Serial Port Profiles

IPv6 Remote

The remote IPv6 interface identifier of the remote end of the PPP link. Choose

Interface Identifier

an address that is part of the same network or subnetwork as the IOLAN. If

 

you enable Negotiate IP Address Automatically, the IOLAN will ignore the

 

remote IP address value you enter here and will allow the remote end to

 

specify its IP address. If your user is authenticated by RADIUS and the

 

RADIUS parameter Framed-Interface-IDis set in the RADIUS file, the

 

IOLAN will use the value in the RADIUS file in preference to the value

 

configured here.

 

Field Format: The first 64 bits of the Interface Identifier must be zero,

 

therefore, ::abcd:abcd:abcd:abcd is the expected format.

ACCM

Specifies the ACCM (Asynchronous Control Character Map) characters that

 

should be escaped from the data stream.

 

Field Format: This is entered as a 32-bit hexadecimal number with each bit

 

specifying whether or not the corresponding character should be escaped. The

 

bits are specified as the most significant bit first and are numbered 31-0. Thus

 

if bit 17 is set, the 17th character should be escaped, that is, 0x11 (XON). The

 

value 000a0000 will cause the control characters 0x11 (XON) and 0x13

 

(XOFF) to be escaped on the link, thus allowing the use of XON/XOFF

 

(software) flow control. If you have selected Soft Flow Control on the Serial

 

Port, you must enter a value of at least 000a0000 for the ACCM.

 

Default: 00000000, which means no characters will be escaped

MRU

The Maximum Receive Unit (MRU) parameter specifies the maximum size of

 

PPP packets that the IOLAN’s port will accept. If your user is authenticated by

 

the IOLAN, the MRU value will be overridden if you have set a MTU value for

 

the user. If your user is authenticated by RADIUS and the RADIUS parameter

 

Framed-MTUis set in the RADIUS file, the IOLAN will use the value in the

 

RADIUS file in preference to the value configured here.

 

Range: 64-1500 bytes

 

Default: 1500

Authentication

The type of authentication that will be done on the link. You can use PAP or

 

CHAP to authenticate a serial port or user on the IOLAN, from a remote

 

location, or authenticate a remote client/device, from the IOLAN.

 

When setting either PAP and CHAP, make sure the IOLAN and the remote

 

client/device have the same setting. For example, if the IOLAN is set to PAP,

 

but the remote end is set to CHAP, the connection will be refused.

 

Data Options:

 

z None

 

z PAP—is a one time challenge of a client/device requiring that it respond

 

with a valid username and password. A timer operates during which

 

successful authentication must take place. If the timer expires before the

 

remote end has been authenticated successfully, the link will be

 

terminated.

 

z CHAP—challenges a client/device at regular intervals to validate itself

 

with a username and a response, based on a hash of the secret (password).

 

A timer operates during which successful authentication must take place.

 

If the timer expires before the remote end has been authenticated

 

successfully, the link will be terminated.

 

Default: CHAP

146

IOLAN SDS/SCS/STS User’s Guide, Version 3.6

Page 146
Image 146
Perle Systems STS, SCS manual IPv6 Remote, None, Default Chap