![ELSA LANCOM Wireless IL-II Manual Download Page 86](http://html1.mh-extra.com/html/elsa/lancom-wireless-il-ii/lancom-wireless-il-ii_manual_2396420086.webp)
Operating modes and functions
|
|
ELSA LANCOM Wireless IL-II
|
86
EN
You may use software which interacts directly with a CAPI (in this case,
the
LANCAPI
) port, such as
ELSA-RVS-COM
. This type of software
searches for the CAPI during its installation and uses it automatically.
Other programs such as LapLink can establish a variety of connection
types, for example, using Windows Dial-up Networking. You may select
the installed communications device that you would like to use when cre-
ating a new dial-up connection. For the
LANCAPI
, select the entry 'ISDN
WAN Line 1'.
4.8
Accounting
The accounting tool determines online times and data transfer volumes and
breaks them down according to the computers that used the connections.
The accounting data are stored in a list for current connections and in an
accumulated list.
The data collected include the following:
User (name, IP address, MAC address)
The online times and data transfer volumes are assigned the MAC
addresses of the system network interfaces in the LAN. The router can
supply additional information regarding the assignments of MAC
addresses and computer names from the DHCP or DNS server modules,
if available. In this case, online times can be assigned directly to com-
puter names. If the assignment of MAC addresses to computer names is
not possible, other existing information is recorded to identify the user,
such as the IP address.
Usually the MAC address cannot be determined for network users who
access the LAN via dial-in connections. In this case, the router generates
a pseudo address that allows the remote dial-in stations to be identified
during accounting.
Remote site to which the connection was established
Type of connection
Sent and received data volumes
Online time
The entire connection time of a dial-up connection that is used by several
users at a time can be longer than the amount of time a user actually uses
it. So in such cases, the length of the connection is determined based on
the first and last user actions plus the valid hold time for the connection.
100324 Wireless IL-11.book Seite 86 Montag, 30. Oktober 2000 4:13 16