
308611-14.00 Rev 00
v
Contents
Preface
Before You Begin .............................................................................................................xiii
Text Conventions .............................................................................................................xiv
Acronyms .........................................................................................................................xvi
Hard-Copy Technical Manuals .......................................................................................xviii
How to Get Help ............................................................................................................xviii
Chapter 1
ATM Half-Bridge Overview
What Is ATM Half Bridge? ..............................................................................................1-1
How the AHB Router Works ...........................................................................................1-4
Forwarding Inbound Packets from CPE Hosts .........................................................1-4
Forwarding Outbound Packets to CPE Hosts ..........................................................1-5
Using DHCP to Dynamically Assign IP Addresses ..................................................1-5
Dynamically Learning New Bridge Table Entries .....................................................1-7
Unsecure Learning Method ...............................................................................1-8
Secure Learning Method ...................................................................................1-8
Maintaining the AHB Bridge Table ...........................................................................1-9
Adding Bridge Table Entries ..............................................................................1-9
Removing Bridge Table Entries .......................................................................1-10
Replacing Bridge Table Entries ........................................................................1-10
Using Source-Based Routing .................................................................................1-10
Responding to Proxy ARP Requests .....................................................................1-11
Using Inbound Packet Filtering ..............................................................................1-12
Kommentare zu diesen Handbüchern