14cf49a43SJulian Elischer.\" Copyright (c) 1996-1999 Whistle Communications, Inc. 24cf49a43SJulian Elischer.\" All rights reserved. 34cf49a43SJulian Elischer.\" 44cf49a43SJulian Elischer.\" Subject to the following obligations and disclaimer of warranty, use and 54cf49a43SJulian Elischer.\" redistribution of this software, in source or object code forms, with or 64cf49a43SJulian Elischer.\" without modifications are expressly permitted by Whistle Communications; 74cf49a43SJulian Elischer.\" provided, however, that: 84cf49a43SJulian Elischer.\" 1. Any and all reproductions of the source or object code must include the 94cf49a43SJulian Elischer.\" copyright notice above and the following disclaimer of warranties; and 104cf49a43SJulian Elischer.\" 2. No rights are granted, in any manner or form, to use Whistle 114cf49a43SJulian Elischer.\" Communications, Inc. trademarks, including the mark "WHISTLE 124cf49a43SJulian Elischer.\" COMMUNICATIONS" on advertising, endorsements, or otherwise except as 134cf49a43SJulian Elischer.\" such appears in the above copyright notice or in the software. 144cf49a43SJulian Elischer.\" 154cf49a43SJulian Elischer.\" THIS SOFTWARE IS BEING PROVIDED BY WHISTLE COMMUNICATIONS "AS IS", AND 164cf49a43SJulian Elischer.\" TO THE MAXIMUM EXTENT PERMITTED BY LAW, WHISTLE COMMUNICATIONS MAKES NO 174cf49a43SJulian Elischer.\" REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, REGARDING THIS SOFTWARE, 184cf49a43SJulian Elischer.\" INCLUDING WITHOUT LIMITATION, ANY AND ALL IMPLIED WARRANTIES OF 194cf49a43SJulian Elischer.\" MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. 204cf49a43SJulian Elischer.\" WHISTLE COMMUNICATIONS DOES NOT WARRANT, GUARANTEE, OR MAKE ANY 214cf49a43SJulian Elischer.\" REPRESENTATIONS REGARDING THE USE OF, OR THE RESULTS OF THE USE OF THIS 224cf49a43SJulian Elischer.\" SOFTWARE IN TERMS OF ITS CORRECTNESS, ACCURACY, RELIABILITY OR OTHERWISE. 234cf49a43SJulian Elischer.\" IN NO EVENT SHALL WHISTLE COMMUNICATIONS BE LIABLE FOR ANY DAMAGES 244cf49a43SJulian Elischer.\" RESULTING FROM OR ARISING OUT OF ANY USE OF THIS SOFTWARE, INCLUDING 254cf49a43SJulian Elischer.\" WITHOUT LIMITATION, ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, 264cf49a43SJulian Elischer.\" PUNITIVE, OR CONSEQUENTIAL DAMAGES, PROCUREMENT OF SUBSTITUTE GOODS OR 274cf49a43SJulian Elischer.\" SERVICES, LOSS OF USE, DATA OR PROFITS, HOWEVER CAUSED AND UNDER ANY 284cf49a43SJulian Elischer.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 294cf49a43SJulian Elischer.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 304cf49a43SJulian Elischer.\" THIS SOFTWARE, EVEN IF WHISTLE COMMUNICATIONS IS ADVISED OF THE POSSIBILITY 314cf49a43SJulian Elischer.\" OF SUCH DAMAGE. 324cf49a43SJulian Elischer.\" 334cf49a43SJulian Elischer.\" Author: Archie Cobbs <archie@whistle.com> 344cf49a43SJulian Elischer.\" 354cf49a43SJulian Elischer.\" $FreeBSD$ 364cf49a43SJulian Elischer.\" $Whistle: ng_cisco.8,v 1.5 1999/01/25 23:46:26 archie Exp $ 374cf49a43SJulian Elischer.\" 384cf49a43SJulian Elischer.Dd January 19, 1999 39bec35b9aSArchie Cobbs.Dt NG_CISCO 4 4051291597SJulian Elischer.Os FreeBSD 414cf49a43SJulian Elischer.Sh NAME 424cf49a43SJulian Elischer.Nm ng_cisco 434cf49a43SJulian Elischer.Nd Cisco HDLC protocol netgraph node type 444cf49a43SJulian Elischer.Sh SYNOPSIS 45f8307e12SArchie Cobbs.Fd #include <netinet/in.h> 464cf49a43SJulian Elischer.Fd #include <netgraph/ng_cisco.h> 474cf49a43SJulian Elischer.Sh DESCRIPTION 484cf49a43SJulian ElischerThe 494cf49a43SJulian Elischer.Nm cisco 504cf49a43SJulian Elischernode type performs encapsulation and de-encapsulation of packets 514cf49a43SJulian Elischerusing the Cisco HDLC protocol. This is a fairly simple 524cf49a43SJulian Elischerprotocol for the transmission of packets across 534cf49a43SJulian Elischerhigh speed synchronous lines. Each packet is prepended with 544cf49a43SJulian Elischeran Ethertype, indicating the protocol. There is also a 5551291597SJulian Elischer.Dq keep alive 5651291597SJulian Elischerand an 5751291597SJulian Elischer.Dq inquire 5851291597SJulian Elischercapability. 594cf49a43SJulian Elischer.Pp 604cf49a43SJulian ElischerThe 614cf49a43SJulian Elischer.Dv downstream 624cf49a43SJulian Elischerhook should connect to the synchronous line. On the other side 634cf49a43SJulian Elischerof the node are the 644cf49a43SJulian Elischer.Dv inet , 654cf49a43SJulian Elischer.Dv atalk , 664cf49a43SJulian Elischerand 674cf49a43SJulian Elischer.Dv ipx 684cf49a43SJulian Elischerhooks, which transmit and receive raw IP, AppleTalk, and IPX packets, 694cf49a43SJulian Elischerrespectively. Typically these hooks would connect to the corresponding 704cf49a43SJulian Elischerhooks on an 71bec35b9aSArchie Cobbs.Xr ng_iface 4 724cf49a43SJulian Elischertype node. 734cf49a43SJulian Elischer.Sh IP Configuration 744cf49a43SJulian ElischerIn order to function properly for IP traffic, the node must be informed 754cf49a43SJulian Elischerof the local IP address and netmask setting. This is because the protocol 7651291597SJulian Elischerincludes an 7751291597SJulian Elischer.Dq inquire 7851291597SJulian Elischerpacket which we must be prepared to answer. 797f9d26bdSMike PritchardThere are two ways to accomplish this, manually and automatically. 804cf49a43SJulian Elischer.Pp 814cf49a43SJulian ElischerWhenever such an inquire packet is received, the node sends a 824cf49a43SJulian Elischer.Dv NGM_CISCO_GET_IPADDR 834cf49a43SJulian Elischercontrol message to the peer node connected to the 844cf49a43SJulian Elischer.Dv inet 854cf49a43SJulian Elischerhook (if any). 864cf49a43SJulian ElischerIf the peer responds, then that response is used. This is the automatic method. 874cf49a43SJulian Elischer.Pp 884cf49a43SJulian ElischerIf the peer does not respond, the node falls back on its cached value 894cf49a43SJulian Elischerfor the IP address and netmask. This cached value can be set at any time 904cf49a43SJulian Elischerwith a 914cf49a43SJulian Elischer.Dv NGM_CISCO_SET_IPADDR 924cf49a43SJulian Elischermessage, and this is the manual method. 934cf49a43SJulian Elischer.Pp 944cf49a43SJulian ElischerIf the 954cf49a43SJulian Elischer.Dv inet 964cf49a43SJulian Elischerhook is connected to the 974cf49a43SJulian Elischer.Dv inet 984cf49a43SJulian Elischerhook of an 99bec35b9aSArchie Cobbs.Xr ng_iface 4 1004cf49a43SJulian Elischernode, as is usually the case, then configuration is automatic as the 101bec35b9aSArchie Cobbs.Xr ng_iface 4 1024cf49a43SJulian Elischerunderstands the 1034cf49a43SJulian Elischer.Dv NGM_CISCO_GET_IPADDR 1044cf49a43SJulian Elischermessage. 1054cf49a43SJulian Elischer.Sh HOOKS 1064cf49a43SJulian ElischerThis node type supports the following hooks: 1074cf49a43SJulian Elischer.Pp 1084cf49a43SJulian Elischer.Bl -tag -width foobarbazio 1094cf49a43SJulian Elischer.It Dv downstream 1104cf49a43SJulian ElischerThe connection to the synchronous line. 1114cf49a43SJulian Elischer.It Dv inet 1124cf49a43SJulian ElischerIP hook. 1134cf49a43SJulian Elischer.It Dv atalk 1144cf49a43SJulian ElischerAppleTalk hook. 1154cf49a43SJulian Elischer.It Dv ipx 1164cf49a43SJulian ElischerIPX hook 1174cf49a43SJulian Elischer.El 1184cf49a43SJulian Elischer.Sh CONTROL MESSAGES 1194cf49a43SJulian ElischerThis node type supports the generic control messages, plus the following: 1204cf49a43SJulian Elischer.Bl -tag -width foo 1214cf49a43SJulian Elischer.It Dv NGM_CISCO_SET_IPADDR 1224cf49a43SJulian ElischerThis command takes an array of two 1234cf49a43SJulian Elischer.Dv "struct in_addr" 1244cf49a43SJulian Elischerarguments. The first is the IP address of the corresponding interface 1254cf49a43SJulian Elischerand the second is the netmask. 1264cf49a43SJulian Elischer.It Dv NGM_CISCO_GET_IPADDR 1274cf49a43SJulian ElischerThis command returns the IP configuration in the same format used by 1284cf49a43SJulian Elischer.Dv NGM_CISCO_SET_IPADDR . 1294cf49a43SJulian ElischerThis command is also 1304cf49a43SJulian Elischer.Em sent 1314cf49a43SJulian Elischerby this node type to the 1324cf49a43SJulian Elischer.Dv inet 1334cf49a43SJulian Elischerpeer whenever an IP address inquiry packet is received. 1344cf49a43SJulian Elischer.It Dv NGM_CISCO_GET_STATUS 1354cf49a43SJulian ElischerReturns a 1364cf49a43SJulian Elischer.Dv "struct ngciscostat" : 1374cf49a43SJulian Elischer.Bd -literal -offset 4n 1384cf49a43SJulian Elischerstruct ngciscostat { 1394cf49a43SJulian Elischer u_int32_t seq_retries; /* # unack'd retries */ 1404cf49a43SJulian Elischer u_int32_t keepalive_period; /* in seconds */ 1414cf49a43SJulian Elischer}; 1424cf49a43SJulian Elischer.Ed 1434cf49a43SJulian Elischer.El 1444cf49a43SJulian Elischer.Sh SHUTDOWN 1454cf49a43SJulian ElischerThis node shuts down upon receipt of a 1464cf49a43SJulian Elischer.Dv NGM_SHUTDOWN 1474cf49a43SJulian Elischercontrol message, or when all hooks have been disconnected. 1484cf49a43SJulian Elischer.Sh BUGS 1494cf49a43SJulian ElischerNot all of the functionality has been implemented. For example, 1504cf49a43SJulian Elischerthe node does not support querying the remote end for its IP address 1514cf49a43SJulian Elischerand netmask. 1524cf49a43SJulian Elischer.Sh SEE ALSO 1534cf49a43SJulian Elischer.Xr netgraph 4 , 154bec35b9aSArchie Cobbs.Xr ng_iface 4 , 155bec35b9aSArchie Cobbs.Xr ngctl 8 1564cf49a43SJulian Elischer.Rs 1574cf49a43SJulian Elischer.%A D. Perkins 1584cf49a43SJulian Elischer.%T "Requirements for an Internet Standard Point-to-Point Protocol" 1594cf49a43SJulian Elischer.%O RFC 1547 1604cf49a43SJulian Elischer.Re 1614cf49a43SJulian Elischer.Sh LEGAL 16251291597SJulian Elischer.Tn Cisco 16351291597SJulian Elischeris a trademark of Cisco Systems, Inc. 16451291597SJulian Elischer.Sh HISTORY 16551291597SJulian ElischerThe 16651291597SJulian Elischer.Nm 16751291597SJulian Elischernode type was implemented in 16851291597SJulian Elischer.Fx 4.0 . 1694cf49a43SJulian Elischer.Sh AUTHORS 17051291597SJulian Elischer.An Julian Elischer Aq julian@whistle.com , 17151291597SJulian Elischer.An Archie Cobbs Aq archie@whistle.com 172