A SERVICE OF

logo

Prestige 201 ISDN Access Router
vi Table of Contents
2.11.1 General Ethernet Setup....................................................................................................................2-17
Chapter 3..............................................................................................................................3-1
Internet Access.....................................................................................................................3-1
3.1 Factory Ethernet Defaults ............................................................................................3-1
3.2 TCP/IP Parameters .....................................................................................................3-1
3.2.1 IP Address and Subnet Mask.................................................................................................................3-1
3.2.2 RIP Setup..................................................................................................................................................3-2
3.2.3 DHCP Configuration...............................................................................................................................3-2
3.3 TCP/IP Ethernet Setup and DHCP................................................................................3-4
3.4 Internet Access Configuration.......................................................................................3-7
3.4.1 Example Internet Access Configuration..............................................................................................3-8
3.5 Single User Account ..................................................................................................3-10
3.5.1 Advantages of SUA...............................................................................................................................3-11
3.5.2 Single User Account Configuration....................................................................................................3-11
3.6 Multiple Servers behind SUA......................................................................................3-12
3.6.1 Configuring a Server behind SUA......................................................................................................3-12
Chapter 4..............................................................................................................................4-1
Remote Node Configuration.................................................................................................4-1
4.1 Remote Node Setup....................................................................................................4-1
4.1.1 Remote Node Profile ...............................................................................................................................4-1
4.1.2 Outgoing Authentication Protocol........................................................................................................4-4
4.1.3 Remote Node Filter..................................................................................................................................4-5
Chapter 5..............................................................................................................................5-1
Static Route Setup...............................................................................................................5-1
Chapter 6..............................................................................................................................6-1
Filter Configuration ..............................................................................................................6-1
6.1 About Filtering.............................................................................................................6-1
6.2 Configuring a Filter Set ................................................................................................6-4
6.2.1 Filter Rules Summary Menus................................................................................................................6-5
6.3 Configuring a Filter Rule..............................................................................................6-7