Sei sulla pagina 1di 8

TECHNICAL BULLETIN

COMMERCIAL - IN - CONFIDENCE

Data Router Cassette Software Release 5.025R


The INDeX Data Router Cassette is now available with a new level of software, version 5.025R.
This release has a powerful new feature set that can provide substantial savings for customers. It
must be recognised that some of the features supported by level 5 are complex in nature and it is
advised that pre-sales technical support is used when selling solutions based on them. The new
software also sees a move away from the existing programming menu system to an easy to use
Windows Graphical User Interface.

Needless to say, all earlier versions of the DRC are upgradeable. The procedure for loading level 5
is more complex than would typically be found with current cassettes. As such field upgrades will
not be possible requiring the DRC to be returned to SDX for upgrade (see Reseller Update 185 for
further information on training and the upgrade procedure).

Nautica Wizard
Nautica Wizard is a Windows 95/NT intuitive Graphical User Interface, which provides a clear
logical approach to set-up and configuration of the DRC, it replaces the current menu system for the
programming of the DRC. A key feature of this Wizard is that it will automatically detect all DRC’s
located on the Local network segment and allows initial configuration without the need to be on the
same IP subnet as the DRC.
Technical Bulletin No. 61
30th November 1998

Nautica Watch
Nautica Watch is a virtual LED system that allows you to quickly monitor the operation of your
DRC. Information on number dialled, which path is in use, status of the call and utilisation is
available.

Bay Command Console (BCC)


The Bay Command Console is designed for the more advanced user of the DRC. It is accessed over
a Telnet connection and provides an intelligent command line programming interface. The menu
style of the previous DRC software is no longer available.

2
Technical Bulletin No. 61
30th November 1998

Software Functionality
New Default IP Address

The default address for the DRC has changed from 1.1.1.1/8 to 10.1.1.1/8

Domain Name Server Forwarding and Caching

When accessing Internet or Intranet services TCP/IP applications, such as MS Internet Explorer, use
names such as www.sdxplc.com to identify where they wish to connect. For a connection to be
established, the name must be converted into an IP address to enable the Routers to direct the data.
A Domain Name Server (DNS) performs this name to IP address translation. The DRC Domain
Name Server feature provides a mechanism for resolving DNS requests. For example, a user may
want all DNS requests for corporate hosts and servers directed to the corporate Intranet, while all
other domains are resolved through a local ISP. Client PCs or workstations can be configured to use
the DRC as the DNS server. The router then applies some rules to the DNS request and decides
over which path the request should be sent. Replies are cached, so repeated lookups are extremely
efficient. All of the benefits of DNS name caching are also applicable when only using a single
path.

Bandwidth Allocation Control Protocol (BACP)

BACP provides a flexible and effective way to add and remove bandwidth between two Routers.
BACP is the only standards based mechanism available which allows the platform that did not
initiate the call to negotiate more (or less) bandwidth with the initiator. The BACP protocol
negotiates pre-defined options during the first part of the call. Regardless of which end requests the
extra bandwidth, it is the originator of the initial call that makes the additional calls and
consequently incurs all the cost. BACP also uses a mechanism known as Bandwidth Allocation
Protocol (BAP), this is responsible for the negotiations to co-ordinate the requests for adding or
removing bandwidth.

For Example, when connected to an Internet Service Provider (ISP) using BACP, the ISP may
request that the originator opens additional ISDN channels. The ISP in this scenario would also,
within the BACP procedure, supply the number to dial to support the additional bandwidth request.

Network Address Translation (NAT)

Network Address Translation (NAT) is a method for translating an internal IP address or network
into a single globally unique IP address. There are several benefits for using NAT: internal address
re-use, use of unregistered addresses for Internet access, the ability to hide internal network
addresses, not needing to re-address the internal network when connecting to the internet or a
corporate network.

The most important benefit of NAT for the DRC is the ability for the router to be assigned an IP
address by a service provider, to allow multiple PC access without the need to reconfigure the
network behind the router.

3
Technical Bulletin No. 61
30th November 1998

A simple NAT routed IP Network is illustrated here


10.1.1.2 10.1.1.3
To
178.164.33.97
D
R
C
10.1.1.1

Local Area Network

For example, the local PC with the IP address 10.1.1.2 wants to browse a page on an Internet Web
Server, 194.202.124.48. This PC has been set-up to have its default Gateway address set to 10.1.1.1,
the DRC, so the first packet is sent to 10.1.1.1 for routing. It has the IP addresses and TCP port
numbers of 10.1.1.2:986 -> 194.202.124.48:80. (The source TCP port numbers are chosen at the
time of connection and could be any unreserved port number, 986 has been used here for the
purpose of this explanation).

The DRC receives this packet and realises it should be sent to the Internet. The NAT functionality
modifies the Source IP and TCP headers and replaces it with its Internet IP address (obtained from
the ISP during call set-up) and replaces the client port number with one not currently in use by the
DRC. The packet then looks like this: 178.164.33.97:1010 -> 194.202.124.48:80 When the DRC
makes this conversion it creates a dynamic table entry which maps the local address and port
numbers to the Internet address and port numbers. This way when the Web server across the
Internet replies the reverse translation can be applied and the packet is sent back to 10.1.1.2.

A useful side effect of this feature is that many Internet Service Providers charge based on the
number of addresses that they allocate to an account. In some cases, using a single IP number could
reduce a bill by as much as 90%! This also helps to enhance the level of security within the
Network by hiding its internal addressing structure.

Dynamic Host Configuration Protocol (DHCP)

DHCP (Dynamic Host Configuration Protocol) is a defined framework for providing PC’s on a
TCP/IP network with configuration data, specifically with IP addresses, from an administered
system, for example, a Microsoft Windows NT server. DHCP Clients (hosts requiring
configuration) make broadcast requests for information and DHCP servers (hosts that manage and
deliver configuration data) offer or deliver the information back to the client.

The DRC now supports DHCP server functionality and is also capable of passing the broadcast
requests and directed responses of a DHCP transaction across subnets and WAN links. This pass-
through action is known as BOOTP Relay Agent functionality.

As a DHCP server, a DRC provides IP addresses manually, automatically or dynamically. It will


also manage the leases of dynamically assigned IP addresses and handles client lease releases. The
DRC DHCP server is intended to act as a small server, not to replace the main office server. It does
not have the ability to store allocated addresses because they occur in non-volatile memory, thus if
rebooted the unit may reallocate addresses which are still on lease.

4
Technical Bulletin No. 61
30th November 1998

Point To Point Tunnelling Protocol (PPTP)

Point to Point Tunnelling Protocol (PPTP) is designed to use the already existing Internet protocols
of PPP and TCP/IP. PPTP allows a PPP session to be tunnelled through an IP infrastructure (like
the Internet), creating a Virtual Private Network (VPN).

By using PPTP a user can access their corporate LAN by making a local call to their ISP rather than
by making a national call to their office. PPTP ensures that security is maintained by allowing
authentication of the call before connection to the LAN is permitted.

PPTP creates a tunnel by wrapping PPP packets of information (containing IP, IPX or bridge
traffic) within IP packets for transmission through the Internet. Upon receipt of this information by
a PPTP enabled device the external IP packets are stripped away and the original packet is then
delivered to its destination. This allows the transportation of packets that would not otherwise
conform to Internet addressing standards.

Example of PPTP Connection


PPTP Enabled
PPTP Enabled Host
Client PSTN Internet E.g. NT Server

ISP
Router DRC
PPP
PPTP

The PPTP enabled client makes a call to their ISP, this call is established as a PPP connection. Once
this has been established a PPTP connection can then be made across this to the PPTP enabled host
at the remote site. When the call arrives at the host the PPTP packets are stripped away leaving the
original packets for delivery.

Bridge Control Protocol (BCP)

Bridge Control Protocol allows the DRC to bridge non-routable protocols, such as Appletalk, across
PPP links to any 3rd party Router or Bridge supporting the BCP and PPP standards. This allows the
DRC to provide comprehensive internetworking support in a multi-protocol, multi-vendor
environment.

Minimum Call Duration Timer

This feature may provide a reduction in ISDN line charges in countries where the service provider
applies a set minimum call charge period. The DRC keeps the ISDN line active for the duration of
the minimum call time period, allowing any subsequent data transfers to take place for free, instead
of raising a second ISDN call.

5
Technical Bulletin No. 61
30th November 1998

Extended Call Filtering

DRC Level 5 software provides Extended Call Filtering to allow intelligent forwarding decisions to
be made for protocols other than IP and IPX when Bridging is enabled. The first implementation
supports the cost effective bridging of AppleTalk over ISDN.

In a large multi-protocol corporate environment, where IP or IPX is the primary routed traffic, there
may be some departments that have already made an investment in Apple computers. These tend to
use AppleTalk as their LAN or workgroup protocol. In this scenario a DRC can be used to route the
primary backbone protocols and bridge the AppleTalk traffic between workgroups utilising ISDN.

Trivial File Transfer Protocol (TFTP)

Trivial File Transfer Protocol (TFTP) is a simple protocol used to exchange files between different
units and networks for the purposes of updating. It lacks most of the features of file Transfer
Protocol (FTP), being able to read/write only to a file with basic error correction. The DRC uses
TFTP to send and receive a configuration file to the Nautica Wizard application.

IP/IPX RIP and SAP Direction Control

DRC Level 5 software provides Network Managers and Administrators with increased network
security and a reduction in overhead traffic through the control of broadcast traffic. Broadcast
traffic generated by IP RIP and IPX RIP updates and Novell’s Service Advertising Protocol (SAP)
can now be configured as: Send and Listen, Send Only, Listen Only or None.

IP RIP

IP RIP has been enhanced to support both Split Horizon and Poison Reverse updates.

DRC-1 DRC-2

Network-A Network-B

Split Horizon updates derive from the fact that it is never useful to send information about a route
back in the direction from which it came. In the example above DRC-1 initially advertises that it
has a route to Network-A. There is no reason for DRC-2 to include this in its update back to DRC-1
because DRC-1 is closer to Network-A.
The split horizon rule says that DRC-2 should omit this route from any updates that is sends to
DRC-1, this helps to overcome routing loops.

Poison reverse updates specifically indicate that a network or subnet is unreachable, rather than
implying that a network is unreachable by not including it in updates. Poison reverse updates are
sent to defeat large routing loops, working on the premise that increased route metrics generally
indicate routing loops.

IPX Ping

The BCC ping command has been enhanced to provide IPX ping capability to aid in testing and
troubleshooting of IPX networks.

6
Technical Bulletin No. 61
30th November 1998

ISDN Threshold Alarm

The Excessive Calls Alarms window allows you to set up alarms on specific events.

By enabling the “Display a Warning If” option, you can set up alarms if ISDN calls exceed a certain
amount, the total call hours exceeds a certain amount or if an individual call lasts longer than a
specified time. The individual alarm counters can also be set to restart at midnight.

Enhanced Compression

Interoperability between NauticaRS and BayRS routing platforms is continually being enhanced to
allow users to cost effectively extend their backbone networks out to even their smallest offices. As
a result of this the DRC now supports Bay Networks WAN Compression Protocol (WCP) for PPP.

Spanning Tree support for Bridging

The DRC now supports the Spanning Tree Protocol (STP), which is used on a Bridged network to
avoid bridging loops.

Windows 95/NT PPP Callback

The DRC now supports callback over a PPP connection. Both RFC1570 LCP Callback and PPP
Callback Control Protocol (CBCP) have been implemented. This allows a home worker to dial into
the DRC, from an analog or ISDN modem, and request a callback.

Blacklisting of Static Routes

Blacklisting is a mechanism used to denote paths in a router that are unavailable for various
reasons. A blacklisted path is kept on the blacklist table for a specified time period. All routes
associated with a blacklisted path are set to an infinite (unreachable) metric. After a definable
period of time, the path will be re-dialled and is either brought up or re-blacklisted, depending on
the success of the call.

Path blacklisting provides Dial Around Dead Site (DADS) functionality in mesh networks. If a call
to a remote site fails, then the path called to that remote site is blacklisted. As the associated routes
are set to an infinite metric, other, higher metric routes become available for the router to use.

7
Technical Bulletin No. 61
30th November 1998

Paths are blacklisted if the initial dialled call to the path fails to connect to the remote unit. This
does not include a call that has been answered but dropped due to a protocol negotiation failure or a
security failure. Each telephone number associated with the path is called three times in turn, and if
they all fail to connect the path is blacklisted.

SNMP and Syslog

Level 5 software supports SNMP traps via Nautica Wizard, enhanced support for 3rd party SNMP
management applications and a new Syslog facility.

SNMP traps are an unsolicited indication of an unexpected event such as a sudden WAN link
outage. The DRC may be configured to forward SNMP traps to the PC running the Nautica Wizard
application. If enabled, Nautica Wizard will display the received SNMP messages in a pop up
dialog box on the PC. Optionally SNMP traps can be forwarded to a generic SNMP management
application, such as Castlerock. The DRC will simultaneously forward a SNMP trap to up to 4 IP
destinations.

The new Syslog facility allows remote collection of log messages by any generic application
supporting this protocol. The version 5 Nautica Wizard has integrated support for Syslog via the
Nautica Log facility.

HTML

It is now possible to connect to the DRC (read only) using a Web Browser. This feature provides
status information on the DRC using HTML. Users are provided with access to useful information
including Routing table, active ISDN calls, ISDN history and current NAT table. This information
can be accessed via standard Web browsers such as Netscape or Microsoft Internet Explorer.

Potrebbero piacerti anche