PPTP
763
Programming Operations Guide
3
Click the
Save
button.
Modifying a Destination Network
1
Click the Destination Network to modify.
2
On the
Configuration
menu, click
Modify Destination Network
.
The Destination Networks screen appears.
3
Change the Destination Networks attributes.
4
Click the
Save
button.
Subnet Mask
Allows you to specify the subnet mask for the destination network.
You require Subnet Mask only if you have entered a value in the Destination Network box.
Always use a valid subnet address and mask pair. If you are using a mask that contains more
than 1 host address, then always specify the subnet number that corresponds to that subnet
and not any other address. For example, if you are using a mask of 24 bits, (255.255.255.0)
then use a subnet number of 192.168.100.0 and not something like 192.168.100.11 (where
the last number should have been 0).
Enter the subnet mask in the dotted format.
Preference Level
Allows you to specify the preference level for this tunnel.
When there are multiple tunnels assigned to a destination network, the preference level
determines which tunnel is used to connect to the destination network. Business
Communications Manager attempts to use the tunnel with the lowest preference number first.
If the connection fails, Business Communications Manager retries the connection as many
time as is specified in the Connect retries box on the Tunnel Link Parameters screen. After the
specified number of retries fails, Business Communications Manager attempts to use the
tunnel with the next lowest preference level. Business Communications Manager continues to
attempt to establish a tunnel until a connection succeeds or all of the tunnels to the destination
network have failed.
For example, a site may have two connections to the internet to take advantage of varied
capacities and costs. You can maintain a PPTP server at each of these connection points.
When you are specifying PPTP tunnels to reach private networks in this site, you may want to
use the connection that is most cost-effective first and use the other connection only if the
most cost effective connection is not in service. To do this, you create two tunnels to reach the
site. You specify the corresponding PPTP server addresses for each tunnel, but enter the
same destination addresses (unless you want to distinguish between the normal and stand-by
operation). However, for the most desired connection to the site, you specify higher
precedence level for the tunnel by putting a lower value for Preferred Level than for the other
tunnel.
When a packet is received by Business Communications Manager with the destination
address of this site, Business Communications Manager tries to bring up the most desired
tunnel. If the connection succeeds, tunnel is established. If Business Communications
Manager cannot connect to this tunnel after the specified number of retries, it attempts to bring
up the 'less desired' tunnel using its parameters.
This feature is useful for providing redundant links to sites that have multiple connections to
the internet.
Note that this parameter is only used with On Demand tunnels.
Table 224
PPTP Destination Networks attributes (Continued)
Attribute
Description
Summary of Contents for BCM 3.7
Page 4: ...4 Software licensing N0008589 3 3...
Page 32: ...32 Contents N0008589 3 3 W 937 Index 939...
Page 46: ...46 Tables N0008589 3 3...
Page 64: ...64 How to get help N0008589 3 3...
Page 90: ...90 Manually activating Telnet N0008589 3 3...
Page 116: ...116 Delayed system restart N0008589 3 3...
Page 194: ...194 Configuring a data module N0008589 3 3...
Page 276: ...276 Setting line telco features N0008589 3 3...
Page 310: ...310 Using COS passwords N0008589 3 3...
Page 364: ...364 Enhanced 911 E911 configuration N0008589 3 3...
Page 380: ...380 Renumbering DNs N0008589 3 3...
Page 398: ...398 Saving wizard pages on your computer N0008589 3 3...
Page 458: ...458 Voice Mail settings N0008589 3 3...
Page 488: ...488 Setting system telco features N0008589 3 3...
Page 508: ...508 Other programming that affects public networking N0008589 3 3...
Page 522: ...522 PRI networking using Call by Call services N0008589 3 3...
Page 592: ...592 Monitoring Hunt groups N0008589 3 3...
Page 636: ...636 Configuring Double Density N0008589 3 3...
Page 640: ...640 Using the Network Update Wizard N0008589 3 3...
Page 666: ...666 Importing and Exporting DHCP data N0008589 3 3...
Page 722: ...722 Restarting the router N0008589 3 3...
Page 726: ...726 Important Web Cache considerations N0008589 3 3...
Page 748: ...748 Configuring an Interface with NAT N0008589 3 3...
Page 794: ...794 IPSec N0008589 3 3...
Page 818: ...818 Configuring the Policy Agent characteristics N0008589 3 3...
Page 832: ...832 Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3 3...
Page 876: ...876 ISDN Programming N0008589 3 3...
Page 1004: ...1004 Index N0008589 3 3...