2 nailed-up connection, 3 outgoing authentication protocol – ZyXEL Communications Prestige 480 User Manual
Page 91

Prestige 480 Dual BRI ISDN Router
Remote Node Configuration
4-5
and this remote node. When set to Leased, the Allocated
Budget and Period do not apply.
Leased
Carrier Access Code
This field allows you to select a specific carrier to take advantage
of discount telephone rates. Enter the carriers access code.
Nailed-up Connection
This field specifies if you want to make the connection to this
remote node a nailed-up connection. See below for more details.
Yes/No
Session Option:
Edit Filter Sets
Use the space bar to toggle this field to Yes and press [Enter] to
open Menu 11.5 to edit the filter sets. See the Remote Node
Filter section for more details.
Default=
Blank
Session Option:
Idle Timeout (sec)
This value specifies the number of idle seconds that elapses
before the remote node is automatically disconnected. Idle
seconds is the period of time when no data is transmitted from
your Prestige. Administrative packets such as RIP are not
counted as data. This option only applies when the Prestige
initiates the call.
Default=
100 secs for
the first
remote
node and
300 secs for
the others.
Once you have completed filling in
Menu 11.1.1 – Remote Node Profile
, press [Enter] at the message
[Press ENTER to Confirm…] to save your configuration, or press [Esc] at any time to cancel.
4.1.2 Nailed-up Connection
A nailed-up connection is a dial-up line where the connection is always up regardless of traffic demand. The
Prestige does two things when you specify a nailed-up connection. The first is that idle timeout is disabled.
The second is that the Prestige will try to b ring up the connection at power-on and whenever the connection
is down.
A nailed-up connection can be very expensive for obvious reasons. Please do not specify a nailed-up
connection unless your telephone company offers flat-rate service or you need a constant connection and the
cost is of no concern.
4.1.3 Outgoing Authentication Protocol
Generally speaking, you should employ the strongest authentication protocol possible, for obvious reasons.
However, some vendor’s implementation includes specific authentication protocol in the user profile. It will
disconnect if the negotiated protocol is different from that in the user profile, even when the negotiated
protocol is stronger than specified. If you encounter the case where the peer disconnects right after a