|
Command or Action |
Purpose |
Step 1 |
enable
Example:
|
Enables privileged EXEC mode.
-
Enter your password if prompted.
|
Step 2 |
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode. |
Step 3 |
key chain name-of-chain
Example:
Router(config)# key chain border1_PFR
|
Enables key-chain authentication and enters key-chain configuration mode.
-
Key-chain authentication protects the communication session between the master controller and the border router. The key ID and key string must match in order for communication to be established.
-
In this example, a key chain is created for use with border router 1.
|
Step 4 |
key key-id
Example:
Router(config-keychain)# key 1
|
Identifies an authentication key on a key chain.
-
The key ID must match the key ID configured on the border router.
|
Step 5 |
key-string text
Example:
Router(config-keychain-key)# key-string b1
|
Specifies the authentication string for the key and enters key-chain key configuration mode.
-
The authentication string must match the authentication string configured on the border router.
-
Any encryption level can be configured.
-
In this example, a key string is created for use with border router 1.
|
Step 6 |
exit
Example:
Router(config-keychain-key)# exit
|
Exits key-chain key configuration mode and returns to key-chain configuration mode. |
Step 7 |
Repeat Step 3 through Step 7. |
Exits key-chain configuration mode and returns to global configuration mode. |
Step 8 |
Repeat Step 3 through Step 7 with appropriate changes to configure key chain authentication for each border router. |
-- |
Step 9 |
pfr master
Example:
Router(config)# pfr master
|
Enters PfR master controller configuration mode to configure a router as a master controller.
-
A master controller and border router process can be enabled on the same router (for example, in a network that has a single router with two exit links to different service providers).
|
Step 10 |
logging
Example:
Router(config-pfr-mc)# logging
|
Enables syslog messages for a master controller or border router process.
-
The notice level of syslog messages is enabled by default.
|
Step 11 |
border ip-address [key-chain key-chain-name]
Example:
Router(config-pfr-mc)# border 10.1.1.2 key-chain border1_PFR
|
Enters PfR-managed border router configuration mode to establish communication with a border router.
-
An IP address is configured to identify the border router.
-
At least one border router must be specified to create an PfR-managed network. A maximum of ten border routers can be controlled by a single master controller.
-
The value for the key-chain-name argument must match the key-chain name configured in Step 3.
Note |
The key-chain keyword and key-chain-name argument must be entered when a border router is initially configured. However, this keyword is optional when reconfiguring an existing border router. |
|
Step 12 |
interface type number external
Example:
Router(config-pfr-mc-br)# interface GigabitEthernet 0/0/0 external
|
Configures a border router interface as an PfR-managed external interface.
-
External interfaces are used to forward traffic and for active monitoring.
-
A minimum of two external border router interfaces are required in an PfR-managed network. At least one external interface must be configured on each border router. A maximum of 20 external interfaces can be controlled by single master controller.
Tip |
Configuring an interface as an PfR-managed external interface on a router enters PfR border exit interface configuration mode. In this mode, you can configure maximum link utilization or cost-based optimization for the interface. |
Note |
Entering the interface command without the external or internal keyword places the router in global configuration mode and not PfR border exit configuration mode. The no form of this command should be applied carefully so that active interfaces are not removed from the router configuration. |
|
Step 13 |
exit
Example:
Router(config-pfr-mc-br-if)# exit
|
Exits PfR-managed border exit interface configuration mode and returns to PfR-managed border router configuration mode. |
Step 14 |
interface type number internal
Example:
Router(config-pfr-mc-br)# interface GigabitEthernet 1/0/0 internal
|
Configures a border router interface as an PfR controlled internal interface.
-
Internal interfaces are used for passive monitoring only. Internal interfaces do not forward traffic.
-
At least one internal interface must be configured on each border router.
|
Step 15 |
exit
Example:
Router(config-pfr-mc-br)# exit
|
Exits PfR-managed border router configuration mode and returns to PfR master controller configuration mode. |
Step 16 |
Repeat Step 11 through Step 15 with appropriate changes to establish communication with each border router. |
-- |
Step 17 |
keepalive timer
Example:
Router(config-pfr-mc)# keepalive 10
|
(Optional) Configures the length of time that an PfR master controller will maintain connectivity with an PfR border router after no keepalive packets have been received.
-
The example sets the keepalive timer to 10 seconds. The default keepalive timer is 60 seconds.
|
Step 18 |
end
Example:
Router(config-pfr-mc-learn)# end
|
Exits PfR Top Talker and Top Delay learning configuration mode and returns to privileged EXEC mode. |
Step 19 |
show running-config
Example:
Router# show running-config
|
(Optional) Displays the running configuration to verify the configuration entered in this task. |