Lucent STGR-CM-IP2000-F User manual

Stinger®IP Control Module
Configuration Guide
Part Number: 363-217-011R9.9.1
Issue 2
For software version 9.9.1
September 2006

Lucent Technologies
Copyright © 2006 Lucent Technologies Inc. All rights reserved.
This material is protected by the copyright laws of the United States and other countries. It may not be reproduced, distributed, or altered in
any fashion by any entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts, or
licensing, without the express written consent of Lucent Technologies. For permission to reproduce or distribute, please email your request to
techcomm@lucent.com.
Notice
Every effort was made to ensure that the information in this document was complete and accurate at the time of printing, but information is
subject to change.
European Community (EC) RTTE compliance
Hereby, Lucent Technologies, declares that the equipment documented in this publication is in compliance with the essential require-
ments and other relevant provisions of the Radio and Telecommunications Technical Equipment (RTTE) Directive 1999/5/EC.
To view the official Declaration of Conformity certificate for this equipment, according to EN 45014, access the Lucent INS online documentation
library at http://www.lucentdocs.com/ins.
Safety, compliance, and warranty Information
Before handling any Lucent Access Networks hardware product, read the Edge Access and Broadband Access Safety and Compliance Guide included
in your product package. See that guide also to determine how products comply with the electromagnetic interference (EMI) and network
compatibility requirements of your country. See the warranty card included in your product package for the limited warranty that Lucent
Technologies provides for its products.
Security statement
In rare instances, unauthorized individuals make connections to the telecommunications network through the use of access features.
Trademarks
Lucent, the Lucent logo, and all Lucent brand and product names are trademarks or registered trademarks of Lucent Technologies Inc. Other
brand and product names are trademarks of their respective holders.
Ordering Information
You can order the most up-to-date product information and computer-based training online at http://www.lucentdocs.com/bookstore.
How to comment
To comment on this information product, go to the Online Comment Form (http://www.lucent-info.com/comments/enus/) or email your

Stinger® IP Control Module Configuration Guide iii
Customer Service
Product and service information, and software upgrades, are available 24 hours a day.
Technical assistance options accommodate varying levels of urgency.
Finding information and software
To obtain software upgrades, release notes, and addenda for this product, log in to
Lucent OnLine Customer Support at http://www.lucent.com/support.
Lucent OnLine Customer Support also provides technical information, product
information, and descriptions of available services. The center is open 24 hours a day,
seven days a week. Log in and select a service.
Obtaining technical assistance
Lucent OnLine Customer Support at http://www.lucent.com/support provides access
to technical support. You can obtain technical assistance through email or the
Internet, or by telephone. If you need assistance, make sure that you have the
following information available:
■Active service or maintenance contract number, entitlement ID, or site ID
■Product name, model, and serial number
■Software version
■Software and hardware options If supplied by your carrier, service profile
identifiers (SPIDs) associated with your line
■Your local telephone company’s switch type and operating mode, such as AT&T,
5ESS Custom, or Northern Telecom National ISDN-1
■Whether you are routing or bridging with your Lucent product
■Type of computer you are using
■Description of the problem
Obtaining assistance through email or the Internet
If your services agreement allows, you can communicate directly with a technical
engineer through Email Technical Support or a Live Chat. Select one of these sites
when you log in to http://www.lucent.com/support.
Calling the technical assistance center (TAC)
If you cannot find an answer through the tools and information of Lucent OnLine
Customer Support or if you have a very urgent need, contact TAC. Access Lucent
OnLine Customer Support at http://www.lucent.com/support and click Contact Us
for a list of telephone numbers inside and outside the United States.
Alternatively, call 1-866-LUCENT8 (1-866-582-3688) from any location in North
America, or +353 16924579 in the Europe, Middle East and Africa (EMEA) region,
for a menu of Lucent services. Or call +1 510-747-2000 for an operator. You must
have an active services agreement or contract.


Stinger® IP Control Module Configuration Guide v
Contents
About This Guide ...............................................................................xix
Chapter 1 Introduction.......................................................................................1-1
Stinger IP DSLAM network features ........................................................................ 1-1
Introduction to the Stinger IP2000 control module................................................. 1-3
IP2000 model numbers and platform support................................................... 1-3
IP2000 support for up to 2048 trunk terminated calls ...................................... 1-4
Features not currently supported by the IP2000 ............................................... 1-5
Introduction to the Stinger IP2100 control module................................................. 1-5
Model numbers and platform support............................................................... 1-6
IP2100 memory modes ...................................................................................... 1-7
Maximizing the number of user connections .................................................... 1-7
Overview of OAM-CONFIG profile settings................................................ 1-8
Required IP2100 memory mode to maximize user connections ................ 1-8
Additional connections created for trunk-terminated connections ............ 1-8
Notice of OAM limitation with more than 5000 user PVCs........................ 1-8
Configurable IP2100 port managers .................................................................. 1-9
System-generated profiles ........................................................................... 1-9
Fixed-rate and nonfixed-rate bandwidth .................................................... 1-9
Configurable NP-PORT profile settings ..................................................... 1-10
Caution about modifying NP-PORT bandwidth allocations ...................... 1-12
How to recover from a bandwidth starvation condition ........................... 1-13
Protection against exceeding line capacity in NP-PORT configurations.... 1-13
Sample HB LIM NP-PORT configuration .................................................. 1-13
Features not currently supported by the IP2100 ............................................. 1-15
Network architecture overview.............................................................................. 1-15
Multicast video ................................................................................................ 1-15
Internet and voice access ................................................................................. 1-16
Multiplexing multiple IP flows on a single ATM VCC ..................................... 1-17
Chapter 2 Gigabit Ethernet Configuration .......................................................2-1
Configuring Gigabit Ethernet interfaces................................................................... 2-1
Overview of ETHERNET profile settings............................................................ 2-1
Enabling layer 2 bridging for VLAN operations ................................................. 2-3
Verifying the Gigabit Ethernet interface setup .................................................. 2-3
Checking the routing table.......................................................................... 2-4
Verifying the network processor setup for the interface............................. 2-4
Verifying the SAR setup for the interface ................................................... 2-4
Verifying IP packet transfer on the interface............................................... 2-4
Configuring Gigabit Ethernet port redundancy ....................................................... 2-5

vi Stinger® IP Control Module Configuration Guide
Contents
Configuring a soft IP interface for Gigabit Ethernet redundancy ...................... 2-6
Configuring Gigabit Ethernet redundancy for RFC 2684 (IPoA) connections .. 2-6
Configuring Gigabit Ethernet redundancy for VLAN bridging .......................... 2-7
Configuring a redundant LAN MBONE............................................................. 2-8
Configuring LACP on Gigabit Ethernet ports (IP2100 only).................................... 2-9
LACP configuration overview.......................................................................... 2-10
ETHER-GROUP settings ............................................................................ 2-10
Virtual ETHERNET profile settings for a LAG ........................................... 2-10
ETHERNET profile settings for physical ports in a LAG ............................ 2-12
LACP profile settings ................................................................................. 2-13
Sample link aggregation configuration............................................................ 2-14
Configuring a routed VLAN on the aggregated bandwidth....................... 2-14
Configuring an N:1 bridged VLAN that uses the aggregated bandwidth .. 2-15
Configuring an MBONE interface on the aggregated ports....................... 2-15
LACP implementation details .......................................................................... 2-16
LACP-related diagnostics ................................................................................. 2-17
Configuring STP on Gigabit Ethernet ports (IP2100 only)..................................... 2-17
Primary application with this software version ............................................... 2-17
Limitations with this software version ............................................................ 2-18
Configuration overview................................................................................... 2-18
Bridge-level STP settings in the ETHER-GROUP profile ........................... 2-19
Port-level STP settings in each port’s ETHERNET profile.......................... 2-20
Sample configuration with transparent bridging............................................. 2-21
Routing implications for STP-enabled ports .................................................... 2-24
Administrative tools for Gigabit Ethernet .............................................................. 2-25
Chapter 3 VLAN Configuration..........................................................................3-1
IP filters for Ethernet-encapsulated bridged IP datagrams ....................................... 3-2
Configuring 1:1 VLAN bridging................................................................................ 3-2
Overview of VLAN-ETHERNET and CONNECTION settings............................. 3-3
Sample 1:1 VLAN bridging configuration .......................................................... 3-5
Configuring N:1 VLAN bridging ............................................................................... 3-6
Creating and configuring bridge groups ............................................................ 3-6
Overview of BRIDGE-GROUP settings........................................................ 3-7
Sample BRIDGE-GROUP configuration with MAC address aging .............. 3-9
Sample BRIDGE-GROUP configuration with port blocking........................ 3-9
Sample BRIDGE-GROUP configuration with IGMP snooping .................. 3-10
VLAN and connection settings......................................................................... 3-11
How address limiting works............................................................................. 3-11
Sample N:1 VLAN bridging configuration with address limiting..................... 3-12
Configuring DHCP and PPPoE snooping for DSL line identification ............... 3-14
Structure of identifiers added to DHCP and PPPoE Discovery packets ..... 3-14
Configuring DHCP snooping ..................................................................... 3-16
Configuring PPPoE snooping for line identification of PPPoE clients ....... 3-20
Configuring stacked VLANs.................................................................................... 3-24
Bridging untagged frames to stacked VLANs ................................................... 3-25
Overview of VLAN stacking settings for untagged frames ........................ 3-25
Sample configuration bridging untagged frames....................................... 3-26
Bridging enterprise VLAN tagged frames to stacked VLANs............................ 3-27
Overview of VLAN stacking settings for tagged frames............................. 3-28
Sample configuration for mapping tagged frames..................................... 3-30

Contents
Stinger® IP Control Module Configuration Guide vii
Configuring routed VLANs..................................................................................... 3-32
Creating a virtual IP interface for a routed VLAN ........................................... 3-32
Sample routed VLAN configuration ................................................................ 3-33
Applying an IP filter to a routed VLAN ..................................................... 3-35
Assigning a virtual router to a routed VLAN............................................. 3-35
VLAN bridging of IPoA traffic to an upstream BRAS ............................................. 3-36
Upstream packet processing............................................................................. 3-36
Downstream packet processing ....................................................................... 3-37
Configuration overview................................................................................... 3-37
Overview of the BRAS profile ................................................................... 3-37
Overview of CONNECTION profile settings .............................................. 3-38
Configuring VLAN bridged IPoA...................................................................... 3-39
Configuring bridged IPoA to multiple BRAS with the same IP address .......... 3-41
Caveat when configuring an unnumbered interface for bridged IPoA............ 3-43
Sample VLAN configuration...................................................................... 3-43
Sample profiles .......................................................................................... 3-43
Possible proxy ARP problems with the sample configuration................... 3-44
Conclusions about the sample configuration ............................................ 3-45
VLAN-based ARP table .................................................................................... 3-45
How the VLAN ARP entries are updated dynamically .............................. 3-45
Adding VLAN ARP entries statically.......................................................... 3-45
PPPoA bridging in 1:1 and N:1 VLAN .................................................................... 3-46
Upstream network element configuration requirements ................................ 3-46
PPPoA bridging in N:1 VLANs ......................................................................... 3-47
Required settings to enable PPPoA bridging in a bridge group ................. 3-47
Downstream CPE configuration considerations ........................................ 3-48
Sample configuration enabling PPPoA bridging in a bridge group ........... 3-48
PPPoA bridging in 1:1 VLANs .......................................................................... 3-50
Required setting to enable PPPoA bridging in a 1:1 VLAN ....................... 3-50
Downstream CPE configuration considerations ........................................ 3-51
Sample configuration enabling PPPoA bridging in a 1:1 VLAN circuit ..... 3-51
Administrative tools for VLAN ............................................................................... 3-53
Chapter 4 IP Routing Configuration..................................................................4-1
Introduction to the IP router software ..................................................................... 4-1
Routes and interfaces......................................................................................... 4-2
Displaying the routing table ........................................................................ 4-2
Displaying the interface table ...................................................................... 4-3
IP control module performance statistics .................................................... 4-4
IP address syntax ............................................................................................... 4-4
Configuring IP-INTERFACE profiles for Ethernet ports ........................................... 4-6
Overview of typical local interface settings ....................................................... 4-6
Configuring a local IP interface.......................................................................... 4-7
Defining a local virtual IP interface ................................................................... 4-8
Defining a soft interface for increased accessibility............................................ 4-8
Disabling directed broadcasts to protect against denial-of-service..................... 4-8
Configuring IP-GLOBAL network features .............................................................. 4-9
Setting a system address .................................................................................... 4-9
Configuring DNS.............................................................................................. 4-10
Overview of typical DNS settings .............................................................. 4-10
Specifying domain names for lookups ...................................................... 4-10

viii Stinger® IP Control Module Configuration Guide
Contents
Setting RIP options .......................................................................................... 4-11
RIP policy for propagating updates back to the originating subnet........... 4-12
RIP triggering ............................................................................................ 4-12
Limiting the size of UDP packet queues .................................................... 4-12
Ignoring default routes when updating the routing table......................... 4-13
Suppressing host-route advertisements .................................................... 4-13
Subscriber profile sharing ................................................................................ 4-14
Equal cost multipath routing ........................................................................... 4-15
Packet-based ECMP................................................................................... 4-15
Flow-based ECMP ..................................................................................... 4-15
Caveat about changing the type of load balancing ................................... 4-15
Limitations of ECMP load balancing ......................................................... 4-16
Overview of ECMP settings....................................................................... 4-16
Sample downstream ECMP configuration ................................................ 4-17
Example of downstream flow-based ECMP .............................................. 4-19
Sample upstream ECMP through routed VLAN interfaces ....................... 4-21
Configuring and using address pools ............................................................... 4-23
Pool requirements ..................................................................................... 4-23
Overview of settings for defining pools..................................................... 4-23
Preventing the use of class boundary addresses........................................ 4-26
Examples of configuring address pools ..................................................... 4-26
Example of configuring summarized address pools .................................. 4-27
Examples of assigning an address from a pool .......................................... 4-29
IP pool chaining ........................................................................................ 4-30
Slot-based address assignment......................................................................... 4-36
Overview of profile settings....................................................................... 4-36
Sample slot-based address configuration using the global router ............. 4-37
Expanding the sample configuration to use a virtual router .................... 4-39
Configuring IP-ROUTE profiles .............................................................................. 4-40
Overview of typical static route settings .......................................................... 4-40
Offloading routing overhead to an external router ......................................... 4-41
Creating a static route to a subnet ................................................................... 4-42
Overview of routed subscriber connection features............................................... 4-42
Source interface local addresses....................................................................... 4-42
Packets that use the specified source address............................................ 4-42
CPE client considerations .......................................................................... 4-43
Soft IP interface requirement .................................................................... 4-43
Overview of configuration settings ........................................................... 4-44
Sample configuration with a source interface address .............................. 4-44
Anti-spoofing protection for IPoA, BIR, PPPoA, and PPPoE connections ....... 4-46
Overview of anti-spoofing settings............................................................ 4-47
Sample anti-spoofing configuration .......................................................... 4-48
Configuring IPoA subscriber connections .............................................................. 4-49
Typical CONNECTION atm-options settings for terminating PVCs ................. 4-49
Typical CONNECTION ip-options settings for terminating PVCs .................... 4-50
Sample RFC 2684 (IPoA) terminating PVC ..................................................... 4-51
Example of using a local-address setting for a numbered interface ................ 4-52
Example of routing a terminated PVC across Gigabit Ethernet ....................... 4-53
Example of using IP routing to aggregate PVCs onto a trunk VC.................... 4-55
Configuring BIR subscriber connections ................................................................ 4-56
Overview of CONNECTION bir-options and ip-options settings ..................... 4-56
Sample subnet (BIR/24) configuration............................................................ 4-57

Contents
Stinger® IP Control Module Configuration Guide ix
Sample host route (BIR/32) configurations..................................................... 4-58
Sample BIR connection on a VDSL port.......................................................... 4-60
Sample use of filters with BIR connections ..................................................... 4-61
Configuring multiple WAN virtual IP interfaces on a BIR connection............ 4-62
Overview of multiple IP address settings .................................................. 4-63
Sample configuration of multiple addresses on a BIR connections .......... 4-64
How routes are created for WAN virtual interfaces......................................... 4-65
Configuring DHCP relay for IPoA and BIR connections ........................................ 4-66
RFC compliance and caveats ........................................................................... 4-66
DHCP option 82 ............................................................................................... 4-66
WAN virtual interfaces on DHCP-configured BIR connections....................... 4-66
IP address assignments on DHCP-configured WAN virtual interfaces ...... 4-67
DHCP IP address lease time for WAN virtual interfaces............................ 4-67
When WAN virtual interfaces are activated.............................................. 4-67
How the system selects an interface for incoming packets ....................... 4-68
Deactivating and deleting WAN virtual IP interfaces ................................ 4-68
DHCP relay configuration settings ................................................................... 4-68
Overview of IP-GLOBAL DHCP relay settings .......................................... 4-68
Overview of DHCP relay agent settings..................................................... 4-69
Overview of DHCP option 82 suboption settings ...................................... 4-70
Overview of IP-INTERFACE and CONNECTION DHCP settings............... 4-72
Per-connection control of the DHCP relay giaddr field ................................... 4-73
Overview of how to use per-connection giaddr contents ......................... 4-73
Samples of how various settings affect giaddr contents ............................ 4-74
Sample DHCP relay configurations for IPoA connections ............................... 4-74
Sample configuration using DHCP relay without option 82 ..................... 4-74
Sample configuration using DHCP relay with option 82 .......................... 4-75
Sending only a hostname in the suboption fields ..................................... 4-75
Interoperation with DHCP servers that zero-delimit suboption fields ...... 4-76
Allowing non-standard DHCP source ports .............................................. 4-76
DHCP issues on LAN management interfaces ................................................. 4-76
Sample DHCP relay configurations for BIR connections ................................. 4-78
Sample configuration with no DHCP relay on a BIR connection ............. 4-78
Sample configuration enabling relay agent on a BIR connection ............. 4-79
Sample configuration with option 82 ....................................................... 4-80
Sample configuration with option 82 and multiple interface creation ..... 4-81
Sample configuration on a VDSL port with option 82 and multiple interface
creation......................................................................................... 4-82
Sample using the soft interface address in the giaddr field ....................... 4-82
Sample configuration using the DHCP router option ............................... 4-83
Sample configuration that sends only a hostname ................................... 4-84
Configuring broadband RAS subscriber access....................................................... 4-85
Recommended call-type setting for PPP sessions .......................................... 4-85
Overview of PPPoA and PPPoE topologies ...................................................... 4-86
Required setup for PPPoA and PPPoE connections ......................................... 4-87
Configuring the ANSWER-DEFAULTS profile for PPP sessions ...................... 4-87
Terminating traffic on a LIM internal interface ............................................... 4-89
The underlying ATM circuit required to terminate traffic ........................ 4-89
PPPoA and PPPoE encapsulation types in the underlying ATM circuit .... 4-89
Configuring an ATM circuit to terminate PPPoA ...................................... 4-90
Configuring an ATM circuit to terminate PPPoE ...................................... 4-91
Example of configuring a PPPoA connection .................................................. 4-91

xStinger® IP Control Module Configuration Guide
Contents
Overview of PPPoA CONNECTION settings.............................................. 4-92
Sample PPPoA connection with bidirectional CHAP authentication ........ 4-93
PPPoA over LLC............................................................................................... 4-94
Verifying the encapsulation type............................................................... 4-94
Example of configuring a PPPoE connection................................................... 4-95
Overview of PPPoE CONNECTION settings .............................................. 4-95
Sample PPPoE connection using PAP authentication ............................... 4-96
Sample PPPoE connection on a VDSL port ............................................... 4-97
Enabling LCP keepalives ........................................................................... 4-98
Enabling magic-number negotiation when LQM is disabled .................. 4-101
Enabling support for PPPoE service names.................................................... 4-101
Details of the service-name negotiation process ..................................... 4-101
Configuration overview .......................................................................... 4-102
Sample PPPoE server configuration using local profiles.......................... 4-105
Sample PPPoE server configuration using RADIUS ................................ 4-106
Administrative tools for IP routing....................................................................... 4-109
Chapter 5 Ethernet and IP QoS..........................................................................5-1
Overview of the QoS implementation ..................................................................... 5-1
Packet classification subsystem .......................................................................... 5-2
Rate-limiting, prioritization, and scheduling subsystem.................................... 5-3
Packet marking engine ...................................................................................... 5-3
Configuration steps............................................................................................ 5-4
What the system does at the output interface ................................................... 5-4
Default IP QoS configuration............................................................................. 5-5
Introduction to PACKET-FLOWS profile settings .................................................... 5-5
Layer 2 classifiers ............................................................................................... 5-6
Packet classifiers................................................................................................. 5-7
Caveat about fragmented IP packets ........................................................... 5-9
Details of packet classifier comparison passes ............................................. 5-9
Comparisons of IP addresses ..................................................................... 5-10
Comparisons of IP TOS values................................................................... 5-10
Comparisons of port numbers ................................................................... 5-11
How nonmatching packets are prioritized (the default rule) .................... 5-11
Scheduling and rate limiting............................................................................ 5-12
Token buckets in the single-rate three color policing algorithm............... 5-13
Using a single rate two-color algorithm .................................................... 5-14
Notes on the policing implementation ...................................................... 5-14
Rate limiting on VLAN bridged interfaces................................................. 5-14
Example of rate limiting on a BIR connection .......................................... 5-15
Example of rate limiting on a 1:1 bridged VLAN ...................................... 5-16
Packet marking ................................................................................................ 5-16
QoS packet marking for routed traffic....................................................... 5-17
Ethernet p-bit marking for bridged or routed VLAN traffic ...................... 5-17
Overview of packet marking settings ........................................................ 5-18
Example of IP ToS marking on a routed VLAN interface.......................... 5-19
Example of Ethernet p-bit marking .......................................................... 5-20
Example of mapping ATM QoS to a packet marking value ...................... 5-21
QoS-related connection and interface settings....................................................... 5-22
Applying a PACKET-FLOWS profile to an output interface ............................ 5-23
Inheritance of PACKET-FLOWS configurations on virtual IP interfaces .. 5-23

Contents
Stinger® IP Control Module Configuration Guide xi
Virtual IP interfaces and interface grouping.............................................. 5-24
ATM QoS and IP QoS considerations........................................................ 5-24
Configuring Ethernet IP traffic shaping ........................................................... 5-24
Configuring VLAN Ethernet traffic shaping..................................................... 5-25
QoS-related settings in the SYSTEM profile........................................................... 5-25
Performance recommendations ....................................................................... 5-25
Configurable queue size for IPTV traffic on DSL links..................................... 5-26
Tracking rate adaptation for downstream traffic shaping ...................................... 5-26
How traffic shaping typically occurs ................................................................ 5-27
How rate adaptation affects traffic shaping...................................................... 5-27
How to enable the rate-tracking optimization................................................. 5-27
How this feature works on the VDSL LIM ................................................ 5-27
How this feature works on the ADSL2+ HB LIM...................................... 5-27
Examples of configuring QoS................................................................................. 5-28
Prioritizing IP packet flows based on DSL service contracts ............................ 5-29
Prioritizing different kinds of IP traffic on an ATM PVC.................................. 5-30
Prioritizing traffic using both IP and ATM QoS ............................................... 5-32
Configuring bridging VLAN Ethernet QoS ...................................................... 5-36
Configuring traffic shaping and rate limiting for a N:1 VLAN bridging ........... 5-37
Configuring rate limiting and traffic shaping with VLAN stacking.................. 5-39
Configuring rate limiting and traffic shaping for 1:1 VLAN bridging .............. 5-42
Configuring a PPPoE connection with and without line-rate tracking ........... 5-44
Configuring a BIR connection with line-rate tracking .................................... 5-46
Administrative tools for monitoring IP QoS........................................................... 5-46
Example of monitoring routed traffic onto Gigabit Ethernet .......................... 5-47
Creating a terminating routed connection ................................................ 5-47
Applying a PACKET-FLOWS profile to the Ethernet IP interface............. 5-47
Obtaining the Ethernet interface number................................................. 5-48
Enabling monitoring on the Ethernet IP interface .................................... 5-48
Example of monitoring bridged VLAN traffic (transparent bridging).............. 5-49
Creating a bridged VLAN interface and PACKET-FLOWS profile............. 5-49
Creating a bridged subscriber interface and PACKET-FLOWS profile ...... 5-50
Obtaining the interface numbers .............................................................. 5-51
Enabling monitoring for the bridged VLAN interface ............................... 5-51
Enabling monitoring for the bridged subscriber interface......................... 5-52
Example of monitoring 1:1 VLAN bridged traffic ............................................ 5-53
Creating the subscriber-side profiles ......................................................... 5-53
Creating the VLAN-side profiles................................................................ 5-54
Obtaining the interface numbers .............................................................. 5-54
Enabling monitoring in the upstream direction........................................ 5-55
Enabling monitoring in the downstream direction ................................... 5-56
Example of monitoring stacked VLAN bridged traffic ..................................... 5-57
Enabling QoS monitoring on an NSP VLAN interface .............................. 5-57
Enabling QoS monitoring on a stacked VLAN WAN connection.............. 5-58
Example of displaying a connection’s traffic shaping parameters ................... 5-59
Displaying a connection’s traffic shaping parameters on the IP2000........ 5-59
Displaying a connection’s traffic shaping parameters on the IP2100........ 5-60
Limitations with the current software version....................................................... 5-61
Chapter 6 L2TP Tunneling Configuration .........................................................6-1
Overview of L2TP tunneling .................................................................................... 6-2

xii Stinger® IP Control Module Configuration Guide
Contents
Links to LNS servers .......................................................................................... 6-2
Links to PPP clients ............................................................................................ 6-2
L2TP-related network settings ........................................................................... 6-3
L2TP-related RADIUS configuration.................................................................. 6-3
Overview of L2TP tunnel authentication................................................................. 6-3
System name used for tunnel authentication.................................................... 6-4
How the system finds a matching tunnel .......................................................... 6-4
Examples of how client-auth-id settings create parallel tunnels ....................... 6-5
Examples of configuration errors causing multiple tunnels .............................. 6-5
Configuring L2TP global options .............................................................................. 6-6
Enabling L2TP operations and authentication................................................... 6-6
Setting L2TP timers and other variables ............................................................ 6-7
Retry timers................................................................................................. 6-9
CSN encoding for RADIUS accounting ..................................................... 6-10
Sample global tunneling configuration............................................................ 6-10
Configuring client connections with PPP authentication....................................... 6-11
Overview of mobile client connection settings................................................ 6-11
Sample PPP-authenticated client connection .................................................. 6-13
Sample PPP-authenticated connection with two LNS systems........................ 6-14
Configuring connection-based tunnel authentication ........................................... 6-16
Overview of connection-based tunnel authentication settings ....................... 6-16
Example of connection-based tunnel authentication...................................... 6-17
Configuring server-based tunnel authentication ................................................... 6-18
Overview of server-based tunnel authentication settings ............................... 6-19
Example TUNNEL-SERVER password configuration....................................... 6-20
Sample server-based authentication configuration ......................................... 6-21
Using tunnel assignment IDs.................................................................................. 6-22
Overview of tunnel assignment settings.......................................................... 6-22
Example of configuring tunnel assignment IDs............................................... 6-23
Administrative tools for monitoring L2TP.............................................................. 6-26
Displaying traffic statistics for open UDP/TCP ports ........................................ 6-26
Displaying L2TP statistics ................................................................................. 6-26
Displaying PPPoE statistics............................................................................... 6-27
Limitations with this software version ................................................................... 6-27
Impact of L2TP data sequencing limitation ..................................................... 6-28
Impact of L2TP IP QoS limitation .................................................................... 6-28
Chapter 7 Virtual Router Configuration ...........................................................7-1
Overview of virtual routing ..................................................................................... 7-1
How virtual routers affect the routing table ...................................................... 7-2
Interconnecting virtual domains ....................................................................... 7-2
Applicability and limitations .............................................................................. 7-2
Creating a virtual router........................................................................................... 7-3
Overview of VROUTER profile settings ............................................................. 7-3
Example of defining a virtual router ................................................................. 7-4
Defining address pools for a virtual router ........................................................ 7-7
Assigning interfaces to a virtual router.............................................................. 7-7
Overview of interface virtual router settings .............................................. 7-7
Examples of assigning virtual router membership to interfaces ................. 7-8
Defining virtual router static routes................................................................... 7-8
Overview of static route settings ................................................................. 7-8

Contents
Stinger® IP Control Module Configuration Guide xiii
Examples of defining a route on a per-virtual-router basis ........................ 7-9
Specifying an inter-virtual-router route...................................................... 7-9
Configuring virtual router DNS servers ........................................................... 7-10
Overview of virtual router DNS settings ................................................... 7-11
Example of a typical virtual router DNS configuration............................. 7-11
Deleting a virtual router......................................................................................... 7-12
Administrative tools for virtual routers.................................................................. 7-12
Chapter 8 OSPF Configuration ..........................................................................8-1
Overview of supported OSPF features ..................................................................... 8-1
Limited border router capability ........................................................................ 8-2
One active IP interface per port ......................................................................... 8-2
Authentication................................................................................................... 8-2
Support for variable-length subnet masks......................................................... 8-2
Exchange of routing information ...................................................................... 8-3
Designated and backup designated routers on broadcast networks .................. 8-4
Routing across NBMA interfaces ....................................................................... 8-5
Configurable cost metrics................................................................................... 8-5
Hierarchical routing (areas) ............................................................................... 8-6
Link-state routing algorithms ............................................................................ 8-7
Enabling OSPF systemwide ...................................................................................... 8-8
Configuring OSPF on Gigabit Ethernet .................................................................... 8-9
Overview of IP-INTERFACE OSPF settings....................................................... 8-9
Sample Gigabit Ethernet interface configuration ............................................ 8-12
Configuring OSPF on an ATM trunk interface ...................................................... 8-13
Overview of CONNECTION OSPF settings ...................................................... 8-13
Sample OSPF point-to-point configuration ..................................................... 8-14
Sample configuration of NBMA across point-to-point .................................... 8-14
Overview of additional NBMA settings..................................................... 8-14
Example of an NBMA configuration......................................................... 8-15
Configuring global route options that apply to OSPF ............................................ 8-16
Example of importing a summarized pool as an ASE...................................... 8-17
Example of setting ASE preferences ................................................................ 8-17
Configuring IP-ROUTE OSPF options .................................................................... 8-17
Example of configuring a type 7 LSA in an NSSA........................................... 8-18
Example of assigning a cost to a static route ................................................... 8-19
Administrative tools for OSPF routing ................................................................... 8-19
Chapter 9 IP Multicast Configuration ...............................................................9-1
IP multicast forwarding ............................................................................................ 9-1
Network-side MBONE interfaces....................................................................... 9-2
Notice about Gigabit Ethernet redundancy for a LAN MBONE ........................ 9-2
LIM-side multicast client interfaces ................................................................... 9-2
IP2100 and IP2000 maximum limits on multicast and bridge groups............... 9-3
Configuring MBONE interfaces................................................................................ 9-3
Overview of multiple MBONE configuration .................................................... 9-4
Sample configuration with multiple MBONE interfaces ................................... 9-5
Sample MBONE configuration on Gigabit Ethernet VLANs.............................. 9-6
Managing multicast group memberships ................................................................. 9-8
Overview of MCAST-SERVICE settings............................................................. 9-8
Sample multicast address filters......................................................................... 9-9

xiv Stinger® IP Control Module Configuration Guide
Contents
Sample multicast address range filter .............................................................. 9-10
Configuring multicast client interfaces................................................................... 9-11
Overview of multicast client CONNECTION settings ...................................... 9-11
Setting IGMP-v2 timers (local profiles only) ................................................... 9-13
Example of using multiple multicast filters ..................................................... 9-14
Sample multicast video configuration with filters ........................................... 9-15
Configuring the local MBONE interface.................................................... 9-16
Configuring multicast client PVCs............................................................. 9-16
Applying a filter that restricts the GigE interface to video traffic only...... 9-17
An alternative filter to restrict each client interface.................................. 9-18
Sample multicast video configuration with a remote MBONE interface......... 9-19
ATM QoS when both multicast and unicast clients are supported.................. 9-21
Multicast server virtual circuits .............................................................................. 9-22
Overview of multicast server VC settings ........................................................ 9-23
Sample configuration of multicast server VCs ................................................. 9-24
Enabling the multicast server VC feature.................................................. 9-24
Configuring the multicast server VCs........................................................ 9-24
Configuring the terminating connections for DSL users ........................... 9-25
Distributed multicast with HB LIMs (IP2100 only)................................................ 9-25
Benefits of distributed multicast ...................................................................... 9-25
Conceptual overview ....................................................................................... 9-26
MBONE and multicast client interactions on FFW interfaces ......................... 9-27
What happens when a CPE joins a multicast group ................................. 9-27
What happens when a CPE leaves a multicast group ............................... 9-28
Multicast-capable HB LIM considerations ....................................................... 9-28
Downstream traffic processing .................................................................. 9-28
Changes in packet-flow prioritization with distributed multicast ............. 9-29
Scheduling priority of the HB LIM FFW interface .................................... 9-30
ATM QoS for unicast traffic on the HB LIM.............................................. 9-31
Statistics and diagnostics for the multicast-capable HB LIM............................ 9-31
Administrative tools for IGMP operations.............................................................. 9-31
Chapter 10 PIM-SM v2 Configuration ...............................................................10-1
PIM-SM features supported with this software version......................................... 10-2
Overview of PIM-SM configuration....................................................................... 10-2
Enabling multicast and PIM............................................................................. 10-3
Overview of settings in the IP-GLOBAL profile ........................................ 10-3
Example showing BSR election and dynamic group-RP mappings .......... 10-4
Configuring static mappings between groups and rendezvous points............. 10-5
Configuring PIM on Gigabit Ethernet or trunk interfaces ............................... 10-6
PIM options in the IP-INTERFACE and CONNECTION profiles ............... 10-7
Example of enabling PIM on the Gigabit Ethernet interface .................... 10-9
Example of enabling PIM on a trunk interface ....................................... 10-10
Sample PIM-SM system configuration................................................................. 10-10
Administrative tools for PIM-SM routing ............................................................ 10-11
Chapter 11 Filter Configuration ........................................................................11-1
Filter overview ....................................................................................................... 11-1
Filter rules........................................................................................................ 11-2
Explicit default filter rules................................................................................ 11-2
Defining IP filters.................................................................................................... 11-2

Contents
Stinger® IP Control Module Configuration Guide xv
Overview of IP filter settings............................................................................ 11-2
Details of IP filter comparison passes ............................................................... 11-4
Filtering on source or destination IP addresses ......................................... 11-4
Filtering on port numbers ......................................................................... 11-5
TCP-established filters ............................................................................... 11-6
Sample IP filters ............................................................................................... 11-7
Sample TCP-established filter.................................................................... 11-8
Preventing address spoofing...................................................................... 11-8
An IP filter for more complex security issues............................................ 11-9
Sample filter with no explicit default rule............................................... 11-10
Sample filter with explicit default rule.................................................... 11-11
Sample filter using a generic explicit default rule ................................... 11-11
Defining ICMP filters............................................................................................ 11-12
Overview of profile settings ........................................................................... 11-12
Sample ICMP filter configurations................................................................. 11-14
Blocking incoming Echo-Request packets............................................... 11-14
Stopping Echo-Request packets from being forwarded upstream .......... 11-16
Blocking Echo-Requests to a specific IP address ..................................... 11-16
Defining route filters ............................................................................................ 11-17
Overview of route filter settings .................................................................... 11-17
Sample route filters........................................................................................ 11-18
Sample route filter that excludes a route ................................................ 11-18
Sample route filter that configures a route’s metric................................ 11-19
Defining Ethernet input filters ............................................................................. 11-19
Overview of ethernet filter settings ............................................................... 11-19
Sample PPPoE and MAC address filter .......................................................... 11-20
Applying a filter to an interface ........................................................................... 11-21
Profile settings for applying a filter ................................................................ 11-21
Applying filters to a CPE interface ................................................................. 11-21
Applying a filter to an Ethernet interface ...................................................... 11-22
Applying a filter to a VLAN Ethernet interface.............................................. 11-22
Applying an Ethernet filter to a VLAN bridging connection ......................... 11-23
Administrative tools for filters.............................................................................. 11-23
Appendix A IP Control Module Diagnostics........................................................ A-1
Enabling the debug environment ............................................................................A-2
Gigabit Ethernet diagnostics.....................................................................................A-2
IGMP diagnostics ......................................................................................................A-4
PIM-SM diagnostics................................................................................................A-10
VLAN-related diagnostics .......................................................................................A-13
SAR-related diagnostics..........................................................................................A-19
Network processor-related diagnostics...................................................................A-20
Multicast-capable high-bandwidth LIM diagnostics ..............................................A-27
SNMP MIB for GMAC and VLAN statistics ............................................................A-29
History maintained at 15-minute intervals......................................................A-29
Gigabit Ethernet (GigE) statistics tables ...........................................................A-29
Gigabit Ethernet configuration..................................................................A-30
Interval transmit statistics .........................................................................A-30
Total transmit statistics ..............................................................................A-30
Interval receive statistics ...........................................................................A-32
Total receive statistics ................................................................................A-32
VLAN statistics tables .......................................................................................A-34

xvi Stinger® IP Control Module Configuration Guide
Contents
VLAN statistics...........................................................................................A-34
VLAN clear statistics ..................................................................................A-35
PIMv2 MIB support................................................................................................A-35
Index ........................................................................................... Index-1

Stinger® IP Control Module Configuration Guide xvii
Figures
Figure 1-1 IP2100 control module basic architecture......................................... 1-6
Figure 1-2 Sample setup showing multicast and unicast video services .......... 1-16
Figure 1-3 Sample setup showing Internet access and voice over ATM .......... 1-16
Figure 1-4 Sample setup showing multiple IP flows to a CPE router ............... 1-17
Figure 2-1 Gigabit Ethernet redundancy for RFC 2684 connectivity ................. 2-6
Figure 2-2 Gigabit Ethernet redundancy for a LAN MBONE ............................. 2-8
Figure 2-3 Redundant uplinks for a VLAN ....................................................... 2-18
Figure 3-1 Bridging VLAN: One PVC to one VLAN (1:1) ................................... 3-2
Figure 3-2 Sample 1:1 VLAN circuit ................................................................... 3-5
Figure 3-3 Bridging multiple PVCs to a VLAN.................................................... 3-6
Figure 3-4 Sample N:1 VLAN bridging ............................................................. 3-12
Figure 3-5 Format when an interface IP address (if-ip) is used ..................... 3-15
Figure 3-6 Format when a text string (vendor-option-string) is used ........... 3-15
Figure 3-7 Format when sending only the hostname (send-only-hostname).. 3-15
Figure 3-8 DHCP snooping example................................................................. 3-17
Figure 3-9 Contents of fields with sample DHCP snooping configuration ....... 3-19
Figure 3-10 PPPoE vendor-specific tag format ................................................... 3-21
Figure 3-11 PPPoE snooping example ................................................................ 3-23
Figure 3-12 Contents of fields with sample PPPoE snooping configuration....... 3-24
Figure 3-13 Stacked VLAN: Bridging untagged frames from DSL interfaces...... 3-25
Figure 3-14 Stacked VLAN: Bridging enterprise VLAN-tagged frames............... 3-28
Figure 3-15 Sample routed VLAN ...................................................................... 3-32
Figure 3-16 Sample routed VLAN ...................................................................... 3-33
Figure 3-17 Terminating IPoA traffic on an upstream BRAS ............................. 3-36
Figure 3-18 Sample 1:1 VLAN circuits for bridging IPoA ................................... 3-39
Figure 3-19 Two BRAS with the same IP address in different VLANs................ 3-41
Figure 3-20 Not recommended with unnumbered interfaces ............................ 3-43
Figure 3-21 Sample transparent-bridged PPPoA configuration.......................... 3-47
Figure 3-22 Sample PVC-to-VLAN bridged PPPoA configuration ...................... 3-50
Figure 4-1 Four DSL links using ECMP routes ................................................. 4-17
Figure 4-2 Two routed VLAN uplinks using ECMP routes ............................... 4-21
Figure 4-3 Remote CPE requiring dynamic IP address assignment .................. 4-29
Figure 4-4 Example of a PPPoE session using slot-based address assignment.. 4-37
Figure 4-5 Default route to a local IP router..................................................... 4-41
Figure 4-6 Static route to a subnet ................................................................... 4-42
Figure 4-7 Sample configuration using two soft IP interface addresses............ 4-45
Figure 4-8 Sample network with two levels of anti-spoofing protection ......... 4-48
Figure 4-9 Router-to-router IP connection ...................................................... 4-51
Figure 4-10 A numbered-interface connection .................................................. 4-52
Figure 4-11 Forwarding terminating PVCs on the Gigabit Ethernet interface ... 4-53
Figure 4-12 Aggregating PVCs onto a single virtual circuit using IP routing...... 4-55

xviii Stinger® IP Control Module Configuration Guide
Figures
Figure 4-13 BIR interface on a LIM port ............................................................ 4-56
Figure 4-14 BIR subnet configuration on LIM interface .................................... 4-57
Figure 4-15 BIR/32 configurations ..................................................................... 4-59
Figure 4-16 Bidirectional filtering on a BIR interface......................................... 4-61
Figure 4-17 Sample BIR connection with four static IP addresses ..................... 4-64
Figure 4-18 DHCP relay for an IPoA terminated PVC ........................................ 4-74
Figure 4-19 Option 82 information field formats ............................................... 4-76
Figure 4-20 Sample DHCP usage with LAN management interface................... 4-77
Figure 4-21 Sample DHCP setup on BIR connection ......................................... 4-78
Figure 4-22 PPPoA topology ............................................................................... 4-86
Figure 4-23 PPPoE topology ............................................................................... 4-87
Figure 4-24 Example of a PPPoA session on a DSL interface ............................. 4-91
Figure 4-25 Example of a PPPoE session on a DSL interface.............................. 4-95
Figure 5-1 QoS subsystems ................................................................................. 5-1
Figure 5-2 Sample deployment with VLAN p-bit marking............................... 5-17
Figure 5-3 Using interface grouping to prioritize traffic by service level .......... 5-29
Figure 5-4 Unicast and multicast video share the same priority ...................... 5-31
Figure 5-5 Prioritizing traffic at the connection level and flow level ............... 5-32
Figure 5-6 Stacked VLAN requiring p-bit remarking on the output interface . 5-36
Figure 5-7 Sample N:1 VLAN bridging with traffic shaping and rate limiting.. 5-37
Figure 5-8 Stacked VLAN with rate limiting and traffic shaping ...................... 5-39
Figure 5-9 1:1 bridging VLAN with rate limiting and traffic shaping ............... 5-42
Figure 6-1 L2TP tunneling.................................................................................. 6-2
Figure 6-2 Bringing up a tunnel using PPP authentication .............................. 6-13
Figure 6-3 Primary and secondary tunnel end points ...................................... 6-15
Figure 6-4 Connection-based tunnel authentication........................................ 6-17
Figure 6-5 Server-based tunnel authentication................................................ 6-21
Figure 6-6 Tunnel assignment IDs.................................................................... 6-23
Figure 7-1 Simple diagram of three virtual domains (virtual routers) ............... 7-1
Figure 8-1 OSPF broadcast network on Gigabit Ethernet................................... 8-4
Figure 8-2 OSPF costs for different types of links............................................... 8-5
Figure 8-3 Dividing an OSPF autonomous system into areas ............................ 8-6
Figure 8-4 Sample OSPF topology ...................................................................... 8-7
Figure 8-5 OSPF on a LAN interface................................................................. 8-12
Figure 8-6 OSPF over ATM point to point........................................................ 8-14
Figure 8-7 OSPF NBMA over ATM point to point............................................ 8-15
Figure 9-1 Multicast video sample setup ............................................................ 9-1
Figure 9-2 Multiple MBONE interfaces on trunk or LAN interfaces .................. 9-2
Figure 9-3 Sample configuration with multiple MBONE interfaces................... 9-5
Figure 9-4 Sample configuration of VLAN MBONE interface ............................ 9-7
Figure 9-5 DSL video application with a local MBONE interface..................... 9-16
Figure 9-6 IPTV video sample configuration .................................................... 9-19
Figure 9-7 One VC per multicast group for incoming multicast data streams.. 9-22
Figure 9-8 Multicast server VCs on a trunk interface....................................... 9-24
Figure 9-9 FFW interfaces on multicast-capable modules................................ 9-26
Figure 9-10 Two IGMP Join requests for the same multicast group .................. 9-27
Figure 9-11 Two IGMP Leave requests for the same multicast group................ 9-28
Figure 10-1 PIM-SM on Gigabit Ethernet and trunk interface......................... 10-10

Stinger® IP Control Module Configuration Guide xix
Tables
Table 1-1 Overview of network features........................................................... 1-1
Table 1-2 IP2000 model numbers and platform support ................................. 1-3
Table 1-3 IP2100 control module enhancements ............................................. 1-5
Table 1-4 IP2100 model numbers and platform support ................................. 1-6
Table 1-5 NP port manager profiles .................................................................. 1-9
Table 1-6 Default classification and prioritization........................................... 1-17
Table 3-1 Definition of VLAN terms.................................................................. 3-1
Table 3-2 Traffic restrictions when port blocking is enabled............................. 3-9
Table 3-3 IGMP control packet handling with IGMP snooping enabled......... 3-10
Table 3-4 Maximum number of learned MAC addresses per module ............ 3-11
Table 3-5 Packet handling with PPPoE snooping............................................ 3-20
Table 3-6 Enterprise VLAN tagged frames mapped to a stacked VLAN .......... 3-30
Table 3-7 ARP request packet contents on a configured VLAN ...................... 3-45
Table 3-8 VLAN ID argument added to arptable command............................ 3-53
Table 4-1 Decimal subnet masks and corresponding prefix lengths ................. 4-5
Table 4-2 Profiles for configuring logical IP interfaces for Ethernet ports......... 4-6
Table 4-3 Settings that affect contents of the giaddr field in DHCP packets ... 4-74
Table 4-4 Required encapsulation types for PPPoA and PPPoE ...................... 4-90
Table 4-5 Configurable LCP Echo interaction with LQM.............................. 4-100
Table 4-6 Permanent RADIUS PPPoE server profiles.................................... 4-107
Table 5-1 Descriptions of QoS support for routed, bridged, and VLAN traffic.. 5-2
Table 5-2 Packet marking supported on egress interfaces................................. 5-4
Table 5-3 Comparison passes performed on inbound packet flows .................. 5-9
Table 5-4 Rate limiting terminology ............................................................... 5-12
Table 5-5 Flow-based rate limiting configurations.......................................... 5-14
Table 5-6 VLAN traffic shaping configurations ............................................... 5-25
Table 5-7 Sample IP traffic types and priorities across an ATM PVC .............. 5-31
Table 5-8 Sample IP traffic types and priorities across two PVCs.................... 5-32
Table 5-9 Sample bandwidth limitations ........................................................ 5-33
Table 5-10 Ethernet p-bit remarking table........................................................ 5-36
Table 6-1 Network settings related to L2TP ...................................................... 6-3
Table 6-2 Existing tunnels to the same LNS ..................................................... 6-5
Table 6-3 Tunnels created for clients based on profile settings......................... 6-5
Table 6-4 Tunnels created when user1 dials in first (error not detected) ......... 6-6
Table 6-5 Tunnels created when user2 dials in first (error shown) .................. 6-6
Table 7-1 Administrative commands showing optional vrouter arguments... 7-12
Table 8-1 Description of LSA types ................................................................... 8-3
Table 8-2 Link-state databases for OSPF topology in Figure 8-4 ...................... 8-7
Table 8-3 Shortest-path tree and resulting routing table for Router-1 ............. 8-8
Table 8-4 Shortest-path tree and resulting routing table for Router-2 ............. 8-8
Table 8-5 Shortest-path tree and resulting routing table for Router-3 ............. 8-8
Table 9-1 Maximum multicast groups, multicast users, and bridge groups...... 9-3

xx Stinger® IP Control Module Configuration Guide
Tables
Table 9-2 Sample multicast and unicast client requirements ......................... 9-21
Table 9-3 FFW interfaces registered as MBONE or multicast client................ 9-27
Table 9-4 Packet flow with multicast traffic as the highest priority flow........ 9-29
Table 9-5 Packet flow with unicast traffic as the highest priority flow ........... 9-29
Table 9-6 Packet flow with interleaving priorities (unicast/multicast) ........... 9-30
Table 9-7 Packet flow with interleaving priorities (multicast/unicast) ........... 9-30
Table 10-1 Current level of support for PIM-SM functionality......................... 10-2
Table 11-1 Default filtering behavior ................................................................ 11-1
Table A-1 GigEConfigTable MIB objects.......................................................... A-30
Table A-2 GigETxIntervalTable MIB objects.................................................... A-30
Table A-3 GigETxTotalTable MIB objects ........................................................ A-31
Table A-4 GigERxIntervalTable MIB objects ................................................... A-32
Table A-5 GigERxTotalTable MIB objects ........................................................ A-33
Table A-6 GigEVlanStatTable MIB objects....................................................... A-34
Table A-7 GigEVlanClearStatTable MIB objects .............................................. A-35
Table A-8 Current level of support for PIMv2 MIB tables............................... A-35
This manual suits for next models
7
Table of contents
Other Lucent Control Unit manuals
Popular Control Unit manuals by other brands

Texas Instruments
Texas Instruments DAC38RF8xEVM Series user guide

Honeywell
Honeywell VHL120 Installation and user instructions

Automationdirect.com
Automationdirect.com Productivity P1-04DAL-1 manual

Trox Technik
Trox Technik HESCO HFA installation manual

Giacomini
Giacomini R453HY011 Instruction

DURAG
DURAG D-ISC 100 2 Series operating manual

Kessel
Kessel Staufix Series Installation and operating instructions

Mitsubishi Electric
Mitsubishi Electric AJ65DBTB1-32D user manual

Aim
Aim ARINC 429 Reference manual

schmersal
schmersal SRB 220XV2 V.2 operating instructions

Honeywell
Honeywell R7284B installation instructions

Jung
Jung 4008 TSM Safety instructions