background image

NX-590E Internet Interface 

20

ETHERNET 

A local-area network (LAN) architecture developed by Xerox Corporation in 
cooperation with DEC and Intel in 1976.  Ethernet uses a bus or star topology 
and supports data transfer rates of 10Mbps.  The Ethernet specification served 
as the basis for the IEEE 802.3 standard, which specifies the physical and 
lower software layers.  Ethernet uses the CSMA/CD access method to handle 
simultaneous demands.  It is one of the most widely implemented LAN 
standards. 
 
A newer version of Ethernet, called 100Base-T (or Fast Ethernet) supports 
data transfer rates of 100Mbps.  And the newest version, Gigabit Ethernet 
supports data rates of 1 gigabit (1,000 megabits) per second. 

FIREWALL 

A system designed to prevent unauthorized access to or from a private 
network.  Firewalls can be implemented in both hardware and software, or a 
combination of both.  Firewalls are frequently used to prevent unauthorized 
Internet users from accessing private networks connected to the Internet, 
especially intranets.  All messages entering or leaving the intranet pass 
through the firewall, which examines each message and blocks those that do 
not meet the specified security criteria. 
 
There are several types of firewall techniques: 

 

Packet filter:  Looks at each packet entering or leaving the network 
and accepts or rejects it based on user-defined rules.  Packet filtering is 
fairly effective and transparent to users, but it is difficult to configure.  In 
addition, it is susceptible to IP spoofing. 

 

Application gateway:  Applies security mechanisms to specific 
applications, such as FTP and Telnet servers.  This is very effective, 
but can impose performance degradation. 

 

Circuit-level gateway:  Applies security mechanisms when a TCP or 
UDP connection is established.  Once the connection has been made, 
packets can flow between the hosts without further checking. 

 

Proxy server:  Intercepts all messages entering and leaving the 
network.  The proxy server effectively hides the true network 
addresses. 

 
In practice, many firewalls use two or more of these techniques in concert. 
 
A firewall is considered a first line of defense in protecting private information.  
For greater security, data can be encrypted. 

GATEWAY 

In networking, a combination of hardware and software that links two different 
types of networks.  Gateways between e-mail systems, for example, allow 
users on different e-mail systems to exchange messages. 

Содержание Profile Series

Страница 1: ...NetworX Series NX 590E Internet Interface Installation and Startup...

Страница 2: ...ains proprietary information of GE Interlogix USA and is furnished to its customer solely to assist that customer in the installation testing operations and or maintenance of the equipment described T...

Страница 3: ...A USING THE LED KEYPAD 8 1 Entering the Program Mode 8 2 Selecting the Module to Program 8 3 Factory Defaulting the Module 8 4 Programming a Location 8 5 Exiting a Location 8 6 Exiting the Program Mo...

Страница 4: ...Caution Indicates a procedure practice condition or statement that if not strictly observed could result in damage to or destruction of equipment or property This symbol indicates general warnings and...

Страница 5: ...ith the half moon protrusion fits into the larger hole The smaller hole is for the screw Diagram 2 Place the first black plastic PCB guide in the top insertion point grooved edge downward The half moo...

Страница 6: ...et module and the network as shown in the following table LED DESCRIPTION DS1 Flashes each time the NX 590E has an opportunity to access the NetworX bus It should be flashing about two times each seco...

Страница 7: ...inal of the panel Current draw is 100 mA for the NX 590E COM Connect to the KP COM terminal of the panel DATA Connect to the KP DATA terminal of the panel J16 Connect to 10BT network hub using a CAT5...

Страница 8: ...minate and the zone LED s will show the binary data for the first segment of this location To change the data enter the data followed by r While entering new data the Ready LED will begin flashing to...

Страница 9: ...87 7 0 08 8 H 2 24 4 X 4 40 0 d 5 56 6 t 7 72 2 r 8 88 8 0 09 9 I 2 25 5 Y 4 41 1 e 5 57 7 u 7 73 3 8 89 9 _ 1 10 0 J 2 26 6 Z 4 42 2 f 5 58 8 v 7 74 4 9 90 0 1 11 1 K 2 27 7 0 4 43 3 g 5 59 9 w 7 75...

Страница 10: ...es not enabled will display a hyphen After the desired setting of features is selected for this segment press the r key This will enter the data and automatically advance to the next segment of the lo...

Страница 11: ...T TO RECEIVER 1 16 SEGMENTS OF FEATURE SELECTION DATA Location 1 contains the partition s that should be included when reporting over the Network If you wish to exclude any partition from reporting si...

Страница 12: ...cuit Ground Fault Segment 3 Bypass Segment 11 Sensor Lost Segment 4 Zone Trouble Segment 12 Sensor Low Battery Segment 5 Power Trouble AC Failure or Low Battery Segment 13 Expander Trouble Segment 6 S...

Страница 13: ...ver accepts Generally looking like any other user on the domain that you are connecting to works Many mail servers reject emails from domains other than their own to prevent spamming Location 13 Email...

Страница 14: ...ation 49 Reserved Location 50 Reserved Location 51 IP Address Mail Server Location 52 IP Address of Gateway It is necessary to power down the NX 590E module and power it back up in order initialize th...

Страница 15: ...r for installations If you have a Sure Gard receiver with line A enter as line 11 LOCATION 63 TIMERS AND COUNTERS 3 SEGMENTS DECIMAL DATA This location sets the number of attempts and the number of se...

Страница 16: ...000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000...

Страница 17: ...00000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000...

Страница 18: ...0000000000000 45 14 IP ADDRESS FOR THIS MODULE 0 0 0 0 46 14 IP ADDRESS FOR PRIMARY RECEIVER 0 0 0 0 47 14 IP ADDRESS FOR SECONDARY RECEIVER 0 0 0 0 48 14 IP ADDRESS FOR ON SITE EVENT RECORDER 0 0 0 0...

Страница 19: ...ers and computer networks have an e mail system Some electronic mail systems are confined to a single computer system or network but others have gateways to other computer systems enabling users to se...

Страница 20: ...mines each message and blocks those that do not meet the specified security criteria There are several types of firewall techniques Packet filter Looks at each packet entering or leaving the network a...

Страница 21: ...route messages based on the IP address of the destination The format of an IP address is a 32 bit numeric address written as four numbers separated by periods Each number can be zero to 255 For examp...

Страница 22: ...to a WAN are often connected through public networks such as the telephone system They can also be connected through leased lines or satellites The largest WAN in existence is the Internet In additio...

Страница 23: ...al may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference...

Страница 24: ...0 degrees F DIMENSIONS 6 0 Wide 3 25 High 1 0 Deep SHIPPING WEIGHT 1 lb Main 800 727 2339 Technical Support 800 727 2339 Outside the US 903 845 6941 Tech Support Fax 903 845 8409 Main Fax 903 845 6811...

Отзывы: