User`s guide

Index
IN-3
8000-A2-GB21-10 June 1997
tFTP client, 3-3
MCC card
assigning an IP address to the MCC card, A-2
description, 1-4
proxy ARP, 4-7
resetting the card, A-9
static route example, 6-3
MIB compliance, 8-1
multicasting, 2-2
N
Network Access Provider (NAP), 1-8
network address rule type, 7-2
network configuration worksheets, A-1
Network Management System (NMS), 8-1
network model
customer domain components, 4-1
discovering devices on the network, 4-6
domain types, 1-11
management domain components, 4-5
network model
Network Access Provider (NAP), 1-8
Network Service Provider (NSP), 1-9
overview, 1-7
service subscriber, 1-8
network route address, 6-1
Network Service Provider (NSP), 1-9
O
organization of document, vi
output filter, 7-1
P
peer IP addresses, 5-7
ping program, 3-2
Point–of–Presence (POP), 1-9
Point–to–Point Protocol (PPP), 2-2
port naming convention, 5-1
POTS splitter, 1-1, 1-5
preventing unauthorized access, C-5
preventing unwanted traffic from leaking, 7-3
product–related documents, vii
proxy ARP, 2-3, 4-3, 4-7
R
recording your configuration settings, 5-10
regional center, 1-9
related documents, vii
Remote Termination Unit (RTU)
configuring the management domain IP addresses,
A-10
description, 1-5
proxy ARP, 4-4
resetting
the DSL card, A-20
the MCC card, A-9
routing
destination–based, 6-1
source–based, 6-5
routing table
description, 6-1
types of addresses, 6-1
rule types
host address, 7-2
network address, 7-2
socket address, 7-2
S
s1b, 5-1, 5-7, A-4
service security filtering scenario, 7-4
service subscriber, 1-8
setting the peer IP addresses, 5-7
Simple Network Management Protocol (SNMP), 8-1
SNMP agent
defining a community, C-2
enabling traps, C-2
general configuration, 8-3
overview, 8-1
preventing unauthorized access, C-5
summarizing the configuration, C-1
SNMP configuration worksheets, C-1
SNMP traps, 8-2, C-2
socket address rule type, 7-2
source route, A-18
source–based routing, 6-5
spoofing, 7-3
static route examples
DSL card static route, 6-4
MCC card static route, 6-3