background image

 

UM Configuration BAT-C2                                                                                                 2019-04-03

 * 6. Redistributions of any form whatsoever must retain the following
 *    acknowledgment:
 *    "This product includes software developed by the OpenSSL Project
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 *
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 * ====================================================================
 *
 * This product includes cryptographic software written by Eric Young
 * ([email protected]).  This product includes software written by Tim
 * Hudson ([email protected]).
 *
 */

Original SSLeay License
-----------------------

/* Copyright (C) 1995-1998 Eric Young ([email protected])
 * All rights reserved.
 *
 * This package is an SSL implementation written
 * by Eric Young ([email protected]).
 * The implementation was written so as to conform with Netscapes SSL.
 *
 * This library is free for commercial and non-commercial use as long as
 * the following conditions are aheared to.  The following conditions
 * apply to all code found in this distribution, be it the RC4, RSA,
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
 * included with this distribution is covered by the same copyright terms
 * except that the holder is Tim Hudson ([email protected]).
 *
 * Copyright remains Eric Young's, and as such any Copyright notices in
 * the code are not to be removed.
 * If this package is used in a product, Eric Young should be given attribution
 * as the author of the parts of the library used.
 * This can be in the form of a textual message at program startup or
 * in documentation (online or textual) provided with the package.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright

Summary of Contents for HIRSCHMANN BAT-C2

Page 1: ...UM Configuration BAT C2 Technical support Release 01 0 00 04 2019 https hirschmann support belden com Configuration User Manual Industrial Wireless LAN Gateway BAT C2...

Page 2: ...hmann product site http www hirschmann com Hirschmann Automation and Control GmbH Stuttgarter Str 45 51 72654 Neckartenzlingen Germany Open Source Information Open Source Software used in the product...

Page 3: ...be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU General Public License and the GNU Lesser General Public Licens...

Page 4: ...free program by obtaining a restrictive license from a patent holder Therefore we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use s...

Page 5: ...omplete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the library Ac...

Page 6: ...y of the Library To do this you must alter all the notices that refer to this License so that they refer to the ordinary GNU General Public License version 2 instead of to this License If a newer vers...

Page 7: ...ust be distributed under Sections 1 and 2 above and if the work is an executable linked with the Library with the complete machine readable work that uses the Library as object code and or source code...

Page 8: ...hese terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties with thi...

Page 9: ...EPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPL...

Page 10: ...v1 5 gmp v6 0 0 usbutils v7 wireless tools v29 libnfnetlink v1 0 1 mtd utils v1 5 1 mii diag v2 11 lzo v2 09 rng tools v4 ikescan v1 9 socat 2 0 0 b7 sshpass v1 06 and ndisc6 v1 0 2 GNU GENERAL PUBLI...

Page 11: ...Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this Li...

Page 12: ...ur cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1 and 2 above on a medium customari...

Page 13: ...e integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through tha...

Page 14: ...veryone can redistribute and change under these terms To do so attach the following notices to the program It is safest to attach them to the start of each source file to most effectively convey the e...

Page 15: ...ng or other promotional materials to be disseminated to the public or any portion thereof nor to use the name of any STANFORD faculty member employee or student or any trademark service mark trade nam...

Page 16: ...to take away your freedom to share and change it By contrast the GNU General Public Licenses are intended to guarantee your freedom to share and change free software to make sure the software is free...

Page 17: ...icense permits more lax criteria for linking other code with the library We call this license the Lesser General Public License because it does Less to protect the user s freedom than the ordinary Gen...

Page 18: ...ntact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You may charge a fee for the physical act of transferri...

Page 19: ...tions 1 and 2 above on a medium customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to c...

Page 20: ...compatible with the version that the work was made with c Accompany the work with a written offer valid for at least three years to give the same user the materials specified in Subsection 6a above fo...

Page 21: ...stribution of the Library by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution...

Page 22: ...OF THE USE OR INABILITY TO USE THE LIBRARY INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERAT...

Page 23: ...that are not Modified Works Contributor means any person or entity that Distributes the Program Licensed Patents mean patent claims licensable by a Contributor which are necessarily infringed by the u...

Page 24: ...hts and licenses granted hereunder each Recipient hereby assumes sole responsibility to secure any other intellectual property rights needed if any For example if a third party patent license is requi...

Page 25: ...am in a commercial product offering The obligations in this section do not apply to any claims or Losses relating to any actual or alleged intellectual property infringement In order to qualify an Ind...

Page 26: ...and distribute copies of this Agreement but in order to avoid inconsistency the Agreement is copyrighted and may only be modified in the following manner The Agreement Steward reserves the right to p...

Page 27: ...ns of the OpenSSL License and the original SSLeay license apply to the toolkit See below for the actual license texts OpenSSL License Copyright c 1998 2018 The OpenSSL Project All rights reserved Redi...

Page 28: ...Original SSLeay License Copyright C 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was wri...

Page 29: ...ESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF...

Page 30: ...l be responsible for any legal consequences yourself I am not making any claims whether possessing or using this is legal or not in your country and I am not taking any responsibility on your behalf N...

Page 31: ...S LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY O...

Page 32: ...are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer 2 Redistribut...

Page 33: ...censee a nonexclusive royalty free world wide license to reproduce analyze test perform and or display publicly prepare derivative works distribute and otherwise use Python alone or in any derivative...

Page 34: ...OF CALIFORNIA BE LIABLE FOR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE DATA OR PROFITS WHETHER IN AN ACTION OF CONTRACT NEGLIGENCE OR OTHER...

Page 35: ...NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR T...

Page 36: ...T LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INC...

Page 37: ...THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOS...

Page 38: ...MPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE...

Page 39: ...th the aim of protecting users freedom to change the software The systematic pattern of such abuse occurs in the area of products for individuals to use which is precisely where it is most unacceptabl...

Page 40: ...f any on which the executable work runs or a compiler used to produce the work or an object code interpreter used to run it The Corresponding Source for a work in object code form means all the source...

Page 41: ...r each copy that you convey and you may offer support or warranty protection for a fee 5 Conveying Modified Source Versions You may convey a work based on the Program or the modifications to produce i...

Page 42: ...ce Regardless of what server hosts the Corresponding Source you remain obligated to ensure that it is available for as long as needed to satisfy these requirements e Convey the object code using peer...

Page 43: ...to require their own removal in certain cases when you modify the work You may place additional permissions on material added by you to a covered work for which you have or can give appropriate copyr...

Page 44: ...er section 10 9 Acceptance Not Required for Having Copies You are not required to accept this License in order to receive or run a copy of the Program Ancillary propagation of a covered work occurring...

Page 45: ...al knowledge that but for the patent license your conveying the covered work in a country or your recipient s use of the covered work in a country would infringe one or more identifiable patents in th...

Page 46: ...al Public License you may choose any version ever published by the Free Software Foundation If the Program specifies that a proxy can decide which future versions of the GNU General Public License can...

Page 47: ...ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU General Public License for more details You should have received a copy of the GNU Ge...

Page 48: ...EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE dhcp v4 3 6 This is not governed by any open source license dbus v1 6 18 The Academic Free License v 2 1 This Academic Free License the License applie...

Page 49: ...atent rights granted herein by Licensor are owned by the Licensor or are sublicensed to You under the terms of this License with the permission of the contributor s of those copyrights and patent righ...

Page 50: ...rmination of this License 13 Miscellaneous This License represents the complete agreement concerning the subject matter hereof If any provision of this License is held to be unenforceable such provisi...

Page 51: ...Work as defined below An Application is any work that makes use of an interface provided by the Library but which is not otherwise based on the Library Defining a subclass of a class defined by the L...

Page 52: ...ution include the copyright notice for the Library among these notices as well as a reference directing the user to the copies of the GNU GPL and this license document d Do one of the following 0 Conv...

Page 53: ...v4 3 6 and e2fsprogs v1 42 9 GNU LIBRARY GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright C 1991 Free Software Foundation Inc 51 Franklin St Fifth Floor Boston MA 02110 1301 USA Everyone is permi...

Page 54: ...g the library and is analogous to running a utility program or application program However in a textual and legal sense the linked executable is a combined work a derivative of the original library an...

Page 55: ...based on the Library and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a The modified work must itself be a soft...

Page 56: ...ins no derivative of any portion of the Library but is designed to work with the Library by being compiled or linked with it is called a work that uses the Library Such a work in isolation is not a de...

Page 57: ...istributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executa...

Page 58: ...ople have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or...

Page 59: ...iles the Software to deal in the Software without restriction including without limitation the rights to use copy modify merge publish distribute distribute with modifications sublicense and or sell c...

Page 60: ...WARE IS PROVIDED AS IS AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE bzip2 v1 0 6 This progr...

Page 61: ...ed from any source distribution Jean loup Gailly Mark Adler jloup gzip org madler alumni caltech edu Iperf v2 0 5 Copyright c 1999 2000 2001 2002 2003 2004 2005 The Board of Trustees of the University...

Page 62: ...IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT IN NO EVENT SHALL THE AUTHORS OR...

Page 63: ...be omitted when the library is built THE BASIC LIBRARY FUNCTIONS Written by Philip Hazel Email local part ph10 Email domain cam ac uk University of Cambridge Computing Service Cambridge England Copyr...

Page 64: ...pnpd v1 9 20141209 MiniUPnPd Copyright c 2006 2011 Thomas BERNARD All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the fol...

Page 65: ...y forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list of conditions and th...

Page 66: ...R MAKES NO AND DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THIS PRODUCT WILL NOT INFRINGE ANY THIRD PARTY RIGHTS 5 THE COPYRIGH...

Page 67: ...his list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS...

Page 68: ...thout modification are permitted provided that the following conditions are met 1 Redistributions in source code must retain the above copyright notice this list of conditions and the following discla...

Page 69: ...MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF PYTHON WILL NOT INFRINGE ANY THIRD PARTY RIGHTS 5 PSF SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON FOR ANY INCI...

Page 70: ...search Initiatives having an office at 1895 Preston White Drive Reston VA 20191 CNRI and the Individual or Organization Licensee accessing and otherwise using Python 1 6 1 software in source or binary...

Page 71: ...and Licensee This License Agreement does not grant permission to use CNRI trademarks or trade name in a trademark sense to endorse or promote products or services of Licensee or any third party 8 By c...

Page 72: ...84 Accessing Web Manager ___________________________________________________84 Web Manager Components _________________________________________________85 Status Page _________________________________...

Page 73: ...iguring VPN Settings _______________________________________________109 Wi Fi Protected Setup _____________________________________________________109 To Initiate WPS _________________________________...

Page 74: ..._____________________125 WAN _______________________________________________________________125 WAN MAC Address Filters ______________________________________________126 To Configure Gateway WAN Setti...

Page 75: ..._______140 System ________________________________________________________________140 To access System settings _____________________________________________141 User Management _______________________...

Page 76: ...81 Figure 3 1 Components of the Web Manager Page ______________________________________85 Figure 3 2 Expandable Menu Bar Selections ___________________________________________85 Figure 3 3 Status Page...

Page 77: ..._____________________________________________ 107 Table 4 17 Wi Fi Protected Setup__________________________________________________ 109 Table 4 18 WLAN Scan Quick Connect Results_____________________...

Page 78: ...SSL Credential Create New Self Signed Certificate__________________________ 137 Table 7 24 SSL Trusted Authority__________________________________________________ 138 Table 7 25 SSL CSR Certificate Si...

Page 79: ...wired network wireless network protocol stack Wi Fi protected setup WLAN Scan QuickConnect and WLAN Profiles settings 5 Filesystem Instructions to access and configure filesystem status 6 Diagnostics...

Page 80: ...ncontrolled machine actions caused by data loss configure all the data transmission devices individually Before you start any machine which is controlled via data transmission be sure to complete the...

Page 81: ...g n ac Support of the following frequency ranges 2 4 GHz and 5 GHz Convenient device management via Web browser Encryption functions Smart roaming for uninterrupted connections during transmission fro...

Page 82: ...required Network Connectivity Ethernet Wi Fi Antenna diversity Operating temperature range 40 C to 70 C Protocol Support The BAT C2 contains a full featured IP networking and wireless software stack...

Page 83: ...to users and administrators XML is easily editable with a standard text or XML editor Hardware Address The hardware address is also referred to as the Ethernet address physical address or MAC address...

Page 84: ...Manager is normally accessed through a standard web browser For further instructions see the Installation User Manual available as PDF download on the Internet at the Hirschmann product pages www hir...

Page 85: ...ration tabs contain selections that can further expand to reveal additional subsections A right pointing blue arrow indicates a particular selection can be expanded to reveal subsections Expand or col...

Page 86: ...ge The Status page appears upon logging into Web Manager and when you click the Status tab The upper left vertical menu bar allows you to jump to a specific section on the Status page Click a particul...

Page 87: ...points 89 Action Allows you to view and configure the actions for a specific alarm or report 121 Applications View and configure application running scripts 122 Bridge Allows you to configure a bridg...

Page 88: ...setup configuration options for the BAT C2 147 Relay Contact Allows you to enable or disable the Relay Contact 124 Routes Shows the current system routing table 119 SNMP Shows SNMP status and configur...

Page 89: ...up allowing clients to connect at any time Default selection Triggered in response to an external trigger event the SoftAP interface will come up for a user configurable amount of time the First Clie...

Page 90: ...control the channel on which the SoftAP operates as long as the station STA interface is not connected to an access point Once the STA interface has established an association with an access point the...

Page 91: ...to the bridged client from BAT C2s connected via the access point network and from this BAT C2 If Auto Detect IP Address is enabled then the BAT C2 will attempt to learn the IP Address by using the s...

Page 92: ...cal links Enabled by default Bridging Mode Select either Host Network or Static Network In Host mode a single device is connected via Ethernet Default In Network mode multiple devices can be connected...

Page 93: ...dging address Bridging IP Address Enter the bridging IP address which specifies the IP address of the bridged client When bridging is active this IP address will be used to create a static route betwe...

Page 94: ...attempt to obtain IPv4 settings from a DHCP server and will periodically renew these settings with the server Note Overrides the BOOTP client the configured IPv4 address mask gateway hostname and doma...

Page 95: ...t the BAT C2 Within Web Manager click Renew to renew the DHCPV6 lease IPv6 Auto Configuration Select to turn On or Off IPv6 auto configuration Off by default IPv6 IP Address Enter the static IPv6 addr...

Page 96: ...abled the router will control the flow of outbound traffic according to the user defined filters In other words QoS improves performance by allowing the user to prioritize applications Filters can be...

Page 97: ...0 to set speed to default Note Default is set to 90 of the maximum link speed Submit button Click the Submit button to enter the QoS settings The Submit button appears when new settings are entered D...

Page 98: ...of the wireless wlan0 interface and link on the BAT C2 To see the effect of these items after a reboot view the Status page The following items require a reboot to take effect Network State DHCP Clien...

Page 99: ...he BAT C2 is not in bridging mode and both interfaces are connected to the same IP subnet MTU When DHCP is enabled the MTU size is usually provided with the IP address When not provided by the DHCP se...

Page 100: ...obtain IPv4 settings from a DHCP server upon bootup Note Overrides the configured IP address mask gateway hostname and domain Changing this value requires you to reboot the BAT C2 Within Web Manager...

Page 101: ...available on the Wireless wlan0 Network WLAN Link Status page This same information is configurable on the Wireless wlan0 Network WLAN Link Configuration page Field Button Description Choice 1 Profile...

Page 102: ...canning Channel List For example if the router is configured to operate on channel 40 with 40 MHz support enabled the BAT C2 may establish a connection on channel 36 Scanning Channel List Enter the Sc...

Page 103: ...filters can be added The following are predefined priority classes Network Control and Internetwork Control are typically used for network control packets such as ICMP and have the highest priorities...

Page 104: ...and click the Submit button Filter type Select the filter type from the drop down window Mac Address Network Port MAC Address Enter the MAC address to prioritize traffic from a particular BAT C2 with...

Page 105: ...sent Method Select ICMP or TCP based ping Timeout Indicate the interval to wait for ping response from remote host Interval Indicate the interval in which to test reachability Failover Threshold Indic...

Page 106: ...eting existing ones Added entries are static and for test purposes only Protocol Stack ICMIP Settings Description State Select to enable or disable processing of ICMP messages This includes both incom...

Page 107: ...IKEv2 negotiation should be transmitted or accepted Propose signifying that the BAT C2 will permit IKEv2 and also use it as the default to initiate Insist signifying that the BAT C2 will only accept...

Page 108: ...between the Local and VPN Gateway ISAKMP Phase 1 IKE Aggressive Mode Select to enable or disable Aggressive Mode In Aggressive mode IKE tries to combine as much information into fewer packets while m...

Page 109: ...ity with the host on the remote network Ping Interval Enter the Ping Interval to monitor connectivity with a host on the remote network Max Tries Enter the number of Max Tries for pinging the host bef...

Page 110: ...ext field description below Scan network SSID Click Scan to search for all network names containing the first few letters entered in the Network Name search field Performs a scan for BAT C2s within ra...

Page 111: ...rofiles and have a higher priority than user created profiles The profiles on the WLAN Profiles page are listed in order of priority RSSI A real time value that indicates the signal strength of the ne...

Page 112: ...P has become more vulnerable due to advances in hacking technology State of the art equipment can find WEP keys in 5 minutes For stronger security use WPA or the stronger WPA2 with AES CCMP WPA2 WPA M...

Page 113: ...with some products that generate four identical keys from a passphrase this index must be one For Keys 1 4 enter one or more encryption keys in hexadecimal format Enter 10 hexadecimal digits 0 9 a f f...

Page 114: ...name Enter a username Password Enter a password if the LEAP EAP TTLS and PEAP option is chosen Check the Show Password check box to make the password viewable as you enter it in the Password field Inn...

Page 115: ...g Web Manager To view current filesystem browser statistics or to format the filesystem click Filesystem in the menu and select Statistics Note Formatting the filesystem will cause existing files on t...

Page 116: ...ndary DNS addresses come from the active interface The static addresses from the Network Interface configuration settings may be overridden by DHCP Accessing the DNS Settings Using Web Manager To view...

Page 117: ...also shows the reserved ports and associated services on this device To View the List of IP Sockets Using Web Manager To view IP Sockets on the Diagnostics page click IP Sockets Using XML Include in y...

Page 118: ...Using Web Manager To view memory information on the Diagnostics page click Ping Processes The BAT C2 shows all the processes currently running on the system It shows the process ID PID parent process...

Page 119: ...nical experts in debugging To View Thread Information Using Web Manager To view thread information on the Diagnostics page click Threads Using XML Include in your file statusgroup name processes Trace...

Page 120: ...6 Diagnostics UM Configuration BAT C2 120 Release 01 0 00 04 2019 To Perform a Traceroute Using Web Manager To view traceroute information on the Diagnostics page click Traceroute...

Page 121: ...nfiguration options for all alarms and reports Action Settings Description Delay Enter the Delay time in seconds to defer alarm processing Alarm actions will not be executed if the cause is corrected...

Page 122: ...ng the Python language s standard library In addition the developer can take advantage of thousands of available third party packages to speed up development IDE Python scripts can be written with any...

Page 123: ...articular script to have it run upon the start up of the BAT C2 Uncheck the checkbox to disable automatically running the unit upon startup Run on shutdown checkbox Check the Run on shutdown checkbox...

Page 124: ...od is selected enter the date using the Year Month and Day drop down menus that become available Time If Manual method is selected enter the time using the Hour Minute Min and Second Sec drop down men...

Page 125: ...abled enables the gateway firewall Disabled disable the gateway firewall default MAC Address filter Select to enable or disable the MAC address filter Disabled by default Interface Specify the interfa...

Page 126: ...is going through firewalls all referenced ports on the gateway and LAN devices must be accessible Adding or Deleting New MAC Address Filter Settings Description Delete Click the checkbox to the left...

Page 127: ...a port range Protocol Select the protocol for the rule TCP UDP or Both IP Address Enter the target for the port forwarding rule Target Port Indicate the target port This is the port which the packets...

Page 128: ...nd IPv6 routing tables Please note that some fields may differ from static route definitions The following information displays in the IPv4 routing table Network Gateway Mask Flags Metric Interface Th...

Page 129: ...is enabled Disabled DHCP Relay is disabled Start IP Address Start IP Address of address pool End IP Address End IP Address of address pool DHCP v6Settings State Enable or Disable the DHCP server for...

Page 130: ...rsion 1 and 2 default Update Interval Indicate the number of seconds for the Update Interval Send unsolicited Response message every Update Interval seconds containing the complete routing table to al...

Page 131: ...Keep the checkbox checked to keep the virtual IP address enabled A virtual IP address is enabled by default Delete checkbox Check the Delete checkbox adjacent to a virtual IP address if any listed to...

Page 132: ...page See Table 7 20 for the HTTP settings that can be authenticated on the HTTP Authentication page MTU Enter the number of bytes indicating the largest physical packet size that the network can trans...

Page 133: ...acks Note You may need to increase this number in some cases where the browser is sending data aggressively within TCP Windows size limit when file including firmware upgrade is uploaded from webpage...

Page 134: ...nt types offer various levels of security from the least to most secure None no authentication necessary Basic encodes passwords using Base64 Digest encodes passwords using MD5 When changing the param...

Page 135: ...enerated Read Community Specify the read community used by the agent defaults to public community The password for the read community is For SNMPv2c public For SNMPv3 publicpublic For the SNMPv3 read...

Page 136: ...ion tab 2 Click SSL Credentials 3 Click X beside the existing credential you wish to delete 4 To confirm the delete click OK or Cancel to cancel the deletion Using XML Include in your file configgroup...

Page 137: ...te click Browse to browse to and select the file 7 Select the New Key Type from the drop down menu 8 Click Submit Submit button Click the Submit button to enter the settings The Submit button appears...

Page 138: ...own window If you select SSL authority RSA or DSA certificates select PEM or PKCS7 If the Web Manager determines that the certificate is an authority certificate type the field updates to PKCS12 autom...

Page 139: ...llowing steps 1 On the Administration page click SSL CSR Certificate Signing Request The Certificate Signing Request page displays 2 Modify the following fields 3 Click Submit to initiate the Certific...

Page 140: ...in your file configgroup name syslog System The BAT C2 settings allow for reboot restoring factory defaults uploading new firmware and updating a system s short and long name Note Anytime you reboot t...

Page 141: ...k to the defaults After setting the configuration back to the factory defaults the gateway will automatically be rebooted Factory defaults may also be restored by pressing and holding the Reset button...

Page 142: ...user Password Modify the current account s Password as desired The default Password for read write access is private The default password for read access only is public Submit Click Submit to submit c...

Page 143: ...e Administrator Technician and User roles are system defined and cannot be deleted or altered Configuration Groups Displays the Configuration Groups accessible by the role Configuration Group access c...

Page 144: ...s to Export filters instances to be exported are in the line and terminal groups To Export Configuration By default all settings groups are checked Using Web Manager 1 In the Web Manager click the Adm...

Page 145: ...ion Export to browser sends the information into a separate web window which appears Export to local file sends information into a new locally saved file A file name must be specified in field provide...

Page 146: ...s Click Clear All to clear all checkmarks and Select All to check all checkmarks Whole Groups to Import Select the configuration groups to import from the XML configuration record This option imports...

Page 147: ...by using the source or destination IP address of packets arriving on the Ethernet interface This may affect the performance of running processes during the learning phase Bridging IP Address Select t...

Page 148: ...ton will only appear when changes have been made to fields above 7 Click Manual Setup to return to the Status page where you may make changes directly in the configuration pages accessible through the...

Page 149: ...ps hirschmann support belden com This site also includes a free of charge knowledge base and a software download section Hirschmann Competence Center The Hirschmann Competence Center is ahead of its c...

Reviews: