User's Manual

Prestige P645 ADSL Internet Access Router
4-4 Remote Node Configuration
FIELD DESCRIPTION EXAMPLE
ENCAP the only available protocol is IP.
Bridge Bridging is used for protocols that are not supported by the
Prestige, e.g., SNA, or are not turned on in the previous Route
field. Select Yes to enable and No to disable. When bridging is
enabled, your Prestige will forward any packet that it does not
route to this remote node; otherwise, the packets are discarded.
No
(default)
Edit PPP Options Only available when using PPPoE or PPP. To edit the PPP
options for this remote node, move the cursor to this field, use
the [SPACE BAR] to select Yes and press [ENTER]. This will
bring you to Menu 11.2 - Remote Node PPP Options. For
more information on configuring PPP options, see the section
Editing PPP Options
.
No
(default)
Rem IP Addr Enter the IP address of the remote gateway or leave this field
set to 0.0.0.0 for connecting to your ISP.
0.0.0.0
Edit IP/IPX/Bridge
Press the [SPACE BAR] to select Yes and press [ENTER] to go
to Menu 11.3 - Remote Node Network Layer Options menu.
No
Session Options:
Edit Filter Sets
Use the [SPACE BAR] to select Yes in this field and press
[ENTER] to open menu 11.5 to edit the filter sets. See the
Remote Node Filter section for more details.
No
(default)
PPPoE Idle
Timeout (sec)
This value specifies the number of idle seconds that elapse
before the Prestige automatically disconnects the PPPoE
session.
N/A
PPPoE Service
Name
Only available when PPPoE encapsulation is used. Enter the
name of your PPPoE service provider. This is the same as
Service Name in menu 4.
N/A
Schedule Sets Only available when using PPPoE. You can select up to four
schedule sets here and configure them in menu 26. For more
details, please see the Call Scheduling chapter.
N/A
Once you have completed filling in Menu 11.1 – Remote Node Profile, press [ENTER] at the message
[Press ENTER to Confirm…] to save your configuration, or press [ESC] at any time to cancel.
4.1.3 Outgoing Authentication Protocol
For obvious reasons you should generally employ the strongest authentication protocol possible. However,
some vendors’ implementation includes a specific authentication protocol in the user profile. It will
disconnect if the negotiated protocol is different from that in the user profile, even when the negotiated
protocol is stronger than specified. If you encounter a case where the peer disconnects right after a