4. CONFIGURATION
4.4
PPPoE Configuration
PPPoE (Point-to-Point over Ethernet) is a network protocol which encapsulates PPPoE
frames into Ethernet frames. The router uses the PPPoE client to connect to devices support-
ing a PPPoE bridge or server. The bridge or server is typically an ADSL router.
To open the
PPPoE Configuration
page, select the
PPPoE
menu item. If you mark the
Create PPPoE connection
check box, then the router attempts to establish a PPPoE connec-
tion after boot up. After connecting, the router obtains the IP address of the device to which
it is connected. The communications from a device behind the PPPoE server is forwarded to
the router.
Item
Description
Username
Username for secure access to PPPoE
Password
Password for secure access to PPPoE
Authentication
Authentication protocol in GSM network
•
PAP or CHAP
– The router selects the authentication method.
•
PAP
– The router uses the PAP authentication method.
•
CHAP
– The router uses the CHAP authentication method.
MRU
Specifies the Maximum Receiving Unit. The MRU identifies the max-
imum packet size, that the router can receive in a given environ-
ment. The default value is 1492 bytes. Other settings can cause in-
correct data transmission.
MTU
Specifies the Maximum Transmission Unit. The MTU identifies the
maximum packet size, that the router can transfer in a given envi-
ronment. The default value is 1492 bytes. Other settings can cause
incorrect data transmission.
Table 26: PPPoE configuration
Figure 24: PPPoE configuration
Setting a bad packet size value (MRU, MTU) can cause unsuccessful transmission.
37
Summary of Contents for SPECTRE V3
Page 1: ...Configuration Manual for v3 Routers ...
Page 22: ...3 STATUS Figure 4 WiFi Scan 13 ...
Page 32: ...4 CONFIGURATION Figure 12 Example 1 LAN Configuration Page 23 ...
Page 37: ...4 CONFIGURATION Figure 19 Example of VRRP configuration backup router 28 ...
Page 44: ...4 CONFIGURATION Figure 20 Mobile WAN Configuration 35 ...
Page 51: ...4 CONFIGURATION Figure 25 WiFi Configuration 42 ...
Page 74: ...4 CONFIGURATION Figure 39 IPsec Tunnels Configuration 65 ...
Page 105: ...4 CONFIGURATION Figure 63 Example 2 USB port configuration 96 ...