They can be used in point-to-point subinterface configuration or point-to-multipoint nonbroadcast multiaccess (NBMA) configuration.
⇑ Translate the sentence above by Google ⇑
Related: configuration
Prev: Simplified configuration of security.
Next: Software configuration management.