Arris 3387W Manual Do Utilizador
92
will default to a class C subnet mask.
If you select
IP-Passthrough
the
Host Hardware Address
field displays.
Here you enter the MAC address of the designated IP-Passthrough com-
puter.
puter.
•
If this MAC address is not all zeroes, then it will use DHCP to set the LAN
host's address to the (configured or acquired) WAN IP address.
host's address to the (configured or acquired) WAN IP address.
The MAC address must be six colon-delimited or dash-delimited sets of
hex digits ('0' – 'FF').
hex digits ('0' – 'FF').
•
If the MAC address is all zeroes, then the LAN host will have to be config-
ured manually.
ured manually.
Once configured, the passthrough host's DHCP leases will be shor tened to
two minutes. This allows for timely updates of the host's IP address, which
will be a private IP address before the WAN connection is established. After
the WAN connection is established and has an address, the passthrough
host can renew its DHCP address binding to acquire the WAN IP address.
two minutes. This allows for timely updates of the host's IP address, which
will be a private IP address before the WAN connection is established. After
the WAN connection is established and has an address, the passthrough
host can renew its DHCP address binding to acquire the WAN IP address.
A restriction.
Since both the Gateway and the passthrough host will use
the same IP address, new sessions that conflict with existing sessions will
be rejected by the Gateway. For example, suppose you are a teleworker
using an IPSec tunnel from the Gateway and from the passthrough host.
Both tunnels go to the same remote endpoint, such as the VPN access con-
centrator at your employer’s office. In this case, the first one to star t the
IPSec traffic will be allowed; the second one – since, from the WAN, it's
indistinguishable – will fail.
be rejected by the Gateway. For example, suppose you are a teleworker
using an IPSec tunnel from the Gateway and from the passthrough host.
Both tunnels go to the same remote endpoint, such as the VPN access con-
centrator at your employer’s office. In this case, the first one to star t the
IPSec traffic will be allowed; the second one – since, from the WAN, it's
indistinguishable – will fail.