User manual
Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
vii
6.10.3 Disabling the re-group of the fragments of the MP packets..........................................................6-43
6.10.4 Configuring the packet order guarantee function on the MP-group interface...............................6-44
6.10.5 Checking the configuration ...........................................................................................................6-45
6.11 Maintaining PPP and MP.........................................................................................................................6-46
6.12 Configuration examples...........................................................................................................................6-47
6.12.1 Example for configuring PAP authentication ................................................................................6-47
6.12.2 Example for configuring unidirectional CHAP authentication .....................................................6-50
6.12.3 Example for configuring bidirectional CHAP authentication .......................................................6-52
6.12.4 Example for binding MPs into the MP-group ...............................................................................6-54
6.12.5 Example for configuring MP direct binding using the VT............................................................6-59
6.12.6 Example for configuring MP authentication binding using the VT...............................................6-62
6.13 Troubleshooting.......................................................................................................................................6-68
6.13.1 Physical link is not in the up state .................................................................................................6-68
6.13.2 Link is always in the down state....................................................................................................6-69
6.13.3 CHAP authentication of a PPP link fails .......................................................................................6-69
6.13.4 MP configured through the VT works abnormally........................................................................6-70
7 LAPB and X.25 configuration...................................................................................................7-1
7.1 Introduction .................................................................................................................................................7-3
7.1.1 X.25...................................................................................................................................................7-3
7.1.2 X.25 Principle....................................................................................................................................7-4
7.1.3 LAPB.................................................................................................................................................7-5
7.1.4 X.25 switching function ....................................................................................................................7-6
7.1.5 X.25 load balancing...........................................................................................................................7-6
7.1.6 XOT ..................................................................................................................................................7-8
7.2 LAPB configuration ....................................................................................................................................7-9
7.2.1 Establishing the configuration task ...................................................................................................7-9
7.2.2 Configuring the link layer protocol of an interface as LAPB..........................................................7-10
7.2.3 Configuring LAPB parameters........................................................................................................7-10
7.2.4 Checking the configuration .............................................................................................................7-12
7.3 Configuring an X.25 interface...................................................................................................................7-12
7.3.1 Establishing the configuration task .................................................................................................7-12
7.3.2 Configuring X.25 attributes.............................................................................................................7-13
7.3.3 Configuring X.25 interface supplementary parameter ....................................................................7-18
7.3.4 Configuring an X.25 sub-interface..................................................................................................7-21
7.3.5 Checking the configuration .............................................................................................................7-22
7.4 Configuring X.25 datagram transmission..................................................................................................7-22
7.4.1 Establishing the configuration tTask ...............................................................................................7-22
7.4.2 Configuring X.25 datagram transmission........................................................................................7-23
7.4.3 Configuring supplementary parameters of X.25 datagram Transmission .......................................7-25
7.4.4 Configuring X.25 switching............................................................................................................7-29
7.4.5 Checking the configuration .............................................................................................................7-30