3
The CWI provides three ways to configure and manage a router:
•
Using a Telnet or SSH session launched from the CWI, which allows you to configure and manage the router using
command-line interface (CLI) commands.
•
Using the Configuration Editor or Replace Configuration Editor, which allows you to view and edit the running
configuration in CLI format. The configuration editors provide common text editing functionality as well as traditional CLI
features. See the “Configuration Editor” section on page 22 and the “Replace Configuration Editor” section on page 22.
•
Using the graphical configuration applications. See the “Configuration Desktop Window” section on page 20.
Support is provided to manage a two-stage commit functionality, which includes locking and rollback control.
3
Getting Started
This section provides information you need to know before you can start setting up a router and CWI client. The following
information is provided:
•
Network Considerations, page 3
•
Prerequisites, page 4
Network Considerations
The following network information must be taken into consideration before starting the minimum router and CWI client
configuration.
Basic Configuration
The basic configuration is not secure. See the “Setting Up the Required Management Services Without a Secure Connection”
section on page 8 for procedures.
Secure Socket Layer Encryption Configuration
The secure configuration has Secure Socket Layer (SSL) encryption. If you use the SSL protocol on your network, use the SSL
configuration. See the “Setting Up the Required Management Services with a Secure Connection” section on page 8 for
procedures.
IP Security
IP security (IPSec) does not require any special configuration for CWI on the router or client. See the “Setting Up the Required
Management Services Without a Secure Connection” section on page 8 for procedures.
Firewall
If you have a firewall in your network, you can use the basic or SSL encryption configurations. See the “Setting Up the Required
Management Services with a Secure Connection” section on page 8 and “Setting Up the Required Management Services Without
a Secure Connection” section on page 8 for procedures.
The ports listed in Table 1 must be opened when configuring the firewall. Refer to the firewall documentation for information
on opening the ports.
Table 1
Firewall Ports
Component
Port
Direction
HTTP/HTTPS
80/443
Inbound
IIOP/IIOPSSL
10001/10002
Inbound
Содержание CRS-1 Series
Страница 25: ...25 ...