iii
Table of Contents
CHAPTER 1.
GETTING STARTED ............................................................................. 1
1.1 Introduction............................................................................................................................. 1
1.2 Typpical Point-to-Point System Configuration.................................................................... 1
1.3 Equipment List........................................................................................................................ 2
1.4 Equipment Setup..................................................................................................................... 2
1.5 PC Configuration.................................................................................................................... 2
1.6 Transmit and Receive IF Configuration............................................................................... 3
1.7 Basic IP Configuration ........................................................................................................... 3
1.7.1 Main Menu......................................................................................................................... 4
1.7.2 Restoring factory Default Configuration ........................................................................... 4
1.7.3 CiM 1 Configuration.......................................................................................................... 5
1.7.4 CiM 2 Configuration.......................................................................................................... 6
1.7.5 Verification ........................................................................................................................ 7
1.8 Using Encryption .................................................................................................................... 8
1.8.1 CiM 1 Configuration.......................................................................................................... 8
1.8.2 Configuration ..................................................................................................................... 9
1.8.3 Verification ...................................................................................................................... 10
1.9 Other Configuration Items................................................................................................... 11
1.9.1 User Names & Passwords................................................................................................ 11
1.9.2 Access Lists ..................................................................................................................... 11
1.9.3 Enabling/Disabling Telnet ............................................................................................... 13
Figures
Figure 1. Typical Point-to-Point System Configuration ................................................................ 1
Figure 2. Main Menu ..................................................................................................................... 4