options, such as enabling broadcasts and specifying the number of virtual circuits allowed, and defining various user facility settings.
Note Multiprotocol maps, especially those configured to carry broadcast traffic, can result in significantly larger traffic loads, requiring a larger hold queue, larger window sizes, or multiple virtual circuits.
For specific information about how to establish a protocol to run over X.25, refer to the appropriate protocol chapters in this publication or in the Router Products Command Reference publication. The configuration for the Open Shortest Path First (OSPF) protocol can be greatly simplified by adding the optional broadcast keyword. See the x25 map command description in the X.25 and LAPB Commands chapter of the Router Products Command Reference publication for more information.
FINAL DRAFT
Configure PAD Access
CISCO CONFIDENTIAL
Configure an X.25 Datagram Transport
By default, packet assembler/disassembler (PAD) connection attempts are processed for session creation or protocol translation (subject to the configuration of those functions) from all hosts. To restrict PAD connections to only statically mapped X.25 hosts, perform the following tasks in interface configuration mode:
Task Restrict PAD access. Configure a host for PAD access. Command x25 pad-access x25 map pad x121-address [option]
You can configure outgoing PAD access using the optional features of the x25 map pad command without restricting incoming PAD connections to the configured hosts.
The x25 pvc command uses the same protocol keywords as the x25 map command. See the Map Datagram Addresses to X.25 Hosts section of this chapter for a list of protocol keywords. Encapsulation PVCs also use a subset of the options defined for the x25 map command. For an example of configuring a PVC, see the section PVC Used to Exchange IP Traffic Example later in this chapter.
FINAL DRAFT
Configure Additional X.25 Datagram Transport Features
CISCO CONFIDENTIAL
Configure X.25 Payload Compression Configure the Encapsulation Virtual Circuit Idle Time Increase the Number of Virtual Circuits Allowed Configure the Ignore Destination Time Establish the Packet Acknowledgment Policy Configure X.25 User Facilities Define the Virtual Circuit Packet Hold Queue Size Restrict Map Usage
The compressed virtual circuit must connect two Cisco routers, because X.25 payload compression is not standardized. The data packets conform to the X.25 protocol rules, so a compressed virtual circuit can be switched through standard X.25 equipment, but only Cisco routers can compress and de-compress the data.
Only datagram traffic can be compressed, although all of the encapsulation methods supported by Cisco routers are available (for example, an IETF multiprotocol virtual circuit can be compressed). Switched virtual circuits can not be translated between compressed and non-compressed data, nor can PAD data be compressed.
FINAL DRAFT
CISCO CONFIDENTIAL
Configure Additional X.25 Datagram Transport Features
X.25 payload compression should be applied carefully. Each compressed virtual circuit requires significant memory resources (for a dictionary of learned data patterns) and computation resources (every data packet received is decompressed and every data packet sent is compressed). Excessive use of compression can cause unacceptable overall router performance.
X.25 compression must be explicitly configured for a map command. A received Call that specifies compression will be rejected if the corresponding host map does not specify the compress option. An incoming Call that does not specify compression can, however, be accepted by a map that specifies compression.
To enable payload compression over X.25, perform the following task in interface configuration mode:
Task Enable payload compression over X.25. Command x25 map protocol address [protocol2 address2 [...[protocol9 address9]]] x.121-address compress
This command specifies that X.25 compression is to be used between the two hosts. Because each virtual circuit established for compressed traffic uses significant amounts of memory, compression should be used with careful consideration of its impact on the routers performance. The compress option may be specified for an encapsulation PVC.
For an example of configuring the SVC idle timer, see the section Typical X.25 Configuration Example later in this chapter. See the section Monitor and Maintain LAPB and X.25 later in this chapter for additional commands that clear virtual circuits.
FINAL DRAFT
Configure Additional X.25 Datagram Transport Features
CISCO CONFIDENTIAL
For an example of increasing the number of virtual circuits allowed, see the sections Typical X.25 Configuration Example and DDN X.25 Configuration Example later in this chapter.
FINAL DRAFT
Task
CISCO CONFIDENTIAL
Configure Additional X.25 Datagram Transport Features Command x25 facility packetsize in-size out-size or x25 map protocol address [protocol2 address2 [...[protocol9 address9]]] x.121-address packetsize in-size out-size x25 facility windowsize in-size out-size or x25 map protocol address [protocol2 address2[...[protocol9 address9]]] x.121-address windowsize in-size out-size
x25 facility reverse or x25 map protocol address [protocol2 address2 [...[protocol9 address9]]] x.121-address reverse x25 accept-reverse or x25 map protocol address [protocol2 address2 [...[protocol9 address9]]] x.121-address accept-reverse x25 facility throughput in out or x25 map protocol address [protocol2 address2 [...[protocol9 address9]]] x.121-address throughput in out x25 facility transit-delay number or x25 map protocol address [protocol2 address2 [...[protocol9 address9]]] x.121-address transit-delay number x25 facility rpoa name or x25 map protocol address [protocol2 address2 [...[protocol9 address9]]] x.121-address rpoa name x25 map protocol address [protocol2 address2 [...[protocol9 address9]]] x.121-address nuid username password x25 map protocol address [protocol2 address2 [...[protocol9 address9]]] x.121-address nudata string
Set a user-defined network user identification allowing format determined by the network administrator.
The windowsize and packetsize options are supported for PVCs, although they have a slightly different meaning since PVCs do not use the call setup procedure. If the PVC does not use the interface defaults for the flow control parameters, these options must be used to specify the values. Not all networks will allow a PVC to be defined with arbitrary flow control values. Additionally, the D-bit is supported, if negotiated. PVCs allow the D-bit procedure since there is no call setup to negotiate its use. Both restricted and unrestricted fast select are also supported and are transparently handled by the software. No configuration is required for use of the D-bit or fast select facilities.
FINAL DRAFT
Configure X.25 Routing
CISCO CONFIDENTIAL
An encapsulation virtual circuits hold queue size is determined when it is created; the x25 hold-queue command will not affect existing virtual circuits. This command also defines the hold queue size of encapsulation PVCs.
Incoming calls received from a local serial interface running X.25 can be forwarded to another local serial interface running X.25. This is known as local X.25 switching because the router handles the complete path. It does not matter whether the interfaces are configured as DTE or DCE devices, because the software will take the appropriate actions. An incoming call also can be forwarded to another of our routers over a LAN using the TCP/IP protocols. Upon receipt of an incoming call, a TCP connection is established to the router that is acting as the switch for the destination. All X.25 packets are sent and received over this reliable data stream. Flow control is maintained end-to-end. This is known as X.25-over-TCP or XOT (previously remote X.25 switching, or tunneling). It does not matter whether the interfaces are configured as DTE or DCE, because the software will take the appropriate actions.
Running X.25 over TCP/IP provides a number of benefits. The datagram containing the X.25 packet can be switched by other routers using their high-speed switching abilities. X.25 connections can be sent over networks running only the TCP/IP protocols. The TCP/IP protocol suite runs over many different networking technologies, including Ethernet, Token Ring, T1 serial, and FDDI. Thus X.25 data can be forwarded over these media to another router, where it can be output to an X.25 interface.
FINAL DRAFT
CISCO CONFIDENTIAL
Configure X.25 Routing
When the connection is made locally, the switching configuration is used; when the connection is across a LAN, the XOT configuration is used. The basic function is the same for both types of connections, but different configuration commands are required for the two types of connections. The X.25 switching subsystem supports the following facilities and parameters:
D-bit negotiation is allowed and data packets with the D-bit set are passed through transparently Variable-length interrupt data (if not operating as a DDN or BFE interface) Flow Control Parameter Negotiation Window size up to 7, or 127 for modulo 128 operation Packet size up to 4096 (if the LAPB layers used are capable of handling the requested size)
Basic Closed User Group selection Throughput class negotiation Reverse charging and fast select
The handing of these facilities is described in the X.25 Facility Handling section. To configure X.25 routing, perform the tasks in the following sections:
Enable X.25 Routing Configure a Local X.25 Route Configure an XOT (Remote) X.25 Route Configure a Locally Switched PVC Configure an XOT (Remote) PVC
You may also need to configure additional X.25 routing features, as required for your network. Each task is described in a following section.
The use-tcp-if-defs keyword is used by some routers that receive remote routed calls from older versions of XOT; it might be needed if the originating router cannot be migrated to a new software release. The use of this keyword is described in the Configure XOT to Use Interface Default Flow Control Values section later in this chapter. For an example of configuring X.25 routing, see the sections X.25 Route Address Pattern Matching Example and X.25 Routing Examples later in this chapter.
FINAL DRAFT
Configure X.25 Routing
CISCO CONFIDENTIAL
The command options are packetsize in out and windowsize in out; they allow a PVCs flow control values to be defined if they differ from the interface defaults.
FINAL DRAFT
CISCO CONFIDENTIAL
Configure Additional X.25 Routing Features
For an example of configuring a local switched PVC, see the section PVC Switching on the Same Router Example later in this chapter.
The command options are packetsize in out and windowsize in out; they allow a PVCs flow control values to be defined if they differ from the interface defaults. For an example of configuring a remote tunneled PVC, see the section Remote PVC Tunneling Example later in this chapter.
Configure XOT to Use Interface Default Flow Control Values Substitute Addresses in a Local X.25 Route Configure XOT Alternate Destinations
FINAL DRAFT
Configure Additional X.25 Routing Features
CISCO CONFIDENTIAL
What the older XOT implementations required was that the source and destination XOT router use the same default flow control values on the two X.25 interfaces that connect the SVC; it was easy to create connection with mismatched flow control values if this assumption was not true, which results in mysterious problems. The current implementations practice of signalling the values in the call confirm avoids these problems. Occasionally the older XOT implementation will be connected to a piece of X.25 equipment that cannot handle modification of the flow control parameters in the call confirm packet. These configurations should be upgraded to use a more recent version of XOT; when this is not possible, XOTs behavior causes a migration problem. In this situation, the user may configure the router to cause XOT to assume that any unspecified flow control facility values should come from the destination interfaces default values. To configure this behavior, add the option use-tcp-if-defs when enabling X.25 routing in global configuration mode:
Task Enable X.25 routing; optionally modify XOTs assumption of unencoded flow control values. Command x25 routing [use-tcp-if-defs]
The sequence of alternate destination XOT host addresses is simply added to the normal XOT route configuration command.
FINAL DRAFT
CISCO CONFIDENTIAL
Configure CMNS Routing
Note It can take up to 50 seconds to try an alternate route due to TCP timings.
For an example of constructing the routing table, see the section X.25 Routing Examples later in this chapter.
Note For information about configuring LLC2 parameters, refer to the Configuring LLC2 and
In addition, our CMNS implementation allows LAN-based OSI resources, such as a DTE host and a Sun workstation, to be interconnected to each other via the routers LAN interfaces and to a remote OSI-based DTE through a WAN interface (using, for example, an X.25 PSN).
Note CMNS is implicitly enabled whenever an X.25 encapsulation is included with a serial
interface configuration.
All local mapping is performed by statically mapping MAC addresses and X.121 addresses to NSAP addresses. Implementing CMNS routing involves completing the tasks in the following sections:
For an example of enabling CMNS on an interface, see the section CMNS Configured for X.121 and MAC Addresses Example later in this chapter.
FINAL DRAFT
Configure DDN or BFE X.25
CISCO CONFIDENTIAL
For an example of configuring a CMNS static map of addresses, see the section CMNS Configured for X.121 and MAC Addresses Example later in this chapter.
To enable BFE X.25 service, perform the task in the following section: Configure Blacker Front-End X.25
FINAL DRAFT
Figure 13-2
Class A: Bits: Class B: Bits: Class C: Bits:
CISCO CONFIDENTIAL
Configure DDN or BFE X.25 DDN IP Address Conventions
Net.Host.LH.PSN 8 8 8 8 0000 0 PPPHH00 0000 0 PPPHH00
Net.Net.Host.PSN 8 8 8 8
Figure 13-3
BFE Class A : Bits:
S2823
S2302
Net.Net.Net.Host.PSN
0000 0 PPPHH00
FINAL DRAFT
Configure DDN or BFE X.25
CISCO CONFIDENTIAL
To enable DDN X.25, perform one of the following tasks in interface configuration mode, as appropriate for your network:
Task Set DDN X.25 DTE operation. Set DDN X.25 DCE operation. Command encapsulation x25 ddn encapsulation x25 dce ddn
For an example of enabling DDN X.25, see the section DDN X.25 Dynamic Mapping in this chapter.
Some hosts send nonstandard data in the TOS field, thereby causing multiple, wasteful virtual circuits to be created.
Enters emergency mode when requested to by the network. If the router is configured to respond to a BFE device in emergency mode, or if the EXEC command bfe enter is used, the router sends address translation information to the BFE device. Never enters emergency mode. Notifies the router that the emergency mode window is open and waits for the router to tell it to enter emergency mode. If the router is configured to respond to a BFE in emergency mode, or if the EXEC command bfe enter is used, the router sends a special address translation packet to the BFE device. The special data includes a command to the BFE to enter emergency mode.
FINAL DRAFT
CISCO CONFIDENTIAL
Configure DDN or BFE X.25
Set BFE encapsulation on the router attached to a BFE device. Provide address translation information to the BFE device. Define the circumstances under which the router will participate in emergency mode. Enter Blacker Emergency Mode using the bfe EXEC command.
The following tables describe these tasks. BFE encapsulation operates to map between Class A IP addresses and the X.121 addresses expected by the BFE encryption device. To set BFE encapsulation, perform the following task in interface configuration mode:
Task Set BFE encapsulation on the router attached to a BFE device. Command encapsulation x25 bfe
You must set up a table that provides the address translation information the router sends to the BFE when the BFE is in emergency mode. To do so, perform the following task in interface configuration mode:
Task Set up the table that lists the BFE nodes (host or gateways) to which the router will send packets. Command x25 remote-red host-ip-address remote-black blacker-ip-address
You can define the circumstances under which the router participates in emergency mode and how it will participate in emergency mode. To do so, perform the following tasks in interface configuration mode:
Task Define the circumstances under which the router will participate in emergency mode. Define how a router configured as x25 bfe-emergency decision will participate in emergency mode. Command x25 bfe-emergency {never | always | decision} x25 bfe-decision {no | yes | ask}
To set the router to participate in emergency mode or to end participation in emergency mode when your system is so configured, perform the following task in EXEC mode:
Task Set router to participate in emergency mode. Command bfe {enter | leave} type number
For an example of configuring Blacker Emergency mode, see the section Blacker Emergency Mode Example at the end of this chapter.
FINAL DRAFT
Monitor and Maintain LAPB and X.25
CISCO CONFIDENTIAL
show cmns [type number] show interfaces serial number show llc2 show x25 map show x25 remote-red show x25 route show x25 vc [lcn]
Note See the X.25 Cause and Diagnostic Codes appendix in the Debug Command Reference
publication for a description of PVC states that can appear in these show command displays.
FINAL DRAFT
CISCO CONFIDENTIAL
X.25 Facility Handling
Treatment of Standard X.25 Facilities Treatment The router adds, removes, or changes flow control parameter values to match the values on both interfaces, as described in the following cases. Router inserts flow control parameters into the outgoing switched Call. Router strips parameter values from the outgoing switched Call. Router lowers the packet size to the largest value that can be supported by the two interfaces. Router lowers the larger requested window size to 7. Router X.25 code ensures that both proposed maximum packet sizes and proposed window sizes for a Call are present. By default, the router forces the Call to use the maximum packet sizes (128/128) and window sizes (2/2). If the x25 routing use-tcp-if-defs command and keyword are specified, the router will assume that the Call takes the default values of the outgoing serial interface. In either case, the Call Confirm sent back over the X.25-over-TCP (XOT) connection will indicate the final flow control values negotiated for the connection. Router sends an outgoing Call Accepted packet that indicates the accepted flow control values.
Flow Control Negotiation (negotiation of window size and maximum packet size) Requested flow control values do not match the outgoing interfaces defaults. Requested values match the outgoing interfaces defaults. Requested maximum packet size exceeds the capability of either interface. Call is routed from a modulo 128 interface to a modulo 8 interface. Call is remotely routed over a TCP connection.
Call is received from an X.25 over TCP connection without one or more flow control parameter values.
Accepted flow control parameter values are different, for any reason, from the values proposed for the incoming Call. Throughput Negotiation Closed User Group Selection
Router forwards the incoming Throughput facility. Router forwards a basic format Closed User Group selection facility; any other format of Closed User Group selection (extended format, CUG with outgoing access or Bilateral CUG) will be stripped. Router forwards an incoming Reverse Charging facility. Router forwards an incoming Fast Select facility. Router forwards an incoming NUID facility on a Call packet; an NUID facility on a Call Accepted packet will be stripped. Router strips any Charging Information or Request. Configuring X.25 and LAPB 13-37
Charging Information
FINAL DRAFT
X.25 Facility Handling Facility RPOA Selection Called Line Address Modified Notification Call Redirection Notification Transit Delay Selection
CISCO CONFIDENTIAL
Treatment Router strips any RPOA Selection. Router forwards a Called Line Address Modified Notification. Router strips a Call Redirection Notification. Router forwards an incoming Transit Delay facility.
The implementation of X.25 prior to software Release 9.1(4.1) did not insert flow control parameter values into Call packets sent over X.25-over-TCP (XOT) connections. When such an XOT Call is received by software Release 9.1(4.1) or later, the Call will be forced to the standard flow control values. This may cause migration problems when the router is connecting X.25 equipment that is not capable of negotiating flow control parameters; the optional use-tcp-if-defs keyword of the x25 routing command can be used if this problem is encountered.
Default Treatment of ITU-T-Specified Marker Facilities Treatment Router forwards an incoming Calling Address Extension facility. Router forwards an incoming Called Address Extension facility. Router strips any of the Quality of Service facilities. Router strips an Expedited Data Negotiation facility.
Calling Address Extension Called Address Extension Quality of Service Negotiation Expedited Data Negotiation
The router requires the Calling Address Extension to route to a CMNS host. The encoding of any CCITT/ITU-T facilities is preceded by a marker, as displayed by the output of the debug x25 command.
Default Treatment of Local Marker Facilities Specified for DDN or BFE X.25 Treatment Router strips an incoming DDN Service Type facility from a Call, but inserts DDN Service Type if a forwarded Call Accepted packet specifies a DDN precedence facility.
FINAL DRAFT
Facility DDN Precedence
CISCO CONFIDENTIAL
X.25 and LAPB Configuration Examples Treatment Router forwards an incoming DDN Precedence facility. However, both the input and output interfaces need to be configured for DDN X.25 encapsulation. To configure treatment of this facility, see the Define IP Precedence Handling section. Router strips an incoming BFE Emergency Mode Addressing facility. To configure treatment of this facility, see the Configure Blacker Front-End X.25 section.
Our routers support DDN Standard service but not DDN Basic service. Consequently, DDN Service Type does not have to be configured.
Typical LAPB Configuration Example Transparent Bridging for Multiprotocol LAPB Encapsulation Example Typical X.25 Configuration Example Virtual Circuit Ranges Example PVC Switching on the Same Router Example X.25 Route Address Pattern Matching Example X.25 Routing Examples PVC Used to Exchange IP Traffic Example Point-to-Point Subinterface Configuration Example Simple Remote PVC Tunneling Example Remote PVC Tunneling Example CMNS Configured for X.121 and MAC Addresses Example CMNS Switched over a PDN Example CMNS Switched over Leased Lines Example DDN X.25 Configuration Example Blacker Emergency Mode Example X.25 Configured to Allow Ping Support over Multiple Lines Example Booting from a Network Server over X.25 Example
FINAL DRAFT
X.25 and LAPB Configuration Examples
CISCO CONFIDENTIAL
Note When routing IP over X.25, the X.25 network must be treated as a single IP network or
subnetwork. Map entries for routers with addresses on subnetworks other than the one on which the interfaces IP address is stored are ignored by the routing software. Additionally, all routers using the subnet number should have map entries for all others. There are also issues with the broadcast flag, which apply both to IP and to other protocols with dynamic routing.
interface serial 2 ip address 131.108.9.1 255.255.255.0 ! encapsulation X25 ! ! The bandwidth command is not part of the X.25 ! configuration; it is especially important to understand that it does not ! have any connection with the X.25 entity of the same name. ! bandwidth commands are used by IP routing processes (currently only IGRP) ! to determine which lines are the best choices for traffic. ! Since the default is 1544 Kbaud, and X.25 service at that rate is not generally ! available, most X.25 interfaces that are being used with IGRP in a ! real environment will have bandwidth settings. !
FINAL DRAFT
CISCO CONFIDENTIAL
X.25 and LAPB Configuration Examples
! This is a 9.6 Kbaud line: ! bandwidth 10 ! ! These Level 3 parameters are default flow control values; they need to ! match the PDN defaults. The values used by an SVC are negotiable on a per-call basis: ! x25 win 7 x25 wout 7 x25 ips 512 x25 ops 512 ! ! You must specify an X.121 address to be assigned to the X.25 ! interface by the PDN. ! x25 address 31370054065 ! ! The following Level 3 parameters have been set to match the network. ! You generally need to change some Level 3 parameters, most often ! those listed below. You might not need to change any Level 2 ! parameters, however. ! x25 htc 32 x25 idle 5 x25 nvc 2 ! ! The following commands configure the X.25 map. If you want to exchange ! routing updates with any of the routers, they would need ! broadcast flags. ! If the X.25 network is the only path to the routers, static routes are ! generally used to save on packet charges. If there is a redundant ! path, it might be desirable to run a dynamic routing protocol. ! x25 map IP 131.108.9.3 31370019134 ACCEPT-REVERSE ! ACCEPT-REVERSE allows collect calls x25 map IP 131.108.9.2 31370053087 ! ! If the PDN cannot handle fast back-to-back frames, use the !transmitter-delay command to slow down the interface. ! transmitter-delay 1000
FINAL DRAFT
X.25 and LAPB Configuration Examples
CISCO CONFIDENTIAL
The following example shows a more contrived command intended to illustrate the power of the rewriting scheme:
x25 route ^(....)..(..)..(..)(..)$ substitute-dest \2\4\3\1 interface serial 0 \4 \3 \2 \1
S1046a
It causes all X.25 calls with 14-digit called addresses to be routed through interface serial 0. The incoming DNIC field would be moved to the end of the address. The fifth, sixth, ninth, and tenth digits would be deleted, and the thirteenth and fourteenth would be moved before the eleventh and twelfth.
FINAL DRAFT
x25 route ^3306 interface serial 3 x25 route .* ip 10.2.0.2
CISCO CONFIDENTIAL
X.25 and LAPB Configuration Examples
The routing table forwards calls for X.121 address 100 out interface serial 0. Otherwise, if the X.121 address contains 100 anywhere within it and contains no Call User Data, or the Call User Data is not the string pad, it is forwarded onto serial 1. If the X.121 address contains the digits 100 and the Call User Data is the string pad, the call is forwarded onto serial 2. All X.121 addresses that do not match the first three routes are checked for a DNIC of 3306 as the first four digits. If they do match, they are forwarded over serial 3. All other X.121 addresses will match the fifth entry, which is a match-all pattern and will have a TCP connection established to the IP address 10.2.0.2. The router at 10.2.0.2 will then route the call according to its X.25 routing table. This second example configures a router that sits on a Tymnet PAD/switch to accept calls and have them forwarded to a DEC VAX system. This feature permits running X.25 network over a generalized, existing IP network, thereby making it unnecessary to get another physical line for one protocol. The router positioned next to the DEC VAX system is configured with X.25 routes, as follows:
x25 route vax-x121-address interface serial 0 x25 route .* ip cisco-on-tymnet-ipaddress
This routes all calls to the DEC VAX X.121 address out to serial 0, where the VAX is connected running PSI. All other X.121 addresses are forwarded to the cisco-on-tymnet address using its IP address. This takes all outgoing calls from the VAX and sends them to cisco-on-tymnet for further processing. On the router named cisco-on-tymnet, you would enter these commands:
x25 route vax-x121-address ip cisco-on-vax x25 route .* interface serial 0
This forces all calls with the VAX X.121 address to be sent to the router with the VAX connected to it. All other calls with X.121 addresses are forwarded out to Tymnet. If Tymnet can route them, a Call Accepted packet is returned, and everything proceeds normally. If Tymnet cannot handle it, it clears the call, and the Clear Request packet is forwarded back toward the VAX.
Figure 13-4
FINAL DRAFT
X.25 and LAPB Configuration Examples
CISCO CONFIDENTIAL
In this example, the PDN has established a PVC through its network connecting PVC number 3 of access point A to PVC number 4 of access point B. On Router X, a connection is established between Router X and Router Ys IP address, 131.108.1.4. On Router Y, a connection is established between Router Y and Router Xs IP address, 131.108.1.3.
Figure 13-5
Serial 1
S1179a
PVC 2
FINAL DRAFT
Configuration for Router Y
CISCO CONFIDENTIAL
X.25 and LAPB Configuration Examples
service tcp-keepalives-in service tcp-keepalives-out interface serial 1 x25 pvc 2 tunnel 131.108.1.1 interface serial 0 pvc 1
Figure 13-6
FINAL DRAFT
X.25 and LAPB Configuration Examples
CISCO CONFIDENTIAL
FINAL DRAFT
Figure 13-7
CISCO CONFIDENTIAL
X.25 and LAPB Configuration Examples Example Network Topology for Switching CMNS over a PDN
Ethernet
Router C1
S1 Serial X.121 address 4085551234 Token Ring 0 MAC address 0000.0c00.ff89 Router C2 S0 T0 Token Ring Host B MAC address 0800.4e02.1f9f 38.8261.1700.0150.0029.8431.02
S1047a
PDN
The following configuration listing allows resources on either side of the PDN to call Host A or Host B. This configuration allows traffic intended for the remote NSAP address specified in the x25 map cmns commands (for the serial ports) to be switched through the serial interface for which CMNS is configured.
FINAL DRAFT
X.25 and LAPB Configuration Examples
CISCO CONFIDENTIAL
Figure 13-8
Ethernet Serial X.25 address 00002 Token Ring 0 MAC address 0000.0c00.ee01 Router C4 S0 S1 T0 Private X.25 network Serial X.25 address 00001 Ethernet 0 MAC address 0000.0c00.ab01
Token Ring
S1048a
Router C3 E0
FINAL DRAFT
CISCO CONFIDENTIAL
X.25 and LAPB Configuration Examples
A key difference for this configuration compared with the previous example is that with no PDN, the specification of an X.121 address in the x25 map cmns command is not necessary. The specification of an X.25 address also is not needed, but is included for symmetry with the previous example.
FINAL DRAFT
X.25 and LAPB Configuration Examples
CISCO CONFIDENTIAL
Figure 13-9
Router A E0
S1 S2
S0 S3
Router B E1
Note All four serial ports configured for the two routers in the following configuration example
must be assigned to the same IP subnet address space. In this case, the subnet is 131.108.170.0.
S1044a
FINAL DRAFT
CISCO CONFIDENTIAL
X.25 and LAPB Configuration Examples
x25 map ip 131.108.170.3 31370054067 ! allow either destination address x25 31370054068 alias serial2 x25 31370054069 alias serial1
In this case, 10002 is the X.121 address of the remote router that can get to host 131.108.126.111. The remote router must have the following x25 map entry:
x25 map IP 131.108.126.200 10004 broadcast
This entry allows the remote router to return a boot image (from the netboot host) to the router booting over X.25.
FINAL DRAFT
X.25 and LAPB Configuration Examples
CISCO CONFIDENTIAL