
Prestige 645M-A1 ADSL Bridge
Table of Contents
vii
2.9
Changing the System Password..................................................................................................2-10
2.10
General Setup ......................................................................................................................... 2-11
2.10.1
Procedure to Configure Menu 1 .........................................................................................2-11
Chapter 3 Internet Access.......................................................................................................................... 3-1
3.1
Internet Access Overview.............................................................................................................3-1
3.2
LANs and WANs..........................................................................................................................3-1
3.2.1
LANs, WANs and the Prestige.............................................................................................3-1
3.3
IP Address and Subnet Mask ........................................................................................................3-2
3.3.1
Private IP Addresses.............................................................................................................3-2
3.4
Factory Ethernet Defaults.............................................................................................................3-3
3.5
TCP/IP Ethernet Setup..................................................................................................................3-3
3.6
VPI & VCI....................................................................................................................................3-4
3.7
Multiplexing .................................................................................................................................3-4
3.7.1
VC-based multiplexing.........................................................................................................3-4
3.7.2
LLC-based multiplexing.......................................................................................................3-4
3.8
Encapsulation ...............................................................................................................................3-4
3.8.1
PPPoA ..................................................................................................................................3-4
3.8.2
RFC 1483 .............................................................................................................................3-4
3.9
IP Address Assignment.................................................................................................................3-5
3.9.1
Using PPP Encapsulation .....................................................................................................3-5
3.9.2
Using RFC 1483 Encapsulation ...........................................................................................3-5
3.10
Traffic Shaping .........................................................................................................................3-5
3.11
Internet Access Configuration ..................................................................................................3-6
Chapter 4 Remote Node Configuration.................................................................................................... 4-1
4.1
Remote Node Overview ...............................................................................................................4-1
4.2
Remote Node Setup......................................................................................................................4-1
4.2.1
Encapsulation and Multiplexing Scenarios...........................................................................4-1
4.2.2
Remote Node Profile ............................................................................................................4-2
4.2.3
Outgoing Authentication Protocol........................................................................................4-5
4.2.4
Bridging in General ..............................................................................................................4-5
Chapter 5 Filter Configuration ................................................................................................................. 5-1
5.1
Filtering Overview .......................................................................................................................5-1