Small Office Remote Access Switch 473T RACE M ESSAGESPPP Packet Trace Messages• Configure RequestThe Configure Request is used to indicate the options that are supported by thissending device. The Request contains an option list and the desired values if they aredifferent from the default value.• Configure ACKThe Configure ACK is transmitted in response to a Configure Request. It indicates thatthe sending device supports the options specified in the option list of the ConfigureRequest and that all values are acceptable. The receiving device assumes thatnegotiation is complete for the Control protocol being configured.• Configure NAKThe Configure NAK is transmitted in response to a Configure Request. It indicates thatthe sending device understands, but does not accept the values of the options specifiedin the option list of the Configure NAK. The option list of the NAK only contains theunacceptable options. The receiving device should choose different options and sendanother Configure Request with the new option list and values.• Configure RejectThe Configure Reject is transmitted in response to a Configure Request. It indicatesthat the sending device does not understand the options specified in the option list ofthe Configure Reject. The option list of the Reject only contains the unknown options.The receiving device must assume the sender cannot process the rejected options inany manner, and take appropriate action. The Configure Reject inherently providesbackward compatibility with older PPP implementations.• Terminate RequestThe Terminate Request is transmitted when a device wishes to close down theconnection.• Terminate ACKThe Terminate ACK is sent in response to a Terminate Request and indicates that thesending device has closed the connection.• Code RejectThe Code Reject is transmitted by a device if it does not recognize the PPP commandtype received from the other device.• Protocol RejectThe Protocol Reject is transmitted by a device if it does not recognize the PPP protocoltype received from the other device.• Echo RequestThe Echo request is used to provide a Data Link layer loop back detection mechanism.The Echo Request packet contains the magic number of the sending device. Until themagic number option has been negotiated the value must be set to zero.