
X8824r User’s Manual Version 1.0
35 / 102
6.4 Ethernet over ATM (EoA)
Click on the
EOA
link to view the RFC1483/EoA configuration
table. This table displays EoA information such as: interface
name, interface security type, lower interface, config IP,
network IP, DHCP, default route, gateway IP, and status.
Click on the
trash can
icon to delete the current interface, or
edit the current interface by clicking on the
pencil
icon.
Click on the
Add
button to add another interface.
The Ethernet-over-ATM (EoA) protocol is commonly used to
carry data between local area networks that use the Ethernet
protocol and wide-area networks that use the ATM protocol.
Many telecommunications industry networks use the ATM
protocol. ISPs who provide DSL services often use the EoA
protocol for data transfer with their customers' DSL modems.
EoA can be implemented to provide a bridged connection
between a DSL modem and the ISP. In a bridged connection,
data is shared between the ISP's network and their customer's
as if the networks were on the same physical LAN. Bridged
connections do not use the IP protocol. EoA can also be
configured to provide a routed connection with the ISP, which
uses the IP protocol to exchange data.
X8824r User’s Manual Version 1.0
36 / 102
After you click on the
Add
button, another window will appear.
EOA Interface
: The name the software uses to identify the
EoA interface.
Interface Sec Type
: The type of security protections in
effect on the interface (public, private, or DMZ): A public
interface connects to the Internet (IPoA interfaces are
typically public). Packets received on a public interface are
subject to the most restrictive set of firewall protections
defined in the software.A private interface connects to your
LAN, such as the Ethernet interface. Packets received on a
private interface are subject to a less restrictive set of
protections, because they originate within the network. The
term DMZ (de-militarized zone), in Internet networking
terms, refers to computers that are available for both public
and in-network accesses (such as a company's public Web
server). Packets incoming on a DMZ interface -- whether
from a LAN or external source -- are subject to a level of
protection that is in between those for public and private
interfaces.