USER’S GUIDE

Configure Request

The Configure Request is used to indicate the options that are supported by this sending device. The Request contains an option list and the desired values if they are different from the default value.

Configure ACK

The Configure ACK is transmitted in response to a Configure Request. It indicates that the sending device supports the options specified in the option list of the Configure Request and that all values are acceptable. The receiving device assumes that negotiation is complete for the Control protocol being configured.

Configure NAK

The Configure NAK is transmitted in response to a Configure Request. It indicates that the sending device understands, but does not accept the values of the options specified in the option list of the Configure NAK. The option list of the NAK only contains the unacceptable options. The receiving device should choose different options and send another Configure Request with the new option list and values.

Configure Reject

The Configure Reject is transmitted in response to a Configure Request. It indicates that the sending device does not understand the options specified in the option list of the Configure Reject. The option list of the Reject only contains the unknown options. The receiving device must assume the sender cannot process the rejected options in any manner, and take appropriate action. The Configure Reject inherently provides backward compatibility with older PPP implementations.

Terminate Request

The Terminate Request is transmitted when a device wishes to close down the connection.

Terminate ACK

The Terminate ACK is sent in response to a Terminate Request and indicates that the sending device has closed the connection.

Code Reject

The Code Reject is transmitted by a device if it does not recognize the PPP command type received from the other device.

Protocol Reject

The Protocol Reject is transmitted by a device if it does not recognize the PPP protocol type received from the other device.

Echo Request

The Echo request is used to provide a Data Link layer loop back detection mechanism. The Echo Request packet contains the magic number of the sending device. Until the magic number option has been negotiated the value must be set to zero.

496 CyberSWITCH

Page 496
Image 496
Cabletron Systems CSX1000, CSX1200 Configure Request, Configure ACK, Configure NAK, Configure Reject, Terminate Request