Outgoing authentication protocol, 3 outgoing authentication protocol – ZyXEL Communications Prestige 642 User Manual
Page 75
Prestige 642 ADSL Internet Access Router
4-4
Remote Node Configuration
Field
Description
Options
z
CHAP/PAP - Your Prestige will accept either CHAP or
PAP when requested by this remote node.
CHAP/PAP
z
CHAP - accept CHAP only.
CHAP
z
PAP - accept PAP only.
PAP
Route
This field determines the protocols that your Prestige will
route.
Bridge
Bridging is used for protocols that the Prestige does not
support, e.g., SNA, or not turned on in the previous Route
field. When bridging is enabled, your Prestige will forward
any packet that it does not route to this remote node;
otherwise, the packets are discarded. Press space bar to
toggle the options.
Yes or No
Edit PPP Options
To edit the PPP options for this remote node, move the
cursor to this field, use the space bar to select Yes and
press [ENTER]. This will bring you to Menu 11.2 - Remote
Node PPP Options. For more information on configuring
PPP options, see the section Editing PPP Options. Press
space bar to toggle Yes then press [ENTER].
Rem IP Addr
Enter the IP address of the remote gateway.
Edit IP/IPX/Bridge
Press the space bar to select Yes and press ENTER to go
to Menu 11.3 - Remote Node Network Layer Options menu.
Yes or No
Session Option:
Edit Filter Sets
Use the space bar to toggle this field to Yes and press
[ENTER] to open Menu 11.5 to edit the filter sets. See the
Remote Node Filter section for more details.
Default=
No
PPPoE Idle
Timeout(sec)=
This value specifies the number of idle seconds that elapse
before the Prestige automatically disconnects the PPPoE
session.
100
(default)
PPPoE Service Name
This is valid only when you have chosen PPPoE
encapsulation. If you are using PPPoE encapsulation, then
type the name of your PPPoE service here.
poellc
Once you have completed filling in Menu 11.1 – Remote Node Profile, press [ENTER] at the message
[Press ENTER to Confirm…] to save your configuration, or press [Esc] at any time to cancel.
4.1.3 Outgoing
Authentication
Protocol
Generally speaking, you should employ the strongest authentication protocol possible, for obvious reasons.
However, some vendor’s implementation includes specific authentication protocol in the user profile. It