Home > 3Com > Router > 3Com Router User Manual

3Com Router User Manual

Here you can view all the pages of manual 3Com Router User Manual. The 3Com manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 161

Sub-Interface157
Any packet reaching the null interface will be dropped, which provides another 
method for packet filtering: Just sending unnecessary network traffic to Null0 
interface, so that there is no need to configure ACL.
For example: Use static routing configuration command ip route-static 
192.101.0.0 255.255.0.0 null 0 
will drop all the packets sent to network 
segment 192.101.0.0.
2Configure operating parameters of the interface
ip unreachables is the only command which can be configured on...

Page 162

158CHAPTER 11: CONFIGURING LOGICAL INTERFACE
Configure sub-interfaces of Ethernet interface
1Create and delete Ethernet sub-interfaces
Please use the following commands in all views.
Ta b l e 190   Create and delete Ethernet interface
When using the above commands, if corresponding Ethernet sub-interface has 
been created (the same as sub-number), enter the view of this sub-interface 
directly. Otherwise, first create Ethernet sub-interface with sub-number as the 
specified one, and then enter the view...

Page 163

Sub-Interface159
■IPX network number which is different from that of the affiliated WAN 
interface, and other IPX working parameters
■Virtual circuit of the sub-interface 
Please see chapters in Operation Manual - Link Layer Protocol and Operation 
Manual - Network Protocol for details about the above configurations. 
Configure sub-interfaces of WAN interface which link layer protocol is X.25
1Create and delete WAN sub-interfaces
The command is the same as above.
2Configure relevant working parameters...

Page 164

160CHAPTER 11: CONFIGURING LOGICAL INTERFACE
[Router-Serial0]link-protocol fr
3Specify DTE as its frame relay terminal type
[Router-Serial0]fr interface-type dte
4Create sub-interface Serial 0.1 on WAN interface Serial0 of router A in point-to 
point mode, and enter its view
[Router]interface serial 0.1 point-to-point
5Set its IP address to 202.38.160.1 and address mask to 255.255.255.0.
[Router-Serial0.1]ip address 202.38.160.1 255.255.255.0
6Allocate a virtual circuit with DLCI 50 to it....

Page 165

Virtual-Template and Virtual Interface161
dynamically create a virtual interface based on the configuration parameters of the 
template.
Similarly, after multiple PPP links are bound as MP, a virtual interface also needs to 
be created to exchange data with the opposite end. At this time, select an 
interface template to dynamically create a virtual interface.
Configure 
Virtual-Template In VPN and MP application environments, the system automatically creates and 
deletes virtual interface, which is...

Page 166

162CHAPTER 11: CONFIGURING LOGICAL INTERFACE
3Create corresponding relation between the virtual-template and related physical 
interface
In VPN application environment, it is necessary to build up corresponding relations 
between L2TP group and virtual-template. In MP application environment, it is 
necessary to build up corresponding relations between MP and virtual-template. 
Please see chapters in Operation Manual – VPN and Operation Manual – Link 
Layer Protocol for detailed description.
Display and...

Page 167

IV
LINK LAYER PROTOCOL
Chapter 12Configuring PPP and MP
Chapter 13Configuring PPPoE Client
Chapter 14Configuring SLIP
Chapter 15Configuring ISDN Protocol
Chapter 16Configuring LAPB and X.25
Chapter 17Configuring Frame Relay
Chapter 18Configuring HDLC
Chapter 19Configuring Bridge 

Page 168

164 

Page 169

12
CONFIGURING PPP AND MP
This chapter contains information on the following topics:
■PPP Overview
■MP Overview
■Configure PPP
■Configure MP
■Display and Debug PPP
■Typical PPP Configuration Example
■Typical MP Configuration Example
■Fault Diagnosis and Troubleshooting of PPP
PPP OverviewThe Point-to-Point Protocol (PPP) provides a standard method for transporting 
multi-protocol datagram over point-to-point links. It gains wide applications since 
it can provide user authentication, support...

Page 170

166CHAPTER 12: CONFIGURING PPP AND MP
The authenticator sends some randomly generated packets to the requester 
(challenge), and at the same time it sends its configured username to the 
requester.
When the requester receives the challenge, it will look for the user password 
according to the authenticators username and its own user list. If it finds the user 
in the user list with the same name as the authenticators username, the requester 
builds the response with its own password, serial number of...
Start reading 3Com Router User Manual

Related Manuals for 3Com Router User Manual

All 3Com manuals