Siemens MD740-1 GSM/GPRS Modem User Manual Manual

Siemens AG GSM/GPRS Modem Manual

Manual

Download: Siemens MD740-1 GSM/GPRS Modem User Manual Manual
Mirror Download [FCC.gov]Siemens MD740-1 GSM/GPRS Modem User Manual Manual
Document ID626500
Application IDbAR3//N19jKxEi/S4MOMaQ==
Document DescriptionManual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize178.6kB (2232519 bits)
Date Submitted2006-02-07 00:00:00
Date Available2006-02-07 00:00:00
Creation Date2006-02-06 11:14:58
Producing SoftwareAcrobat Distiller 4.05 for Windows
Document Lastmod2006-02-06 11:16:07
Document TitleManual

SINAUT MD740-1
User Manual
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
!
Safety precautions
General: The product SINAUT MD740-1 complies with European standard EN60950, 05.2003,
Safety of Information Technology Equipment.
Read the installation instructions carefully before using the device.
Keep the device away from children, especially small children.
The device must not be installed or operated outdoors or at damp locations.
Do not operate the device if the connecting leads or the device itself are damaged.
External power supply: Use only an external power supply which complies with IEC/EN60950
chapter 2.5 “Limited power sources” and UL1310 / NEC Class 2 respectively. The output voltage of
the external power supply must not exceed 30VDC. The output of the external power supply must
be short-circuit proof.
Warning
The power supply unit to supply the SINAUT MD740-1 must comply with NEC Class 2 circuits as
outlined in the National Electrical Code (ANSI/NFPA 70) only
When connecting to a battery or accumulator, make sure that an all-pole circuit-breaker (main
battery switch) with sufficient selectivity and a fuse with sufficient selectivity are provided between
the device and the battery or accumulator.
Please pay regard to section Technical Data of the installation manual, as well as the installation
and utilisation regulations of the respective manufacturers of the power supply, the battery or the
accumulator.
Digital gate input: Make sure that the specified input voltage range is observed. Please pay regard
to sections Connecting the device and Technical Data of this documentation.
Digital gate output: Switching voltage and switching current must not exceed the specified
maximum values. Please pay regard to sections Connecting the device and Technical Data of this
documentation.
SIM card: To install the SIM card the device must be opened. Before opening the device,
disconnect it from the supply voltage. Static charges can damage the device when it is open.
Discharge the electric static of your body before opening the device. To do so, touch an earthed
surface, e.g. the metal casing of the switch cabinet. Please pay regard to section Inserting or
changing the SIM card of the installation manual.
Handling cables: Never pull a cable connector out of a socket by its cable, but pull on the
connector itself. Cable connectors with screw fasteners (D-Sub) must always be screwed on tightly.
Do not lay the cable over sharp corners and edges without edge protection. If necessary, provide
sufficient strain relief for the cables.
For safety reasons, make sure that the bending radius of the cables is observed.
Failure to observe the bending radius of the antenna cable results in the deterioration of the
system's transmission and reception properties. The minimum bending radius static must not fall
below 5 times the cable diameter and dynamic below 15 times the cable diameter.
Radio device: Never use the device in places where the operation of radio devices is prohibited.
The device contains a radio transmitter which could in certain circumstances impair the functionality
of electronic medical devices such as hearing aids or pacemakers. You can obtain advice from your
physician or the manufacturer of such devices. To prevent data carriers from being demagnetised,
do not keep disks, credit cards or other magnetic data carriers near the device.
2 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Antenna: Use only the antenna of the SINAUT TELECONTROL accessory program being released
for the SINAUT MD740-1. Other antennas may cause damages and the device will loose official
approvals like FCC.
Installing antennas: The emission limits as recommended by the Commission on Radiological
Protection (13/14 September 2001) must be observed.
Installing an external antenna: When installing an antenna outdoors it is essential that the
antenna is fitted correctly by a qualified person. Lightning Protection Standard VDE V 0185 Sections
1 to 4, in its current version, and further standards must be observed.
Lightning protection category for buildings: For outdoor installation, the antenna may be fitted
only within the lightning protection zones O/E or 1. These lightning protection zones are prescribed
by the lightning protection spherical radius.
The EMV lightning protection zone concept is to be observed. To avoid large induction loops a
lightning protection equipotential bonding is to be used. If the antenna or antenna cable is installed
near to the lightning protection system, the minimum distances to the lightning protection system
must be observed. If this is not possible, insulated installation as described in VDE V 0185 Sections
1 to 4, in its current version, is essential.
FCC Part 15
This equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following
measures:
•
Reorient or relocate the receiving antenna.
•
Increase the separation between the equipment and receiver.
•
Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
•
Consult the dealer / installer or an experienced radio/TV technician for help.
This device contains 900 MHz GSM and 1800 DCS functions that are not operational in U.S.
territories.
FCC Part 15.19
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1.
this device may not cause harmful interference, and
2.
this device must accept any interference received, including interference that may cause
undesired operation.
FCC Part 15.21
Modifications not expressly approved by this company could void the user's authority to operate the
equipment.
SINAUT MD740-1
3 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Installation by qualified personnel only
You may only use the SINAUT MD720-3 with an antenna of the SINAUT MD720-3 accessory
program.
The installation of the SINAUT MD720-3 and the antenna as well as servicing is to be performed by
qualified technical personnel only. When servicing the antenna, or working at distances closer than
those listed below, ensure the transmitter has been disabled.
RF Exposure mobile
Warning !
Typically, the antenna connected to the transmitter is an omni-directional antenna
with 0dB gain. Using this antenna the total composite power in PCS mode is smaller
than 1 watt ERP.
The internal / external antennas used for this mobile transmitter must provide a
separation distance of at least 20 cm from all persons and must not be co-located
or operating in conjunction with any other antenna or transmitter."
Warning !
This is a class A equipment. This equipment can disturb other electric equipment in living areas; in
this case the operator can be demanded to carry out appropriate measures.
Warning !
Please note that data packets exchanged for setting up connections, reconnecting, connect attempts
(e.g. Server switched off, wrong destination address, etc.) as well as keeping the connection alive are
also subject to charge.
Product no.
3155
Doc. no.
3155AD001 Rev. 1.1
4 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Contents
Contents
Introduction .........................................................................................................7
1.1 To be able to use the SINAUT MD740-1... ........................................9
1.2 IP address of the remote site.............................................................9
The LEDs of the SINAUT MD740-1 ...................................................................10
S (Status), Q (Quality), C (Connect) ................................................10
DC5V, STAT, LINL, VPN .................................................................11
Putting the device into operation.....................................................................12
3.1 Connecting the device .....................................................................12
Switching the device on/off ..............................................................13
3.2 Configuring the PIN .........................................................................14
3.3 Inserting or changing the SIM card..................................................15
Configuration.....................................................................................................19
Remote configuration.......................................................................19
Prerequisites for local configuration.................................................19
TCP/IP configuration of the network adapter ...................................19
Establish configuration connection ..................................................20
Perform configuration ......................................................................23
4.1 Network menu .................................................................................24
4.2 Firewall menu ..................................................................................27
4.3 VPN menu .......................................................................................36
4.4 Services menu.................................................................................54
4.5 Access menu ...................................................................................62
4.6 Features menu.................................................................................68
4.7 Support menu ..................................................................................72
4.8 System menu...................................................................................75
4.9 CIDR (Classless InterDomain Routing) ...........................................79
4.10 Network example diagram ...............................................................81
Integrated website showing device and connection data..............................83
5.1 Accessing the Web server locally via the service interface..............83
Via dial-up connection: ....................................................................83
Installing the modem for access to the service interface .................83
Creating the dial-up connection for the service interface .................84
Making a connection to the SINAUT MD740-1 website ...................85
Closing the service connection ........................................................85
5.2 Accessing the Web server locally via the application interface
(10/100 BASE-T connector).............................................................86
Prerequisites....................................................................................86
Making a connection to the SINAUT MD740-1 website ...................86
5.3 Accessing the Web Server of the SINAUT MD740-1 from a remote
computer via the GPRS network......................................................87
Prerequisites....................................................................................87
Making a connection to the SINAUT MD740-1 website ...................87
5.4 The website of the SINAUT MD740-1..............................................88
Device Information page..................................................................89
SINAUT MD740-1
5 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Contents
Session Statistics and Total Statistics pages...................................90
PPP layer (PPP - Point-to-Point-Protocol) .......................................90
IP layer (IP - Internet Protocol) ........................................................91
Status Information page...................................................................92
Firmware update via the integrated FTP server..............................................93
Glossary 94
AES .................................................................................................94
APN (Access Point Name)...............................................................94
Asymmetrical encryption..................................................................95
DynDNS provider.............................................................................95
TCP/IP (Transmission Control Protocol/Internet Protocol)...............96
Service Provider ..............................................................................96
Protocol, transmission protocol........................................................97
Client / Server..................................................................................97
PPPoE .............................................................................................97
PPTP ...............................................................................................97
VPN (Virtual Private Network) .........................................................97
DES / 3DES.....................................................................................98
Private Key, Public key; Certification (X.509) ..................................98
NAT (Network Address Translation) ................................................99
Datagram.........................................................................................99
IPSec .............................................................................................100
Spoofing, anti-spoofing ..................................................................100
Symmetrical encryption .................................................................100
Port number...................................................................................100
IP address .....................................................................................101
X.509 Certificate ............................................................................102
Technical Data .................................................................................................103
Pin assignment interface Service...................................................104
Pin assignment interface 10/100 BASE-T......................................104
6 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Introduction
Introduction
The SINAUT MD740-1 serves the following purpose:
The device establishes secure IP data connections by radio
• via the GPRS (General Packet Radio Service) of a GSM
network (Global System for Mobile Communication = mobile
radio network).
•
GPRS modem
•
VPN router
•
Firewall
To do so, the device combines the following functions:
•
GPRS modem for flexible data communication via GPRS
•
VPN router for secure data transfer via public networks (IPSec
protocol, 3DES data encryption, AES encryption)
•
Firewall for protection against unauthorised access. The
dynamic packet filter inspects data packets using the source
and destination address (stateful packet inspection) and blocks
unwanted data traffic (anti-spoofing).
The device is configured simply using a Web browser.
VPN features
Firewall features
Other features
•
Protocol: IPsec (tunnel and transport mode)
•
IPsec DES encryption at 56 Bit
•
IPsec 3DES encryption at 168 Bit
•
IPsec AES encryption at 128, 192 and 256 Bit
•
Packet authentication: MD5, SHA-1
•
Internet Key Exchange (IKE) with Main and Quick Mode
•
Authentication: Pre-Shared Key (PSK), X.509v3 certificates
•
DynDNS
•
NAT-T
•
Dead Peer Detection (DPD)
•
Stateful Packet Inspection
•
Anti-spoofing
•
NAT (IP Masquerading)
•
Port Forwarding
•
DNS Cache
•
DHCP Server
•
NTP
•
Remote Logging
SINAUT MD740-1
7 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Introduction
Scenario 1:
Dedicated line to GPRS
or Internet (with fixed,
known IP address)
GPRS
Internet
LAN
Firewall
Application TAINY
IPSec tunnel
Router with
Firewall
Server in
company
network
GMOD-V2-IO
The application is connected locally direct to the SINAUT MD740-1: e.g. statement
printer, notebook or PC. This application uses the SINAUT MD740-1 in order to have
secure access to a remote LAN as if it were connected direct to the LAN.
The remote site is a computer in a corporate network. The network, protected by a VPN
router with firewall, is connected to the GPRS network or the Internet and has a known
or definable IP address.
Scenario 2:
GPRS
LAN
IPSec tunnel
TAINY
Application GMOD-V2-IO
TAINY GMOD-V2-IO
Server in
company
network
The remote site is another SINAUT MD740-1.
The direct connection of two GPRS end devices is not technically supported in
all GSM/GPRS networks.
8 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Introduction
1.1
To be able to use the SINAUT MD740-1...
you require...
1.2
•
a subscriber contract with a GSM network operator (e.g. TD1,
Vodafone, E-Plus, O2) that supports GPRS
•
release of the GPRS for the user in question by the network
operator
IP address of the remote site
In order that a SINAUT MD740-1 can actively establish a VPN connection the remote
site must have a fixed IP address (an IP address consists of a maximum of 4 numbers,
separated by dots, which can each have up to three digits, e.g. 255.122.201.005). With
many Internet Service Providers (ISPs), however, the IP addresses are assigned
dynamically, i.e. the IP addresses of the computers or networks which have access to
the Internet change. There are 3 ways of obtaining a fixed IP address:
Fixed IP address via
dedicated line to
GPRS
The communication partner is connected to the GPRS network
via a leased dedicated line. In this case it has normally been
assigned a fixed IP address by the network operator.
Fixed IP address via
Internet service
provider
The communication partner can be accessed via the Internet and
has been assigned a fixed IP address by the Internet service
provider (the address can be applied for from some Internet
service providers).
Fixed IP address via
DynDNS service
To solve the problem of dynamic IP address assignment,
DynDNS services can be used. With this kind of service, the
SINAUT MD740-1, for example, or the remote computer,
regardless of the dynamic IP address it currently possesses, is
accessible via a fixed domain name. Each time the IP address
changes, the SINAUT MD740-1 or the remote computer reports
the new IP address to the DynDNS server, so that the current IP
address is always assigned to the domain name on the DNS
server - see glossary, page 95.
The use of a DynDNS service requires a contract with the
provider concerned, e.g. DynDNS.org or DNS4BIZ.com.
SINAUT MD740-1
9 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
The LEDs of the SINAUT MD740-1
The LEDs of the SINAUT MD740-1
LEDs
Power
Status
LAN
VPN
LEDs
S (Status)
Q (Quality)
C (Connect)
S (Status), Q (Quality), C (Connect)
LED
S, Q, C
in sequence
S (Status)
Q (Quality)
C (Connect)
Status
Fast lighting in sequence
Slowly lighting in sequence
Synchronous fast blinking
Blinks slowly
Blinks fast
OFF
ON
Blinks slowly
1 x intermittent blinking
2 x intermittent blinking
3 x intermittent blinking
ON always
OFF
OFF
ON
Meaning
Boot procedure
Update*
Error
Device waiting for PIN input
PIN error / SIM error
No GPRS attach
GPRS attach
Booking into the GPRS network
Field strength not sufficient or unknown**
Field strength sufficient
Field strength medium
Field strength high
Waiting for PIN input
No connection
Connection to server/remote station
GPRS: Authentication on and IP
allocation from network successful
* When updating the communication firmware, at first the LEDs are slowly blinking in sequence.
Further in the process only the LED S is On.
** Shortly after booking into the GSM network, the quality LED blinks once, thus signalling the field
strength as not sufficient or unknown. Cause: At this stage the device can only register availability
10 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
The LEDs of the SINAUT MD740-1
of signal, but not the signal quality. The field strength is then requested in a next check, 15
seconds later.
DC5V, STAT, LINL, VPN
LED
Colour
Status
Meaning
DC5V Green
ON
OFF
Device switched on, operating voltage is on
Device switched off, no operating voltage
STAT Yellow
Blinking
IOVPN board operational
LINK Yellow
ON
OFF
Ethernet connection to local PC / LAN
established
No Ethernet connection to local PC / LAN
VPN Yellow
ON
OFF
VPN tunnel established*
VPN-Tunnel not established
* Shortly after switching on of the SINAUT MD740-1, the LED VPN is set to on for a short period of
time although the VPN tunnel has not yet been established. Cause: self-test of the components
during starting procedure of the device.
SINAUT MD740-1
11 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Putting the device into operation
Putting the device into operation
To put the device into operation, perform the following steps in the order given:
Page
1.
2.
3.
4.
Connect the device
Configure the PIN
Insert or change the SIM card
Perform further configuration
12
14
15
19
! First tell the device the PIN of the SIM card. Then insert the SIM card.
! The device also supports SIM cards without a PIN. If your SIM card has no PIN you
can also insert the SIM card before performing configuration.
! The device must be switched off when you insert or remove the SIM card.
3.1
Connecting the device
Current supply: The screw terminals on top of the device for connecting of the current
supply: 24 V DC voltage (nominal), max. 600mA
Antenna
+ 24 V
+ 24 V
(approx. 50 Ohm)
Application interface.
0V
0V
Connect the
application device
here.
Both terminal screws to the left (24 V)
are connected.
When connecting to
the network card of a
computer use a crossover Ethernet cable.
Both terminal screws to the right (0 V)
are connected.
Service interface.
Optional:
For the connection of a PC to display
device, status and connection
information.
To connect, use a V.24 cable.
Digital gate input
When connecting to
the network use a
UTP cable (CAT 5).
I1+
I1-
12 von 105
Digital gate output
O1a
O1b
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Putting the device into operation
Switching the device on/off
The SINAUT MD740-1 switches on as soon as the operating
voltage is supplied (see Connecting the device, page 12).
The devices switches off when disconnected from the supply
voltage.
When switching on
When the device is switched on the POWER LED comes on first. If
the device has a valid configuration and the SIM card is inserted
the device automatically books into the GPRS network. When the
CONNECT LED comes on a GPRS connection has been
established.
The device is designed in such a way that it can be left switched on
permanently.
SINAUT MD740-1
13 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Putting the device into operation
3.2
Configuring the PIN
In order for the SINAUT MD740-1 to be able to communicate via the GPRS network of
your network operator you must tell the device the PIN (Personal Identification Number)
of the SIM card. Then you can insert the SIM card into the device.
The device also supports SIM cards without a PIN. If your SIM card has no PIN it is not
necessary to configure the PIN. You can then insert the SIM card immediately.
To configure the PIN, proceed as follows:
1. Using your Web browser (e.g. MS Internet Explorer), establish a
configuration connection with the SINAUT MD740-1.
To do this, follow the description in section 4 Configuration,
page 19 to 23.
2. When the Administrator website of the SINAUT MD740-1
appears, select Network # GPRS.
Enter PIN
(in both fields)
In the PIN field, enter the PIN of the SIM card that you then
want to insert into the device.
! Enter the same PIN in both fields.
Then click on OK or Apply.
Once the PIN is set, the message "Not configured yet" is no
longer displayed.
3. You can close the connection by closing the Web browser.
14 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Putting the device into operation
3.3
Inserting or changing the SIM card
SINAUT MD740-1 must be switched off when you insert or change the SIM card
A plug-in SIM card (3 Volt) is used.
1. Make sure that the device is disconnected from the supply voltage.
2. The SINAUT MD740-1 must be
opened to insert the SIM card.
The housing is fastened with clamps,
two each on top of the housing and on
the bottom side.
Clamps
Clamps
3. Release the two clamps on the
housing part with antenna socket.
For this purpose, press the clamps
cautiously with a suitable object (see
picture) so that catch opens.
4. Cautiously pull the unlocked housing
part so that the housing opens.
The boards in both front housing
parts are connected by an IO
cable. When opening the housing
make sure that the cable
connection is not loosened or
damaged. If necessary, unlock
both front housing parts and
cautiously pull them out together.
SINAUT MD740-1
15 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Putting the device into operation
5. The SIM card holder is visible on the
motherboard.
SIM card holder
6. With a suitable object open the flap of
the SIM card holder by moving it
cautiously about 2mm to the left – in
the direction of the arrow (see red
arrow in the illustration) so that it can
be raised.
7. Raise the flap of the SIM card holder
so that you can insert the SIM card.
In the illustration below, the
compartment into which you can insert
the SIM card is emphasized in white.
16 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Putting the device into operation
8. Slide the SIM card into the flap of the
SIM card holder, with the goldcoloured microchip pointing down. The
flap has a groove for this purpose. The
notched corner of the SIM card has to
point towards the front of the device
(see illustration).
9. Slide the SIM card down into the flap
as far as possible.
10. Lower the flap paying attention to the
notched corner of the SIM card (see
illustration).
SINAUT MD740-1
17 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Putting the device into operation
11. With your fingernail or a suitable object
move the flap about 2 mm to the right
(in the direction of the arrow) until you
can feel it click into place.
12. Now the SIM card holder is locked into
position.
13. Check the connection of the internal IO
connection cable.
Finally re-attach both housing parts:
Slide the motherboard into the rails on
top and bottom inside the rear section
of the housing. Close the housing by
slightly pressing the housing parts
together so that the clamps on the
upper and lower parts of the housing
engage.
The housing is locked when all clamps
have clicked shut.
18 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Configuration
Remote
configuration
! Remote configuration is possible only if the SINAUT MD740-1 is
configured for remote access (see page 64). In this case,
proceed exactly as described as from section Establish
configuration connection, page 20.
Prerequisites for •
local configuration
The computer with which you are performing the configuration
must either
- be connected direct to the Ethernet socket of the
SINAUT MD740-1 via cross-over network cable
- or it must have direct access via LAN to the
SINAUT MD740-1.
•
The SINAUT MD740-1 must be switched on.
•
The network adapter of the computer with which you are
performing configuration must have the following TCP/IP
configuration:
IP address: 192.168.1.2
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
Preferred DNS server: address of the Domain Name Server
TCP/IP configuration of the network adapter under Windows XP:
TCP/IP
configuration of
the network
adapter
…under
Windows XP
1. Click on Start, Settings, Control Panel, Network
Connections: right-click on the icon for LAN adapter and click
on Properties in the context menu.
On the General tab in
the Properties of LAN
connection local
network dialogue box,
select the Internet
Protocol (TCP/IP) entry
and then click on the
Properties button to
make the following
dialogue box appear:
SINAUT MD740-1
19 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
2. Enter the following:
IP address: 192.168.1.2
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
Preferred DNS server: address of the Domain Name Server
…under
Windows 2000
Preferred DNS
server
Establish
configuration
connection
Under Windows 2000, proceed accordingly.
If you call up addresses via a domain name (e.g.
www.neuhaus.de), a Domain Name Server (DNS) has to look
up which IP address belongs to the name. You can determine
the following as the Domain Name Server:
•
the DNS address of the network operator
OR
•
the local IP address of the SINAUT MD740-1, provided that
it is configured to resolve hostnames in IP addresses, see
Services menu.
To determine the Domain Name Server in the TCP/IP
configuration of your network adapter, proceed as described
above.
Proceed as follows:
1. Start a Web browser.
(e.g. MS Internet Explorer from Version 5.0 or Netscape Communicator
from Version 4.0; the Web browser must support SSL (i.e. https))
2. Make sure that the browser does not automatically dial up a
connection when starting.
In MS Internet Explorer you make this setting as follows: menu
Tools, Internet Options..., Connections tab: under Dial-up and
Virtual Private Network settings, Never dial a connection must
be activated.
IP address of the
3. In the address line of the browser, enter the full address of the
SINAUT MD740-1:
SINAUT MD740-1. In accordance with the default setting, this
is:
https://192.168.1.1
https://192.168.1.1
Consequence: the security alert shown on the next page
appears.
20 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
In case
the Administrator
website does not
appear...
If the browser still tells you after several attempts that the page
cannot be displayed, try the following:
•
Check the hardware connection.
To do so on a Windows computer, enter the following
command via the DOS prompt (menu Start, Programs,
Tools, Command Prompt):
ping 192.168.1.1
If there is no message about the reception of the 4 sent
packets within the prescribed time, check the cable, the
connections and the network card.
•
Make sure that the browser does not use a proxy server.
In MS Internet Explorer (Version 6.0) you make this setting as
follows: menu Tools, Internet Options..., Connections tab:
under LAN Settings click on the Settings button, in the
Settings for local area network (LAN) dialogue box make sure
that the Use a proxy server for your LAN entry is not
activated.
•
If there are other LAN connections active on the computer,
deactivate them for the duration of configuration.
Under Windows menu Start, Settings, Control Panel,
Network Connections / Network and Dial-up
Connections right-click on the appropriate icon and select
Deactivate in the context menu.
•
Enter the address of the SINAUT MD740-1 plus slash:
https://192.168.1.1/
SINAUT MD740-1
21 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
When the
connection is
successfully
established...
4. Following the successful establishment of the connection the
following security alert appears:
Explanation:
As the device can only be
administered via
encrypted accesses it is
supplied with a self-signed
certificate.
Acknowledge the security alert with Yes.
5. You are prompted to enter the user name and the password.
The default setting is:
User name:
admin
Password:
tainy
Start page of the
Administrator
website
6. Consequence: the Administrator website of the
SINAUT MD740-1 appears - see next page.
22 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
To perform the configuration, proceed as follows:
Perform
configuration
1. Call up the
required setting
area via the menu.
2. Make the required
entries on the page
concerned.
3. Confirm with OK or
Apply, so that the
settings are
accepted by the
device.
If a page is not up to date when next displayed because the
browser is loading it from the cache, refresh the page display.
To do so, click on the Refresh icon in the browser's icon bar.
Depending on how you configure the SINAUT MD740-1, you may then have to
adapt the network interface of the connected computer or network accordingly.
When entering IP addresses, always enter the IP address sub-numbers without
the leading zeros, e.g.: 192.168.0.8.
Please note:
In the following screenshots of the configuration pages of the SINAUT MD740-1 are
displayed. The caption of these screenshots refers to another product from SIEMENS
A&D. This product basically supports the same features as SINAUT MD740-1 (VPN,
Firewall) but has a different housing.
SINAUT MD740-1
23 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
4.1
Network menu
Network # Local Internal IPs
An internal IP is the IP address at which the SINAUT MD740-1 can
be accessed by devices of the locally connected network.
The default setting for the IP address is as follows:
Local IP address of
IP address:
192.168.1.1
the SINAUT MD740Local
netmask:
255.255.255.0
1 according to
default setting:
You can determine further addresses at which the
192.168.1.1
SINAUT MD740-1 can be accessed by devices of the locally
connected network. This is helpful if, for example, the locally
connected network is divided into subnets. In this case, several
devices from different subnets access the
SINAUT MD740-1 at different addresses.
! If you want to determine a further internal IP, click on New.
You can determine any number of internal IPs.
! If you want to delete an internal IP, click on Delete.
(The first IP address in the list cannot be deleted.)
Additional Internal Routes
If further subnets are connected to the locally connected network,
you can define additional routes.
See also Network example diagram, page 81.
! If you want to determine a further route to a subnet, click on
New.
Enter the following:
- the IP address of the subnet (network), and
- the IP address of the gateway via which the subnet is
connected.
You can determine any number of internal routes.
! If you want to delete an internal route, click on Delete.
24 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Network # GPRS
User (user name)
Password
When the SINAUT MD740-1 logs into the GPRS network it is
generally asked for the user name and the password before it is
given access to the network.
Some GSM/GPRS network operators dispense with access
control via user name and/or password. In this case, enter
visitor in the appropriate field.
INFO: Documentation from your network operator.
Enter the password identically in both fields.
Once the password has been set, the message "Not configured
yet" is no longer displayed.
APN (Access Point Name)
This denotes the gateway
- to the Internet. In this case the remote site can be reached via
the Internet.
OR
- to the private network. In this case the remote site is
connected to the GPRS network operator via a leased
dedicated line.
INFO:
• Internet APN:
You will find the APN in the documentation or at the website of
your GSM/GPRS network operator, or you can call the hotline
and ask for it there.
• Private APN:
You can obtain the access data from your network operator.
SINAUT MD740-1
25 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
When putting the
device into
operation:
1. Tell the device
the PIN of the
SIM card
2. Insert the SIM
card
PIN of the SIM card inserted in the device
In order for the SINAUT MD740-1 to be able to operate with the
SIM card of your network operator you must tell the device the PIN
(Personal Identification Number) of the SIM card, provided that the
SIM card has a PIN. Only after this should you insert the SIM card
into the switched off(!) device.
To do so, enter the PIN and click on OK or Apply.
If a PIN has been set, the message "Not configured yet" is no
longer displayed.
! Enter the PIN identically in both fields.
! The entered PIN must tally with the PIN of the SIM card with
which the device is to operate.
! You cannot change the PIN of the SIM card with this device.
Confirm the entries on this configuration page by clicking on OK or
Apply.
Network # Status
Display only:
Network mode
This indicates whether a GPRS connection has been
established (display: "modem connected") or whether the
GPRS modem is on standby and ready to establish a GPRS
connection (display: "(none)” or “modem (later)").
External IP /GPRS:
The IP address at which the device can be reached from the
outside. This IP address is assigned to the device by the
operator of the GPRS network for the current connection.
Default gateway via external IP:
IP address of the integrated GPRS module.
26 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
4.2
Firewall menu
The SINAUT MD740-1 comes with a Stateful Packet Inspection Firewall. The connection
data of an active connection are collected in a database (connection tracking). This
means that rules are only to be defined for one direction, while data from the other
direction of a connection, and only these, are allowed through automatically. A side
effect of this is that existing connections are not interrupted as a result of
reconfiguration, even if a corresponding new connection should no longer be
established.
Default firewall setting:
• All incoming connections are rejected (except VPN).
• The data packets of all outgoing connections are rejected (except VPN and except
connections to the integrated website which provides information about devices and
connection data).
! VPN connections are not subject to the firewall rules determined under this menu
item. You can determine firewall rules for each individual VPN connection under the
menu VPN # Connections.
! If several firewall rules have been set, they are scanned in the order of the entries
from top to bottom until a suitable rule is found. This rule is then applied. Should
there also be rules further down in the list which would be also suitable, they are
ignored.
Firewall # Incoming
This lists the fixed firewall rules. These apply to incoming data
connections which have been initiated externally.
• If no rule has been set, all incoming connections (except VPN)
are rejected (= default setting).
Deleting a rule
Click on Delete next to the entry concerned. Then click on OK
or Apply.
SINAUT MD740-1
27 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Setting a new rule
If you want to set a new rule, click on New.
Set the required rule (see below), then click on OK or Apply.
You receive a system message as confirmation.
You can make the following possible entries:
Protocol: All means: TCP, UDP, ICMP and others.
IP address: 0.0.0.0/0 means all addresses. To denote a range, use
CIDR syntax - see CIDR (Classless InterDomain Routing), page
79.
Port:
(is evaluated only with TCP and UDP protocols)
any means any port.
startport:endport (e.g. 110:120) denotes the port area.
Individual ports can be entered either with the port number or with
the corresponding service name: (e.g. 110 for pop3 or pop3 for
110).
Action:
Accept means that the data packets may pass.
Refuse means that the data packets are turned away so that the
sender is informed of the refusal.
Reject means that data packets are not allowed to pass. They
are "swallowed" so that the sender is not informed of their
whereabouts.
Log:
For each individual firewall rule you can determine whether, when
the rule is applied,
- the event is to be logged - set Log to Yes
- or not - set Log to No (default setting)
Log entries for unknown connection attempts:
This logs all connection attempts which are not recorded by the
prevalent rules.
28 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Firewall # Outgoing
This lists the fixed firewall rules. These apply to outgoing data
packets which belong to GPRS connections initiated by the
SINAUT MD740-1 to communicate with a remote site.
! If no rule is set, all outgoing connections are prohibited (except
VPN).
! Default setting: outgoing connections prohibited (except VPN
and connections to the integrated website which provides
information about devices and connection data).
Deleting a rule
Click on Delete next to the entry concerned. Then click on OK
or Apply.
Setting a new rule
If you want to set a new rule, click on New.
Set the required rule (see below), then click on OK or Apply.
You receive a system message as confirmation.
You can make the following possible entries:
Protocol: All means: TCP, UDP, ICMP and others.
IP address: 0.0.0.0/0 means all addresses. To denote a range, use
CIDR syntax - see CIDR (Classless InterDomain Routing), page
79.
Port:
(is only evaluated with TCP and UDP protocols)
any means any port.
startport:endport (e.g. 110:120) denotes the port area.
Individual ports can be entered either with the port number or with
the corresponding service name: (e.g. 110 for pop3 or pop3 for
110).
Action:
Accept means that the data packets may pass.
Refuse means that the data packets are turned away so that the
SINAUT MD740-1
29 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
sender is informed of the refusal.
Reject means that data packets are not allowed to pass. They
are swallowed so that the sender is not informed of their
whereabouts.
Log:
For each individual firewall rule you can determine whether, when
the rule is applied,
- the event is to be logged - set Log to Yes
- or not - set Log to No (default setting)
Log entries for unknown connection attempts:
This logs all connection attempts which are not recorded by the
prevalent rules.
Firewall #Port Forwarding
This lists the fixed rules for port forwarding.
With port forwarding the following takes place: the header of
incoming data packets from the external network which are
intended for the external IP address (or one of the external IP
addresses) of the SINAUT MD740-1 and for a particular port of the
SINAUT MD740-1 are rewritten in such a way that they are
forwarded to the internal network to a particular computer and to a
particular port of this computer. That means that the IP address
and port number in the headers of incoming data packets are
changed.
This method is also called Destination NAT.
! The rules set here take priority over the settings under Firewall
# Incoming.
Deleting a rule
Click on Delete next to the entry concerned. Then click on OK
or Apply.
Setting a new rule
30 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
If you want to set a new rule, click on New.
Set the required rule (see below), then click on OK or Apply.
Protocol
Here you enter the protocol to which the rule is to apply.
Incoming on IP
Here you enter the external IP address (or one of the
external IP addresses) of the SINAUT MD740-1.
OR
Should a dynamic change of the external IP address of the
SINAUT MD740-1 take place, so that it cannot be given, use
the following variable: %extern.
The special value %extern refers to the first IP address in
the list when using several static IP addresses for the
external interface.
Incoming on Port
Original destination port that is given in incoming data
packets.
Redirect to IP
Internal IP address to which the data packets are to be
forwarded and to which the original destination addresses
are rewritten.
Redirect to Port
Port to which the data packets are to be forwarded and to
which the original destination addresses are rewritten.
You can make the following possible entries:
Port
You can only specify individual ports, either with the port
number or with the corresponding service name: (e.g. 110
for pop3 or pop3 for 110).
Log
For each individual port forwarding rule you can determine
whether, when the rule is applied,
- the event is to be logged - set Log to Yes
- or not - set Log to No (default setting).
SINAUT MD740-1
31 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Firewall # NAT
This lists the fixed rules for NAT (Network Address Translation) and
allows rules to be set or deleted.
For outgoing data packets the device can translate the given
sender IP addresses from its internal network to its own external
address, a technique known as NAT (Network Address
Translation).
This method is used when the internal addresses cannot or should
not be routed, e.g. because a private address range such as
192.168.x.x or the internal network structure is to be hidden.
This method is also called IP Masquerading.
! When using several static IP addresses for the external
interface, the first IP address in the list is always used for IP
Masquerading.
Default setting: NAT does not take place.
Deleting a rule
Click on Delete next to the entry concerned. Then click on OK
or Apply.
Setting a new rule
If you want to set a new rule, click on New.
Set the required rule (see below), then click on OK or Apply.
You can make the following possible entries:
From IP
0.0.0.0/0 means all addresses, i.e. all internal IP addresses are
subjected to the NAT procedure. To denote a range, use
CIDR syntax - see CIDR (Classless InterDomain Routing),
page 79.
32 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Firewall # Extended Settings
These settings determine the basic behaviour of the firewall.
Standard settings
All Modes
Maximum number ...
These 5 entries determine upper limits. They are selected in
such a way that they are never reached in normal practical
operation. In the event of attacks, however, they can easily
be reached, therefore the limitation represents built-in,
additional protection. Should special requirements exist in
your operating environment, you can increase the values.
Enable "FTP" NAT/Connection Tracking support
When an outgoing connection is established in the FTP
protocol for the purpose of retrieving data, there are two
possible forms of data transmission: with "enabled FTP" the
called-up server in turn establishes an additional condition
to the caller in order to transmit the data via this connection.
With "disabled FTP" the client establishes this additional
SINAUT MD740-1
33 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
connection to the server for data transmission. In order for
the additional connections to be allowed through by the
firewall, Enable "FTP" NAT/Connection Tracking support
must be set to Yes (standard).
Enable "IRC" NAT/Connection Tracking support
Similar to FTP: when chatting on the Internet via IRC,
incoming connections must be allowed following the active
establishment of a connection if chatting is to work
smoothly. For these connections to be allowed through by
the firewall, Enable "IRC" NAT/Connection Tracking
support must be set to Yes (standard).
Enable "PPTP" NAT/Connection Tracking support
Must only be set to Yes if the following condition is present:
A VPN connection using PPTP is to be established to an
external computer from a local computer without the help of
the SINAUT MD740-1.
The default setting of this switch is No.
ICMP from extern to the TAINY
With this option you can influence behaviour when receiving
ICMP messages which are sent from the external network to
the SINAUT MD740-1. You have the following possibilities:
Reject: All ICMP messages sent to the
SINAUT MD740-1 are rejected.
Accept ping: Only ping messages (ICMP type 8) sent to the
SINAUT MD740-1 are accepted.
Accept all ICMPs: All types of ICMP messages sent to the
SINAUT MD740-1 are accepted.
34 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Firewall # Logs
Display only:
If the logging of events (Log = Yes) has been determined during
the setting of firewall rules you can then view all the log of all
logged events here.
The format corresponds to that commonly used under Linux.
There are special evaluation programs which present the
information from the logged data in a more easily legible format.
SINAUT MD740-1
35 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
4.3
VPN menu
The general prerequisite for a VPN connection is that the IP addresses of the VPN
partners are known and accessible. See IP address of the remote site, page 9.
•
In order for an IPSec connection to be established successfully the VPN remote site
must support IPsec with the following configuration:
- Authentication via Pre-Shared Key (PSK) or X.509 certificates
- ESP
- Diffie-Hellman groups 2 or 5
- DES, 3DES or AES encryption
- MD5 or SHA-1 Hash algorithms
- Tunnel or transport mode
- Quick mode
- Main mode
- SA Lifetime (1 second to 24 hours)
If the remote site is a computer running under Windows 2000, the Microsoft Windows
2000 High Encryption Pack or at least Service Pack 2 must be installed.
•
If the remote site is behind a NAT router it must support NAT-T. Alternatively, the
NAT router must recognise the IPsec protocol (IPsec/VPN Passthrough). In both
cases, only IPsec tunnel connections are possible for technical reasons.
36 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
VPN # Connections
This lists the VPN connections already set up.
! You can enable (Enabled = Yes) or disable (Enabled = No)
each individual connection.
Deleting a VPN connection
Click on Delete next to the entry concerned.
Then click on OK or Apply.
Setting up a new VPN connection
Click on New.
Give the connection a name and click on Edit.
Perform the desired or necessary settings (see below).
Then click on OK or Apply.
Editing a VPN connection
Click on the Edit button next to the connection concerned.
Perform the desired or necessary settings (see following
illustration and explanations).
Then click on OK or Apply.
SINAUT MD740-1
37 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
A descriptive name for the connection
You can name or rename the connection as you wish.
Enabled
Determine whether the connection is to be enabled (= Yes) or
not (= No).
38 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Address of the remote site's VPN gateway
• This denotes the address of the gateway to the private
network in which the remote communication partner is
located - see illustration below.
Devices and addresses of remote site
GPRS
Internet
IPsec tunnel
SINAUT MD740-1
Remote VPN
gateway address
•
Router with
firewall
LAN
Tunnel: the address
of the opposite
network (can also be
individual computer.)
If the SINAUT MD740-1 is to initiate and establish the
connection actively with the remote site, then enter the
remote site's IP address here. Instead of an IP address you
can also enter a hostname (i.e. domain name in URL format
in the form www.xyz.de).
If the VPN gateway of the remote site does not have a fixed
and known address, a fixed and known address can
nevertheless be simulated by using the DynDNS service. See
IP address of the remote site, page 9.
• If the SINAUT MD740-1 is to be ready to accept the
connection actively initiated and established by a remote site
with any IP address to the local SINAUT MD740-1, then
enter: %any
Then a remote site which is assigned its own IP address (by
the Internet service provider) dynamically, i.e. has a changing
IP address, can "call" the local SINAUT MD740-1.
If only one particular remote site with a fixed IP address
establishes the connection, you can enter this address to be
on the safe side.
! In order for the SINAUT MD740-1 to accept a connection
actively initiated and established by a remote site, the
SINAUT MD740-1 requires a fixed IP address from the
provider or by using a DynDNS service.
In many GSM/GPRS networks it is not possible to set up
connections initiated from a remote site to the GPRS
device (SINAUT MD740-1).
SINAUT MD740-1
39 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Connection type
There are four options:
• Tunnel (network $ # network)
• Transport (host $ # host)
• Transport (L2TP Microsoft Windows)
• Transport (L2TP SSH Sentinel)
Tunnel (network $ # network)
This connection type is suitable in every case and it is also
the safest. In this mode the IP datagrams to be transferred
are completely encrypted and sent with a new header to the
remote site's VPN gateway, the "end of the tunnel". There
the transferred datagrams are decrypted and the original
datagrams retrieved from them. These can then be sent to
the destination computer.
Transport (host $ # host)
With this connection type only the data in the IP packets are
encrypted. The IP header information is not encrypted.
Transport (L2TP Microsoft Windows)
If this connection is enabled on the remote computer, you
should also set the SINAUT MD740-1 to Transport (L2TP
Microsoft Windows). The SINAUT MD740-1 will then work
accordingly. The L2TP/PPP protocol creates a tunnel within
the IPsec Transport connection. The locally connected L2TP
computer is assigned its IP address dynamically by the
SINAUT MD740-1.
If you select the connection type Transport (L2TP Microsoft
Windows), set Perfect Forward Secrecy (PFS) to No (see
below). Also enable the L2TP server.
! As soon as the IPsec/L2TP connection is started under
Windows, a dialogue box appears, asking for the user
name and login. You can enter anything here because
authentication has already taken place via the X.509
certificates, so that the SINAUT MD740-1 ignores these
entries.
40 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Transport (L2TP SSH Sentinel)
If this connection is enabled on the remote computer, you
should also set the SINAUT MD740-1 to Transport (L2TP
SSH Sentinel). The SINAUT MD740-1 will then work
accordingly. The L2TP/PPP protocol creates a tunnel within
the IPsec Transport connection. The locally connected L2TP
computer is assigned its IP address dynamically by the
SINAUT MD740-1. Also enable the L2TP server.
Connection startup
There are 2 possibilities:
• Start the connection to the remote site
• Wait for the remote site
Start the connection to the remote site
In this case the local SINAUT MD740-1 initiates the
connection to the remote site. The fixed IP address of the
remote site or its domain name must be entered in the
Remote site's VPN gateway address field (see above).
Wait for the remote site
In this case the local SINAUT MD740-1 is ready to accept
the connection actively initiated and established by a remote
site to the local SINAUT MD740-1. %any can be entered in
the Remote site's VPN gateway address field (see above).
If only one particular remote site with a fixed IP address
establishes the connection, enter its IP address or host
name to be on the safe side.
In order for a connection to the
SINAUT MD740-1 to be established, the
SINAUT MD740-1 requires a fixed IP address from the
provider or by using a DynDNS service.
In many GSM/GPRS networks it is not possible to set
up connections initiated from a remote site to the GPRS
device (SINAUT MD740-1).
Authentication method
There are 2 possibilities:
• X.509 Certificate
• Pre-Shared Key
SINAUT MD740-1
41 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
X.509 Certificate
This method is supported by most newer IPSec
implementations. The SINAUT MD740-1 encrypts the
authentication datagrams that it sends to the remote site the "end of the tunnel" - with the remote site's public key (file
name *.cer or *.pem). (You received this *.cer or *.pem file
from the operator of the remote site, e.g. on a disk or by email).
To make this public key available to the
SINAUT MD740-1, proceed as follows:
Prerequisite:
You have stored the *.cer or *.pem file on the locally
connected computer.
1. Click on Configure.
Consequence: The VPN > Connections > Connection
xyz > X.509 Certificate screen appears. ("xyz" is the
name of the connection concerned.)
2. Click on Browse... and select the file.
3. Click on Import.
After importing, the content of the new certificate is
displayed – see following illustration. You will find an
explanation of the displayed information in section VPN
# Machine Certificate, page 48.
Pre-Shared Secret Key (PSK)
This method is supported mainly by older IPsec
implementations. The SINAUT MD740-1 encrypts the
datagrams which it sends to the remote site – the "end of
the tunnel" – with an agreed sequence of characters.
To make this agreed key available to the
SINAUT MD740-1, proceed as follows:
1. Click on Configure.
42 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Consequence: the screen illustrated below appears:
2. Enter the agreed sequence of characters in the field PreShared Secret Key (PSK). To obtain security
comparable to 3DES, the sequence of characters should
consists of approx. 30 randomly selected lower and
upper case characters and numerals.
3. Click on Back.
! Pre-Shared Secret Key cannot be used with dynamic
(%any) IP addresses; only fixed IP addresses or hostnames
on both sides are supported.
ISAKMP SA (Key Exchange)
Encryption algorithm
! Agree with the administrator of the remote site as to
which encryption method is to be used.
3DES-168 is the most commonly used method and is
therefore preset as the standard.
Basically, the following applies: the more bits an encryption
algorithm has – indicated by the number shown – the more
secure it is. The relatively new AES-256 method is therefore
considered to be the safest, but it is not yet so widespread.
The longer the key, the more time-consuming the encryption
process. This aspect is of no consequence to the
SINAUT MD740-1 because it works with hardware-based
encryption technology. Nevertheless, this aspect could be
significant for the remote site.
The selectable algorithm marked "Zero" contains no
encryption at all.
Checksum algorithm/Hash
Leave the setting on All algorithms. Then it makes no
difference whether the remote site works with MD5 or
SHA-1.
IPsec SA (data exchange)
Unlike ISAKMP SA (Key Exchange) (see above) the method
SINAUT MD740-1
43 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
for data exchange is determined here. This may differ from
that of the Key Exchange, but not necessarily.
Encryption algorithm
See above.
Checksum algorithm/Hash
See above.
Perfect Forward Secrecy (PFS)
A method for the additional improvement of security during
data transfer. With IPsec, the keys for data exchange are
renewed at certain intervals. With PFS, new random
numbers are negotiated with the remote site instead of
deriving them from previously agreed random numbers.
Only if the remote site supports PFS, select Yes.
When selecting the connection type Transport (L2TP
Microsoft Windows) set Perfect Forward Secrecy (PFS) to
No.
Tunnel settings
Local network address
The appropriate netmask
With these two entries you give the address of the client
(network or computer) that is connected locally to the
SINAUT MD740-1 direct and which is protected by the das
SINAUT MD740-1. This address defines the local endpoint
of the connection.
Example:
If the computer that you are also using for the configuration
of the device is connected to the SINAUT MD740-1, then
these data could be:
Local network address: 192.168.1.1
The appropriate netmask: 255.255.255.0
See also Network example diagram, page 81.
44 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Local devices and
addresses
Tunnel: the address of the local network
(can also be an individual computer)
LAN
GPRS
Internet
IPsec tunnel
SINAUT MD740-1
To the remote
site
Devices and addresses
of remote site
Tunnel: the address of the opposite network (can
also be an individual computer)
GPRS
LAN
Internet
IPsec tunnel
SINAUT MD740-1
SINAUT MD740-1
Router w.
firewall
Remote VPN
gateway address
45 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Remote network address
The appropriate netmask
With these two entries you give the address of the network in
which the remote communication partner is located. This
address can also be that of a computer which is connected
direct to the VPN gateway.
Firewall incoming, Firewall outgoing
While the settings performed under the menu item Firewall
apply only to non-VPN connections (see above under Firewall
# Incoming, page 27), the settings here apply only to the VPN
connection defined here. In practical terms, that means: if you
have defined several VPN connections, you can restrict access
to each one from the outside or from the inside. Attempts to
bypass the restrictions can be recorded in the log.
According to the default setting the VPN firewall is set so
that everything is permitted for this VPN connection.
However, the extended firewall settings which are defined
and explained above still apply to each individual VPN
connection, independent of each other (see Firewall #
Extended Settings, page 33).
If several firewall rules have been set, they are scanned in
the order of the entries from top to bottom until a suitable
rule is found. This rule is then applied. Should there also
be rules further down in the list which would be also
suitable, they are ignored.
To set or delete a firewall rule, proceed exactly as
described above (see Firewall # Incoming, page 27 and
Firewall # Outgoing, page 29.
As there, you can make the following possible entries:
Protocol:
All means: TCP, UDP, ICMP and other IP protocols.
IP address:
0.0.0.0/0 means all addresses. To denote a range, use
CIDR syntax - see CIDR (Classless InterDomain Routing),
page 79.
46 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Port:
(is evaluated only with TCP and UPD protocols)
any means any port.
startport:endport (e.g. 110:120) denotes the port area.
Individual ports can be entered either with the port number
or with the corresponding service name (e.g. 110 for pop3
or pop3 for 110).
Action:
Accept means that the data packets may pass.
Refuse means that the data packets are turned away so
that the sender is informed of the refusal.
Reject means that data packets are not allowed to pass.
They are swallowed so that the sender is not informed of
their whereabouts.
Log
For each individual firewall rule you can determine whether,
when the rule is applied,
the event is to be logged - set Log to Yes
or not - set Log to No (default setting)
Log entries for unknown connection attempts:
This logs all connection attempts which are not recorded by
the prevalent rules.
! If several firewall rules have been set, they are followed in
the order of the entries.
SINAUT MD740-1
47 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
VPN # Machine Certificate
Certificate
This denotes the currently imported X.509 certificate with which
the SINAUT MD740-1 identifies itself to other VPN gateways.
After a certificate has been imported the following information is
displayed:
subject
The owner to whom the certificate has been issued.
issuer
The certification office which has signed the certificate.
C:
Country
ST:
State
L:
Location
O:
Organisation
OU: Organisation Unit
CN: Common Name
MD5, SHA1 Fingerprint
Fingerprint of the certificate for comparison with
another one, e.g. on the telephone. Windows displays
the fingerprint in SHA1 format at this point.
notBefore, notAfter
Validity period of the certificate. Is ignored by the
SINAUT MD740-1 due to lack of an internal clock.
48 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
The imported certificate file (filename extension *.p12 or *.pfx)
contains the information given above, as well the two keys: the
public key for encryption, the private key for decryption. The
appropriate public key can be assigned any number of
connection partners, enabling them to send encrypted data.
In agreement with the remote site, the certificate must be made
available to the operator of the remote site as a .cer or .pem
file, e.g. handed over personally or by e-mail. If you do not have
a secure mode of transfer, you should then compared the
fingerprint displayed by the SINAUT MD740-1 via a secure
channel.
Only one certificate file (PKCS#12 file) can be imported into the
device.
! To important a (new) certificate, proceed as follows:
New certificate
Prerequisite:
The certificate file (file name = *.p12 or *.pfx) is generated and
stored on the connected computer.
1. Click on Browse... to select the file.
2. Enter the password with which the private key of the
PKCS#12 file is protected in the field Password.
3. Click on Import.
4. Then click on OK or Apply.
After importing, you receive a system message:
SINAUT MD740-1
49 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
VPN # L2TP
Start L2TP Server for IPsec/L2TP? Yes / No
If you want to enable an L2TP connection, set this switch to
Yes.
Within the IPsec transport connection the L2TP in turn contains a PPP
connection. Consequently, a kind of tunnel is created between 2
networks. The SINAUT MD740-1 informs the remote site via PPP as to
which addresses are being used: for itself and the remote site.
Local IP for L2TP connections
In the above screenshot the SINAUT MD740-1 is telling the
remote site that the device itself has the address 10.106.106.1.
Remote IPs for L2TP connections range
In the above screenshot the SINAUT MD740-1 is telling the
remote site that the remote site has the addresses from
10.106.106.2 (one computer) to 10.106.106.254 (several
computers).
50 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
VPN # IPsec Status
Display only:
Provides information on the status of the IPSec connections.
The names of the VPN connections are on the left, their current
status on the right.
GATEWAY
denotes the communicating VPN gateways
TRAFFIC
denotes computers or networks communicating via the VPN
gateways.
ID
denotes the Distinguished Name (DN) of an X.509 certificate.
ISAKMP Status
ISAKMP Status (Internet security association and key
management protocol) is given as "established" if the two VPN
gateways involved have established a channel for key
exchange. In this case, they were able to contact each other
and all entries up to and including "ISAKMP SA" on the
configuration page of the connection were correct.
IPsec Status
IPsec Status is given as "established" when IPSec encryption is
enabled during communication. In this case, the entries under
"IPsec SA" and "Tunnel settings" were also correct.
If there are problems, it is recommended to look at the VPN logs of
the computer to which the connection was established, because
the initiating computer receives no detailed error messages for
security reasons.
The message
SINAUT MD740-1
51 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
ISAKMP SA established, IPsec State: WAITING
means:
Authentication was successful, but the other parameters were not
correct. Does the connection type (tunnel, transport) correspond? If
tunnel was selected, do the network areas on both sides
correspond?
The message
IPsec State: IPsec SA established
means:
The VPN has been successfully established and can be used.
However, if this is not the case, then there are problems with the
remote site's VPN gateway. In this case, tag the connection name
and then click on OK or Apply to restart the connection.
VPN # L2TP Status
Display only:
Provides information the L2TP status if this has been chosen as the
connection type. See VPN # Connections, page 37.
If this connection type was not selected, see the display illustrated.
52 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
VPN # VPN Logs
Display only:
This lists all VPN events.
The format corresponds to that commonly used under Linux.
There are special evaluation programs which present the
information from the logged data in a more easily legible format.
SINAUT MD740-1
53 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
4.4
Services menu
Services # DNS
If the SINAUT MD740-1 is to establish a connection to a remote
site (e.g. VPN gateway or NTP server), it must know the die IP
address of the remote site in question. If it is given the address in
the form of a domain address (i.e. www.abc.xyz.de), then the
device must consult a Domain Name Server (DNS) to see which IP
address is behind the domain address.
You can configure locally connected clients in such a way that they
can use the SINAUT MD740-1 to resolve hostnames into IP
addresses. See IP configuration with Windows clients, page 59.
Hostname mode
With Hostname Modus and Hostname you can give the
SINAUT MD740-1 a name. This name is then displayed, e.g.
when logging in by SSH. Giving names simplifies the
administration of several SINAUT MD740-1s.
User defined (from field below)
(Standard) The name entered in the field Hostname is set as
the name for the SINAUT MD740-1.
Provider defined (e.g. via DHCP)
If the external setting of the hostname is enabled, e.g. as with
DHCP, then the name supplied by the provider is set for the
SINAUT MD740-1.
Hostname
If the option User defined is selected under Hostname mode,
then you enter the name here which the
SINAUT MD740-1 is to receive.
Otherwise, i.e. when the option Provider defined (e.g. via
DHCP) is selected under Hostname mode, an entry in this field
is ignored.
Domain search path
54 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Makes it easier for the user to enter a domain name: if the user enters
the domain name in abbreviated form, the
SINAUT MD740-1 supplements his entry with the given domain suffix
which is fixed here under domain search path.
Servers to query
Possibilities: DNS Root Servers / Provider defined / User
defined
DNS Root Servers
Queries are directed to the DNS root servers on the Internet
whose IP addresses are stored in the
SINAUT MD740-1. These addresses rarely change. This
setting should only be selected if the alternative settings do
not work.
Provider defined (e.g. via PPPoE or DHCP)
The Domain Name Server of the Internet service provider is
used who provides access to the Internet. You can select
this setting with enabled DHCP (see Services # DHCP,
page 57).
User defined (from field below)
If this setting is selected, the SINAUT MD740-1 makes
contact with the Domain Name Servers which are listed
under User defined name servers.
User defined name servers
If you have set the option User defined under Servers to query,
in this list you configure the IP addresses of the Domain Name
Servers to be used.
! To enable the locally connected clients can obtain the resolution
of hostnames in IP addresses from the
SINAUT MD740-1, you must determine the local IP address of
the SINAUT MD740-1 as the Preferred DNS server on the
clients.
See IP configuration with Windows clients, page 59.
SINAUT MD740-1
55 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Services # DynDNS Monitoring
Watch hostname of remote VPN Gateways? Yes / No
If the address of the remote VPN Gateway has been given to
the SINAUT MD740-1 as a hostname (see VPN # Connections,
page 37), and if this Domain Name has been issued by a
DynDNS service, then the SINAUT MD740-1 can check
regularly whether any changes have been made to the DynDNS
concerned. If so, the VPN connection is established to the new
IP address.
Refresh Interval (sec)
Standard: 300 (sec)
Services # DynDNS Registration
To establish VPN connections at least the IP address of one of the
partners must be known so that they can make contact with each
other. This condition is not fulfilled if both participants are assigned
their IP addresses dynamically by their Internet service providers.
In this case, however, a DynDNS service such as DynDNS.org or
DNS4BIZ.com can help. With a DynDNS service the currently valid
IP address is registered under a fixed name. See also IP address
of the remote site, page 9
Once you are registered with a DynDNS service supported by the
SINAUT MD740-1 you can make the corresponding entries in this
dialogue box.
Register this TAINY at a DynDNS Service? Yes / No
Select Yes if you are registered with a DynDNS provider and
the SINAUT MD740-1 is to use the service. Then the
SINAUT MD740-1 reports the current IP address assigned to its
own Internet connection by the Internet service provider to the
DynDNS service.
Refresh Interval (sec)
56 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Standard: 420 (sec).
Whenever the IP address of the device's own Internet
connection is or has been changed, the SINAUT MD740-1
informs the DynDNS service of the new IP address. For
reliability reasons this message is also sent at the time intervals
fixed here.
DynDNS Provider
The selectable providers support the same protocol that is also
supported by the SINAUT MD740-1.
Enter the name of the provider with whom you are registered,
e.g. DynDNS.org
DynDNS Server
Name of the server of the DynDNS provider selected above,
e.g. dyndns.org
DynDNS Login, DynDNS Password
Here you enter the user name and the password assigned to
you by the DynDNS provider.
DynDNS hostname
The hostname selected for this SINAUT MD740-1 with the
DynDNS service – provided that you use a DynDNS service and
have given the appropriate details above.
Services # DHCP
(DHCP = Dynamic Host Configuration Protocol) This function
automatically assigns the required network configuration (IP
address and subnet mask) to the client connected locally to the
SINAUT MD740-1.
SINAUT MD740-1
57 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Start DHCP Server
Set this switch to Yes if you want to enable this function.
Enable dynamic IP address pool
Set this switch to Yes if you want to use the IP address pool
selected by DHCP range start and DHCP range end.
Set this switch to No if only static assignments based on the
MAC address are to be performed (see below).
Options:
If the DHCP server and the dynamic IP address pool are
enabled you can indicate the network parameters to be used by
the client
DHCP range start:
Start and end of the address range from
which the DHCP server of the
DHCP range end:
SINAUT MD740-1 is to assign IP
addresses to the locally connected
clients.
Local netmask:
Default setting: 255.255.255.0
Default gateway:
Determines which IP address is to be
used as the default gateway by the
client. This is usually the local IP
address of the
SINAUT MD740-1.
DNS server:
Determines from where clients receive
resolution of hostnames in IP addresses.
If the DNS services of the SINAUT
MD740-1 is enabled it can be the local
IP address of the SINAUT MD740-1.
Client MAC address / client IP address
You can establish the MAC address of your client as follows:
Windows 95/98/ME: Start "winipcfg" in a DOS box
Windows NT/2000/XP: Start "ipconfig /all" in a prompt. The
MAC address is displayed as a "physical address".
Linux: Call up "/sbin/ifconfig" or "ip link show" in a shell .
Delete address
Click on Delete next to the entry concerned, then OK or Apply.
Add address
If you want to add a new address, click on New.
Enter the address data (see below) and click on OK or Apply.
Enter:
Client MAC address
The MAC address (without spaces or hyphens) of the client.
58 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Client IP address
The static IP that is to be assigned to the client's MAC
address.
The static assignments take priority over the dynamic IP
address pool.
Static assignments must not overlap with the dynamic IP
address pool.
An IP must not be used in several static assignments,
otherwise this IP will be assigned to several MAC
addresses.
Only one DHCP server per subnet must be used.
When you start the DHCP server of the
SINAUT MD740-1 you must configure the locally connected
clients in such a way that they receive their IP addresses
automatically (see below).
! IP configuration with Windows clients
Under Windows XP, click on Start, Control Panel, Network
Connections: right-click on the LAN adapter icon and click on
Properties in the context menu. On the General tab in the
Properties of LAN connection local network dialogue box, tag
the Internet Protocol (TCP/IP) entry under "This connection
uses the following items" and then click on the Properties
button.
In the dialogue box Properties of Internet Protocol (TCP/IP),
make the required entries and settings.
Services # NTP
(NTP = Network Time Protocol)
Current system time (UTC)
SINAUT MD740-1
59 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Displays the current system time in Universal Time Coordinates
(UTC). If NTP time synchronization is not yet enabled (see
below) and Time stamps in file system are disabled, the clock
begins with 1 January 2000.
Current system time (local)
If the possibly deviating current local time is to be displayed you
must make the corresponding entry under Time zone in
POSIX.1 Notation... (see below).
NTP State
Displays the current NTP state
Enable NTP time synchronization: Yes / No
As soon as the NTP is enabled the SINAUT MD740-1 sources
the time from the Internet and displays it as the current system
time. Synchronization may take a few seconds.
Only if this switch is set to Yes and at least 1 time server is
given under NTP servers to synchronize to (see below) is the
current system time provided.
NTP servers to synchronize to
NTP Server
Here you can enter one or more NTP servers from which the
SINAUT MD740-1 is to source the current time. If you enter
several time servers, the SINAUT MD740-1 automatically
connects to all of them to ascertain the current time.
The SINAUT MD740-1 also provides the connected computers
with the NTP time.
! Enter the IP addresses (instead of the hostnames) of the
required time servers.
Min. Poll / Max. Poll
Time synchronization takes place cyclically. Here you enter the
interval at which the poll is to take place (poll interval).
The NTP client selects the poll interval dynamically between the
two values. Make sure that the minimum value entered is
smaller than the maximum value.
Time zone in POSIX.1 notation...
If you do not want the current Greenwich Mean Time to be
displayed under Current system time, but the current local time
(= deviating from Greenwich Mean Time), then you must enter
here by how many hours your local time is ahead or behind.
Examples:
In Hamburg the time is 1 hour ahead of Greenwich Mean
Time. So you enter: CET-1
If you want CET (= valid for Germany) to be displayed with
60 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
automatic switching to summer or winter time, enter:
CET-1CEST,M3.5.0,M10.5.0/3
Time stamp in file system (2h granularity): Yes / No
If this switch is set to Yes, the SINAUT MD740-1 writes the
current system into its memory every 2 hours.
Consequence: If the SINAUT MD740-1 is switched off and then
back on, after being switched on a time in this 2-hour time
window will be displayed and not a time on 1 January 2000.
Services # Remote Logging
All log entries take place by default in the flash memory of the
SINAUT MD740-1. If the maximum memory space for these logs is
exhausted, the oldest log entries are automatically overwritten by
new ones.
It is possible to transfer the log entries to an external computer.
This is advisable if, for example, logging is to administered
centrally.
Activate remote UDP logging: Yes / No
If all log entries are to be transferred to the external log server
(specified below), set this switch to Yes.
Log Server IP address
Enter the IP address of the log server to which the log entries
are to be transferred via UDP.
The log server must have a fixed and known IP address.
You must enter the IP address, not a hostname. Name
resolution is not supported here because otherwise the
breakdown of a DNS server could not be reported.
Log Server port
Enter the port of the log server to which the log entries are to be
transferred via UDP. Default: 514
SINAUT MD740-1
61 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
4.5
Access menu
Access # Passwords
The SINAUT MD740-1 offers 3 levels of user rights. To log in at a
particular level the user must enter the password which is allocated
to the privilege level in question.
Privilege level
Root
Provides extended rights for the parameters of the
SINAUT MD740-1.
With SSH access at this privilege level it is
possible to misconfigure the device in such
a way that it has to be sent in for servicing.
In this case, please contact your dealer or
distributor.
Default user name:
root
Default root password: root
The user name root cannot be changed.
Administrator
Provides the rights for all configuration options
which are also available via the web-based
administrator interface.
Default user:
admin
Default password:
tainy
The user name admin cannot be changed.
User
Once a user password has been determined and
enabled, the user must then enter this password
after each restart of the SINAUT MD740-1 when
accessing any HTTP URL in order to facilitate VPN
connections.
62 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
If you want to use this option, determine a user
password in the corresponding entry field.
Root Password
Default setting: root
If you want to change the root password, enter the old password
in the field Old Password, then enter the new password in the
two fields below.
(unalterable user name: admin)
Administrator Password (Account: admin)
Default setting: tainy
(unalterable user name: admin)
Enable User Password: Yes / No
User password protection is switched off as default.
If a user password has been determined below, user password
protection can be enabled or disabled with this switch.
User Password
No user password is preset as default. To determine one, enter
the required password identically in each of the two entry fields.
Access # Language
Please select your preferred language
If (Automatic) is selected in the language selection list, the
device automatically adopts the language setting from the
computer's browser.
SINAUT MD740-1
63 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Access # HTTPS
When HTTPS remote access is switched on, the
SINAUT MD740-1 can be configured via its web-based
administrator interface from a remote computer. This means that
the browser on the remote computer is used to configure the local
SINAUT MD740-1.
This option is switched off as default.
! N.B.:
When you enable remote access, make sure that a secure root
and administrator password have been determined.
To enable HTTPS remote access, make the following settings:
Enable HTTPS remote access: Yes / No
If you want to enable HTTPS remote access, set this switch to
Yes.
! In this case, make sure that the firewall rules on this page
are set so that the SINAUT MD740-1 can be accessed from
the outside.
If you set this parameter to No by remote access, no further
entries by HTTPS remote access are possible. This option
must then be accepted again, either locally or by SSH
remote access, provided that this has been configured.
Port for incoming HTTPS connections (remote
administration only)
Default: 443
You can determine a different port.
If you have determined a different port, the remote site
which makes the remote access must then give the port
number after the IP address in the address information.
Example:
If this SINAUT MD740-1 can be reached via the Internet
using the address 192.144.112.5, and if the port number
442 has been determined for remote access, then the
64 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
following must be entered at the remote site in the web
browser:
192.144.112.5:442
Firewall rules to accept HTTPS access
This lists the fixed firewall rules. They apply to the incoming
data packet of a HTTPS remote access.
Delete rule
! Click on Delete next to the entry concerned.
Set new rule
! If you want to set a new rule, click on New.
Set the required new rule (see below) and click on OK or
Apply.
From IP
Here you enter the address(es) of the computer(s) which is/are
allowed remote access.
You can make the following possible entries:
IP address: 0.0.0.0/0 means all addresses. To denote a range,
use CIDR syntax - see CIDR (Classless InterDomain Routing),
page 79.
Interface
extern (fixed)
Action
Possibilities: Accept / Refuse / Reject
Accept means that the data packets may pass.
Refuse means that the data packets are turned away so that
the sender is informed of the refusal.
Reject means that data packets are not allowed to pass. They
are swallowed so that the sender is not informed of their
whereabouts.
Log
For each individual firewall rule you can determine whether,
when the rule is applied,
• the event is to be logged - set Log to Yes
•
or not - set Log to No (default setting).
SINAUT MD740-1
65 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Access # SSH
When SSH remote access is switched on, the SINAUT MD740-1
can be configured from a remote computer. To do so, a connection
must first be established from the remote site to the
SINAUT MD740-1 using an SSH-capable program. To perform
settings in the SINAUT MD740-1 enter the command "gaiconfig"
via the SSH console.
This option is switched off as default.
! N.B.:
When you enable remote access, make sure that a secure root
and administrator password have been determined.
! N.B.:
With SSH access via the root password it is possible to
misconfigure the device in such a way that it has to be sent in
for servicing. In this case, please contact your dealer or
distributor.
To enable SSH remote access, make the following settings:
Enable SSH remote access: Yes / No
If you want to enable SSH remote access, set this switch to
Yes.
In this case, make sure that the firewall rules on this page
are set so that the SINAUT MD740-1 can be accessed from
the outside.
Port for incoming SSH connections (remote administration
only)
Default: 22
You can determine a different port.
If you have determined a different port, the remote site
which makes the remote access must then give the port
number that is set here before the IP address in the address
information.
Example:
66 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
If this SINAUT MD740-1 can be reached via the Internet
using the address 192.144.112.5, and if a different port
number has been set for remote access, then this number
must be entered at the remote site in the SSH client (e.g.
web browser), e.g.
ssh -p 22222 192.144.112.5
Firewall rules to accept SSH access
This lists the fixed firewall rules. These apply to the incoming
data packets of an SSH remote access.
Delete rule
! Click on Delete next to the entry concerned.
Set new rule
! If you want to set a new rule, click on New.
Set the required new rule (see below) and click on OK or
Apply.
From IP
Here you enter the address(es) of the computer(s) which is/are
allowed remote access.
You can make the following possible entries:
IP address: 0.0.0.0/0 means all addresses. To denote a range,
use CIDR syntax - see CIDR (Classless InterDomain Routing),
page 79.
Interface
extern (fixed)
Action
Possibilities: Accept / Refuse / Reject
Accept means that the data packets may pass.
Refuse means that the data packets are turned away so that
the sender is informed of the refusal.
Reject means that data packets are not allowed to pass. They
are swallowed so that the sender is not informed of their
whereabouts.
Log
For each individual firewall rule you can determine whether,
when the rule is applied,
• the event is to be logged - set Log to Yes
•
or not - set Log to No (default setting).
SINAUT MD740-1
67 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
4.6
Features menu
Features # Install Update
Prerequisite: you have either
•
stored a current software package locally on your configuration
computer
OR
•
been provided with a current software package via a remote
server.
Ask your dealer or distributor whether and how you can obtain a
software update.
! Under no circumstances should you disconnect the power
supply of the SINAUT MD740-1 during the update. The device
could be damaged and can only be reactivated by the
manufacturer.
If you have stored a current software update on your configuration
computer, proceed as follows:
1. Click on Browse... then select the file.
2. Click on Install Packages to load them into the device.
Depending on the size of the update, this procedure can take
several minutes.
If a reboot should be necessary following the system update, a
corresponding message will appear.
•
If you are provided with a current software update on a remote
server, the server's address must be set - see Features #
Update Server, page 69.
Proceed as follows:
1. Write the filename in the entry field.
68 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
2. Click on Install Package Set to load it into the device.
Depending on the size of the update, this procedure can take
several minutes.
If a reboot should be necessary following the system update, a
corresponding message will appear.
Features # Update Server
If you are provided with a software update (Features # Install
Update, page 68) for the SINAUT MD740-1 on a remote server,
enter the server's address here. This must always come before the
protocol used.
Examples: http://123.456.789.1 OR http: //www.xyz.com/update
SINAUT MD740-1
69 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Features # Software Information
Display only:
This lists the software modules contained in the device. These are
described as packets.
Serves update purposes: compare the displayed version numbers
with the current version numbers of the appropriate packets. To do
so, please contact your distributor.
Should new versions be available you can update the software in
the device. See Features # Install Update, page 68.
70 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Features # Hardware Information
Display only:
For experienced system administrators / support.
SINAUT MD740-1
71 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
4.7
Support menu
Support # Snapshot
This function serves support purposes.
It creates a compressed file (in tar format) containing all the current
configuration settings and log entries which could be relevant for a
fault diagnosis. (This file contains no private information such as
the private machine certificate or the passwords. However, any
used Pre-Shared Keys from VPN connections are contained in the
snapshots.)
To create a snapshot, proceed as follows:
1. Click on Download.
2. Store the file under the name snapshot.tar.gz
Make the file available to support if requested to do so.
72 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Support # Status
Display only:
Displays a summary of different status information for support
purposes:
Network mode
Operating mode of the SINAUT MD740-1: modem
External IP
The IP address of the SINAUT MD740-1 at its connection for
the external network (WAN or Internet).
Default gateway via external IP
The external IP address of the SINAUT MD740-1.
VPN (Total / Used / Up)
Possibilities: Total / Used / Up
Total :
total number of VPN connections set up
Used :
VPN connections used
Up :
VPN connections currently active
VPN User login
Possibilities: N/A / not logged in / logged in
N/A:
not available
not logged in : VPN closed
logged in :
VPN open
DynDNS registration
Possibilities: none / DynDNS server address / failure / trying
none :
no DynDNS server
DynDNS server address : address of the DynDNS server used
by the SINAUT MD740-1 to resolve
hostnames
failure :
the SINAUT MD740-1 is trying
unsuccessfully to connect to the
DynDNS server.
SINAUT MD740-1
73 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
trying :
the SINAUT MD740-1 is trying to
connect to the DynDNS server.
HTTPS remote access
Possibilities: no / yes
SSH remote access
Possibilities: no / yes
NTP state
Possibilities: synchronized / not synchronized
synchronized :
the SINAUT MD740-1 is receiving the
current time (Greenwich Mean Time) from a
time server via the Network Time Protocol.
not synchronized : the SINAUT MD740-1 is not connected to a
time server and therefore cannot provide
the current time.
Software version
Version of the software installed in the SINAUT MD740-1
System Uptime
Uptime since the last start-up of the SINAUT MD740-1
Language
Language currently set
74 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
4.8
System menu
System # Configuration Profiles
You have the possibility to save the settings of the
SINAUT MD740-1 as a configuration profile under any name in the
SINAUT MD740-1. You can create several such configuration
profiles. You can then activate whichever configuration profile you
require when using the
SINAUT MD740-1 in different operating environments.
Furthermore, you can save configuration profiles as files on the
hard disk of the configuration computer. Vice versa, you can upload
a configuration file created in this way to the
SINAUT MD740-1 and put it into effect.
In addition, you have the possibility to put the default setting (back)
into effect at any time.
! When a configuration profile is saved, password and user
names are not saved with it.
Save Configuration to Profile in the SINAUT MD740-1
1. Enter the required name in the field Name for the new
profile.
2. Click on the button Save Current Configuration to Profile.
SINAUT MD740-1
75 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Display / activate / delete a configuration profile saved in
the SINAUT MD740-1
Names of
configuration profiles
created (examples)
Prerequisite:
At least one configuration profile has been created and saved in
the SINAUT MD740-1 (see above).
Display configuration profile
Click on the name of the configuration profile.
Activate configuration profile
Click on the Restore button to the right of the configuration
profile concerned.
Delete configuration profile
Click on the Delete button to the right of the configuration profile
concerned.
Display / activate default setting
The default setting is saved as a configuration profile under the
name Factory Default in the SINAUT MD740-1.
Display: Click on the name Factory Default.
Activate: Click on the Restore button next to the name Factory
Default.
It is not possible to delete the Factory Default configuration
profile.
Save configuration profile as a file on hard disk
1. Click on the Download button next to the name of the
configuration profile concerned.
2. In the dialogue box displayed, determine the file name and
folder under/in which the configuration profile is to saved as
a file.
(You can give the file any name.)
76 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Upload configuration profile from hard disk to the SINAUT
MD740-1
Prerequisite:
Following the procedure described above, you have saved a
configuration profile as a file on the hard disk of the
configuration computer.
1. In the field Name for the new profile, enter the name for the
configuration profile to be uploaded.
2. Click on the Browse button and then select the file.
3. Click on the button Upload Configuration to Profile.
Consequence: the uploaded configuration is displayed in the
list of configuration profiles.
If the uploaded configuration profile is to be activated, click on
the Restore button next to the name.
System # Reboot
A reboot is required in the event of an error. It may also be
necessary after a software update.
At the end of the reboot the text "Rebooted" is displayed.
A reboot can also be effected by switching the device off and back
on again.
SINAUT MD740-1
77 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
System # Logs
Display only:
Displayed all recorded log entries (total log).
The format corresponds to that commonly used under Linux.
There are special evaluation programs which present the
information from the logged data in a more easily legible format.
You can transfer the log entries to an external server. See Services
# Remote Logging, page 61.
Following a reboot of the device, entries are already made in
the log file before the device can synchronize the system time.
In this case, the time stamps are not chronologically arranged.
The entries are, however, in chronological order.
78 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
4.9
CIDR (Classless InterDomain Routing)
IP netmasks and CIDR are notations which aggregates several IP addresses to form
one address range. A range of consecutive addresses is treated as a network.
The CIDR scheme reduces, for example, the routing tables stored in routers by means
of a postfix in the IP address. With this postfix, a network and the networks lying below it
can be denoted in a summarized form. The method is described in RFC 1518.
To advise a range of IP addresses to the SINAUT MD740-1, e.g. when configuring the
firewall, it may be necessary to give the address space in CIDR syntax. The following
table shows the IP netmask on the left, with the corresponding CIDR syntax on the far
right.
SINAUT MD740-1
79 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
IP netmask
binary
CIDR
255.255.255.255
255.255.255.254
255.255.255.252
255.255.255.248
255.255.255.240
255.255.255.224
255.255.255.192
255.255.255.128
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111110
11111100
11111000
11110000
11100000
11000000
10000000
32
31
30
29
28
27
26
25
255.255.255.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
255.255.224.0
255.255.192.0
255.255.128.0
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111110
11111100
11111000
11110000
11100000
11000000
10000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
24
23
22
21
20
19
18
17
255.255.0.0
255.254.0.0
255.252.0.0
255.248.0.0
255.240.0.0
255.224.0.0
255.192.0.0
255.128.0.0
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111110
11111100
11111000
11110000
11100000
11000000
10000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
16
15
14
13
12
11
10
255.0.0.0
254.0.0.0
252.0.0.0
248.0.0.0
240.0.0.0
224.0.0.0
192.0.0.0
128.0.0.0
11111111
11111110
11111100
11111000
11110000
11100000
11000000
10000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
00000000
0.0.0.0
00000000 00000000 00000000 00000000 0
Example: 192.168.1.0 / 255.255.255.0 corresponds to CIDR: 192.168.1.0/24
80 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
4.10 Network example diagram
The following diagram shows how the IP addresses could be distributed in a local
network with subnets, which network addresses result and what the specification of an
additional internal route could be in the SINAUT MD740-1.
GPRS/Internet
Address from outside: 80.81.192.37
(allocated by Provider)
TAINY GMOD-V2-IO
Internal address: 192.168.11.1
Net A
Netw. address: 192.168.11.0/24
Network mask: 255.255.255.0
Router
External IP: 192.168.11.2
Internal IP: 192.168.15.254
Network mask: 255.255.255.0
Net B
Netw. address: 192.168.15.0/24
Network mask: 255.255.255.0
Router
Router
External
External IP:
IP: 192.168.15.1
192.168.15.1
Internal IP: 192.168.27.254
Network mask: 255.255.255.0
Net C
Netw. address: 192.168.27.0/24
Network mask: 255.255.255.0
= Additional internal routes
SINAUT MD740-1
81 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Configuration
Network A
Computer
A2
A3
A4
A5
IP address
A1 internal routes
= Additional
192.168.11.3
192.168.11.4
192.168.11.5
192.168.11.6
192.168.11.7
Network mask
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
Computer
B1
B2
B3
B4
IP address
192.168.15.2
192.168.15.3
192.168.15.4
192.168.15.5
Network mask
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
Computer
C1
C2
C3
C4
IP address
192.168.27.1
192.168.27.2
192.168.27.3
192.168.27.4
Additional
internal routes
SINAUT
MD7401Network:
192.168.15.0/24
Gateway:
192.168.11.2
Network mask
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
Network B
Network C
Network:
192.168.27.0/24
Gateway:
192.168.11.2
Further settings of the routers, e.g. internal routers for communication from
Network B to Network C, are not taken into consideration in the above example.
82 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Integrated website showing device and connection data
Integrated website showing device and connection data
The SINAUT MD740-1 has an integrated Web server. The Web server provides a
website with information on device and connection data. There are different ways of
accessing the website using a Web browser:
•
locally via the service interface - see page 83
•
locally via the application interface (10/100 BASE-T connector) - see page 86
•
from a remote computer via the GPRS network (network-dependent) - see page 87.
5.1
Accessing the Web server locally via the service interface
Via dial-up
connection:
To address the SINAUT MD740-1 via its service interface the
following conditions must be fulfilled:
• The computer you intend to use must be connected to the
service interface of the SINAUT MD740-1 via one of its COM
ports.
•
Dial-up no.: *98#
User name.: service
Password: service
An appropriate dial-up connection must be set up on this
computer (see below). This must contain the following data:
- the character string for dialling up the service interface: *98#
- user name and password: service in each case
- modem or device via which the connection is to be established:
TAINY GMOD Service. The modem driver file must have been
installed previously (see below).
To install the modem driver under Windows XP, proceed as
Installing the
modem for access follows.
to the service
Installation under Windows 98 or Windows 2000 is done
accordingly
interface
! When using Windows 2000 or XP you must be registered as the
1.
2.
3.
4.
administrator. In this case, make sure that no other modem
drivers have been or are installed for the selected interface.
Click on Start, Control Panel so that the Control Panel
dialogue box appears.
Switch to "Classic View ".
Double-click on the Phone and modem options icon.
In the Phone and modem options dialogue box, click on the
Add... button in the Modems tab.
The Add New Hardware Wizard for the installation of a new
modem appears.
Follow the instructions of the Add New Hardware Assistant:
SINAUT MD740-1
83 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Integrated website showing device and connection data
Determine that you will select the modem yourself, i.e. that
automatic recognition does not take place.
When choosing the modem, select the file
TAINY_GMODService.inf.
This is located in the Drivers folder on the data carrier
supplied.
! If this dialogue box is displayed...
Click on Continue Anyway.
Creating the dial- To create the dial-up connection for the service interface, proceed
up connection for as follows:
the service
interface
Windows 2000:
1. Click on Start - Settings - Network and Dial-up connections Make New Connection to launch the Network Connections
Wizard.
2. Select Connect to the Internet, Set up my connection
manually..., Connect using a dial-up modem.
Follow the instructions in the dialogue boxes.
Make sure that no area codes or local access numbers are
entered.
84 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Integrated website showing device and connection data
Windows XP:
1. Click on Start - Control Panel: in classic view, double-click on
Network and Internet connections, then click on Create a
New Connection to launch the New Connections Wizard.
2. Select Connect to the Internet, Set up my connection
manually, Connect using a dial-up modem.
Follow the instructions in the dialogue boxes.
Make sure that no area codes or local access numbers are
entered.
1. Double-click on the dial-up connection icon that has been
Making a
created for the CSD dial-up.
connection to the
SINAUT MD740-1
The Make a connection dialogue box appears.
website
The user name and password are both: service
2. Click on Select.
Effect:
User name.: service
The computer is connected to the SINAUT MD740-1 in such a
Password: service
way that the integrated Web server can be addressed.
3. Start your Web browser, e.g. MS Internet Explorer.
Enter the address of the internal website in the browser's
address line. The address is:
http://192.168.0.8
Effect:
The start page of the website stored in the
SINAUT MD740-1 is displayed - see The website of the
SINAUT MD740-1 page 88.
4. Click on the hyperlink of the required HTML pages to view
them.
5. Then close the dial-up connection.
Closing the
service
connection
In the Info section in the bottom right corner of the screen, rightclick on the connection icon and then click on Close
connection in the opened menu.
SINAUT MD740-1
85 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Integrated website showing device and connection data
5.2
Accessing the Web server locally via the application interface
(10/100 BASE-T connector)
Prerequisites
•
A GPRS connection must be active, i.e. the LED C of the
SINAUT MD740-1 is lit and indicates that an IP address has
been assigned by the GPRS network.
•
NAT must take place for the address of the locally connected
computer that is to access the internal website (see Firewall #
NAT, page27).
•
The firewall of the SINAUT MD740-1 must allow the data
packets that the locally connected computer sends to the Web
server of the SINAUT MD740-1 to pass (see Firewall #
Outgoing, page 29)
Example:
If the computer you are also using for the configuration of the
SINAUT MD740-1 (own address 192.168.1.2) is to have access
to the website stored in the SINAUT MD740-1, the settings are,
for example, as follows:
Setting for Firewall # NAT:
Possible address entries: 192.168.1.2 or 192.168.1.0/24
Setting for Firewall # Outgoing:
Prot. From IP
From Port To IP
TCP 192.168.1.2
To Port
Action
any
192.168.0.8 any
Accept
any
192.168.0.8 any
Accept
or
TCP 192.168.1.0/24
1. Start your Web browser, e.g. MS Internet Explorer.
Making a
connection to the
Enter the address of the internal website in the browser's
SINAUT MD740-1
address line. The address is:
website
http://192.168.0.8
Effect:
The start page of the website stored in the
SINAUT MD740-1 is displayed - see The website of the
SINAUT MD740-1 page 88.
2. Click on the hyperlink of the required HTML pages to view
them.
86 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Integrated website showing device and connection data
5.3
Accessing the Web Server of the SINAUT MD740-1 from a remote
computer via the GPRS network
Prerequisites
•
Access is dependent on the configuration of the GPRS network
and on how your LAN is linked to the GPRS.
•
A GPRS connection to the remote SINAUT MD740-1 must be
active, i.e. the LED C of the
SINAUT MD740-1 is lit and indicates that an IP address has
been assigned by the GPRS network.
1. Start your Web browser, e.g. MS Internet Explorer.
Making a
connection to the
Enter the external address of the SINAUT MD740-1 in the
SINAUT MD740-1
browser's address line.
website
Effect:
The start page of the website stored in the
SINAUT MD740-1 is displayed - see The website of the
SINAUT MD740-1 page 88.
2. Click on the hyperlink of the required HTML pages to view
them.
SINAUT MD740-1
87 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Integrated website showing device and connection data
5.4
The website of the SINAUT MD740-1
To be able to view the website of the SINAUT MD740-1 with a Web
browser the appropriate preparatory measures must be taken,
depending on whether you want to access the website with your
Web browser
• locally via the service interface (see page 83)
•
•
locally via the application interface (10/100 BASE-T connector)
(see page 86)
OR
from a remote computer via the GPRS network (networkdependent) (see page 87).
When you enter the address http://192.168.0.8 (or the external IP
address of the device if you are accessing the website from a
remote computer, see page 87) in your Web browser the start page
of the website of the SINAUT MD740-1 appears.
By clicking on the appropriate hyperlink you can have the
corresponding HTML page displayed in the browser.
88 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Integrated website showing device and connection data
Device Information page
If you wish to view this page click on the Device Information hyperlink on the
start page.
Explanation of terms:
Firmware version:
Date of firmware:
Website version:
Date of website:
Service IP:
Web/Ftp-IP:
Version of the firmware currently in the device
Date of the last firmware update
Version of the HTML files in the device
Date on which the HTML pages were created
IP address of the service interface
IP address of the internal Web and FTP server
GSM module data
IMEI:
IMSI:
Own numbers:
(1..6):
International Mobile station Equipment Identity. Unique,
unchangeable CODE which is assigned to the internal mobile
module (device number).
International Mobile Subscriber Identity. The IMSI serves to
uniquely identify subscribers in wireless and wire-based
communications services in accordance with Internal
Telecommunication Union (ITU) standards. In the case of mobile
phones the IMSI is stored on the SIM card.
The (own) telephone numbers stored on the SIM card.
If available the voice, data and fax numbers are displayed.
SINAUT MD740-1
89 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Integrated website showing device and connection data
Session Statistics and Total Statistics pages
If you wish to view these pages click on the Session Statistics or Total
Statistics hyperlink on the start page.
Then perform the Refresh command in the browser to load the current data.
Information on the PPP layer is displayed on the left, for the IP layer on the right.
Explanation of terms:
PPP layer (PPP - Point-to-Point-Protocol)
Packets:
Received: Number of PPP frames (data packets) received
Sent: Number of PPP frames sent
Total: Sum total of all PPP frames sent and received during the online
connection
Invalid: Number of incorrect (invalid) PPP frames
Bytes:
Received: Number of data bytes received within a PPP frame
Sent: Number of bytes sent in a PPP frame
Total: Sum total of all bytes sent and received at PPP level
Invalid: Number of incorrect bytes
Online time: Specifies the duration of the current GPRS connection.
Displayed as "Hours.Minutes.Seconds“.
90 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Integrated website showing device and connection data
IP layer (IP - Internet Protocol)
Packets:
Received: Number of IP frames received
Sent: Number of IP frames sent
Total: Sum total of all IP packets sent and received during the online
connection
Invalid: Number of incorrect (invalid) IP frames
Bytes:
Received: Number of data bytes received within an IP frame
Sent: Number of bytes sent in an IP frame
Total: Sum total of all bytes sent and received at IP level during the
online connection
Invalid: Number of incorrect bytes within an IP packet
Device IP: The IP address which the SINAUT MD740-1 has received from
the network provider on establishment of the connection into the
GPRS network. This dynamic IP address is assigned to the device
and is the IP address for incoming data packets. It can be
assumed that the SINAUT MD740-1 is (dynamically) assigned a
different IP address by the provider each time it connects to the
GPRS network.
SINAUT MD740-1
91 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Integrated website showing device and connection data
Status Information page
If you wish to view this page click on the Status Information hyperlink on the
start page.
This page provides information on the GSM network and the network operator.
Explanation of terms:
GSM information:
Cell ID:
The Cell ID is a unique identification number for a cell.
APN:
Access Point Name. A logical, defined interface on the GGSN
which establishes a connection to the desired service (e.g.
Internet, Wap, corporate network, …)
GSM network:
Operator:
Signal quality:
GPRS-Attach:
Name of the network operator. (e.g. T-D1 etc. ...)
This number specifies the current signal quality of the connection
in the GPRS network.
The meanings of the displayed values are shown in the table
below.
Signal quality
(value)
Meaning/Signal
-113dBm or worse
-111dBm
2...30
-109dBm to -53dBm
31
-51dBm or better
99
cannot be read / unknown
Yes or No is used to specify whether or not the
SINAUT MD740-1 is booked into the GPRS network.
Yes
booked in (Attach)
No
not booked in
92 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Firmware update via the integrated FTP server
Firmware update via the integrated FTP server
The SINAUT MD740-1 has an integrated FTP server (FTP = File Transfer Protocol).
This can be used to load an update - if available - of the communication software into
the SINAUT MD740-1.
We recommend using an FTP program (downloadable as Freeware from the Internet) to
establish a connection with the FTP server of the SINAUT MD740-1.
To establish an FTP connection, proceed as follows:
Prerequisite:
The firmware file is located on the service PC
1. To make a connection to the FTP server of the
SINAUT MD740-1, proceed exactly as when accessing the Web
server
•
locally via the service interface - see page 83
•
locally via the application interface (10/100 BASE-T
connector) - see page 86
•
from a remote computer via the GPRS network (networkdependent) - see page 87.
2. Instead of a Web browser, start an FTP program.
Enter as follows
Address:
192.168.0.8 (or external IP address, see
page 87).
User name:
service
Password:
service
Example: You are using the FTP program of the Windows
operating system. Click on Start, Run. After Open, enter: ftp
192.168.0.8 You will then be asked to enter the user name and
the password.
3. When the connection has been established, load the firmware
file (*.bin, e.g. gprsvpn.bin) into the SINAUT MD740-1.
After the firmware file has been transferred, load the file !cmdfile
into the device. This is the command for the SINAUT MD740-1
to accept the firmware.
4. Finally, close the FTP connection using the FTP program.
SINAUT MD740-1
93 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Glossary
Glossary
AES
The NIST (National Institute of Standards and Technology) has
been developing the AES encryption standard jointly with industrial
companies for years. This # symmetrical encryption is designed to
replace the previous DES standard. The AES standard specifies
three different key sizes with 128, 192 and 256 bits.
In 1997, the NIST launched the AES initiative and announced its
conditions for the algorithm. Of the encryption algorithms proposed,
the NIST short-listed five; the algorithms MARS, RC6, Rijndael,
Serpent and Twofish. In October 2000, the encryption algorithm
chosen was Rijndael.
APN (Access
Point Name)
Cross-network connections, e.g. from the GPRS network into the
Internet are established in the GPRS network via so-called APNs.
In ternet
APN
GPRS
terminal
APN
Priv ate
In tranet
A terminal wishing to establish a connection via the GPRS network
specifies the network with which it wishes to be connected via the
APN:
•
the Internet,
•
a private corporate network connected via a dedicated line.
The APN denotes the point of access to the other network.
94 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Glossary
Asymmetrical
encryption
In asymmetrical encryption, data are encrypted with one key and
decrypted with a second key. Both keys are suitable for encryption
and decryption. One of the keys is kept secret by its owner (Private
Key), the other is issued to the public (Public Key), i.e. possible
communication partners.
A message encrypted with a Public Key can only be decrypted and
read by the recipient who has the corresponding Private Key. A
message encrypted with the Private Key can be decrypted by any
recipient who has the corresponding Public Key. Encryption with
the Private Key shows that the message actually originates from
the owner of the corresponding Public Key. We therefore speak of
a digital signature.
Asymmetrical encryption methods such as RSA are, however, slow
and vulnerable to certain attacks, which is why they are often
combined with a symmetrical method (# symmetrical encryption).
On the other hand, concepts are also possible which avoid the
complex administration of symmetrical keys.
DynDNS provider Also Dynamic DNS provider. Each computer that is connected to
the Internet has an IP address (IP = Internet Protocol). An IP
address consists of 4 numbers, separated by dots, which can each
have up to three digits. If the computer is online using a telephone
line via modem, ISDN or ADSL, it is dynamically assigned an IP
address by the Internet service provider, i.e. the address changes
from one session to another. Even if the computer is online for 24
hours without interruptions (e.g. with a flat rate) the IP address is
changed from time to time.
If a local computer is to be accessible via the Internet it must have
an address which is known to the remote communication partner.
Only in this way can the communication partner establish a
connection to the local computer. However, if the address of the
local computer continually changes this is not possible, unless the
operator of the local computer has an account with a DynamicDNS
provider (DNS = Domain Name Server).
The operator can then determine a hostname with the provider at
which the computer is to be reached in the future, e.g.
www.xyz.abc.de. In addition, the DynamicDNS provider provides a
small program which has to be installed and executed in the
computer in question. In each Internet session of the local
computer this tool informs the DynamicDNS provider of the
computer's current IP address. The provider's Domain Name
Server registers the current Hostname / IP address allocation and
informs other Domain Name Servers on the Internet accordingly.
If a remote computer now wants to establish a connection to the
local computer which is registered with the DynamicDNS provider,
the remote computer uses the local computer's hostname as the
SINAUT MD740-1
95 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Glossary
address. This establishes a connection to the responsible DNS
(Domain Name Server), where a scan is made for the IP address
which is currently allocated to this hostname. The IP address is
transferred back to the remote computer which now uses it as the
destination address. This now leads to exactly the desired local
computer.
Basically, all Internet addresses are based on this system: first, a
connection is established to the DNS in order to ascertain the IP
address assigned to this hostname. Once this has taken place, the
connection to the desired remote site, which can be any Internet
presence, is established with this "referenced" IP address.
TCP/IP
(Transmission
Control
Protocol/Internet
Protocol)
Network protocols which are used for the connection of two
computers in the Internet.
IP is the basic protocol.
UDP is based on IP and sends individual packets. These may
arrive at the recipient in a different order to that in which they were
sent, or they can even be lost.
TCP serves to protect the connection and, for example, ensures
that the data packets are forwarded in the correct order to the
application.
UDP and TCP, in addition to the IP addresses, include port
numbers between 1 and 65535, by means of which the different
services are distinguished.
UDP and TCP form the basis for a number of other protocols, e.g.
HTTP (Hyper Text Transfer Protocol), HTTPS (Secure Hyper Text
Transfer Protocol), SMTP (Simple Mail Transfer Protocol), POP3
(Post Office Protocol, Version 3), DNS (Domain Name Service).
ICMP is based on IP and contains control messages.
SMTP is an e-mail protocol based on TCP.
IKE is an IPsec protocol based on UDP.
ESP is an IPsec protocol based on IP.
On a Windows PC the WINSOCK.DLL (or WSOCK32.DLL) takes
over the handling of both these protocols.
(# datagram)
Service Provider
A company or institution which provides users with access to the
Internet or an online service.
96 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Glossary
Protocol,
transmission
protocol
Devices which communicate with one another must use the same
rules for this communication. They must "speak the same
language". Such rules and standards are collectively referred to as
a protocol or transmission protocol. Frequently used protocols are,
for example, IP, TCP, PPP, HTTP or SMTP. TCP/IP is the generic
term for all protocols based on IP.
Client / Server
In a client/server environment a server is a program or computer
which receives and answers queries from the client program or
client computer.
In data communication the term client is also used for the computer
which establishes a connection to a server (or host), i.e. the client
is the calling computer and the server (or host) is the called
computer.
PPPoE
Acronym for Point-to-Point Protocol over Ethernet. Based on the
standards PPP and Ethernet. PPPoE is a specification to connect
users by Ethernet to the Internet via a shared broadband medium
such as DSL, Wireless LAN or cable modem.
PPTP
Acronym for Point-to-Point Tunneling Protocol. This protocol was
developed by Microsoft, U.S. Robotics and others to transmit data
securely between two VPN nodes (# VPN) via a public network.
VPN (Virtual
Private Network)
A Virtual Private Network (VPN) connects several separate private
networks (subnets) via a public network, e.g. the Internet, to form a
shared network. Confidentiality and authenticity are ensured by
using cryptographic protocols. A VPN therefore provides an
inexpensive alternative to dedicated lines when it comes to setting
up a supraregional corporate network.
SINAUT MD740-1
97 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Glossary
DES / 3DES
The symmetrical encryption algorithm (# symmetrical encryption)
DES, originally developed by IBM and checked by the NSA, was
determined in 1977 by the American National Bureau of Standards,
the predecessor of today's National Institute of Standards and
Technology (NIST), as the standard for American government
institutions.
As this was the first standardized encryption algorithm of all, it
quickly established itself in industry and hence outside the USA.
DES works with a key length of 56 bits, which is no longer
considered secure due to the increase in computing power since
1977.
3DES is a variant of DES. It works with 3-times larger keys, i.e. 168
bits long. It is still considered secure today and is, among other
things, also part of the IPsec standard.
Private Key, PublicIn asymmetrical encryption algorithms 2 keys are used: a Private
key; Certification Key and a Public Key. The public key serves to encrypt data and
the private key to decrypt them.
(X.509)
The public key is provided by the future recipient of the data to
those who will send the data to him in encrypted form. The private
key is possessed only by the recipient and serves to decrypt the
received data.
Certification:
So that the user of the public key (for encryption) can be certain
that the public key conveyed to him really does come from the
entity that is to receive the data to be sent, certification can be
used: the verification of the authenticity of the public key and the
consequent link between the identity of the sender and his key is
performed by a Certification Authority or CA. This is done according
to the rules of the CA, for example by the sender being required to
appear in person. Following successful inspection the CA signed
the sender's public key with its (digital) signature. A certificate is
created.
An X.509 certificate makes a connection between an identity in the
form of an 'X.500 Distinguished Name' (DN) and a public key. This
connection is authenticated by the digital signature of an X.509
Certification Authority (CA). The signature - an encryption with the
signature key - can be checked with the private key issued by the
CA to the certificate holder.
98 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Glossary
NAT (Network
Address
Translation)
In Network Address Translation (NAT) - often also referred to as IP
Masquerading - an entire network is "hidden" behind a single
device, the NAT router. This device is usually a router. The internal
computers in the local network remain hidden with their IP
addresses when they communicate to the outside via the NAT
router. For the external communication partners only the NAT
router with its own IP address appears.
However, in order for internal computers to be able to communicate
direct with external computers (on the Internet) the NAT router
must change the IP datagrams passing from internal computers to
the outside and from the outside to an internal computer.
If an IP datagram is sent from the internal network to the outside
the NAT router changes the datagram's IP and TCP headers. It
replaces the source IP address and the source port with its own
official IP address and its own, previously unused port. To this end
it creates a table showing the correlation between the original
values and the new ones.
When receiving a reply datagram the NAT router recognises by
means of the destination port specified that the datagram is actually
intended for an internal computer. Using the table the NAT box
exchanges the destination IP address and the destination port and
forwards the datagram to the internal network.
Datagram
In the TCP/IP transfer protocol data are sent in the form of data
packets or datagrams. An IP datagram is structured as follows:
IP header
TCP/UDP
header
Data
(payload)
The IP header contains:
- the IP address of the sender (source IP address)
- the IP address of the recipient (destination IP address)
- the protocol number of the protocol of the next highest
protocol layer (according to the OSI layer model)
- the IP header checksum to check the integrity of the header
upon reception.
The TCP/UDP header contains the following information:
- the port of the sender (source port)
- the port of the recipient (destination port)
- a checksum for the TCP header and some information from
the IP header (e.g. source and destination IP address)
SINAUT MD740-1
99 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Glossary
IPSec
IP Security (IPSec) is a standard that makes it possible to ensure
the authenticity of the sender, the confidentiality and the integrity of
the data in IP datagrams by means of encryption. The components
of IPSec are the Authentication Header (AH), the Encapsulating
Security Payload (ESP), the Security Association (SA), the Security
Parameter Index (SPI) and the Internet Key Exchange (IKE).
When communication starts the computers involved clarify the
method used and its implications, e.g. Transport Mode or Tunnel
Mode.
In Transport Mode an IPSec header is inserted into each IP
datagram between the IP header and the TCP or UDP header. As
the IP header is not changed this mode is suitable only for a hostto-host connection.
In Tunnel Mode an IPSec header and a new IP header are inserted
in front of the entire IP datagram. This means that the original
datagram is contained, encrypted as a whole, in the payload of the
new datagram.
The Tunnel Mode is used in the VPN: the devices at the tunnel
ends perform the encryption and decryption of the datagrams, while
the datagrams themselves remain completely protected as they
pass through the tunnel, i.e. during transmission via a public
network.
Spoofing, antispoofing
In Internet terminology, spoofing means giving a false address. By
giving a false Internet address someone is pretending to be an
authorised user.
Anti-spoofing refers to mechanisms designed to detect or prevent
spoofing.
Symmetrical
encryption
With symmetrical encryption the data are encrypted and decrypted
using the same key. Examples of symmetrical encryption
algorithms are DES and AES. These are fast, but require complex
administration as the number of users increases.
Port number
The port number field is a 2-byte field in UDP and TCP headers.
Assigning port numbers serves to identify the different data streams
handled simultaneously by UDP/TCP. The entire data exchange
between the UDP/TCP and the application processes takes place
via these port numbers. The assignment of port numbers to
application processes takes place dynamically and randomly. Fixed
port number are assigned to certain frequently used application
processes. These are known as assigned numbers.
100 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Glossary
IP address
Each host or router on the Internet / Intranet has a unique IP
address (IP = Internet Protocol). The IP address is 32 bits (= 4
bytes) long and is written as 4 numbers (each in the region from 0
to 255) separated by dots.
An IP address consists of 2 parts: the network address and the
host address.
Network
address
Host address
All hosts in a network have the same network address, but different
host addresses. Depending on the size of the network concerned a distinction is made between Class A, B and C networks - the two
parts of the address can differ in length:
1st byte 2nd byte 3rd byte 4th byte
Class A
Net. addr.
Class B
Host addr.
Network addr.
Class C
Host addr.
Network addr.
Host addr.
Whether an IP address denotes a device in a Class A, B or C
network can be identified by the first byte in the IP address. The
following are fixed values:
Value of Bytes for the
Bytes for the host
1st byte network address
address
Class A
1-126
Class B
128-191
Class C
192-223
In terms of figures, there can only be a maximum of 126 Class A
networks in the world, with each of these networks encompassing a
maximum of 256 x 256 x 256 hosts (3 bytes address space). Class
B networks can occur 64 x 256 times and can each contain up to
65,536 hosts (2 bytes address space: 256 x 256). Class C
networks can occur 32 x 256 x 256 times and can each contain up
to 256 hosts (1 byte address space).
Subnet mask
Normally, a corporate network with access to the Internet is
officially assigned only one single IP address, e.g. 134.76.0.0. In
this address example it can be seen from the 1st byte that this
corporate network is a Class B network, i.e. the last 2 bytes can be
used freely for host addresses. In terms of figures, this results in
address space for 65,536 possible hosts (256 x 256).
SINAUT MD740-1
101 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Glossary
Such a huge network makes little sense. It becomes necessary to
form subnets. The subnet mask serves this purpose. Like an IP
address, this a field 4 bytes long. The value 255 is assigned to
each of the bytes representing the network address. This serves
mainly to "borrow" a part from the host address area in order to use
it to address subnets. In a Class B network, for example, (2 bytes
for the network address, 2 bytes for the host address) the 3rd byte,
which is normally reserved for the host address, can now be used
for subnet addresses by applying the subnet mask 255.255.255.0.
In terms of figures, this means that 256 subnets can be created,
each with 256 hosts.
X.509 Certificate
A kind of "seal" which proves the authenticity of a Public Key (#
asymmetrical encryption) and appendant data.
So that the user of the public key for encryption can be certain that
the public key conveyed to him really does come from its issuer
and hence from the entity that is to receive the data to be sent,
certification can be used. This verification of the authenticity of the
public key and the consequent link between the identity of the
issuer and his key is performed by a Certification Authority or CA.
This is done according to the rules of the CA, for example by the
issuer of the public key being required to appear in person.
Following successful inspection the CA signs the public key with its
(digital) signature. A certificate is created.
An X.509(v3) certificate therefore contains a public key, information
about the key owner (given as Distinguished Name (DN)),
permitted designated uses, etc. and the signature of the CA.
The signature is created as follows: from the bit sequence of the
public key, the data on its owner and other data, the CA creates an
individual bit sequence which can be up to 160 bits long, the HASH
value. This is encrypted by the CA using its private key and added
to the certificate. Encryption with the CA's private key is proof of
authenticity, i.e. the encrypted HASH character sequence is the
digital signature of the CA. Should the data of the certificate be
changed without authorization, the HASH value is no longer correct
and the certificate then becomes worthless.
The HASH value is also known as the fingerprint. As it is encrypted
with the private key of the CA, anyone in possession of the
corresponding public key can decrypt the bit sequence and thus
check the authenticity of the fingerprint or signature in question.
Involving certification authorities means that not every key owner
needs to know the other one, but only the certification authority
used. The additional key information also simplifies the
administrability of the key.
X.509 certificates are employed, e.g. in e-mail encryption, using
S/MIME or IPsec.
102 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Technical Data
Technical Data
Application Interface
10/100 Base-T (RJ45 plug)
Ethernet IEEE802
10/100 Mbit/s
Service Interface
DSUB-9 plug, PIN assignment RS232
Virtual Private Network
Protocol: IPSec (tunnel and transport mode)
Encryption: 3DES, AES, DES
Packet authentication: MD5, SHA-1
Internet Key Exchange (IKE), authentication: Pre-Shared
Key (PSK), X.509v3 certificates
NAT-T, DynDNS, Dead Peer Detection (DPD)
Firewall
Stateful Packet Inspection
Anti-Spoofing
NAT (IP Masquerading)
Port Forwarding
Other
DNS Cache, DHCP Server, NTP, Remote Logging
Management
Web based administration
Connection
GPRS: Multislot class 10;
Coding schemes: CS-1, CS-2, CS-3, CS-4
Transmission Power
Quad Band; GSM 850 MHz: max. 2 Watt, GSM 900
MHz: max. 2 Watt, DCS 1800 MHz: max. 1 Watt, PCS
1900 MHz: max. 1 Watt
Antenna Connection
Impedance nominal: 50 Ohm, socket: SMA
Power supply
Un 18-30 VDC
In 450-260mA ; Iburst = 1,3 A
Temperature range
Operating:
Storage:
Humidity:
Mechanics
Construction:
Material:
Protection class:
Dimensions:
Weight:
Approvals
CE
R&TTE (GSM)
GSM/GPRS engine with GCF approval
EMV/ESD:
EN 55024
EN 55022 Class A
EN 61000-6-2
Electrical safety:
EN 60950
-20 °C up to +50 °C
-40 °C up to +85 °C
0-95 %, not condensing
top-hat rail housing
synthetic material
IP20
114 mm x 45 mm x 99 mm
approx. 280g
SINAUT MD740-1
103 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Technical Data
Pin assignment interface Service
Signals
(Signal direction DTE)
Pin1
DCD
Pin2
RXD
Output
Pin3
TXD
Input
Pin4
DTR
Input
Pin5
GND
Signal ground
Pin6
DSR
Output
Pin7
RTS
Input
Pin8
CTS
Output
Pin9
RI
Output
SUB-D9 socket, Pin assignment RS232
Output
Pin assignment interface 10/100 BASE-T
Signals
(Signal direction DTE)
Pin1
RD+
Pin2
RD-
Pin3
TD+
Pin4
Not connected
Pin5
Not connected
Pin6
TD-
Pin7
Not connected
Pin8
Not connected
RJ45 socket - Ethernet
104 von 105
SINAUT MD740-1
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn
Copyright Statement
The information contained in this publication is protected by copyright. Translations,
reproduction, copying and storage in data processing systems require the explicit
approval of SIEMENS AG.
© 2005 SIEMENS AG
All rights reserved.
SIEMENS Automation and Drives
www.siemens.de
Specifications are subject to change without notice.
Product no.
3172
Doc. no.
3172AD001 Rev. 1.1
SINAUT MD740-1
105 von 105
File
3172AD001_V1_1_060206.doc
File saved
06.02.2006
File printed
06.02.2006
State
Freigabe
Autor
Pauluhn

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
Create Date                     : 2006:02:06 11:14:58
Producer                        : Acrobat Distiller 4.05 for Windows
Modify Date                     : 2006:02:06 11:16:07+01:00
Page Count                      : 105
EXIF Metadata provided by EXIF.tools
FCC ID Filing: LYHMD740-1

Navigation menu