![Nortel 400 Using Manual Download Page 176](http://html.mh-extra.com/html/nortel/400/400_using-manual_1706871176.webp)
176
Chapter 6 IP security and VPN
300868-G
Figure 89 Ping Configuration dialog box
4
Enter the IP address or host name of the remote computer you want to ping.
When using ping from Instant Internet-to-Instant Internet, it is best to select
the private address of the remote Instant Internet to ping to. When using ping
from Instant Internet to a CES, it is best to select the private address of the
Contivity to ping.
5
Enter the length of the data.
6
Enter the time, in seconds, for the interval of time between packets.
7
Enter the period of time to wait for a ping to come back.
8
Select the type of ping to run:
•
Monitor – Used for IPsec, this option checks the validity of a tunnel.
After a series of failed pings, this option destroys the tunnel. This type of
ping does not initiate a dial-up connection or cause a dial-up connection
to be kept active. The ping monitors the validity of the tunnel.
•
Control – Manages the operating status of an interface. This type of ping
can be used to force a connection to be kept active at all times.
•
Background – Runs the ping in the background. This can be used to keep
a dial-up connection active.
9
If you selected Monitor or Control, select the interface to monitor or control.
Otherwise skip this step.
Summary of Contents for 400
Page 16: ...16 Contents 300868 G ...
Page 22: ...22 Figures 300868 G ...
Page 24: ...24 Tables 300868 G ...
Page 92: ...92 Chapter 2 User access administration 300868 G ...
Page 114: ...114 Chapter 3 Internet activity logging 300868 G ...
Page 166: ...166 Chapter 5 Advanced IP configuration 300868 G ...
Page 200: ...200 Chapter 6 IP security and VPN 300868 G ...
Page 256: ...256 Chapter 8 Advanced communications configuration 300868 G ...
Page 302: ...302 Chapter 10 Instant Internet unit configuration support and diagnostics 300868 G ...
Page 314: ...314 Appendix A Troubleshooting and error messages 300868 G ...
Page 344: ......