Manual
+7(495) 797-3311 www.qtech.ru 
Москва, Новозаводская ул., 18, стр. 1 
12 
49.3 PPPOE INTERMEDIATE AGENT TYPICAL APPLICATION ................................................. 378 
49.4 PPPOE INTERMEDIATE AGENT TROUBLESHOOTING ..................................................... 380 
CHAPTER 50 WEB PORTAL CONFIGURATION ........................................... 381 
50.1 INTRODUCTION TO WEB PORTAL AUTHENTICATION ...................................................... 381 
50.2 WEB PORTAL AUTHENTICATION CONFIGURATION TASK LIST ......................................... 381 
50.3 WEB PORTAL AUTHENTICATION TYPICAL EXAMPLE ..................................................... 383 
50.4 WEB PORTAL AUTHENTICATION TROUBLESHOOTING .................................................... 384 
CHAPTER 51 VLAN-ACL CONFIGURATION ................................................. 385 
51.1 INTRODUCTION TO VLAN-ACL .................................................................................. 385 
51.2 VLAN-ACL CONFIGURATION TASK LIST ..................................................................... 385 
51.3 VLAN-ACL CONFIGURATION EXAMPLE ...................................................................... 386 
51.4 VLAN-ACL TROUBLESHOOTING ................................................................................ 388 
CHAPTER 52 SAVI CONFIGURATION ........................................................... 389 
52.1 INTRODUCTION TO SAVI ............................................................................................ 389 
52.2 SAVI CONFIGURATION ............................................................................................... 389 
52.3 SAVI TYPICAL APPLICATION ...................................................................................... 393 
52.4 SAVI TROUBLESHOOTING .......................................................................................... 394 
CHAPTER 53 MRPP CONFIGURATION......................................................... 396 
53.1 INTRODUCTION TO MRPP .......................................................................................... 396 
53.1.1 Conception Introduction ............................................................................ 396 
53.1.2 MRPP Protocol Packet Types .................................................................... 397 
53.1.3 MRPP Protocol Operation System ............................................................ 398 
53.2 MRPP CONFIGURATION TASK LIST............................................................................. 399 
53.3 MRPP TYPICAL SCENARIO ........................................................................................ 401 
53.4 MRPP TROUBLESHOOTING ........................................................................................ 403 
CHAPTER 54 ULPP CONFIGURATION ......................................................... 404 
54.1 INTRODUCTION TO ULPP ........................................................................................... 404 
54.2 ULPP CONFIGURATION TASK LIST ............................................................................. 406 
54.3 ULPP TYPICAL EXAMPLES ........................................................................................ 408 
54.3.1 ULPP Typical Example1 ............................................................................. 408 
54.3.2 ULPP Typical Example2 ............................................................................. 410 
54.4 ULPP TROUBLESHOOTING ........................................................................................ 411 
CHAPTER 55 ULSM CONFIGURATION ......................................................... 413 
55.1 INTRODUCTION TO ULSM .......................................................................................... 413 










