Using the Web Browser Interface for Basic Configuration Tasks
Configuring Demand Routing for a Primary or Backup Connection
14-88
Configuring Demand Routing for a
Primary or Backup Connection
The process for configuring demand routing through the Web browser inter-
face differs slightly from the process outlined for the CLI. Although you
configure the same settings, you configure them in a different order.
When you set up an ISDN connection using demand routing, ProCurve Net-
working recommends that you configure Point-to-Point Protocol (PPP)
authentication to ensure that only authorized peers can establish a connection
with your router.
To minimize the cost of your dial-up connection, ProCurve Networking also
recommends that you configure the idle timer to match how your company is
charged for the line. (If the dial-up connection is idle for the amount of time
specified by the idle timers, the ProCurve Secure Router terminates the call)
For example, if your public carrier charges your company for every two
minutes that the ISDN line is established, you can set the idle timer to 110
seconds. The ProCurve Secure Router will then disconnect the ISDN line when
it has been idle for 110 seconds, and your company will not be charged for an
additional two minutes
Configuring an ACL to Define Interesting Traffic
The first step in configuring demand routing is to define the interesting traffic-
the traffic that triggers, or activates, the WAN connection. For example, if you
are configuring demand routing for an ISDN connection between the main
office and a branch office, you could define the interesting traffic on the main
office router as the packets with the following source and destination:
source—from a particular subnetwork at the main office
destination—to the subnetwork at the branch office
To define interesting traffic for your dial-up connection, you configure an
extended ACL:
1.
In the left navigation bar of the Web browser interface, click General
Firewall.
2.
Scroll to the bottom of the General Firewall screen and click the Config-
ure ACLs button. The Access Control Lists screen is displayed.