Manual
Nortel Secure Router 8000 Series
Configuration -WAN Access
Contents
5 Logical interface configuration.....................................................................................5-1
5.1 Introduction.................................................................................................................................................. 5-2
5.1.1 Sub-interface overview.......................................................................................................................5-2
5.1.2 Virtual template and virtual access interface......................................................................................5-3
5.1.3 Virtual ethernet interface.................................................................................................................... 5-3
5.1.4 Loopback interface..............................................................................................................................5-4
5.1.5 Null interface.......................................................................................................................................5-4
5.2 Creating sub-interfaces.................................................................................................................................5-4
5.2.1 Establishing the configuration task..................................................................................................... 5-4
5.2.2 Creating FR sub-interfaces................................................................................................................. 5-5
5.2.3 Creating X.25 sub-interfaces...............................................................................................................5-6
5.2.4 Creating ATM sub-interfaces..............................................................................................................5-7
5.2.5 Checking the configuration.................................................................................................................5-7
5.3 Configuring the virtual template.................................................................................................................. 5-8
5.3.1 Establishing the configuration task..................................................................................................... 5-8
5.3.2 Creating a VT......................................................................................................................................5-9
5.3.3 Setting maximum number of links supported by a VT........................................................................5-9
5.3.4 Checking the configuration...............................................................................................................5-10
5.4 Configuring virtual ethernet interfaces...................................................................................................... 5-11
5.4.1 Establishing the configuration task...................................................................................................5-11
5.4.2 Creating a VE interface.....................................................................................................................5-12
5.4.3 Configuring a MAC address for a VE interface
...............................................................................
5-12
5.4.4 Checking the configuration...............................................................................................................5-13
5.5 Configuring a loopback interface...............................................................................................................5-13
5.5.1 Establishing the configuration task...................................................................................................5-13
5.5.2 Creating a loopback interface and configuring its IP address............................................................5-14
5.5.3 Checking the configuration...............................................................................................................5-14
5.6 Configuring a null interface....................................................................................................................... 5-15
5.6.1 Establishing the configuration task...................................................................................................5-15
5.6.2 Entering the null interface view........................................................................................................5-15
5.6.3 Checking the configuration...............................................................................................................5-16
5.7 Configuration examples............................................................................................................................. 5-16
Issue 5.3 (30 March 2009) Nortel Networks Inc. i