User manual
Table of Contents
xi
IP Terminal Server Setup 4-1
Configuring the Remote Computer..............................................4-2
Configuring Login Hosts ............................................................. 4-3
Configuring Login Users ............................................................. 4-5
IP Terminal Service Case Study ..................................................4-9
Network Dial In Access 5-1
Overview......................................................................................5-3
IP Parameters .................................................................................. 5-3
IPX Parameters ............................................................................... 5-4
AppleTalk Parameters..................................................................... 5-4
Remote Computer Setup..............................................................5-5
Configuring Address Pools..........................................................5-6
Configuring an IP Address Pool...................................................... 5-6
Configuring an IPX Address Pool................................................... 5-6
Configuring an ARAP AppleTalk Address Pool............................. 5-7
User Configuration Overview......................................................5-7
NETServer Defaults........................................................................ 5-8
Remote Addressing Options............................................................ 5-8
Network User Types ....................................................................... 5-8
Configuring an IP User ................................................................5-9
Configuring an IPX User ...........................................................5-12
Configuring an AppleTalk User ................................................5-15
Configuring PPP Parameters......................................................5-17
Configuring Additional Parameters...........................................5-18
Remote Access Case Study........................................................5-19
Assumptions.................................................................................. 5-19
Configuring User_A...................................................................... 5-20
Configuring User_B...................................................................... 5-20
Configuring User_C...................................................................... 5-21