background image

UM Configuration BAT-C2

                                                                                                  

Technical support

Release 01.0.00 04/2019                                                                                                 https://hirschmann-support.belden.com

Configuration User Manual

Industrial Wireless LAN Gateway
BAT-C2

Содержание HIRSCHMANN BAT-C2

Страница 1: ...UM Configuration BAT C2 Technical support Release 01 0 00 04 2019 https hirschmann support belden com Configuration User Manual Industrial Wireless LAN Gateway BAT C2...

Страница 2: ...hmann product site http www hirschmann com Hirschmann Automation and Control GmbH Stuttgarter Str 45 51 72654 Neckartenzlingen Germany Open Source Information Open Source Software used in the product...

Страница 3: ...be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU General Public License and the GNU Lesser General Public Licens...

Страница 4: ...free program by obtaining a restrictive license from a patent holder Therefore we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use s...

Страница 5: ...omplete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the library Ac...

Страница 6: ...y of the Library To do this you must alter all the notices that refer to this License so that they refer to the ordinary GNU General Public License version 2 instead of to this License If a newer vers...

Страница 7: ...ust be distributed under Sections 1 and 2 above and if the work is an executable linked with the Library with the complete machine readable work that uses the Library as object code and or source code...

Страница 8: ...hese terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties with thi...

Страница 9: ...EPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPL...

Страница 10: ...v1 5 gmp v6 0 0 usbutils v7 wireless tools v29 libnfnetlink v1 0 1 mtd utils v1 5 1 mii diag v2 11 lzo v2 09 rng tools v4 ikescan v1 9 socat 2 0 0 b7 sshpass v1 06 and ndisc6 v1 0 2 GNU GENERAL PUBLI...

Страница 11: ...Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this Li...

Страница 12: ...ur cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1 and 2 above on a medium customari...

Страница 13: ...e integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through tha...

Страница 14: ...veryone can redistribute and change under these terms To do so attach the following notices to the program It is safest to attach them to the start of each source file to most effectively convey the e...

Страница 15: ...ng or other promotional materials to be disseminated to the public or any portion thereof nor to use the name of any STANFORD faculty member employee or student or any trademark service mark trade nam...

Страница 16: ...to take away your freedom to share and change it By contrast the GNU General Public Licenses are intended to guarantee your freedom to share and change free software to make sure the software is free...

Страница 17: ...icense permits more lax criteria for linking other code with the library We call this license the Lesser General Public License because it does Less to protect the user s freedom than the ordinary Gen...

Страница 18: ...ntact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You may charge a fee for the physical act of transferri...

Страница 19: ...tions 1 and 2 above on a medium customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to c...

Страница 20: ...compatible with the version that the work was made with c Accompany the work with a written offer valid for at least three years to give the same user the materials specified in Subsection 6a above fo...

Страница 21: ...stribution of the Library by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution...

Страница 22: ...OF THE USE OR INABILITY TO USE THE LIBRARY INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERAT...

Страница 23: ...that are not Modified Works Contributor means any person or entity that Distributes the Program Licensed Patents mean patent claims licensable by a Contributor which are necessarily infringed by the u...

Страница 24: ...hts and licenses granted hereunder each Recipient hereby assumes sole responsibility to secure any other intellectual property rights needed if any For example if a third party patent license is requi...

Страница 25: ...am in a commercial product offering The obligations in this section do not apply to any claims or Losses relating to any actual or alleged intellectual property infringement In order to qualify an Ind...

Страница 26: ...and distribute copies of this Agreement but in order to avoid inconsistency the Agreement is copyrighted and may only be modified in the following manner The Agreement Steward reserves the right to p...

Страница 27: ...ns of the OpenSSL License and the original SSLeay license apply to the toolkit See below for the actual license texts OpenSSL License Copyright c 1998 2018 The OpenSSL Project All rights reserved Redi...

Страница 28: ...Original SSLeay License Copyright C 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was wri...

Страница 29: ...ESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF...

Страница 30: ...l be responsible for any legal consequences yourself I am not making any claims whether possessing or using this is legal or not in your country and I am not taking any responsibility on your behalf N...

Страница 31: ...S LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY O...

Страница 32: ...are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer 2 Redistribut...

Страница 33: ...censee a nonexclusive royalty free world wide license to reproduce analyze test perform and or display publicly prepare derivative works distribute and otherwise use Python alone or in any derivative...

Страница 34: ...OF CALIFORNIA BE LIABLE FOR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE DATA OR PROFITS WHETHER IN AN ACTION OF CONTRACT NEGLIGENCE OR OTHER...

Страница 35: ...NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR T...

Страница 36: ...T LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INC...

Страница 37: ...THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOS...

Страница 38: ...MPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE...

Страница 39: ...th the aim of protecting users freedom to change the software The systematic pattern of such abuse occurs in the area of products for individuals to use which is precisely where it is most unacceptabl...

Страница 40: ...f any on which the executable work runs or a compiler used to produce the work or an object code interpreter used to run it The Corresponding Source for a work in object code form means all the source...

Страница 41: ...r each copy that you convey and you may offer support or warranty protection for a fee 5 Conveying Modified Source Versions You may convey a work based on the Program or the modifications to produce i...

Страница 42: ...ce Regardless of what server hosts the Corresponding Source you remain obligated to ensure that it is available for as long as needed to satisfy these requirements e Convey the object code using peer...

Страница 43: ...to require their own removal in certain cases when you modify the work You may place additional permissions on material added by you to a covered work for which you have or can give appropriate copyr...

Страница 44: ...er section 10 9 Acceptance Not Required for Having Copies You are not required to accept this License in order to receive or run a copy of the Program Ancillary propagation of a covered work occurring...

Страница 45: ...al knowledge that but for the patent license your conveying the covered work in a country or your recipient s use of the covered work in a country would infringe one or more identifiable patents in th...

Страница 46: ...al Public License you may choose any version ever published by the Free Software Foundation If the Program specifies that a proxy can decide which future versions of the GNU General Public License can...

Страница 47: ...ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU General Public License for more details You should have received a copy of the GNU Ge...

Страница 48: ...EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE dhcp v4 3 6 This is not governed by any open source license dbus v1 6 18 The Academic Free License v 2 1 This Academic Free License the License applie...

Страница 49: ...atent rights granted herein by Licensor are owned by the Licensor or are sublicensed to You under the terms of this License with the permission of the contributor s of those copyrights and patent righ...

Страница 50: ...rmination of this License 13 Miscellaneous This License represents the complete agreement concerning the subject matter hereof If any provision of this License is held to be unenforceable such provisi...

Страница 51: ...Work as defined below An Application is any work that makes use of an interface provided by the Library but which is not otherwise based on the Library Defining a subclass of a class defined by the L...

Страница 52: ...ution include the copyright notice for the Library among these notices as well as a reference directing the user to the copies of the GNU GPL and this license document d Do one of the following 0 Conv...

Страница 53: ...v4 3 6 and e2fsprogs v1 42 9 GNU LIBRARY GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright C 1991 Free Software Foundation Inc 51 Franklin St Fifth Floor Boston MA 02110 1301 USA Everyone is permi...

Страница 54: ...g the library and is analogous to running a utility program or application program However in a textual and legal sense the linked executable is a combined work a derivative of the original library an...

Страница 55: ...based on the Library and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a The modified work must itself be a soft...

Страница 56: ...ins no derivative of any portion of the Library but is designed to work with the Library by being compiled or linked with it is called a work that uses the Library Such a work in isolation is not a de...

Страница 57: ...istributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executa...

Страница 58: ...ople have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or...

Страница 59: ...iles the Software to deal in the Software without restriction including without limitation the rights to use copy modify merge publish distribute distribute with modifications sublicense and or sell c...

Страница 60: ...WARE IS PROVIDED AS IS AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE bzip2 v1 0 6 This progr...

Страница 61: ...ed from any source distribution Jean loup Gailly Mark Adler jloup gzip org madler alumni caltech edu Iperf v2 0 5 Copyright c 1999 2000 2001 2002 2003 2004 2005 The Board of Trustees of the University...

Страница 62: ...IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT IN NO EVENT SHALL THE AUTHORS OR...

Страница 63: ...be omitted when the library is built THE BASIC LIBRARY FUNCTIONS Written by Philip Hazel Email local part ph10 Email domain cam ac uk University of Cambridge Computing Service Cambridge England Copyr...

Страница 64: ...pnpd v1 9 20141209 MiniUPnPd Copyright c 2006 2011 Thomas BERNARD All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the fol...

Страница 65: ...y forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list of conditions and th...

Страница 66: ...R MAKES NO AND DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THIS PRODUCT WILL NOT INFRINGE ANY THIRD PARTY RIGHTS 5 THE COPYRIGH...

Страница 67: ...his list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS...

Страница 68: ...thout modification are permitted provided that the following conditions are met 1 Redistributions in source code must retain the above copyright notice this list of conditions and the following discla...

Страница 69: ...MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF PYTHON WILL NOT INFRINGE ANY THIRD PARTY RIGHTS 5 PSF SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON FOR ANY INCI...

Страница 70: ...search Initiatives having an office at 1895 Preston White Drive Reston VA 20191 CNRI and the Individual or Organization Licensee accessing and otherwise using Python 1 6 1 software in source or binary...

Страница 71: ...and Licensee This License Agreement does not grant permission to use CNRI trademarks or trade name in a trademark sense to endorse or promote products or services of Licensee or any third party 8 By c...

Страница 72: ...84 Accessing Web Manager ___________________________________________________84 Web Manager Components _________________________________________________85 Status Page _________________________________...

Страница 73: ...iguring VPN Settings _______________________________________________109 Wi Fi Protected Setup _____________________________________________________109 To Initiate WPS _________________________________...

Страница 74: ..._____________________125 WAN _______________________________________________________________125 WAN MAC Address Filters ______________________________________________126 To Configure Gateway WAN Setti...

Страница 75: ..._______140 System ________________________________________________________________140 To access System settings _____________________________________________141 User Management _______________________...

Страница 76: ...81 Figure 3 1 Components of the Web Manager Page ______________________________________85 Figure 3 2 Expandable Menu Bar Selections ___________________________________________85 Figure 3 3 Status Page...

Страница 77: ..._____________________________________________ 107 Table 4 17 Wi Fi Protected Setup__________________________________________________ 109 Table 4 18 WLAN Scan Quick Connect Results_____________________...

Страница 78: ...SSL Credential Create New Self Signed Certificate__________________________ 137 Table 7 24 SSL Trusted Authority__________________________________________________ 138 Table 7 25 SSL CSR Certificate Si...

Страница 79: ...wired network wireless network protocol stack Wi Fi protected setup WLAN Scan QuickConnect and WLAN Profiles settings 5 Filesystem Instructions to access and configure filesystem status 6 Diagnostics...

Страница 80: ...ncontrolled machine actions caused by data loss configure all the data transmission devices individually Before you start any machine which is controlled via data transmission be sure to complete the...

Страница 81: ...g n ac Support of the following frequency ranges 2 4 GHz and 5 GHz Convenient device management via Web browser Encryption functions Smart roaming for uninterrupted connections during transmission fro...

Страница 82: ...required Network Connectivity Ethernet Wi Fi Antenna diversity Operating temperature range 40 C to 70 C Protocol Support The BAT C2 contains a full featured IP networking and wireless software stack...

Страница 83: ...to users and administrators XML is easily editable with a standard text or XML editor Hardware Address The hardware address is also referred to as the Ethernet address physical address or MAC address...

Страница 84: ...Manager is normally accessed through a standard web browser For further instructions see the Installation User Manual available as PDF download on the Internet at the Hirschmann product pages www hir...

Страница 85: ...ration tabs contain selections that can further expand to reveal additional subsections A right pointing blue arrow indicates a particular selection can be expanded to reveal subsections Expand or col...

Страница 86: ...ge The Status page appears upon logging into Web Manager and when you click the Status tab The upper left vertical menu bar allows you to jump to a specific section on the Status page Click a particul...

Страница 87: ...points 89 Action Allows you to view and configure the actions for a specific alarm or report 121 Applications View and configure application running scripts 122 Bridge Allows you to configure a bridg...

Страница 88: ...setup configuration options for the BAT C2 147 Relay Contact Allows you to enable or disable the Relay Contact 124 Routes Shows the current system routing table 119 SNMP Shows SNMP status and configur...

Страница 89: ...up allowing clients to connect at any time Default selection Triggered in response to an external trigger event the SoftAP interface will come up for a user configurable amount of time the First Clie...

Страница 90: ...control the channel on which the SoftAP operates as long as the station STA interface is not connected to an access point Once the STA interface has established an association with an access point the...

Страница 91: ...to the bridged client from BAT C2s connected via the access point network and from this BAT C2 If Auto Detect IP Address is enabled then the BAT C2 will attempt to learn the IP Address by using the s...

Страница 92: ...cal links Enabled by default Bridging Mode Select either Host Network or Static Network In Host mode a single device is connected via Ethernet Default In Network mode multiple devices can be connected...

Страница 93: ...dging address Bridging IP Address Enter the bridging IP address which specifies the IP address of the bridged client When bridging is active this IP address will be used to create a static route betwe...

Страница 94: ...attempt to obtain IPv4 settings from a DHCP server and will periodically renew these settings with the server Note Overrides the BOOTP client the configured IPv4 address mask gateway hostname and doma...

Страница 95: ...t the BAT C2 Within Web Manager click Renew to renew the DHCPV6 lease IPv6 Auto Configuration Select to turn On or Off IPv6 auto configuration Off by default IPv6 IP Address Enter the static IPv6 addr...

Страница 96: ...abled the router will control the flow of outbound traffic according to the user defined filters In other words QoS improves performance by allowing the user to prioritize applications Filters can be...

Страница 97: ...0 to set speed to default Note Default is set to 90 of the maximum link speed Submit button Click the Submit button to enter the QoS settings The Submit button appears when new settings are entered D...

Страница 98: ...of the wireless wlan0 interface and link on the BAT C2 To see the effect of these items after a reboot view the Status page The following items require a reboot to take effect Network State DHCP Clien...

Страница 99: ...he BAT C2 is not in bridging mode and both interfaces are connected to the same IP subnet MTU When DHCP is enabled the MTU size is usually provided with the IP address When not provided by the DHCP se...

Страница 100: ...obtain IPv4 settings from a DHCP server upon bootup Note Overrides the configured IP address mask gateway hostname and domain Changing this value requires you to reboot the BAT C2 Within Web Manager...

Страница 101: ...available on the Wireless wlan0 Network WLAN Link Status page This same information is configurable on the Wireless wlan0 Network WLAN Link Configuration page Field Button Description Choice 1 Profile...

Страница 102: ...canning Channel List For example if the router is configured to operate on channel 40 with 40 MHz support enabled the BAT C2 may establish a connection on channel 36 Scanning Channel List Enter the Sc...

Страница 103: ...filters can be added The following are predefined priority classes Network Control and Internetwork Control are typically used for network control packets such as ICMP and have the highest priorities...

Страница 104: ...and click the Submit button Filter type Select the filter type from the drop down window Mac Address Network Port MAC Address Enter the MAC address to prioritize traffic from a particular BAT C2 with...

Страница 105: ...sent Method Select ICMP or TCP based ping Timeout Indicate the interval to wait for ping response from remote host Interval Indicate the interval in which to test reachability Failover Threshold Indic...

Страница 106: ...eting existing ones Added entries are static and for test purposes only Protocol Stack ICMIP Settings Description State Select to enable or disable processing of ICMP messages This includes both incom...

Страница 107: ...IKEv2 negotiation should be transmitted or accepted Propose signifying that the BAT C2 will permit IKEv2 and also use it as the default to initiate Insist signifying that the BAT C2 will only accept...

Страница 108: ...between the Local and VPN Gateway ISAKMP Phase 1 IKE Aggressive Mode Select to enable or disable Aggressive Mode In Aggressive mode IKE tries to combine as much information into fewer packets while m...

Страница 109: ...ity with the host on the remote network Ping Interval Enter the Ping Interval to monitor connectivity with a host on the remote network Max Tries Enter the number of Max Tries for pinging the host bef...

Страница 110: ...ext field description below Scan network SSID Click Scan to search for all network names containing the first few letters entered in the Network Name search field Performs a scan for BAT C2s within ra...

Страница 111: ...rofiles and have a higher priority than user created profiles The profiles on the WLAN Profiles page are listed in order of priority RSSI A real time value that indicates the signal strength of the ne...

Страница 112: ...P has become more vulnerable due to advances in hacking technology State of the art equipment can find WEP keys in 5 minutes For stronger security use WPA or the stronger WPA2 with AES CCMP WPA2 WPA M...

Страница 113: ...with some products that generate four identical keys from a passphrase this index must be one For Keys 1 4 enter one or more encryption keys in hexadecimal format Enter 10 hexadecimal digits 0 9 a f f...

Страница 114: ...name Enter a username Password Enter a password if the LEAP EAP TTLS and PEAP option is chosen Check the Show Password check box to make the password viewable as you enter it in the Password field Inn...

Страница 115: ...g Web Manager To view current filesystem browser statistics or to format the filesystem click Filesystem in the menu and select Statistics Note Formatting the filesystem will cause existing files on t...

Страница 116: ...ndary DNS addresses come from the active interface The static addresses from the Network Interface configuration settings may be overridden by DHCP Accessing the DNS Settings Using Web Manager To view...

Страница 117: ...also shows the reserved ports and associated services on this device To View the List of IP Sockets Using Web Manager To view IP Sockets on the Diagnostics page click IP Sockets Using XML Include in y...

Страница 118: ...Using Web Manager To view memory information on the Diagnostics page click Ping Processes The BAT C2 shows all the processes currently running on the system It shows the process ID PID parent process...

Страница 119: ...nical experts in debugging To View Thread Information Using Web Manager To view thread information on the Diagnostics page click Threads Using XML Include in your file statusgroup name processes Trace...

Страница 120: ...6 Diagnostics UM Configuration BAT C2 120 Release 01 0 00 04 2019 To Perform a Traceroute Using Web Manager To view traceroute information on the Diagnostics page click Traceroute...

Страница 121: ...nfiguration options for all alarms and reports Action Settings Description Delay Enter the Delay time in seconds to defer alarm processing Alarm actions will not be executed if the cause is corrected...

Страница 122: ...ng the Python language s standard library In addition the developer can take advantage of thousands of available third party packages to speed up development IDE Python scripts can be written with any...

Страница 123: ...articular script to have it run upon the start up of the BAT C2 Uncheck the checkbox to disable automatically running the unit upon startup Run on shutdown checkbox Check the Run on shutdown checkbox...

Страница 124: ...od is selected enter the date using the Year Month and Day drop down menus that become available Time If Manual method is selected enter the time using the Hour Minute Min and Second Sec drop down men...

Страница 125: ...abled enables the gateway firewall Disabled disable the gateway firewall default MAC Address filter Select to enable or disable the MAC address filter Disabled by default Interface Specify the interfa...

Страница 126: ...is going through firewalls all referenced ports on the gateway and LAN devices must be accessible Adding or Deleting New MAC Address Filter Settings Description Delete Click the checkbox to the left...

Страница 127: ...a port range Protocol Select the protocol for the rule TCP UDP or Both IP Address Enter the target for the port forwarding rule Target Port Indicate the target port This is the port which the packets...

Страница 128: ...nd IPv6 routing tables Please note that some fields may differ from static route definitions The following information displays in the IPv4 routing table Network Gateway Mask Flags Metric Interface Th...

Страница 129: ...is enabled Disabled DHCP Relay is disabled Start IP Address Start IP Address of address pool End IP Address End IP Address of address pool DHCP v6Settings State Enable or Disable the DHCP server for...

Страница 130: ...rsion 1 and 2 default Update Interval Indicate the number of seconds for the Update Interval Send unsolicited Response message every Update Interval seconds containing the complete routing table to al...

Страница 131: ...Keep the checkbox checked to keep the virtual IP address enabled A virtual IP address is enabled by default Delete checkbox Check the Delete checkbox adjacent to a virtual IP address if any listed to...

Страница 132: ...page See Table 7 20 for the HTTP settings that can be authenticated on the HTTP Authentication page MTU Enter the number of bytes indicating the largest physical packet size that the network can trans...

Страница 133: ...acks Note You may need to increase this number in some cases where the browser is sending data aggressively within TCP Windows size limit when file including firmware upgrade is uploaded from webpage...

Страница 134: ...nt types offer various levels of security from the least to most secure None no authentication necessary Basic encodes passwords using Base64 Digest encodes passwords using MD5 When changing the param...

Страница 135: ...enerated Read Community Specify the read community used by the agent defaults to public community The password for the read community is For SNMPv2c public For SNMPv3 publicpublic For the SNMPv3 read...

Страница 136: ...ion tab 2 Click SSL Credentials 3 Click X beside the existing credential you wish to delete 4 To confirm the delete click OK or Cancel to cancel the deletion Using XML Include in your file configgroup...

Страница 137: ...te click Browse to browse to and select the file 7 Select the New Key Type from the drop down menu 8 Click Submit Submit button Click the Submit button to enter the settings The Submit button appears...

Страница 138: ...own window If you select SSL authority RSA or DSA certificates select PEM or PKCS7 If the Web Manager determines that the certificate is an authority certificate type the field updates to PKCS12 autom...

Страница 139: ...llowing steps 1 On the Administration page click SSL CSR Certificate Signing Request The Certificate Signing Request page displays 2 Modify the following fields 3 Click Submit to initiate the Certific...

Страница 140: ...in your file configgroup name syslog System The BAT C2 settings allow for reboot restoring factory defaults uploading new firmware and updating a system s short and long name Note Anytime you reboot t...

Страница 141: ...k to the defaults After setting the configuration back to the factory defaults the gateway will automatically be rebooted Factory defaults may also be restored by pressing and holding the Reset button...

Страница 142: ...user Password Modify the current account s Password as desired The default Password for read write access is private The default password for read access only is public Submit Click Submit to submit c...

Страница 143: ...e Administrator Technician and User roles are system defined and cannot be deleted or altered Configuration Groups Displays the Configuration Groups accessible by the role Configuration Group access c...

Страница 144: ...s to Export filters instances to be exported are in the line and terminal groups To Export Configuration By default all settings groups are checked Using Web Manager 1 In the Web Manager click the Adm...

Страница 145: ...ion Export to browser sends the information into a separate web window which appears Export to local file sends information into a new locally saved file A file name must be specified in field provide...

Страница 146: ...s Click Clear All to clear all checkmarks and Select All to check all checkmarks Whole Groups to Import Select the configuration groups to import from the XML configuration record This option imports...

Страница 147: ...by using the source or destination IP address of packets arriving on the Ethernet interface This may affect the performance of running processes during the learning phase Bridging IP Address Select t...

Страница 148: ...ton will only appear when changes have been made to fields above 7 Click Manual Setup to return to the Status page where you may make changes directly in the configuration pages accessible through the...

Страница 149: ...ps hirschmann support belden com This site also includes a free of charge knowledge base and a software download section Hirschmann Competence Center The Hirschmann Competence Center is ahead of its c...

Отзывы: