![XAVI Technologies Corp. X8821r+ Скачать руководство пользователя страница 19](http://html1.mh-extra.com/html/xavi-technologies-corp/x8821r/x8821r_user-manual_3164937019.webp)
X8821r User’s Manual Version 1.0
37 / 101
6.5 IP over ATM (IPoA)
Click on the
IPoA
link to view the IP over ATM configuration
table. This table displays IPoA information such as: interface
name, interface security type, lower interface, config IP,
network IP, subnet mask gateway IP, and status.
Click on the
trash can
icon to delete the current interface, or
edit the current interface by clicking on the
pencil
icon.
Click on the
Add
button to add another interface.
An IPoA interface can be used to exchange IP packets over the
ATM network, without using an underlying Ethernet over ATM
(EOA) connection. Typically, this type of interface is used only
in product development environments, to eliminate unneeded
variables when testing IP layer processing.
After you click on the
Add
button, another window will appear.
X8821r User’s Manual Version 1.0
38 / 101
IPoA Interface
: The name the software uses to identify the
IPoA interface
Config IP Address and Net Mask
: The IP address and
network mask you want to assign to the interface. If the
interface will be used for bridging with your ISP and you will
not be using the device as a router on your LAN, then you
do not need to specify IP information. If you enable DHCP
for this interface, then the Configured IP address will serve
only as a request to the DHCP server. The actual address
that is assigned by the ISP may differ if this address is not
available.
Interface Security Type
: The type of firewall protections
that are in effect on the interface (public, private, or DMZ):
A public interface connects to the Internet (IPoA interfaces
are typically public). Packets received on a public interface
are subject to the most restrictive set of firewall protections
defined in the software. A private interface connects to your
LAN, such as the Ethernet interface. Packets received on a
private interface are subject to a less restrictive set of
protections, because they originate within the network. The
term DMZ (de-militarized zone), in Internet networking
terms, refers to computers that are available for both public