Purpose ........................................................................................................................... xv
Audience .......................................................................................................................... xv
Conventions .....................................................................................................................xvi
Special Message Formats .........................................................................................xvi
Other Conventions ...................................................................................................xvii
Related Publications .......................................................................................................xvii
Chapter 1
About the Router ............................................................................................................1-1
Features ..........................................................................................................................1-1
Key Features ............................................................................................................1-2
ISDN Support ...........................................................................................................1-3
Multilink PPP Support ..............................................................................................1-3
TCP/IP Support ........................................................................................................1-4
Security ....................................................................................................................1-4
Callback .............................................................................................................1-5
Management Support ..............................................................................................1-5
Basic Router Concepts ...................................................................................................1-6
What is a Router? ....................................................................................................1-6
Netmask ...................................................................................................................1-9
Contents
Contents
v