background image

MoRoS ADSL 2.1 PRO 

Safety 

 

2.2

 

Permissible Technical Limits 

The product is only intended for the use within the permissible technical limits 
specified in the data sheets. 
The following permissible limits must be observed: 

 

The ambient temperature limits must not be fallen below or 
exceeded. 

 

The supply voltage range must not be fallen below or exceeded. 

 

The maximum humidity must not be exceeded and condensate 
formation must be prevented. 

 

The maximum switching voltage and the maximum switching current 
load must not be exceeded. 

 

The maximum input voltage and the maximum input current must not 
be exceeded. 

2.3

 

Responsibilities of the Operator 

As a matter of principle, the operator must observe the legal regulations, which are 
valid in his country, concerning operation, functional test, repair and maintenance 
of electrical devices. 

2.4

 

Qualification of the Personnel 

The installation, commissioning and maintenance of the product must only be per-
formed by trained expert personnel, which has been authorised by the plant opera-
tor. The expert personnel must have read and understood this documentation and 
observe the instructions. 
Electrical connection and commissioning must only be performed by a person, who 
is able to work on electrical installations and identify and avoid possible hazards 
independently, based on professional training, knowledge and experience as well 
as knowledge of the relevant standards and regulations. 

2.5

 

Instructions for Transport and Storage 

The following instructions must be observed: 

 

Do not expose the product to moisture and other potential hazardous 
environmental conditions (radiation, gases, etc.) during transport and 
storage. Pack product accordingly. 

 

Pack product sufficiently to protect it against shocks during transport 
and storage, e.g. using air-cushioned packing material. 

Check product for possible damages, which might have been caused by improper 
transport, before installation. Transport damages must be noted down to the ship-
ping documents. All claims or damages must be filed immediately and before in-
stallation against the carrier or party responsible for the storage. 

11 

 

Summary of Contents for MoRoS ADSL 2.1 PRO

Page 1: ...Manual MoRoS ADSL 2 1 PRO...

Page 2: ......

Page 3: ...Inc IBM PC AT XT are registered trademarks of International Business Machine Cor poration INSYS e Mobility LSG and e Mobility PLC are registered trademarks of INSYS MICROELECTRONICS GmbH Windows is a...

Page 4: ...Electrical Installation 13 2 9 General Safety Instructions 13 3 Using Open Source Software 15 3 1 General Information 15 3 2 Special Liability Regulations 16 3 3 Used Open Source Software 16 4 Device...

Page 5: ...Creating or Deleting a Port Forwarding Rule 55 13 2 10 Defining the Exposed Host 56 13 3 VPN 57 13 3 1 VPN General 57 13 3 2 OpenVPN General 57 13 3 3 Setting Up an OpenVPN Server 59 13 3 4 Setting U...

Page 6: ...ying the System Log 98 13 9 2 Displaying the Last System Messages 98 13 9 3 Setting Time and Time Zone 99 13 9 4 Reset 100 13 9 5 Update 101 13 9 6 Updating the Firmware 102 13 9 7 Uploading the Confi...

Page 7: ...ons of our Delivery and Purchasing Conditions are effective These can be found on our website www insys icom de imprint under General Terms and Conditions 1 2 Feedback We are permanently improving our...

Page 8: ...situation It might cause death or severe injuries if not avoided Caution Slight injury and or material damage This symbol in conjunction with the key word Caution indicates a possibly hazardous or har...

Page 9: ...e prerequisites which must be fulfilled to be able to process the subsequent steps in a meaningful way You will also learn which software or which equipment you will need 1 One individual action step...

Page 10: ...ating conditions of the device are effective An optimum protection of the personnel and the environment from hazards as well as a safe and fault free operation of the product is only possible if all s...

Page 11: ...rained expert personnel which has been authorised by the plant opera tor The expert personnel must have read and understood this documentation and observe the instructions Electrical connection and co...

Page 12: ...arately from residual waste via appropriate collecting points See also Section Disposal in this manual CE marking By applying a CE marking the manufacturer confirms that the product complies with the...

Page 13: ...9 General Safety Instructions Caution Moisture and liquids from the environment may seep into the interior of the product Fire hazard and damage of the product The product must not be used in wet or...

Page 14: ...oduct due to overvoltage Install suitable overvoltage protection Caution Damage due to chemicals Ketones and chlorinated hydrocarbons dissolve the plastic housing and damage the surface of the device...

Page 15: ...e free of charge We do not demand usage fees or any comparable fees for the use of the open source soft ware contained in our product The use of the open source software in our product by the customer...

Page 16: ...pective effective open source software license for the respec tive open source software as listed in the following are effective for the use of the open source software beyond the purpose of the contr...

Page 17: ...RO in the manual The devices are MoRoS ADSL 2 1A PRO MoRoS ADSL 2 1B PRO If the devices are different this will be mentioned explicitly in the respective sections The MoRoS ADSL 2 1A PRO supports the...

Page 18: ...sing or damaged please contact your distributor 1 MoRoS ADSL 2 1 PRO 1 Quick Installation Guide 1 Support CD with operator manual in PDF format The following related documents can be found on the deli...

Page 19: ...vel inputs HIGH level 3 12 V contact open or voltage strength for external supply LOW level 0 1 V Current consumption of an active input against GND internal 5V Typically 0 35 mA when enabling the inp...

Page 20: ...TR 067 and ADSL2 TR 100 requirements Extended INP 32 kB Reed Solomon memory for improved IPTV quality and noise immunity LLC encapsulation according to RFC1483 4 port Ethernet switch 10 100 Mbit s fu...

Page 21: ...sition Description 1 Status VPN LED 2 Data LED 3 COM LED 4 Power LED 5 Status LED for Switch LAN 1 6 Status LED for Switch LAN 2 7 Status LED for Switch LAN 3 8 Status LED for Switch LAN 4 9 Reset key...

Page 22: ...een Supply missing present green PPP link establishing COM orange PPP link offline established green Data orange PPP data traffic green VPN VPN connec tion estab lished Status VPN red Status Initializ...

Page 23: ...rt time Resets the software and restarts it Soft reset Press for at least 3 seconds Resets the hardware and restarts it Hard reset Reset key Press three times for a short time within 2 seconds Deletes...

Page 24: ...ons Figure 2 Connections on the front panel of the device Position Description 1 Serial interface RS232 socket V 24 V 28 3 ADSL line connection RJ45 2 Switch with 4 Ethernet ports RJ45 10 100 BT Table...

Page 25: ...e top of the device Terminal Description Description 1 OUT 1 NC Output 1 normally closed 2 OUT 1 Output 1 3 OUT 1 NO Output 1 normally open 4 OUT 2 NC Output 2 normally closed 5 OUT 2 Output 2 6 OUT 2...

Page 26: ...ns on the bottom of the device Terminal Description Description 19 GND Ground 20 Input 2 Input 2 21 Input 1 Input 1 22 GND Ground 23 Reset Reset input 24 GND Ground 25 10 60 VDC Power supply 10 V 60 V...

Page 27: ...Set Ready 7 RTS Request To Send 8 CTS Clear To Send 9 RI Ring Indication Table 9 Description of the pin allocation of the D Sub socket 8 5 LAN Connection Table 10 RJ45 connector Ethernet cable Pin Sig...

Page 28: ...ctor Pin Signal Description 1 n c Not connected 2 n c Not connected 3 n c Not connected 4 a ADSL line connection wire a 5 b ADSL line connection wire b 6 n c Not connected 7 n c Not connected 8 n c No...

Page 29: ...o the already configured IPv6 addresses In addition the router can distribute its prefix to local devices router advertisement Serial Ethernet gateway It is possible to output arriving data from a cer...

Page 30: ...LAN IP forwarding IP forwarding rules can be used to create additional IP addresses at the LAN ext interface Packets to one of these IP addresses will be forwarded to the IP address in the local LAN...

Page 31: ...equests can be forwarded to previously configured DNS servers in the Internet or the DNS servers passed on during PPP connection establishment Firewall stateful firewall The firewall enables the limit...

Page 32: ...onnections or to send messages via e mail or SMS Time synchronisation via NTP Synchronisation of the system time via Network Time Protocol with an NTP server in the Internet The system time will thus...

Page 33: ...e the availability Freely programmable sandbox A freely configurable sandbox is available The sandbox is a kind of a virtual machine which runs on the router and allows to start programs collect data...

Page 34: ...ard and damage of the product The device must not be used in wet or damp environments or in the direct vicinity of water Install the device at a dry location protected from water spray Disconnect the...

Page 35: ...e of the DIN rail 2 Lift the device perpendicular to the DIN rail until the two lower flexible snap in hooks engage in the DIN rail The MoRoS ADSL 2 1 PRO is now readily mounted Connecting the power s...

Page 36: ...he power supply The MoRoS ADSL 2 1 PRO is disconnected from the power supply Removing the device from the DIN rail How to uninstall the MoRoS ADSL 2 1 PRO from a DIN rail in a switch cabinet You will...

Page 37: ...own in the following figure 37 The plastic spring of the snap in hook is stretched 3 While you hold the plastic spring apart with the lower snap in hooks pull the device away from the DIN rail 4 Un ho...

Page 38: ...d the other end into a network socket at the MoRoS ADSL 2 1 PRO switch 3 Plug one end of the phone connection cable into your phone socket or DSL splitter and the other end into the ADSL Line socket 4...

Page 39: ...web browser and enter the URL http 192 168 1 1 into the address bar The browser loads the start page of the MoRoS ADSL 2 1 PRO If you see the message in your browser window that the page with this add...

Page 40: ...ow the language selection We urgently recommend to enable online help for the first configurations to allow a quick and flawless configuration Configuring with the web interface How to configure with...

Page 41: ...web interface is displayed 4 Use the menu on the left side to select the menu item in which you want to change settings 5 Enter the required settings 6 Click on the button OK on the according configur...

Page 42: ...TPS protocol the browser indicates again that an invalid security certificate is used The certificate is not trusted because the Common Name of the certificate differs from your input in the address b...

Page 43: ...can be accessed Configuration via the web interface User name and password are entered in the menu Basic Settings on the page Web interface in the field Authentication You can enable or disable the pe...

Page 44: ...r the IPv4 address of the router in the LAN into the entry field IP address and the Netmask into the field Netmask When changing the local IP address the address range of the DHCP server will be adjus...

Page 45: ...default gateway can be entered nor NAT can be enabled or disabled here This is configured in the menu LAN ext on the respective page Routing 13 1 4 Entering Host Names You can specify the host and dom...

Page 46: ...t is necessary that you enter the MAC address of the computer that is used for configuration into the list of allowed source MAC addresses before activating the MAC filter Configuration via the web in...

Page 47: ...n the LAN ext page the radio button PPPoE connection For an ADSL connection over PPPoAto a WAN configure in the LAN ext menu on the DSL page the ADSL connection first Then select in the LAN ext menu o...

Page 48: ...User name and Password entry fields The following parameters are only relevant if the LAN ext interface has been configured for a PPPoE or PPPoA connection Enter an optional idle time into the entry...

Page 49: ...DSL the checkbox Connect immediately and hold connection If necessary enter another time in minutes for the connection check into the entry field Interval for checking connection The default setting...

Page 50: ...establishment within this period e g a packet that complies with the dialling filter The connection is also terminated if the configured Idle time has expired for example Configuration with the web i...

Page 51: ...f the original source Configuration via the web interface In order to configure an IPv4 default route check in the menu LAN ext on the page Routing the checkbox Set default route to gateway and enter...

Page 52: ...ield Source IP address In order to permit connections to certain ports enter the permitted destination port into the entry field Destination port In order to permit connections to certain IP addresses...

Page 53: ...a permitted IP connection proceed as follows Select in the section Allow new connection in the drop down list field Data direction a data direction for the rule Define the protocol of the permitted c...

Page 54: ...enabled Otherwise all packets that are not directed to these IP addresses would be discarded Configuration via the web interface In order to enable IP forwarding check in the LAN ext menu on the IP f...

Page 55: ...ing check in the menu LAN ext on the page Port forwarding the checkbox Activate port forwarding for LAN ext interface In order to create a port forwarding rule select in the field Create new rule the...

Page 56: ...equested by the local network of the MoRoS ADSL 2 1 PRO or which have not been forwarded to a participant in the local network by a port forwarding rule If no exposed host is configured these incoming...

Page 57: ...RoS ADSL 2 1 PRO as OpenVPN server or OpenVPN client Figure 7 shows a sample configuration for an OpenVPN connection One MoRoS ADSL 2 1 PRO is configured as OpenVPN server and a second as OpenVPN clie...

Page 58: ...thods when establishing the VPN tunnel Authentication type Usage Characteristics None For testing purposes and to connect networks without encryption No encrypted connection It is not possible to log...

Page 59: ...file to create an OpenVPN configuration file for exampple which can be used as basis for the operation of an OpenVPN instance on a client PC The OpenVPN packet for Windows clients can be downloaded fr...

Page 60: ...m size of 1 500 bytes The actually transmitted amount of user data is lower because OpenVPN creates a protocol overhead which means that the protocol information that is transmitted as well is a part...

Page 61: ...hen a client registers with a certificate for whose Common Name no other link has been entered In order to configure the authentication with static key select the radio button No authentication or aut...

Page 62: ...LZO compression is used packets are masked before tunnelling which encryption algorithm is used during transmission how big the tunnel packets are to be and in which time intervals the OpenVPN client...

Page 63: ...gnificantly reduce the transmitted volume of data Switch the compression off if the remote terminal does not support LZO compression In order to mask the packets with the virtual tunnel IP address che...

Page 64: ...is recommended to enter a domain name or IP address which can only be connected via the tunnel here If the ping is not successful a possibly existing tunnel will be terminated and a new tunnel will b...

Page 65: ...into the IPv4 tunnel address local or IPv6 tunnel address local field and the IP address of the remote tunnel end into the IPv4 tunnel address remote or IPv6 tunnel address remote field Enter the addr...

Page 66: ...interface For an operation as PPTP server check in the menu LAN ext on the page PPTP server the checkbox Activate PPTP server In order to display the messages of the last connection select the link Di...

Page 67: ...o display the messages of the last connection select the link Display log of last connection In order to define the IP address or the domain name of the remote terminal to which the VPN connection is...

Page 68: ...urity is a security protocol for the safe communication via IP networks and can be used to set up virtual private networks VPN Two subnets can be connected together using two suitable routers e g INSY...

Page 69: ...tiated In this case the Action on dead peer of the dead peer detection must be set to hold since no new incoming connection request can be accepted any more in case the existing connection has been te...

Page 70: ...ection enter the interval which is used to send requests to the remote terminal in seconds into the field Dead peer detection interval and the maximum time in which these requests must be replied in s...

Page 71: ...s on white box The private key can only be deleted The authentication with passphrase can be used for main mode and aggressive mode The passphrase which must be used by all IPsec participants must be...

Page 72: ...appropriate route to this network will be created automatically which enables to access the tunnel address of the remote terminal for example In order to adjust the MTU maximum permissible number of b...

Page 73: ...l set up or the set up of a serial Ethernet connection The inputs are closed when connected to GND They are opened when there is no connection to GND The states of the two inputs can be queried via th...

Page 74: ...l on demand is deactivated This function is not effective if the LAN ext interface is configured for a PPPoA connection In order to terminate a Dial Out connection by opening input 2 check the checkbo...

Page 75: ...condition daily at a certain time check in the section Switching times Output 1 2 the checkbox Switches to idle condition at and enter into the following field the time for releasing the respective o...

Page 76: ...lso control via the web interface to which switch port a cable is connected and if a physical connection exists Configuration via the web interface You can see the current configuration of the individ...

Page 77: ...ctive switch port In order to define the transmission rate of a switch port use the radio buttons 10 Mbit s and 100 Mbit s To operate a switch port in full duplex or half duplex mode use the radio but...

Page 78: ...VLAN configuration page the checkbox Activate VLAN configuration In order to assign a port or the router to a VLAN check the respective checkbox in the configuration matrix In order to specify a VLAN...

Page 79: ...red separately to a sniffer port where the network traffic can be read Configuration with the web interface To use a port as sniffer port select the according port in the menu Switch on the page Port...

Page 80: ...check in the menu Serial Ethernet on the page Serial Ethernet the checkbox Activate serial Ethernet gateway In order to display the current state of the serial Ethernet gateway click on the link Seri...

Page 81: ...com 1234 When using IPT only the IPT number is specified here e g ATD12345 In order to specify that a character on the serial interface triggers an outgoing connection select in the Outgoing connecti...

Page 82: ...gateway connections will be terminated 13 6 2 Configuring Serial Ethernet Gateway Interface The serial Ethernet gateway of the MoRoS ADSL 2 1 PRO allows a comprehensive configuration of the serial in...

Page 83: ...out value in seconds into the field Idle time If no data transfer takes place as long as specified here the connection will be closed To ensure that the connection is never closed set the value to 0 T...

Page 84: ...le as long as the serial Ethernet gateway has not been restarted ATH The serial Ethernet gateway closes the serial Internet connection ATE n Configuring the echo behaviour ATE0 Echo disabled ATE1 Echo...

Page 85: ...ile click on the link Download current AT answer file In order to upload an AT answer file click on the Browse button and locate the respective file The file will be uploaded after clicking on OK This...

Page 86: ...MTP port usually port 25 Enter the user name for the e mail account into the field User name as well as the associated password into the field Password In order to enable to trigger an SNMP trap you m...

Page 87: ...erface In order to enable e mail dispatch check in the menu Messages on the page E mail the checkbox Activate e mail messages In order to create an e mail message you have to define this in the sectio...

Page 88: ...he menu Messages on the page Configuration Configuration via the web interface In order to enable triggering of SNMP traps check in the menu Messages on the page SNMP traps the checkbox Activate SNMP...

Page 89: ...f IP addresses are combined with host names in the local host table Basic Settings menu Host names page these will be processed first Configuration via the web interface In order to disable the DNS re...

Page 90: ...or this function you will need an account with a DynDNS provider Configuration via the web interface In order to configure the dynamic DNS update check in the menu Server services on the page Dyn DNS...

Page 91: ...address range from which the DHCP server of the device allocates addresses in the LAN The IP address range of the DHCP server must be located in the same network as the IP address of the MoRoS ADSL 2...

Page 92: ...t the LAN ext interface Configuration via the web interface In order to enable the router advertiser check in the menu Server services on the page Router Advertiser the checkbox Activate router advert...

Page 93: ...s in the entry field Timeout for inactive connections In order to avoid overloading you can restrict the number of clients which can connect at the same time Enter the maximum number of simultaneously...

Page 94: ...URL from the list delete the text of the URL from the list Save your settings by clicking OK 13 8 7 Configuring IPT The MoRoS ADSL 2 1 PRO also allows data transfer via an IPT channel It can act as I...

Page 95: ...ximum time between two characters of an IPT command that must be exceeded that the connection to the IPT master will be disconnected and re established again enter this time in seconds into the field...

Page 96: ...the port into the field Port In order to specify a contact information for the SNMP agent you can enter this into the field Contact information In order to specify a description for the SNMP agent you...

Page 97: ...so that they can be addressed in MCIP telegrams The state of the objects can be set and or queried via the device drivers Configuration via the web interface In order to enable device drivers to regi...

Page 98: ...displayed lines and the up date interval can be configured Configuration with the web interface In order to view the detailed system messages via the web interface click on the link Show the extensive...

Page 99: ...ce In order to configure time and date enter in the menu System on the page Time the values for day month year as well as hours and minutes into the entry fields DD MM YYYY hh mm Configure the time zo...

Page 100: ...on Display and Control Elements Function of the Control Elements Configuration via the web interface In order to restart select in the menu System on the page Reset the radio button Reset Click on OK...

Page 101: ...ify the storage location of the update files enter the IP address or the domain name of the server into the Server field and the respective port into the Port field It is also possible to specify sub...

Page 102: ...mware The following steps must be performed to update the firmware You have access to the web interface If you access the web interface via a dial up connection the connection must be maintained long...

Page 103: ...es place following the upload System menu to the Reset page select Reset and click on OK 5 If you have also received the file data_ rev proceed with the second file data_ rev as with the first file wi...

Page 104: ...PRO 1 In the web interface under System switch to the page Update 2 Click on Browse in the Manual update section and select the configuration file e g configuration bin 3 Click on OK to start the uplo...

Page 105: ...figuration and thus all data to provide a good troubleshooting basis when using the support of the manufacturer The support packet will be encrypted so that the secret passwords or keys contained in i...

Page 106: ...currently stored sandbox image is indicated behind Stored sandbox image together with its MD5 checksum The file name of the currently installed sandbox image is indicated behind Installed sandbox imag...

Page 107: ...sandbox the configuration can be modified using this function so that the invader gets access to the configuration and thus to further confidential information like VPN keys or passwords for example I...

Page 108: ...eld enter the IP address to which you want to send the IP packet or the domain name into the field Parameter and click on OK Optionally you may increase the standard number of 3 hops by increasing the...

Page 109: ...ease contact the INSYS icom Support You can contact our support department via e mail under support insys tec de and via phone under 49 941 58692 0 14 3 Repair Send defect devices with detailed failur...

Page 110: ...owing address carriage prepaid Frankenberg Metalle Gaertnersleite 8 D 96450 Coburg Germany This regulation applies to all devices which were delivered after August 13 2005 Please consider possible sto...

Page 111: ...Member States relating to Electromagnetic Compatibility 2004 108 EC and the Council Directive relating to Low Voltage 2006 95 EC as well as the Council Directive R TTE 1999 5 EC You will find the lat...

Page 112: ...ble offense against export regulations This device is subject to the War Weapons Control Act because of its encryption technology and dual use character Thus it requires the permission of the Federal...

Page 113: ...or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copie...

Page 114: ...print an announcement These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered independent and s...

Page 115: ...ctly through you then the only way you could satisfy both it and this Li cense would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenforce...

Page 116: ...r freedom to share and change free software to make sure the software is free for all its users This license the Library General Public License applies to some specially designated Free Software Found...

Page 117: ...that uses the library The former con tains code derived from the library while the latter only works together with the library Note that it is possible for a library to be covered by the ordinary Gen...

Page 118: ...not bring the other work un der the scope of this License 3 You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library To do this...

Page 119: ...the same user the materials specified in Subsection 6a above for a charge no more than the cost of performing this distribution c If distribution of the work is made by offering access to copy from a...

Page 120: ...distrib ute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this Licen...

Page 121: ...OpenSSL library http www openssl org Markus F X J Oberhumer OpenSSL License The OpenSSL toolkit stays under a dual license i e both the conditions of the OpenSSL License and the original SSLeay licens...

Page 122: ...this package is used in a product Eric Young should be given attribution as the author of the parts of the library used This can be in the form of a textual message at program startup or in documentat...

Page 123: ...licence and distribution terms for any publically available version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distribution licence inclu...

Page 124: ...col DHCP servers can dynamically design an IP address and other parameters to DHCP clients on re quest Dial in The device can be called via a dial in connection and then create a connection to the LAN...

Page 125: ...C is a part of an Ethernet interface Each Ethernet interface has a unique global number the MAC address MSN Multiple Subscriber Number Devices that are active on an So bus re quire an answerback code...

Page 126: ...ndividual ports TCP Transmission Control Protocol a transport protocol to enable data ex change between network devices It operates connection based i t the data transmission is protected UDP User Dat...

Page 127: ...MoRoS ADSL 2 1 PRO Glossary WAN Wide Area Network a network consisting of computers which are located far away from each other 127...

Page 128: ...Table 9 Description of the pin allocation of the D Sub socket 27 Table 10 RJ45 connector Ethernet cable 27 Table 11 Description of the pin allocation of the RJ45 connector 27 Table 12 Description of...

Page 129: ...M LED 21 22 Configuration 29 32 43 105 Configuration file 32 101 104 Connection 34 Connection check 49 Connection Establishment 50 52 86 Connection log 60 63 Connection timeout 93 Control lines 82 Cur...

Page 130: ...ocol 66 Ground 26 GSM 125 Half duplex 76 77 Hardware reset 100 Hardware revision 98 Host name 45 Host table 45 Housing 14 HTTP 32 HTTPS 32 42 ICMP 125 ICMP ping 68 108 Idle time 30 48 50 input 74 Inpu...

Page 131: ...N packet 59 OpenVPN server 30 57 59 OpenVPN tunnel 59 73 74 Operating voltage 19 Operation 40 Operation location 99 Output 25 75 Overcurrent 13 Overvoltage 14 Overvoltage protection 14 PAP 125 Passphr...

Page 132: ...3 109 Signal 86 SLAAC 92 SMS 126 SMTP server 86 Sniffer port 79 SNMP 86 96 SNMP agent 32 96 SNMP authentication 86 96 SNMP encryption 86 96 SNMP request 32 SNMP trap 32 86 88 SNMP trap triggering 32 8...

Page 133: ...me 39 41 43 86 90 Validity period 91 Virtual IP address 44 Virtual net address 44 VLAN 31 78 VLAN ID 78 VLAN tag 78 VPN 57 66 126 VPN IP address 61 VPN ping 59 62 VPN ping interval 60 64 VPN tunnel 57...

Page 134: ......

Reviews: