background image

106                                                                                                                                                 MTPSR1-120

Firewall User Guide

Routing Information Protocol (RIP): A distance vector-based protocol that provides a measure of distance, or hops, from
a transmitting workstation to a receiving workstation.

RS232-C: An EIA standard for a serial interface between computers and peripheral devices (modem, mouse, etc.). It uses a
25-pin DB-25, or a 9-pin DB-9 connector. The RS-232 standard defines the purposes, electrical characteristics and timing of
the signals for each of the 25 lines.

RS-422: The EIA standard for a balanced interface with no accompanying physical connector. RS-422 products can use
screw terminals, DB9, various DB25, and DB37 connectors.

RS-530: The EIA standard for the mechanical/electrical interface between DCEs and DTEs transmitting synchronous or
asynchronous serial binary data. RS-530 provides for high data rates with the same connector used for RS-232; however, it
is incompatible with RS-232.

S

Serial Port: The connector on a PC used to attach serial devices (those that need to receive data one bit after another),
such as a mouse, a printer or a modem. This consists of a 9- or 25-pin connector that sends data in sequence (bit by bit).
Serial ports are referred to as “COMx” ports, where x is 1 to 4 (i.e., COM1 through COM4). A serial port contains a
conversion chip called a “UART” which translates between internal parallel and external serial formats.

Service: The requirements offered by an RPOA to its customers to satisfy specific telecommunications needs.

Serial Line Internet Protocol (SLIP): An Internet protocol which is used to run IP over serial lines such as telephone
circuits.

Severely Errored Seconds (SES): Refers to a typical T1 error event where an error burst occurs (a short term, high bit-
error rate that is self-clearing). Per the ITU-T (CCITT) G.821: any second in which the BER is less than 1x10 -3 .

Signaling: The process of establishing, maintaining, accounting for, and terminating a connection between two endpoints
(e.g., the user premises and the telco CO). Central office signals to the user premises can include ringing, dial tone, speech
signals, etc. Signals from the user’s telephone can include off-hook, dialing, speech to far-end party, and on-hook signals.
In-band signaling techniques include pulse and tone dialing. With common channel signaling, information is carried out-of-
band.

Simple Network Management Protocol (SNMP): TCP/IP protocol that allows network management.

Simultaneous Voice Data (SVD): A technology for letting a user send data via a modem, and use a handset to talk to
another user at the same time over the same connection. The alternative, making a second call, can be expensive or even
impossible. The uses for SVD are telecommuting, videoconferencing, distant learning, tech support, etc.

Stop Bit: One of the variables used for timing in asynchronous data transmission. Depending on the devices, each
character may be trailed by 1, 1.5, or 2 stop bits.

Superframe (D4): A T1 transmission format that consists of 12 DS1 frames, or 2316 bits. A DS1 frame consists of 193 bit
positions. A frame overhead bit is in the first position, and it is used for frame and signaling phase alignment only.

Subscriber Loop: See “Local loop”.

Switched 56: A circuit-switched (full duplex digital synchronous data transmission) service that lets you dial a number and
transmit data to it at 56 Kbps. It is a relatively low cost service, widely used in North America for telecommuting,
videoconferencing and high speed data transfers. Many phone companies are (or will be) phasing out Switched 56 in favor
of ISDN service.

Switched Virtual Circuit (SVC): A type of data transmission where the connection is maintained only until the call is
cleared.

Switched Line: In communications, a physical channel established by dynamically connecting one or more discrete
segments. This connection lasts for the duration of the call after which each segment can be used as part of a different
channel. Contrast with leased line.

Switched Network: A network in which a temporary connection is established from one point via one or more segments.

Synchronous Data Link Control (SDLC): A discipline conforming to subsets of the Advanced Data Communications
Control Procedures (ADCCP) of the American National Standards Institute (ANSI) and High-level Data Link Control (HDLC)
of the International Organization for Standardization, for managing synchronous, code-transparent, serial-by-bit information
transfer over a link connection. Transmission exchanges may be duplex, or half-duplex over switched or nonswitched links.
The configuration of the link connection may be point-to-point, multipoint, or loop.

Synchronous Transmission: The transmission of data which involves sending a group of characters in a packet. This is a
common method of transmission between computers on a network or between modems. One or more synchronous
characters are transmitted to confirm clocking before each packet of data is transmitted. Compare to Asynchronous
Transmission.

Systems Network Architecture (SNA): The description of the logical structure, formats, protocols, and operational
sequences for transmitting information units through, and controlling the configuration and operation of networks.

Содержание PROXYSERVER MTPSR1-120

Страница 1: ...Dual Ethernet ProxyServer Model MTPSR1 120 User Guide ...

Страница 2: ...ithout obligation of Multi Tech Systems Inc to notify any person or organization of such revisions or changes Record of Revisions Revision Description A Manual released All pages at revision A 9 4 98 B Manual revised for software version 2 00 All pages at Revision B 2 19 99 C Manual revised for software version 3 00 All pages at Revision C 2 15 2000 Patents This Product is covered by one or more o...

Страница 3: ...rical Physical 13 Chapter 2 Installation Safety Warnings 16 Unpacking Your Firewall 16 V 35 Shunt Procedure 17 Cabling Your Firewall 18 Chapter 3 Software Loading and Configuration Loading your Software 22 Wizard Setup 24 IP Wizard Setup 25 Default WAN Link Configuration 27 Chapter 4 Firewall Software Introduction 30 Before You Begin 30 Firewall Setup 31 Changing IP Parameters 32 Changing PPP SLIP...

Страница 4: ...uction 74 Firewall Management Menu 75 Web Browser Management 76 Chapter 8 Warranty Service and Tech Support Introduction 80 Limited Warranty 80 On line Warranty Registration 80 Tech Support 81 Recording Firewall Information 81 Service 82 About the Internet 83 Ordering Accessories 83 Appendixes Appendix A TCP IP Transmission Control Protocol Internet Protocol Description 86 Appendix B Cabling Diagr...

Страница 5: ...Chapter 1 Introduction and Description ...

Страница 6: ...provides easy to use configuration menus Figure 1 1 Firewall MTPSR1 120 Preview of this Guide This guide describes the Firewall and tells you how to install and configure the unit The information contained in each chapter is as follows Chapter 1 Introduction and Description Chapter 1 describes the Firewall s front panel indicators and back panel connectors and switch and includes a list of relevan...

Страница 7: ...NT PC users for Internet access via the Firewall Chapter 6 Remote Configuration Chapter 6 provides procedures for changing the configuration of a remote Firewall Using remote configuration you can change the configuration of a remote unit by simply connecting two modems between the Firewalls with a special remote configuration cable between the remote modem and the remote Firewall s command port a...

Страница 8: ...or failed and shows if the power On Off switch on the back of the Firewall is turned On Figure 1 2 Front Panel ETHERNET 1 and 2 RCV Receive Data indicator blinks when packets are being received from the private Ethernet 1 or public Ethernet 2 LANs XMT Transmit Data indicator blinks when packets are being transmitted to the private Ethernet 1 or public Ethernet 2 LANs LNK Link indicator lights when...

Страница 9: ...hunt must be moved from the default RS232 position to the V 35 position for details on this procedure refer to Chapter 2 V 35 Shunt Procedure Ethernet 1 and 2 10Base T Connectors The Ethernet 10Base T connectors are used to connect the Firewall to a 10 MB LAN using unshielded twisted cable Ethernet 1 connects the private LAN and Ethernet 2 connects the public LAN These connectors are RJ 45 jacks C...

Страница 10: ...d to the ETHERNET 1 jack on the back panel of the Firewall Internet access is provided through a cable modem or DSL modem that is connected to the ETHERNET 2 jack on the Firewall MTPSR1 120 Firewall IP Address 192 168 0 101 Mask 255 255 255 0 Internet Novell Server IP Address 192 168 0 102 Windows NT Server IP Address 192 168 0 103 Mail Server IP Address 192 168 0 104 Workstation IP Address 192 16...

Страница 11: ...ddress 192 168 0 102 Windows NT Server IP Address 192 168 0 103 Mail Server IP Address 192 168 0 104 Workstation IP Address 192 168 0 105 Workstation IP Address 192 168 0 106 Workstation IP Address 192 168 0 107 HUB TM TM LAN 1 Private LAN 2 Public Video Server IP Address 204 26 12 40 Web Server IP Address 204 26 12 20 FTP Server IP Address 204 26 12 30 HUB Private LAN Router IP address 204 26 12 ...

Страница 12: ... Address 192 168 0 101 Mask 255 255 255 0 Internet Novell Server IP Address 192 168 0 102 Windows NT Server IP Address 192 168 0 103 Mail Server IP Address 192 168 0 104 Workstation IP Address 192 168 0 105 Workstation IP Address 192 168 0 106 Workstation IP Address 192 168 0 107 HUB TM TM LAN 1 Private LAN 2 Public Video Server IP Address 204 26 12 40 Web Server IP Address 204 26 12 20 FTP Server...

Страница 13: ...T twisted pair RJ 45 jacks Command Port Single 19 2K bps asynchronous Command Port using an RJ 45 to DB 9 female cable WAN Link One RS232 V 35 port connector DB 25 female Electrical Physical Voltage 115 VAC Standard 240 Volts AC Optional Frequency 47 to 63 Hz Power Consumption 10 Watts Dimensions 1 625 high x 6 wide x 9 deep 5 63 cm high x 22 34 cm wide x 22 34 cm deep Weight 2 pounds 92 kg ...

Страница 14: ...14 MTPSR1 120 Firewall User Guide ...

Страница 15: ...Chapter 2 Installation ...

Страница 16: ...k of electrical shock from lightning 7 Do not use the phone to report a gas leak in the vicinity of the leak 8 To reduce the risk of fire use only No 26 AWG or larger Telecommunication line cord Unpacking Your Firewall The shipping box contains the Firewall external power supply power cord Command Port RJ 45 to DB 9 cable your Quick Start Guide and a CD ROM with the Firewall Software and the Firew...

Страница 17: ...abinet Mounting Screw 3 While supporting the back panel turn the Firewall right side up tilt the back panel down and slide the circuit board assembly out of the chassis 4 Place the circuit board assembly on a flat grounded surface 5 Carefully remove the shunt from the RS232 position and insert it in the V 35 position Figure 2 3 5 6 7 8 V 35 Shunt Position RS232C Shunt Position Back Panel Connector...

Страница 18: ...lows details the steps for connecting the cables to your Firewall Power Connection Secure LAN Internet LAN WAN Connection 2 ETHERNET COMMAND 10BASET 10BASET ON OFF 1 RS232 V 35 POWER Command Cable supplied Figure 2 4 Cable Connections 1 With the ON OFF switch set to OFF connect one end of the power supply to a live AC outlet and connect the other end to the Firewall as shown in Figure 2 4 The powe...

Страница 19: ... However if the RS232 V 35 connector on the Firewall is going to be connected to a WAN device i e connecting your secure private LAN to an ISP connect one end of an RS232 or V 35 interface cable to the RS232 V 35 connector on the back of the Firewall Connect the other end of this cable to the WAN device 6 Apply power to the Firewall by setting the ON OFF switch on the back panel to the ON position...

Страница 20: ...20 Dual Ethernet ProxyServer User Guide ...

Страница 21: ...Chapter 3 Software Loading and Configuration ...

Страница 22: ...rectly from a COM port of a local PC For configuring over a network your PC must first be configured for network communications i e TCP IP stack must be installed and both the PC and the Firewall must be on the same physical LAN segment If you need to load the TCP IP stack refer to Chapter 5 Client Setup 2 Insert the Firewall CD ROM into the CD ROM drive on your local PC The CD ROM should start au...

Страница 23: ... 300 6 The Select Program Folder dialog box enables you to name the program group for the Firewall 3 00 icons You can either select the default name Firewall Version 3 00 or name it anything you like Click Next or press Enter to continue 7 The next dialog box enables you to designate the COM port of your PC that is connected to the Firewall On the Select Port field click the down arrow and select ...

Страница 24: ...g the basic information needed to configure your Firewall This screen will guide you through entering the IP Address Net Mask and Default Route for your Secure private LAN Then you can set up for static or dynamic addressing on the Internet LAN Port set up the Gateway Parameters and then do the same for the WAN port if it is used 9 Click Yes to run the Wizard Setup Clicking No takes you to the pro...

Страница 25: ...to the unique parameters for your Secure private LAN connected to the ETHERNET 1 Port Follow the onscreen instructions Secured LAN ETHERNET 1 Setup 11 If an Internet public LAN is connected to the ETHERNET 2 Port click the Internet LAN option in the Select Port window then either leave the DHCP Client option enabled or disable uncheck it and assign the proper IP Address Net Mask and DNS Server add...

Страница 26: ...dress Mask option enabled or disable uncheck it and assign the proper IP Address and Net Mask for your WAN port If your connection to the Internet is through the WAN port follow the onscreen instructions select WAN in the Gateway Parameters group then enter a Host Name in the field provided 13 Click OK when you are finished configuring the IP parameters The Default WAN Link s Setup dialog box is d...

Страница 27: ...up dialog box the Default WAN Link s Setup dialog box will appear as follows with the Enable checked and everything active proceed to step 15 to complete the information needed on the dialog box 15 Click the down arrow for Modem Type and select from the listing the type of device that is connected to the RS232 V 35 connector then click the down arrow for Speed and if necessary reduce the setting t...

Страница 28: ...you can now install on your PC s hard drive either Acrobat Reader by clicking the Acrobat Reader icon or the User Guide To install the User Guide click the Install Manuals icon and the file will install at C Program Files Multi Tech Systems Inc PSR1 120 Documentation unless you browse and select an alternate directory for installation 23 At this time your Firewall is operational Now verify that ea...

Страница 29: ...Chapter 4 Firewall Software ...

Страница 30: ...moves the Firewall configuration software from your PC The Upgrade Firewall feature checks the Firewall downloads the default setup then downloads two binary files newboot bin and fwxxx bin that upgrade the Firewall User Filter Management enables you to establish a User Database add Groups and Users to the database and assign authentications to the Groups and the User Monitoring feature enables yo...

Страница 31: ...display and change the IP settings define the WAN ports change features such as the Internet DHCP Server Proxy Server and Virtual Servers display statistics on the WAN port control activation of Telnet TFTP and Web servers and dumb terminal management test the communications link print messages received from the target Firewall and download setup information to the Firewall In addition to the Stat...

Страница 32: ...up will vary depending on the LAN configuration The Internet LAN Port Parameters group defines the static or dynamic addressing scheme for the public LAN connected to ETHERNET 2 on the back panel of the Firewall DHCP Client The DHCP Dynamic Host Configuration Protocol Client option can be used if your Internet Services Provider ISP is able to dynamically provide the registered Internet IP addresse...

Страница 33: ... should enter the Host Name if any you received from your service provider DNS Server This field identifies the IP address of the domain name server responsible for resolving domain names for the client systems If you use the Internet LAN port and DHCP is enabled leave the default 0 0 0 0 and the DHCP Server will supply the IP address however if you use the WAN port you will need to enter the DNS ...

Страница 34: ...mple Static Route IP Address 200 1 1 0 indicates that PC clients on Routers with IP addresses beginning with 200 1 1 will be included on the static route The Gateway Address must be the IP address of the local router Gateway Address 192 168 2 1 on the next hop toward the target host and the port i e LAN with which it is associated The Address Mask is the IP subnetwork mask 255 255 255 0 of the tar...

Страница 35: ... also enabled Verify with your ISP to ensure that they support VJC The Data Compression option on this dialog box compresses the entire data packet DO NOT ENABLE this option if you are downloading from the Internet data that is already compressed the extra attempt to compress the packet data will probably greatly slow down the download process If your ISP supports SLIP Serial Line Internet Protoco...

Страница 36: ...etup dialog box will appear in the Dial Number window of the Connection Method group If the DCE device connected to the RS232 V 35 port on the Firewall is a synchronous device then the Mode group on this dialog box has to be changed to Synchronous and the clocking of the device determined If the DCE device provides the clocking then the External Clock option needs to be enabled If the clocking is ...

Страница 37: ... Range field Excluded addresses individual IP addresses or ranges of addresses are computers with static IP addresses e g a DNS server a WINS server and the DHCP server itself You can also add delete edit and bind addresses using the corresponding buttons in this group The Option Types and Values group at the bottom of the dialog box enables you to customize the configuration of the client platfor...

Страница 38: ...ications is important as new software programs are continually being developed to perform useful tasks For example you may want to add new database managers spreadsheets communications packages graphics programs etc anything that would make your job easier Editing considerations might involve enabling disabling protocols individually both TCP and UDP are enabled by default changing the Port Name i...

Страница 39: ... these items are selected or entered clicking OK will add the new port usage to the existing list of supported usages To further enhance the security of the firewall network you can if necessary change the FTP Control Port and Data Port numbers from their reserved values 21 and 20 respectively as shown below on the FTP Port Numbers Configuration dialog box If you do change these numbers be sure to...

Страница 40: ...dress so the router knows where the traffic is coming from and where to send the reply In our Internet connection shown above we have assigned an IP address of 192 168 0 20 to the Web server address 192 168 0 30 to the FTP server address 192 168 0 40 to the Mail or E Mail server and address 192 168 0 101 to the Firewall To reduce the number of static IP addresses a virtual server feature in the Fi...

Страница 41: ...filter by functionality the activity of the traffic to and from the Internet The addresses that we assigned to our servers in the virtual server example are unregistered addresses that are only seen by the Firewall These local IP addresses are arbitrarily assigned to servers in our virtual server connection example These local addresses are then individually mapped one at a time to the global addr...

Страница 42: ... list on the Virtual Server Setup dialog box as shown on the following screen Had we accessed the Internet through the Firewall s WAN port instead of the Router we could ve mapped the three servers on the Private LAN to a Global Dynamic WAN port address Everything else on the Virtual Server Setup dialog box would be the same as shown on the above screen ...

Страница 43: ...e 1 to 16 characters and is not case sensitive Then verify that all needed applications are enabled To disable support for any of the applications Telnet TFTP Web Server or Dumb Terminal Management click the corresponding check box to clear it For more information on using these remote configuration applications refer to Chapter 5 Clicking the SNTP Simple Network Time Protocol button on the Applic...

Страница 44: ...e Internet account The maximum baud rate and modem type are also displayed In the Current Connection group the Connect String field displays a message e g CONNECT 115200 reported by the modem when the call connected The Port Status field displays the current status of the selected port e g PPP Client Up The IP Address group displays the parameters of the current connection and the Uptime field sho...

Страница 45: ...nables the other two tabs so you can then set up Users and Groups and later manage and monitor them Note If Enable UserDataBase is later disabled unchecked the various groups of Blocked Sites and Allowed Sites that you have set up will be applied to everyone on your network i e there will be NO AUTHENTICATION In normal usage however with Enable UserDataBase enabled checked the Web sites requiring ...

Страница 46: ...efined as administrative units comprised of one or more users with similar needs for network resources Once users are placed in groups resource access can be managed on a group basis rather than an individual basis For example it is much easier to manage five groups of 20 each than 100 individual users Groups or Workgroups are assigned names for organizational purposes and convenience and the grou...

Страница 47: ...ted site For a more detailed description of User Management refer to the Helps provided with your Firewall software Access Rights The Access Rights tab on the UserFilter Database dialog box enables you to add ranges of IP addresses where no authentication is needed i e all Groups will have free access all the time Here too you can add ranges of application ports together with the corresponding pro...

Страница 48: ...amp the entries In addition to Close and Help buttons this dialog box includes a Refresh Server List button and a History button Clicking the History button displays a History screen below which enables you to view today s history or the history of events that occurred on a different day that you select This History dialog box comes up initially with today s date however you can use the drop down ...

Страница 49: ...Chapter 5 Client Setup ...

Страница 50: ...et port and assigned user names and passwords to the WAN links All these factors play a role in client configuration Make certain that you are aware of the decisions made prior to setting up client PCs PC To access the Firewall your PC must have communications capability including hardware such as a network card and any necessary software If the Firewall does not automatically assign an IP address...

Страница 51: ...les only Please select options appropriate to your system 1 Click Start Settings Control Panel then double click the Network icon The Network dialog box Configuration tab is displayed which shows all the network components e g clients adapters protocols and any services installed on your PC 2 If TCP IP is listed proceed to step 3 otherwise refer to Installing TCP IP Win98 95 at the end of this sec...

Страница 52: ...n if necessary click the box to the left of TCP IP so this entry is enabled checked When you are finished click OK to return to the Network dialog box Note There may be other protocols listed and enabled under your Ethernet adapter This does not affect the TCP IP protocol Rather it simply means your computer will accept messages using those protocols as well as TCP IP 5 Select TCP IP then click Pr...

Страница 53: ...all DHCP status with your network administrator then proceed to step 7 for DHCP assigned addressing or to step 8 for manual addressing 7 If DHCP Services are active on the Firewall default verify that the Obtain an IP address automatically option is selected You are done go to step 17 to reboot your PC and attempt to open an Internet session 8 If DHCP Services are NOT active on the Firewall you wi...

Страница 54: ...ress This address is entered in dotted decimal notation and is comprised of four groups octets separated by periods or dots If a group has fewer than 3 digits type the necessary digits and press the space bar to move to the next group When you are finished verify that the IP address is identical to the IP address you were given for your PC 10 Click the Gateway tab ...

Страница 55: ... In the New gateway field enter the IP address of the Firewall s Ethernet port and click Add The new gateway address is displayed in the list of Installed gateways 12 Click the DNS Configuration tab Verify that Enable DNS is selected checked ...

Страница 56: ...st below the address field Your network may have more than one DNS server allowing you to use a secondary DNS server if the primary DNS server is not available If this is the case add the IP address of the secondary DNS server using the same procedure as with the first Note The address that is displayed first at the top of the list is the primary server the first one searched You can drag and drop...

Страница 57: ...ing steps 18 and 19 If you encounter problems contact your administrator 18 Initiate an Internet session by double clicking your browser icon or try to FTP a file Note The Firewall operates transparently so there should not be a need for any special proxy settings on your IP applications e g browser Telnet or FTP Set up each application as No Proxy or equivalent or connect to the Internet over the...

Страница 58: ...t click the manufacturer option Microsoft in the example to highlight it A list of available protocols will appear in the Network Protocols list 4 In the Network Protocols list select TCP IP and click OK 5 Exit the add option Click the OK button Note If Windows does not find the necessary files on the hard drive click Have Disk and follow the onscreen instructions for loading TCP IP from the insta...

Страница 59: ... appropriate to your network 1 Click Start Settings Control Panel Double click the Network icon 2 The Network dialog box is displayed Click the Protocols tab A list of protocols currently present on your PC is displayed Check the installed protocols If you find TCP IP Protocol listed proceed to step 4 If TCP IP is not listed you must install it prior to proceeding Refer to Installing TCP IP WinNT ...

Страница 60: ...e entry for your Ethernet card adapter to expand the list of bindings Verify that TCP IP Protocol is included in the bindings below your adapter Note There may be other protocols in the list under your Ethernet adapter This does not affect the TCP IP protocol Rather it simply means your computer will accept messages using those protocols as well as TCP IP 6 Click the Protocols tab ...

Страница 61: ...e to assign your IP address manually Verify the Firewall DHCP status with your network administrator then proceed to step 9 for DHCP assigned addressing or to step 10 for manual addressing 9 If DHCP Services are active on the Firewall the default verify that the Obtain an IP address from a DHCP server option is enabled checked At this point you are done Go to step 20 and attempt to open an Interne...

Страница 62: ...or dots If a group has fewer than 3 digits type the necessary digits and press the space bar to move to the next group When you are finished verify that the IP address is identical to the IP address you were given for your PC 12 In the Subnet Mask field type the subnetwork mask assigned by your administrator When you are finished verify the new mask 13 In the Default Gateway field type the IP addr...

Страница 63: ... organization s domain name usually the organization name followed by one of the following extensions com edu gov org mil or net For example multitech com 17 In the DNS Server Search Order group click Add The TCP IP DNS Server dialog box is displayed 18 In the DNS Server field place the cursor in the first group and type the IP address of your LAN s DNS server provided by your network administrato...

Страница 64: ...K You are returned to the Network dialog box Use the following checklist to record all the configuration settings for future use IP Address PC IP Address ProxyServer Host User Name Domain DNS Server Address Network Adapter Manufacturer Model Number Configuration Checklist 20 Reboot the PC for changes to take effect At this point your client setup is complete Test your setup by performing steps 21 ...

Страница 65: ...ayed with a list of available protocol options Highlight TCP IP Protocol and click OK If necessary e g the operating system does not find the necessary files on the hard drive click the Have Disk button then follow the instructions provided onscreen 3 You are returned to the Network dialog 4 Reboot your PC for changes to take effect 5 Open the Control Panel and double click the Network icon to ret...

Страница 66: ...66 MTPSR1 120 Firewall User Guide ...

Страница 67: ...Chapter 6 Remote Configuration ...

Страница 68: ...onfiguration Modem based 1 At the remote site disconnect the serial cable from the PC to the Command port jack on the Firewall 2 At the remote site connect a special cable Remote Configuration Cable between the Command Port jack on the back panel of the Firewall and the DB 25 RS232 connector on the modem The special cable is a serial cable with male connectors on both ends Connect the modem to you...

Страница 69: ...h dialog box and field within a dialog box 10 After you have changed the configuration of the remote Firewall click Download Setup to update the configuration The remote Firewall will be brought down the new configuration written to the unit and the unit will reboot 11 Click Exit when the downloading is complete 12 The Hangup connection with Router dialog box is displayed Click Yes to disconnect t...

Страница 70: ...n Port Setup icon in the Firewall Version 3 00 program group 3 The Port Setup dialog box is displayed Verify that IP is selected in the Communication Type group In the Firewall IP Address field enter the IP Address of the remote Firewall unit Click OK when you are satisfied with your selections 4 Run the Firewall Configuration program Click Start Programs Firewall Version 3 00 Firewall Configurati...

Страница 71: ...wnload Setup to update the configuration The remote Firewall will be brought down the new configuration written to the unit and the unit will reboot 9 Click Exit when the downloading is complete 10 Double click the Firewall Configuration icon in the Program Manager screen once more to verify that the Firewall is running ...

Страница 72: ...72 MTPSR1 120 Firewall User Guide ...

Страница 73: ...Chapter 7 Firewall Management ...

Страница 74: ...n work in your environment refer to Chapter 4 in this User Guide For a detailed description of each parameter refer to the on line Help provided within your Firewall software The TCP IP stack has to be loaded before the Telnet client can run and the Telnet Server option in the Firewall software has to be enabled To access the Telnet Client double click the Telnet icon A blank Telnet screen is disp...

Страница 75: ...able you to gather various kinds of statistics or display a System Information screen Firewall Configuration Selecting Option 2 displays the Firewall Configuration menu with options that enable you to configure Firewall parameters set up various servers or reset the Firewall For more details on Firewall configuration refer to Chapter 4 Firewall Software and the Helps WAN Device Configuration Selec...

Страница 76: ...ault users can access the Firewall by entering its IP address in the destination field of their Web browser The following screen appears The User Name and Password on this screen can be ignored unless you have enabled and set up a username database To log in to the Firewall configuration program click the words click here The Enter Network Password screen is displayed Type supervisor in the User N...

Страница 77: ...ewall Management From this screen you can either access any of the configuration options or switch to the Standard View below to access the same options Refer to Chapter 4 Firewall Software for descriptions of the various options ...

Страница 78: ...78 MTPSR1 120 Firewall User Guide ...

Страница 79: ...Chapter 8 Warranty Service and Tech Support ...

Страница 80: ...BY DISCLAIMED This warranty does not apply to any products which have been damaged by lightning storms water or power surges or which have been neglected altered abused used for a purpose other than the one for which they were manufactured repaired by the customer or any party without MTS s written authorization or used in any manner inconsistent with MTS s instructions MTS s entire obligation und...

Страница 81: ...is connected to the RS232 V 35 connector on the back panel of your Firewall before calling tech support Also note the status of your Firewall including LED indicators screen messages diagnostic test results problems with a specific application etc Use the space below to note the Firewall status ________________________________________________________________________________________________________...

Страница 82: ...nt if the Firewall is out of warranty Check with your technical support specialist for the standard repair charge for your Firewall if possible note the name of the technical support specialist with whom you spoke If you need to inquire about the status of the returned product be prepared to provide the serial number of the product sent Send your Firewall to this address MULTI TECH SYSTEMS INC 220...

Страница 83: ...b site at http www multitech com and an FTP site at ftp ftp multitech com Ordering Accessories SupplyNet Inc supplies replacement transformers cables and connectors for select Multi Tech products You can place an order with SupplyNet via mail phone fax or the Internet at Mail SupplyNet Inc 614 Corporate Way Valley Cottage NY 10989 Phone 800 826 0279 Fax 914 267 2420 Email info thesupplynet com Int...

Страница 84: ...84 MTPSR1 120 Firewall User Guide ...

Страница 85: ...Appendixes ...

Страница 86: ...tagram to another host on the same network the sending application must know both the IP and MAC addresses of the intended receiver Unfortunately the IP process may not know the MAC address of the receiver The Address Resolution Protocol ARP described in RFC 826 http info internet isi edu 80 in notes rfc files rfc826 txt provides a mechanism for a host to determine a receiver s MAC address from th...

Страница 87: ...info internet isi edu 80 in notes rfc files rfc1945 txt being the most current HTML WWW pages are written in the Hypertext Markup Language HTML an ASCII based platform independent formatting language per RFC 1866 http info internet isi edu 80 in notes rfc files rfc1866 txt Finger used to determine the status of other hosts and or users per RFC 1288 http info internet isi edu 80 in notes rfc files ...

Страница 88: ...ork and host Network addresses come in five classes A B C D and E Each class of network address is allocated a certain number of host addresses For example a class B network can have a maximum of 65 534 hosts while a class C network can have only 254 The class A and B addresses have been exhausted and the class D and E addresses are reserved for special use Consequently companies now seeking an In...

Страница 89: ...Clock A Receive Clock A External TX Clock B Receive Clock B Transmit Clock A Transmit Clock B 1 7 4 5 6 8 20 2 3 12 22 23 17 25 18 15 21 1 7 4 5 6 8 20 2 3 12 22 23 17 25 18 15 21 To WAN Device To WAN Port Ethernet Cables 10BaseT Pin Circuit Signal Name 1 TD Data Transmit Positive 2 TD Data Transmit Negative 3 RD Data Receive Positive 6 RD Data Receive Negative Command Port Cable RJ 45 PIN NO 4 7 ...

Страница 90: ...inal Ready Transmit Data A Receive Data A Transmit Data B Receive Data B External TX Clock A Receive Clock A External TX Clock B Receive Clock B Transmit Clock A Transmit Clock B A B C D E F H P R S T U V W X Y a 1 7 4 5 6 8 20 2 3 12 22 23 17 25 18 15 21 The RS 232C Interface circuits have been designed to meet the electrical specifications given in EIA Electronic Industries Association RS 232C a...

Страница 91: ...you will find in the Help file in your Firewall software Following the list of commands is an example script Commands by Function Dial Connection and Remote ACTIVATEDOD BAUDRATE BREAK GETCTS GETDCD HANGUP PARITYR GETC RGETS RXFLUSH SETDTR SETRTS STOPBITS THISLAYERUP TRANSMIT TXFLUSH WAITFOR Mathematical functions DEC INC Miscellaneous EXIT WAIT Program constructs FOR IF PROC SWITCH WHILE String op...

Страница 92: ...1 shell_menu choice shell_menu_response 1 transmit A wait 1 transmit T M waitfor OK 10 transmit A wait 1 transmit T wait 1 transmit DT963 M if waitfor login_prompt 60 then transmit user_name transmit M if waitfor password_prompt timeout then transmit password transmit M if waitfor shell_menu timeout then transmit shell_menu_response transmit M else transmit Shell Menu Not Received M endif else tra...

Страница 93: ...ent and receiver Connect the equipment to an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC rules Operation is subject to the following two conditions 1 This device may not cause harmful interference 2 This device must accept any interference received including...

Страница 94: ...94 MTPSR1 120 Dual Ethernet ProxyServer User Guide ...

Страница 95: ...Glossary of Terms ...

Страница 96: ... possible characters The extended ASCII file provides 255 characters Asynchronous Transfer Mode ATM A very high speed method of transmission that uses fixed size cells of 53 bytes to transfer information over fiber also known as cell relay AT Commands A standard set of commands used to configure various modem parameters establish connections and disconnect The AT is used to get the attention of th...

Страница 97: ...t use the same logical link control protocol but that can use different medium access control protocols A bridge forwards a frame to another bridge based on the medium access control MAC address 3 In the connection of local loops channels or rings the equipment and techniques used to match circuits and to facilitate accurate data transmission Buffer A temporary storage register or Random Access Me...

Страница 98: ...elay service provider Compression 1 The process of eliminating gaps empty fields redundancies and unnecessary data to shorten the length of records or blocks 2 In SNA the replacement of a string of up to 64 repeated characters by an encoded control byte to reduce the length of the data stream to the LU LU session partner The encoded control byte is followed by the character that was repeated unles...

Страница 99: ... g a sequence of voltage pulses Digital devices such as terminals and computers transmit data as a series of electrical pulses which have discrete jumps rather than gradual changes Digital Signaling Rates DSn A hierarchical system for transmission rates where DS0 is 64 Kbps equivalent to ISDN B channel and DS1 is 1 5 Mbps equivalent to ISDN PRI Digital Transmission A method of electronic informati...

Страница 100: ...ns together With this method a congestion condition is identified and fixed before it becomes critical Contrast with implicit congestion Extended Super Frame ESF One of two popular formats for framing bits on a T1 line ESF framing has a 24 frame Superframe where robbed bit signaling is inserted in the LSB bit 8 of the DS 0 byte of frames 6 12 18 and 24 ESF has more T1 error measurement capabilitie...

Страница 101: ...networks or systems of different architectures A bridge interconnects networks or systems with the same or similar architectures 2 A network that connects hosts Graphical User Interface GUI A type of computer interface consisting of a visual metaphor of a real world scene often of a desktop Within that scene are icons representing actual objects that the user can access and manipulate with a point...

Страница 102: ... a Touch Tone phone Ericsson and a KTS Key Telephone Set L LAPB Link Access Procedure Balanced based on the X 25 Layer 2 specification A full duplex point to point bit synchronous protocol commonly used as a data link control protocol to interface X 25 DTEs LAPB is the link initialization procedure that establishes and maintains communications between the DTE and the DCE LAPD Link Access Protocol ...

Страница 103: ...a computer to transmit information over a telephone line It converts the computer s digital signals into analog signals to send over a telephone line and converts them back to digital signals at the receiving end Modems can be internal and fit into an expansion slot or external and connect to a serial port MultiLink PPP ML PPP A bandwidth on demand technology that allows one logical PPP connection...

Страница 104: ...d by the process of transmission Commonly used data field lengths in packets are 128 or 256 bytes 5 The field structure and format defined in the CCITT X 25 recommendation Packet Assembler Dissembler PAD Used by devices to communicate over X 25 networks by building or stripping X 25 information on or from a packet Packet Data The information format packetized used for packet mode calls Packet Mode...

Страница 105: ...primary workspace All data must be stored in RAM even for a short while before software can use the processor to manipulate the data Before a PC can do anything useful it must move programs from disk to RAM When you turn it off all information in RAM is lost Rate Enforcement The concept in frame relay where frames sent faster than the CIR are to be carried only if the bandwidth is available otherw...

Страница 106: ...odem and use a handset to talk to another user at the same time over the same connection The alternative making a second call can be expensive or even impossible The uses for SVD are telecommuting videoconferencing distant learning tech support etc Stop Bit One of the variables used for timing in asynchronous data transmission Depending on the devices each character may be trailed by 1 1 5 or 2 st...

Страница 107: ...s an external T1 CSU Transmission Control Protocol Internet Program TCP IP A multilayer set of protocols developed by the US Department of Defense to link dissimilar computers across dissimilar and unreliable LANs Terminal The screen and keyboard device used in a mainframe environment for interactive data entry Terminals have no box which is to say they have no file storage or processing capabilit...

Страница 108: ... using HDLC or other character oriented protocol V 54 The ITU T standard for local and remote loopback tests in modems DCEs and DTEs The four basic tests are local digital loopback tests DTE send and receive circuits local analog loopback tests local modem operation remote analog loopback tests comm link to the remote modem and remote digital loopback tests remote modem operation Virtual Circuit A...

Страница 109: ...t 9 DCE See Data Communications Equipment DHCP Client 32 DHCP Relay Agent 32 DHCP Server 37 DNS 87 Download Firmware 30 E Enabling the DHCP Server 37 Ethernet 1 and 2 Connectors 9 F Finger 87 Firewall Configuration 31 Front Panel 8 LEDs 8 FTP 87 G Gopher 87 H HTML 87 HTTP 87 I Installing TCP IP Win95 98 58 Installing TCP IP WinNT 65 Internet 83 Internet Gateway Parameters 33 Internet LAN Port Para...

Страница 110: ...P Parameters 32 Proxy Applications 38 WAN Port Parameters 35 Specifications 11 T TCP IP 86 Tech Support 81 Technical Specifications 11 Telnet 87 Client 74 Traceroute 87 Transmission Control Protoco 86 Typical Applications Configuration 1 Cable DSL Modem 10 Configuration 2 Existing Dual LAN with Router11 Configuration 3 New Dual LAN with T1 DSU 12 U Uninstall Proxy Server Configuration 30 Unpacking...

Отзывы: