Enterasys Networks Security Router X-PeditionTM User Manual

Page 19

Advertising
background image

xvii

Describing the XSR’s PIM-SM v2 Features .................................................................................................... 7-7

Phase 1: Building a Shared Tree ............................................................................................................. 7-8
Phase 2: Building Shortest Path Tree Between Sender & RP ................................................................. 7-8
Phase 3: Building Shortest Path Tree Between Sender & Receiver ........................................................ 7-9
Neighbor Discovery and DR Election ..................................................................................................... 7-10
PIM Register Message ........................................................................................................................... 7-11
PIM Join/Prune Message ....................................................................................................................... 7-11
Bootstrap & Rendezvous Point .............................................................................................................. 7-11
Assert Processing .................................................................................................................................. 7-11
Source-Specific Multicast ....................................................................................................................... 7-12
PIM SM over Frame Relay ..................................................................................................................... 7-12

PIM Configuration Examples ........................................................................................................................ 7-13

Chapter 8: Configuring PPP

Overview ......................................................................................................................................................... 8-1
PPP Features ................................................................................................................................................. 8-1

Link Control Protocol (LCP) ..................................................................................................................... 8-2
Network Control Protocol (NCP) .............................................................................................................. 8-2
Authentication .......................................................................................................................................... 8-3

Password Authentication Protocol (PAP) ........................................................................................... 8-3
Challenge Handshake Authentication Protocol (CHAP)..................................................................... 8-3
Microsoft Challenge Handshake Protocol (MS-CHAP) ...................................................................... 8-3

Link Quality Monitoring (LQM) ................................................................................................................. 8-4
Multilink PPP (MLPPP) ............................................................................................................................ 8-4
Multi-Class MLPPP .................................................................................................................................. 8-5

MLPPP Packet Fragmentation and Serialization Transmission Latency............................................ 8-6
Fragment Interleaving Over the Link .................................................................................................. 8-7
Multilink Head Format Negotiation ..................................................................................................... 8-7
Events and Alarms ............................................................................................................................. 8-8

IP Control Protocol (IPCP) ....................................................................................................................... 8-8

IP Address Assignment ...................................................................................................................... 8-9

PPP Bandwidth Allocation/Control Protocols (BAP/BAPC) ...................................................................... 8-9

Configuring PPP with a Dialed Backup Line ................................................................................................. 8-10
Configuring a Synchronous Serial Interface ................................................................................................. 8-10
Configuring a Dialed Backup Line ................................................................................................................ 8-11

Configuring the Dialer Interface ............................................................................................................. 8-11
Configuring the Physical Interface for the Dialer Interface ..................................................................... 8-11
Configuring the Interface as the Backup Dialer Interface ....................................................................... 8-12

Configuring MLPPP on a Multilink/Dialer interface ....................................................................................... 8-13

Multilink Example ................................................................................................................................... 8-13
Dialer Example ....................................................................................................................................... 8-13

Configuring BAP ........................................................................................................................................... 8-14

Dual XSRs: One Router Using DoD with Call Request .......................................................................... 8-14

XSR1 Configuration.......................................................................................................................... 8-14
XSR2 Configuration.......................................................................................................................... 8-15

Dual XSRs: BAP Using Call/Callback Request ...................................................................................... 8-16

XSR1 Configuration.......................................................................................................................... 8-16
XSR2 Configuration.......................................................................................................................... 8-16

Advertising