USER’S GUIDE
176 SmartSwitch Remote Access Module
•
Configure Request
The Configure Request is used to indicate the options that are supported by this
sending device. The Request contains an option list and the desired values if they are
different from the default value.
•
Configure ACK
The Configure ACK is transmitted in response to a Configure Request. It indicates that
the sending device supports the options specified in the option list of the Configure
Request and that all values are acceptable. The receiving device assumes that
negotiation is complete for the Control protocol being configured.
•
Configure NAK
The Configure NAK is transmitted in response to a Configure Request. It indicates that
the sending device understands, but does not accept the values of the options specified
in the option list of the Configure NAK. The option list of the NAK only contains the
unacceptable options. The receiving device should choose different options and send
another Configure Request with the new option list and values.
•
Configure Reject
The Configure Reject is transmitted in response to a Configure Request. It indicates
that the sending device does not understand the options specified in the option list of
the Configure Reject. The option list of the Reject only contains the unknown options.
The receiving device must assume the sender cannot process the rejected options in
any manner, and take appropriate action. The Configure Reject inherently provides
backward compatibility with older PPP implementations.
•
Terminate Request
The Terminate Request is transmitted when a device wishes to close down the
connection.
•
Terminate ACK
The Terminate ACK is sent in response to a Terminate Request and indicates that the
sending device has closed the connection.
•
Code Reject
The Code Reject is transmitted by a device if it does not recognize the PPP command
type received from the other device.
•
Protocol Reject
The Protocol Reject is transmitted by a device if it does not recognize the PPP protocol
type received from the other device.
•
Echo Request
The Echo request is used to provide a Data Link layer loop back detection mechanism.
The Echo Request packet contains the magic number of the sending device. Until the
magic number option has been negotiated the value must be set to zero.