![Patton electronics ipRocketLink IAD 3086 User Manual Download Page 6](http://html2.mh-extra.com/html/patton-electronics/iprocketlink-iad-3086/iprocketlink-iad-3086_user-manual_4074497006.webp)
Contents
Model 3086 G.SHDSL Integrated Access Device User Guide
6
PCM Mode ...............................................................................................................................................63
PCM Transmit Polarity ............................................................................................................................63
PCM Receive Polarity ...............................................................................................................................63
Loopback ..................................................................................................................................................63
Annex Type ...............................................................................................................................................63
Line Probe .................................................................................................................................................63
Using the 3086 in Routed or Bridged applications ................................................................................................64
Two stand-alone units directly connected .......................................................................................................64
Ethernet extension (HDLC – PPPOH) Bridged .......................................................................................64
Network Extension (HDLC—PPPoH Routed) ........................................................................................67
DSLAM Connections with remote CPE units .......................................................................................................73
Bridged application configurations to a DSLAM ............................................................................................73
RFC 1483 Bridged Configuration. ............................................................................................................73
PPPoH Bridged Configuration .................................................................................................................76
PPPoA Bridged (RFC 2364) Configuration ..............................................................................................79
Routed application configurations to a DSLAM .............................................................................................81
RFC 1483 Routed .....................................................................................................................................81
PPPoH Routed .........................................................................................................................................88
PPPoA Routed (RFC 2364) ......................................................................................................................95
IPoA Routed (RFC 1577) ......................................................................................................................107
5 Specialized Configurations .......................................................................................................................... 113
IP Configurations ................................................................................................................................................114
Router ...........................................................................................................................................................114
DHCP Server and Relay ...............................................................................................................................114
6 Security ....................................................................................................................................................... 119
Introduction ........................................................................................................................................................120
Configuring the IAD ...........................................................................................................................................120
Configuring the security interfaces.......................................................................................................................121
Deleting a Firewall Policy .............................................................................................................................122
Enabling the Firewall...........................................................................................................................................123
Firewall Portfilters ...............................................................................................................................................123
Security Triggers..................................................................................................................................................124
Intrusion Detection System (IDS) .......................................................................................................................126
7 NAT (Network Address Translation) .......................................................................................................... 129
Introduction ........................................................................................................................................................130
Enabling NAT ..............................................................................................................................................130
Global address pool and reserved map ...........................................................................................................131
8 Monitoring Status ....................................................................................................................................... 133
Status LEDs.........................................................................................................................................................134
9 Diagnostics.................................................................................................................................................. 135
Introduction ........................................................................................................................................................136
Ping.....................................................................................................................................................................136