- Enterasys Security Router User's Guide

xvii
Describing the XSR’s PIM-SM v2 Features .................................................................................................... 7-7
Phase 1: Building a Shared Tree ............................................................................................................. 7-8
Phase 2: Building Shortest Path Tree Between Sender & RP ................................................................. 7-8
Phase 3: Building Shortest Path Tree Between Sender & Receiver ........................................................ 7-9
Neighbor Discovery and DR Election ..................................................................................................... 7-10
PIM Register Message ........................................................................................................................... 7-11
PIM Join/Prune Message ....................................................................................................................... 7-11
Bootstrap & Rendezvous Point .............................................................................................................. 7-11
Assert Processing .................................................................................................................................. 7-11
Source-Specific Multicast ....................................................................................................................... 7-12
PIM SM over Frame Relay ..................................................................................................................... 7-12
PIM Configuration Examples ........................................................................................................................ 7-13
Chapter 8: Configuring PPP
Overview ......................................................................................................................................................... 8-1
PPP Features ................................................................................................................................................. 8-1
Link Control Protocol (LCP) ..................................................................................................................... 8-2
Network Control Protocol (NCP) .............................................................................................................. 8-2
Authentication .......................................................................................................................................... 8-3
Password Authentication Protocol (PAP) ........................................................................................... 8-3
Challenge Handshake Authentication Protocol (CHAP)..................................................................... 8-3
Microsoft Challenge Handshake Protocol (MS-CHAP) ...................................................................... 8-3
Link Quality Monitoring (LQM) ................................................................................................................. 8-4
Multilink PPP (MLPPP) ............................................................................................................................ 8-4
Multi-Class MLPPP .................................................................................................................................. 8-5
MLPPP Packet Fragmentation and Serialization Transmission Latency............................................ 8-6
Fragment Interleaving Over the Link .................................................................................................. 8-7
Multilink Head Format Negotiation ..................................................................................................... 8-7
Events and Alarms ............................................................................................................................. 8-8
IP Control Protocol (IPCP) ....................................................................................................................... 8-8
IP Address Assignment ...................................................................................................................... 8-9
PPP Bandwidth Allocation/Control Protocols (BAP/BAPC) ...................................................................... 8-9
Configuring PPP with a Dialed Backup Line ................................................................................................. 8-10
Configuring a Synchronous Serial Interface ................................................................................................. 8-10
Configuring a Dialed Backup Line ................................................................................................................ 8-11
Configuring the Dialer Interface ............................................................................................................. 8-11
Configuring the Physical Interface for the Dialer Interface ..................................................................... 8-11
Configuring the Interface as the Backup Dialer Interface .......................................................................8-12
Configuring MLPPP on a Multilink/Dialer interface ....................................................................................... 8-13
Multilink Example ................................................................................................................................... 8-13
Dialer Example ....................................................................................................................................... 8-13
Configuring BAP ........................................................................................................................................... 8-14
Dual XSRs: One Router Using DoD with Call Request .......................................................................... 8-1
4
XSR1 Configuration.......................................................................................................................... 8-14
XSR2 Configuration.......................................................................................................................... 8-15
Dual XSRs: BAP Using Call/Callback Request ...................................................................................... 8-16
XSR1 Configuration.......................................................................................................................... 8-16
XSR2 Configuration.......................................................................................................................... 8-16