AWAN 3883/4/5 Access Server Configuration and Management Manual
Configuring User and Port Access
AWAN 3883/4/5 Access Server Configuration and Management Manual—424242-001
7-4
Planning Port Access
•
An IP address can be assigned by a Dynamic Host Configuration Protocol (DHCP)
server.
Planning Port Access
Planning port access involves the following tasks:
•
Determining which protocols to enable for each port
•
Determining which security protocols to enable for each port
Use the Port Configuration Worksheet to plan port access. Blank worksheets are
provided in Appendix A, Blank Configuration Worksheets
. Instructions for using the
Port Configuration Worksheet are provided in note boxes titled Worksheet Instructions
throughout this subsection.
Determining Protocols for Ports
You must decide which protocols to enable for each port. The protocols you enable
depend on the type of connection you are configuring as follows:
•
For TCP/IP connections, enable PPP or SLIP
•
For IPX-over-PPP connections, enable PPP
•
For NRN connections, enable NRN
•
For AppleTalk connections, enable ARA
•
For NASI remote-control connections, enable NASI
Determining Protocols for Port Security
You must also determine which protocols to use for port security. The protocols you
enable depend on the type of connection you are configuring as follows:
•
For TCP/IP connections, enable PPP or SLIP
•
If you are using the Password Authentication Protocol (PAP) or the Challenge
Handshake Authentication Protocol (CHAP), enable PAP or CHAP
•
For IPX-over-PPP connections, enable PPP
•
For NRN connections, enable NRN
•
For AppleTalk connections, enable ARA
•
For NASI remote-control connections, enable NACS
Worksheet Instructions. If each port is assigned an IP address, enter an IP address on your
Port Configuration Worksheet. If each user is assigned an IP address, enter an IP address on
your Dial-In User Worksheet.
Worksheet Instructions. Record the protocols to be enabled for the port on your Port
Configuration Worksheet.
Worksheet Instructions. Record the protocols to be enabled for port security on your Port
Configuration Worksheet.