beautypg.com

Patton electronic G.SHDSL INTEGRATED 3086 User Manual

Page 6

background image

Contents

Model 3086 G.SHDSL Integrated Access Device User Guide

6

PCM Mode ...............................................................................................................................................63
PCM Transmit Polarity ............................................................................................................................63
PCM Receive Polarity ...............................................................................................................................63
Loopback ..................................................................................................................................................63
Annex Type ...............................................................................................................................................63
Line Probe .................................................................................................................................................63

Using the 3086 in Routed or Bridged applications ................................................................................................64

Two stand-alone units directly connected .......................................................................................................64

Ethernet extension (HDLC – PPPOH) Bridged .......................................................................................64
Network Extension (HDLC—PPPoH Routed) ........................................................................................67

DSLAM Connections with remote CPE units .......................................................................................................73

Bridged application configurations to a DSLAM ............................................................................................73

RFC 1483 Bridged Configuration. ............................................................................................................73
PPPoH Bridged Configuration .................................................................................................................76
PPPoA Bridged (RFC 2364) Configuration ..............................................................................................79

Routed application configurations to a DSLAM .............................................................................................81

RFC 1483 Routed .....................................................................................................................................81
PPPoH Routed .........................................................................................................................................88
PPPoA Routed (RFC 2364) ......................................................................................................................95
IPoA Routed (RFC 1577) ......................................................................................................................107

5 Specialized Configurations .......................................................................................................................... 113

IP Configurations ................................................................................................................................................114

Router ...........................................................................................................................................................114
DHCP Server and Relay ...............................................................................................................................114

6 Security ....................................................................................................................................................... 119

Introduction ........................................................................................................................................................120
Configuring the IAD ...........................................................................................................................................120
Configuring the security interfaces.......................................................................................................................121

Deleting a Firewall Policy .............................................................................................................................122

Enabling the Firewall...........................................................................................................................................123
Firewall Portfilters ...............................................................................................................................................123
Security Triggers..................................................................................................................................................124
Intrusion Detection System (IDS) .......................................................................................................................126

7 NAT (Network Address Translation) .......................................................................................................... 129

Introduction ........................................................................................................................................................130

Enabling NAT ..............................................................................................................................................130
Global address pool and reserved map ...........................................................................................................131

8 Monitoring Status ....................................................................................................................................... 133

Status LEDs.........................................................................................................................................................134

9 Diagnostics.................................................................................................................................................. 135

Introduction ........................................................................................................................................................136
Ping.....................................................................................................................................................................136