4
TABLE OF CONTENTS
1
THIS MANUAL ....................................................................................................................................... 6
1.1
T
YPES OF USERS
........................................................................................................................................ 6
1.2
M
ANAGEMENT
C
ONSOLE
........................................................................................................................... 6
1.3
M
ORE INFORMATION
................................................................................................................................. 7
2
SYSTEM CONFIGURATION ..................................................................................................................... 8
2.1
M
ANAGEMENT
C
ONSOLE
C
ONNECTION
......................................................................................................... 8
2.2
A
DMINISTRATOR
S
ET
U
P
.......................................................................................................................... 10
2.3
N
ETWORK
C
ONFIGURATION
...................................................................................................................... 11
2.4
S
ERVICE
A
CCESS AND
B
RUTE
F
ORCE
P
ROTECTION
.......................................................................................... 15
2.5
C
OMMUNICATIONS
S
OFTWARE
.................................................................................................................. 18
2.6
M
ANAGEMENT
N
ETWORK
C
ONFIGURATION
................................................................................................. 19
3
SERIAL PORT, HOST, DEVICE & USER CONFIGURATION ........................................................................ 28
3.1
C
ONFIGURE
S
ERIAL
P
ORTS
........................................................................................................................ 28
3.2
A
DD AND
E
DIT
U
SERS
.............................................................................................................................. 38
3.3
A
UTHENTICATION
................................................................................................................................... 42
3.4
N
ETWORK
H
OSTS
.................................................................................................................................... 42
3.5
T
RUSTED
N
ETWORKS
............................................................................................................................... 43
3.6
S
ERIAL
P
ORT
C
ASCADING
.......................................................................................................................... 45
3.7
S
ERIAL
P
ORT
R
EDIRECTION
(P
ORT
S
HARE
) .................................................................................................... 49
3.8
M
ANAGED
D
EVICES
................................................................................................................................. 50
3.9
IP
SEC
VPN ............................................................................................................................................ 52
3.10
O
PEN
VPN ............................................................................................................................................ 55
3.11
PPTP
VPN ............................................................................................................................................ 63
3.12
C
ALL
H
OME
........................................................................................................................................... 68
3.13
IP
P
ASSTHROUGH
................................................................................................................................... 71
3.14
C
ONFIGURATION OVER
DHCP
(ZTP) .......................................................................................................... 73
3.15
E
NROLLMENT INTO
L
IGHTHOUSE
................................................................................................................ 75
4
FIREWALL, FAILOVER & OOB ACCESS ................................................................................................... 76
4.1
D
IALUP
M
ODEM
C
ONNECTION
.................................................................................................................. 76
4.2
OOB
D
IAL
-I
N
A
CCESS
.............................................................................................................................. 76
4.3
D
IAL
-O
UT
A
CCESS
................................................................................................................................... 79
4.4
OOB
B
ROADBAND
E
THERNET
A
CCESS
........................................................................................................ 83
4.5
B
ROADBAND
E
THERNET
F
AILOVER
.............................................................................................................. 83
4.6
C
ELLULAR
M
ODEM
C
ONNECTION
............................................................................................................... 84
4.7
C
ELLULAR
O
PERATION
............................................................................................................................. 93
4.8
F
IREWALL
&
F
ORWARDING
....................................................................................................................... 96
5
SSH TUNNELS & SDT CONNECTOR ..................................................................................................... 105
5.1
C
ONFIGURING FOR
SSH
T
UNNELING TO
H
OSTS
........................................................................................... 106
5.2
SDT
C
ONNECTOR
C
LIENT
C
ONFIGURATION
................................................................................................ 106
5.3
SDT
C
ONNECTOR TO
M
ANAGEMENT
C
ONSOLE
.......................................................................................... 115
5.4
SDT
C
ONNECTOR
:
T
ELNET OR
SSH
CONNECT TO SERIALLY ATTACHED DEVICES
.................................................. 115
5.5
U
SING
SDT
C
ONNECTOR FOR OUT
-
OF
-
BAND CONNECTION TO THE GATEWAY
.................................................... 117
5.6
I
MPORTING
(
AND EXPORTING
)
PREFERENCES
.............................................................................................. 118
5.7
SDT
C
ONNECTOR
P
UBLIC
K
EY
A
UTHENTICATION
......................................................................................... 119
5.8
S
ETTING UP
SDT
FOR
R
EMOTE
D
ESKTOP ACCESS
......................................................................................... 120
5.9
SDT
SSH
T
UNNEL FOR
VNC ................................................................................................................... 121
5.10
U
SING
SDT
TO
IP
CONNECT TO HOSTS THAT ARE SERIALLY ATTACHED TO THE GATEWAY
...................................... 123
5.11
SSH
T
UNNELING USING OTHER
SSH
CLIENTS
(
E
.
G
.
P
U
TTY) ........................................................................... 127