Installation guide
Chapter 6. Network Configuration 81
Figure 6-10. Token Ring Device
Be sure to click Apply to save the changes.
After adding the device, you can edit its configuration by selecting the device from the device
list and clicking Edit. For example, you can configure whether the device is started at boot
time.
When the device is added, it is not activated, as seen by its Inactive status. To activate the
device, select it from the device list, and click the Activate button.
6.7. Establishing a CIPE Connection
CIPE stands for Crypto IP Encapsulation. It is used to configure an IP tunneling device. For
example, CIPE can be used to grant access from the outside world into a Virtual Private
Network (VPN). If you need to setup a CIPE device, contact your system administrator for
the correct values.
Figure 6-11. CIPE Settings