Wave Wireless Networking SLTM Wireless Lan User Manual speedlan xe 3000 6000 manual ver 3 3

Wave Wireless Networking Wireless Lan speedlan xe 3000 6000 manual ver 3 3

users manual

Download: Wave Wireless Networking SLTM Wireless Lan User Manual speedlan xe 3000   6000 manual ver 3 3
Mirror Download [FCC.gov]Wave Wireless Networking SLTM Wireless Lan User Manual speedlan xe 3000   6000 manual ver 3 3
Document ID106120
Application IDyZe3z1qfOketEFn/cxxqXQ==
Document Descriptionusers manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize66.42kB (830275 bits)
Date Submitted2000-06-21 00:00:00
Date Available2000-10-04 00:00:00
Creation Date2000-06-21 10:02:28
Producing SoftwareAcrobat Distiller 4.0 for Windows
Document Lastmod2000-06-21 10:04:43
Document Titlespeedlan xe 3000 & 6000 manual ver 3.3
Document CreatorAdobe PageMaker 6.52
Document Author: DFatone

SPEEDLAN
TM 6000
OPERATOR’S MANUAL
Version 1.0
Last revised June, 2000
941-358-9283
941-355-0219 FAX
800-721-9283
www.speedlan.com
sales@speedlan.com
Division
1748 Independence Blvd. C-5
Sarasota, FL 34234
SPEEDLAN TM
PRODUCT LICENSE AGREEMENT
It is important for users of Wave Wireless hardware and software to take time to read this License Agreement associated with this software PRIOR TO ITS USE.
The Customer or Reseller has paid a License fee to Wave Wireless for use of this software on one bridge or bridge/router. This License does not extend to any
copyrights to the program nor does it license use of the program on more than one bridge or bridge/router nor to make copies of the program for distribution or resale.
A product registration card is included with the product manual. Please complete the card within 10 days of receipt of the software/hardware and return it to Wave
Wireless. Registration is required for warranty service, technical support and notification of product updates and revisions.
License Agreement: The Customer or Reseller is granted a non-exclusive License to use the licensed program on a single bridge or bridge/router subject to the terms
and conditions as set forth in this agreement. The Customer or Reseller may not copy, modify or transfer the reference manual or other documentation or any copy
thereof except as expressly provided in this agreement.
The Copyright and all intellectual/industrial rights of this program and associated material remain the property of Wave Wireless. THE CUSTOMER OR
RESELLER MAY NOT USE, COPY, SUBLICENSE, ASSIGN OR TRANSFER THE LICENSED MATERIALS OR ANY COPIES THEREOF IN
WHOLE OR IN PART, EXCEPT AS EXPRESSLY PROVIDED IN THIS LICENSE AGREEMENT. The Customer or Reseller shall not reverse assemble
or reverse compile the Licensed product or any copy thereof in whole or in part.
RETURN POLICIES AND WARRANTIES
Initial One Year Warranty Term:
Each Wave Wireless product is warranted against defects in material and workmanship for a period of one year from date of shipment. During the warranty period Wave
Wireless will, at its option, repair or replace products that prove to be defective.
If equipment fails, the Customer or Reseller shall notify Wave Wireless and request a Return Material Authorization (RMA) number. For warranty service or repair,
this product must be returned to Wave Wireless. All returns to Wave Wireless MUST have a valid RMA number written clearly on the outside of the box or
the shipment will be refused. The buyer shall pay all return shipping charges during the one-year warranty. All outbound shipments will be made via
ground shipment by Wave Wireless or via air courier with the customer’s account number with the exception of Extended/“Spare in the Air” Warranty
holders.
Extended Warranty Policies (Includes “Spare in the Air”)
At any time during the first year following an equipment purchase, an Extended Warranty Policy may be purchased for 10% of the original list price. Terms of the
Extended Warranty include “Spare in the Air” privileges to allow the use of parts or a spare unit temporarily.
“Spare in the Air” Loaner Unit or Parts Replacement Policies
For an additional 10% of list price, the customer may purchase a “Spare in the Air” policy. This policy gives the customer the right to a loaner replacement unit
shipped within 24 hours of acceptance of the RMA by Wave. All outbound shipments will be made via overnight air courier (during the first year).
“Spare in the Air” Policy Steps for Warranty or Extended Warranty Loaner Service:
1.
Customer obtains RMA approval
2.
Overnight shipment of spare unit or parts to customer within 24 hours of approved RMA. Customer swaps unit or part(s) with phone assistance, if required.
3.
Customer returns part(s) to Wave Wireless. All returns to Wave Wireless MUST have a valid RMA number written clearly on the outside of the box or
the shipment will be refused.
4.
After 14 days from the issuance of an RMA, an invoice for the list price of the unit or components will be issued for any equipment that has not been returned.
This will be credited upon the return of the defective or replacement part or unit to Wave Wireless.
Extended Warranty Pricing Schedule
1st year: 10% of published equipment list price
2nd year: 15% of published equipment list price
3rd year: 15% of published equipment list price
*If all three years are purchased simultaneously, the cost will be 10% per year or 30% of list.
Years 2 & 3 can be purchased during the initial year of coverage if the equipment was under extended warranty during the first year or if a physical on-site equipment
inspection is performed and equipment is evaluated in warrantable condition by Wave Wireless personnel at prevailing or site service call rates.
Onsite Services
Onsite services for troubleshooting and repair are billed at daily rate, plus expenses, unless otherwise agreed upon. Use of spectrum analyzers or other test equipment
may raise the daily rate.
Rental Unit Loaner
Customer may rent a unit at an agreed upon daily rate, plus shipping expenses, in lieu of purchasing a spare or “Spare in the Air” policy. Rental days are counted
from date shipped until the date the unit is received in return by Wave Wireless.
Refurbishing Fees
Any product returned that requires refurbishing, is damaged due to inadequate or improper packaging protection, or that has not been returned with original packing
materials may be subject to a refurbishing fee.
Bench Test and Repair Time
A unit is returned as defective and through bench testing is determined that the unit is not defective, Wave Wireless, at its discretion, may charge bench test time at
a rate of $85 U.S. per hour for testing and troubleshooting. Out of warranty repairs will be performed at a rate of $85 U.S. per hour plus parts. All shipping charges
will be the responsibility of the customer.
SPEEDLAN TM
Return for Credit
All returns to Wave Wireless MUST have a valid RMA number written clearly on the outside of the box or the shipment will be refused. No returns for credit
after 30 days will be approved. Products must be returned undamaged and in original packaging or they will be subject to a minimum 20% restocking/refurbishing
fee. Return freight charges must be prepaid. At the option of Wave Wireless, products may be returned for repair or replaced provided the goods have not been modified
or repair attempted by someone other than Wave Wireless.
Limitation of Warranty
The foregoing warranty shall not apply to defects resulting from improper or inadequate maintenance by the buyer, buyer supplied interfacing, unauthorized
modification or misuse, operation outside of the environmental specifications for the product, or improper site preparation or maintenance. Systems must be protected
from electrical brownouts and surges by a quality UPS such as an APC Smart brand or Tripp Lite Omni or similar, or warranty shall be null and void.
Warranties do not apply to any product that has been (i) altered, except expressly approved by Wave Wireless in accordance with its instructions, (ii) damaged by
improper electrical power or environment, abuse, misuse, accident, or negligence. Repairs in the case of damage from “acts of God” are covered on a time and materials
basis. The warranty shall not apply if Wave Wireless prebuilt U.S. FCC approved antenna assemblies have been altered and installed by any persons other than
professional wireless installers.
THE FOREGOING WARRANTIES ARE EXCLUSIVE REMEDIES AND ARE IN LIEU OF ALL OTHER WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING, WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
No statement, including, without limitation, representations regarding capacity, suitability for use or performance of products, whether made by Wave Wireless
employees or otherwise, shall be deemed to be a warranty by Wave Wireless for any purpose or give rise to any liability for Wave Wireless unless expressly contained
in writing. Resellers will have complete responsibility and liability for performance of its agreements with its customers and Resellers shall indemnify and hold Wave
Wireless harmless from and against all liability arising out of such agreements.
Wave Wireless warrants that the firmware for use with the unit will execute its programming instructions when properly installed on the unit. Wave Wireless does
not warrant that the operation of the unit or firmware will be uninterrupted or error-free. Wave Wireless shall not be obligated to remedy any software defect that cannot
be repeated.
Wave Wireless is not responsible for equipment non-performance due to outside radio interference caused by any source.
Exclusive Remedies
The remedies provided herein are the buyer’s sole and exclusive remedies. Wave Wireless shall not be liable for any direct, indirect, special, incidental or consequential
damages, whether based on contract, tort or any legal theory.
OTHER IMPORTANT STATEMENTS AND WARNINGS
Copyright/Liability
SPEEDLAN TM . Copyright ©1999/2000 SPEEDCOM International Corporation, dba Wave Wireless Networking, All rights reserved. No part of this publication
may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form by any means without the written permission
of SPEEDCOM International Corporation, dba Wave Wireless Networking.
SPEEDCOM International, dba Wave Wireless Networking shall not be liable for errors contained herein or for incidental or consequential damages in connection with
the furnishing, performance, or use of this material. SPEEDCOM International, dba Wave Wireless Networking reserves the right to revise this publication from time
to time and make changes in content without obligation to notify any person of such revision changes.
Contents of this publication may be preliminary and/or may be changed at any time without notice and shall not be regarded as a warranty.
Trademarks
Wave Wireless Networking’s name and all trademarks in this document are property of SPEEDCOM International Corporation, except for Microsoft®
Corporation Windows 95®, Windows 98®, and Windows NT®.
FCC STATEMENT (FOR USA ONLY)
FEDERAL COMMUNICATIONS COMMISSION
Radio Frequency Interference Statement for Spread Spectrum Devices
Warning: This equipment generates, uses, and can radiate radio frequency energy. If it is not installed and used in accordance with the instruction manual, it may
cause interference to radio communications. It has been tested and found to comply with the limits for a Class A computing device pursuant to Part 15 of FCC Rules,
which are designed to provide reasonable protection against such interference when operated in a commercial environment. Operation of this equipment in a residential
area is likely to cause interference, in which case the user at his own expense will be required to take whatever measures may be required to correct the interference.
Electronic Emission Notices
All the spread spectrum devices sold in this catalog comply with Part 15 of the FCC rules.
Operation is subject to the following two conditions:
1.
This device may not cause harmful interference.
2.
This device must accept any interference received, including interference that may cause undesired operation.
If this equipment causes interference to radio reception (which can be determined by unplugging the power cord from the equipment) try these measures: (1) Re-orient
the receiving antenna, (2) Relocate the equipment with respect to the receiver, (3) Plug the equipment and receiver into different branch circuits, or (4) Consult your
dealer or an experienced technician for additional suggestions.
DANGER!!!
Rooftop or tower antenna installations are extremely dangerous and incorrect installation may result in injury, damage, or death. Rooftop and tower
installations must be performed by professional antenna installers only.
SPEEDLAN TM
Table of Contents
1. INTRODUCTION........................................7
Features and Benefits..............................9
Features Chart........................................10
2. USING CONFIGURATOR.......................11
Installation and Description.....................13
3.CONFIGURING SPEEDLAN TM..............15
General Setup.........................................17
Interface and Advanced Interface .........20
The Setup Buttons...................................21
Transport Methods .............................22
4. BRIDGING SETUP...................................25
Protocol Filtering.....................................27
Ethernet Protocols................................27
MAC Filtering.........................................28
Permit Ethernet Multicasts......................28
Permit Ethernet Broadcasts.....................29
Storm Thresholds....................................29
Tunnel Partners......................................30
5. SETTING UP THE IP ADDRESSES (IP
HOST SETUP)..................................33
Quick Overview of IP Addressing .........34
Setting Up the IP Address......................42
Physical (Static) Setup...............42
DHCP Client & Interface.......... 44
DHCP Server on SPEEDLAN. 45
Setting Up NAT.....................................47
Incoming NAT.......................................47
Outgoing NAT...........................................49
6. IP-ROUTER SETUP..................................53
IP-Router Setup.......................................54
RIP Routing..............................................56
7. SNMP SETUP.............................................59
8. SYSTEM ACCESS SETUP......................63
9. SNMP MONITORING..................................67
Remote Statistics......................................69
Interface Monitor......................................71
SNMP Monitor.........................................72
IP Monitor................................................73
IP/TCP/UDPMonitor................................76
ICMP Monitor.........................................78
9. TABLES.......................................................83
System Information....................................85
Bridge Learn Table...................................86
IP ARP Table...........................................87
IP Route Table.........................................88
IP/TCP Connection Table........................90
IP/UDP Listener Table.............................91
Local - IP Address Table.........................92
10. APPENDIX..............................................93
Common Ethernet Protocols...................95
Common Ethernet Vendor Addresses....98
Common Ethernet Multicast Addresses.113
Common Ethernet Broadcast Addresses.116
SPEEDLAN TM
INTRODUCTION
SPEEDLAN TM
Features and Benefits
Transparent Ethernet Bridging with Advanced Filtering for Security and Network Reliability
SPEEDLAN TM supports what is known as Transparent Ethernet Bridging with no Spanning Tree or Source
Routing support. Since the brouter contained in the SPEEDLAN TM is intended to provide network security
between a local LAN and a campus or enterprise wide network, and since using multiple bridges in a Spanning
Tree could compromise this security, the Spanning Tree scenario is not supported. In addition to the Transparent
Ethernet Bridging, the SPEEDLAN TM can drop (i.e., not forward) packets based upon the encapsulated higher
layer data within the packet. It is this option that gives SPEEDLAN TM the ability to perform advanced firewall
filtering and can add a significant measure of security and network reliablility to a network, surpassing that
provided by modern multiprotocol routers.
IP Routing with Advanced Filtering for Security
The SPEEDLAN TM supports IP Routing in addition to bridging. It can be used to add routing capability when an
IP router may be a more appropriate choice.
SPEEDLAN TM
Features Chart
Hardware Supported
10/100BASE-T Ethernet Card
SPEEDLAN Wireless Radio
Bridging Features
Transparent Bridging
Filtering by Ethernet Multicast, Broadcast and Bad Packets
Filtering by Protocol
Filtering by Ethernet Address Pair
Generic Ethernet Tunneling through IP Networks
Learned Table Lockdown
Expanded IP ARP Support
Automatic Broadcast Storm Protection and Notification
SNMP Features
IP “ping” Support
IP SNMP Support (MIB II, Ethernet, Inteface, SNMP, and Bridge MIB)
IP SNMP WaveLAN
IP SNMP Trap Support
SNMP Access Lists
IP-Router Features
IP Static Routing with Direct and Static Routes
ICMP Messages, Default Router, and Subnet Support
SNMP Support for All Router-Related MIB Variables
RIP Support
Encryption Features (Add-on Option)
Data Encryption of Wireless Packets
10
SPEEDLAN TM
USING CONFIGURATOR
11
SPEEDLAN TM
Windows 95/98/NT 4.0 SPEEDLAN TM Configurator
Installing the Windows SPEEDLAN TM Configurator
1. Shut down all programs and applications.
2. Note: The SPEEDLAN TM Configurator uses digital libraries, which reside on your Windows 95/
98/NT 4.0 PC. If a program or application is open, the Setup will not install correctly. If the
configurator is not installed correctly, the brouter could be rendered and inoperable after saving a
configuration.
3. Insert the CD into your floppy drive (i.e., Drive E, F, etc.).
4. If the setup.exe program does not install automatically, click Start + Run. The Run dialog box
appears. Click Browse and locate the setup.exe where your CD-ROM drive is located. Then,
click Open and OK.
5. Follow the installation prompts.
6. After the installation is complete, restart your computer.
Note: Visit the web site for the newest SPEEDLAN TM Configurator.
File Menu
The Windows 95/98/NT 4.0 Configurator will configure either a remote Flash ROM in the SPEEDLAN unit
or configure a SPEEDLAN file saved on your computer. You can configure a SPEEDLAN file on your
computer and download it to the brouter later after you have verified that all settings are correct. This can make
reconfiguring your SPEEDLAN TM a quick operation if you have the completed configuration already saved
to your computer.
Configuring a Remote SPEEDLAN TM
To configure a remote (network attached) brouter, you can use the Open Remote Config and Save functions.
You must have a remote SPEEDLAN TM configuration opened with the Configuration Utility before any
configuration functions may be performed. After you have opened the remote device and configured it, you can
then save your configuration back to the open device. When you ‘Save’ back to the remote device, its Flash
ROM will be erased and then reprogrammed with the new configuration. After you save the configuration, you
must wait the required 15-second period to allow the Flash ROM to be fully programmed and let the bridge
reboot with the new configuration. Turning off the SPEEDLAN TM or otherwise interrupting the reprogramming of the Flash ROM will damage the programming of the brouter, and render it inoperable.
Note: Anytime you make changes in Frequency, IP Routing, or Network ID, start with the brouter
furthest away from your current location. This will help avoid loss of communication between units.
Configuring a Saved Configuration File
To configure a saved CNF file (configuration file), open it from the file menu using the open function. You then
configure the file just as if you were configuring a remote SPEEDLAN TM. When you are finished configuring
the file, save it to disk from the file menu using the “Save Config File as...” function. The “Open Remote
Config...” and “Save Config” functions are used for accessing and saving directly to the brouter without using
a file saved on diskette. Be careful when you save the configuration file that you do not save the configuration
directly to the SPEEDLAN TM; otherwise, you will be configuring the brouter and may not be able to reaccess it after uploading the incorrect configuration to it.
13
SPEEDLAN TM
Exporting and Importing a Configuration
Once you have opened a remote brouter, you can take a “snapshot” of the current configuration with the
“Save Config as...” function. This function will result in creating a CNF file. The extension .CNF is used to
denote the special exported binary configuration file. The CNF file created with the “Save as...” function can
later be imported into another brouter by using the “Import Config File” function, then saving the configuration
to the brouter using the “Save Config” function.
The Toolbar
Open
Open Remote
Save
Select Device
Save Remote Upload Software
Help
System Information
Below the menus you see a row of seven icons. Each icon depicts a function that can also be accessed from the
menus.
The File Menu
Open Config File - This function is used to open a configuration file from disk.
Open Remote Config - This opens the configuration file directly from a remote device.
Save Config - Saves the configuration you are working on to the place where you opened it.
Save Config File as - Saves the current configuration into a file on disk. This file will have the extension .CNF.
Import Config File - This opens a configuration file from disk. This function is used when you are going to save
the configuration from disk to a remote brouter.
Upload Software - This function is to load a raw and unconfigured binary file to the brouter. This is done only
in the event that the brouter’s firmware has been damaged.
Reboot Remote - Use this function to reboot a brouter from a remote location.
Exit - Closes the SPEEDLAN TM Configuration program.
14
SPEEDLAN TM
CONFIGURING SPEEDLAN TM
15
SPEEDLAN TM
General Setup Menu
The third menu from the left is the Setup Menu. In this menu are the screens you will use to configure your
brouters. Below are descriptions of the menu items and the settings found on their respective screens.
General Setup
Enable Bridging - The transparent bridging function will be enabled when this is item is checked. If you want
the brouter to perform the bridging function,you must enable this. When bridging is enabled, the Bridge Setup
Screen will be accessible. Bridging should be enabled for nearly all applications of the brouter. Default is on.
(This function should never be disabled.)
Enable IP Routing - The transparent routing function will be enabled when this is item is checked. IP Routing
will work properly only if the routes are set up in the IP Route Menu. If the routes are not set up properly
before you save the configuration, the bridge will become inoperable. Default is off.
17
SPEEDLAN TM
Enable Data Encryption - This optional feature allows you to encrypt wireless data transmissions on top
of the encryption provided by the radio. It provides 56 bit DES encryption. It is not shipped standard as
part of the XE units. If you did not purchase it when you originally bought the SPEEDLAN TM units, it can
be purchased later as a software upgrade.
Data encryption is disabled by default. Check the box labeled “Enable Encryption” to enable the encryption
features. You will still need to define at least one encryption key before your wireless traffic will be transmitted using wireless data encryption. To do this, return to the drop down menu presented when you clik on
Setup. Now you will see a Data Encryption Setup item added to the menu list. Select Data Encryption
Setup. Select the DES Encryption button and enter an 8 digit alhpanumeric string in the range of “a-z”, “AZ”, and “0-9”.
Examples:
· Alphanumeric: a5F2z4wK
Warning: This setting must be set to the same value on all XE units you wish to have communicate
together. Failure to set them to the same value will prevent any communications from taking place.
(e.g. for multipoint to work properly, the base station AND all of the satellite units must use the same
Encryption Key setting.
Enable Remote Bridging using IP Tunnels - SPEEDLAN TM supports a special feature which will enable
Ethernet packets of any protocol type to be encapsulated in IP packets and sent to other brouters (purchased
from Wave Wireless )for de-encapsulation. This method can be used to setup virtual Ethernet LANs between
several points using an IP network as the transport layer.
Enable Advanced Network Monitoring Support - This option is not available at this time.
Enable IP Security Counter Measures - This option is not available at this time.
Enable Access Control - This option is not available at this time.
Enable Digital Alarm Monitoring and Reporting - This option is not available at this time.
18
SPEEDLAN TM
Enable Outgoing Network Address Translation - This option enables a company to map the private
networks IP addresses into one or more global public network IP addresses. This means that outsiders will
only view the single (or more if designated) IP network address assigned for global viewing on the Internet.
For more informatoin, see Setting UP NAT, page 61.
Enable Incoming Network Address Translation - This option enables a company to unmap public
network IP address into private network IP addresses. For more information, see Setting UP NAT on
page 61
Enable DHCP Server - This option enables the DHCP client and the interface that is selected. For more
information, see Setting UP the IP Addresses, page 58.
Enable Access Point Radius Authentication - This option is not available at this time
Enable CampusPRC Radius Authentication - This option is not available at this time.
Enable Link Integrity - This option is not available at this time..
Enable IP/UDP/TCP Security Filters - This option is not available at this time.
Enable AppleTalk Security Filters - This option is not available at this time.
Enable Novell Security Filters - This option is not available at this time.
Enable Watchdog Reboot Timer - This feature instructs the bridge to reboot in the event that the bridge fails
to receive any incoming packets, from any port, for a period of 10 minutes. The brouter will assume an error
has occured and will reboot. If, after the brouter reboots, it does not receive an incoming hello signal, the
bridge will listen for the hello signal until the user reboots the brouter manually. The Watchdog will recognize
when a signal has been re-established and will reset the timer accordingly.
Enable VGA Realtime Display - This feature allows a client to install a video card and a monitor and view
the statistics directly from the unit, instead of Configurator, laptop, PC, etc.
Note: Click Scale to view the LED Forwarding Scale.
19
SPEEDLAN TM
Interface & Advanced Interface Setup
The interfaces that are installed in your brouter will be represented on this screen. The Remote check box is
used to designate which interfaces will be considered local and remote. The local interface is consider to be the
interface that connects directly to the local LAN with respect to the unit. The remote interface is considered to
be the interface that connects with the remote LAN. The set up buttons are used to access the portion of the
configuration which controls how the individual interfaces are configured.
The Advanced Interface Setup has a few more advanced settings, but essentially they are the same set up
screen. Note that the Max Tx rate is available on both the Interface Setup and Advanced Interface Setup.
Max Tx Rate is useful to ISPs that want to regulate the maximum bandwidth provided to each customer. These
settings should not be changed without the assistance of a Wave Wireless Networking Technical Support
Engineer. Backup and Perm are not used with the XE series products. These fields must remain empty.
20
SPEEDLAN TM
The Setup Buttons
Setup 1 - Ethernet Setup
SPEEDLAN products come standard with a 10/100 Base-T
interface to connect to your wired network. Although the
interface is capable of operating at both 10 Mbps and 100
Mbps, it is not autosensing or autoswitching. The default setting is for 10 Mbps half-duplex operation. If you which to
connect your SPEEDLAN unit to a 100 Mbps port, the
Ethernet interface can be manually switched to 100 Mbps in
this portion of the setup.
The card also supports full-duplex operation when connected
to either a 10 or 100 Mbps LAN port. The default setting is
for Half-Duplex. The interface can be configured to operate
in Full Duplex using the options on this setup screen.
Pressing the Setup buttons (1 and 2) on the Interface & Advanced Interface Setup screen will open the Setup screen for
the interface selected.
Setup 2 - 11 Mb RF Interface Setup - On this screen are the configuration settings that control the individual
interfaces and how they communicate with each other. On the next page you will find a description of the
settings and how they effect the performance of the SPEEDLAN interfaces.
21
SPEEDLAN TM
Transport Methods
The industry compatible method of transmitting and receiving data over wireless networks cause data packets
to frequently be lost. This is due to the fact that a wireless network does not have the ability to detect collisions
like a wired Ethernet network. On an Ethernet network collisions can be detected by the hardware and are
automatically retransmitted. Ethernet is refered to as CSMA/CD (Carrier Sense Multiple Access with Collision Detection). Wireless networks are CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance).
The reason collisions can not be detected is wireless cannot receive and transmit at the same time, hence
SPEEDLAN TM is not able to listen for the collisions. In practice a properly operating SPEEDLAN point-topoint network will loose, due to collisions, less than 1% of the transmitted packets. This packet loss is not
normally a problem with protocols such as Novell IPX (without the Burst Mode NLM), but may cause
networks using most other protocols to experience poor performance. Campus Cell PRC helps to alleviate
this problem by placing multiple packets into one larger packet, thus saving bandwidth by eliminating the extra
overhead.
Campus Cell PRC Mode (No base stations) - This method of transportation requires that all brouters be
able to detect each other. If any of the stations are unable to see each other then a Base Station must be
assigned that can repeat traffic from one brouter to another. This method utilizes Campus Cell PRC packet
bundling which reduces the amount of overhead caused by sending smaller individual packets across the
wireless network. This greatly improves the performance of the SPEEDLAN network
Campus PRC Mode (This is a Non-Polling Base Station) - This setting should be used if this is the only
base station in the SPEEDLAN TM wireless network cell. With the previously mentioned ‘Campus Cell PRC
Mode (No Base Stations)’ setting there is a requirement that all wireless stations be able to transmit to and
receive from ALL other stations in the wireless network. This is not always possible due to particular topology
and terrain. SPEEDLAN TM has a special mode where one of the wireless stations can be configured as a
Base Station and all other wireless nodes setup as Satellite Stations. In this configuration the only requirement
is that each satellite station be able to communicate directly with the base station. The base station is responsible for repeating packets that need travel between the satellite stations. The Non-Polling Base Station does
not allocate bandwidth to each statellite. This is preferable when the total number of satellites in the wireless cell
is less then somewhere between 5 to 10 stations.
The performance of this approach is greatly improved if the base station is connected to the most heavily
loaded network or network server. This is due to the fact that data flowing from one satellite to another
satellite station must be repeated (retransmitted) by the base station, thus more of the wireless bandwidth is used. Data packets flowing from a satellite station to the base station are transmitted directly to
the base station without the need to be repeated.
Campus PRC Mode (This is a Polling Base Station) - This setting should be used if this is the one and only
base station in the wireless network cell. When the number of satellites become greater then approximately 5
to 10 stations the Non-Polling Base Station sometimes is not as able to keep up with the wireless traffic that
needs to be forwarded. The Polling Base Station alleviates this problem by continuously communicating with
all of the satellite stations in its cell, and is responsible for dynamically assigning how much time is to be alotted
to each satellite in the next transmission of data packets from that satellite. This is done after every transmission
22
SPEEDLAN TM
and greatly improves the performance of a base station wireless network cell when the total number of satellite
stations is greater then 5 to 10 stations. As the number of stations increases, the usage of the wireless network
cell increases and efficiency is proportionately improved.
Campus PRC (This is a Satellite Station) - This is the configuration required for stations that are to be
installed into a wireless network cell that utilizes a base station. Except for the base station, all the stations in this
type of wireless network cell should be configured as Satellite Stations. The satellite configuration tells the
brouter to forward all data that needs to pass through the wireless network to the base station. In addition, the
satellite stations are configured to listen to the base station for instructions if they are forthcoming.
Frequency Button - The Frequency button can be found in the
lower right hand corner of the individual interfaces setup screens.
Clicking this button will open a new screen that allows you to
change the operating frequency of the interface. All of the brouters
expected to communicate with this device should be configured
with the same frequency.
Advanced 11 Mb RF Interface Setup
Network ID - The Network ID is a security setting that allows
the SPEEDLAN TM unit to reject packets from other wireless
bridges in the area. Although the bridging or routing table would
reject the packet once it was processed, the Network ID allows
the bridge to reject the packet with much less processing. This
improves the performance of the SPEEDLAN TM units in installations where many wireless bridges are colocated in the same area or where other organizations may be running wireless bridges of their own. The
default setting is 0 and the valid range is 0 to 15.
Warning: This setting must be set to the same value on
all SPEEDLAN TM units you wish to have communicate
together. Failure to set them to the same value will prevent any communications from taking place. (e.g. for
multipoint to work properly, the base station AND all of
the satellite units must use the same Network ID setting)
Rate – This setting refers to the RF data rate. The
SPEEDLAN TM 11 Mbps radio has four data rates that can
be used:
High - This is the full 11 Mbps data rate. The interface default to this value and it is recommended that you
operate using it for most installations. The receiver sensitivity of the radio with this setting is –82 dBm.
Medium – This setting limits the card to providing 5.5 Mbps of bandwidth. The receiver sensitivity of the radio
with this setting is –85 dBm.
23
SPEEDLAN TM
Standard – This setting limits the card to providing 2 Mbps of bandwidth. The receiver sensitivity of the radio
with this setting is –89 dBm. You must use this setting if you want your XE unit to communicate with an older
SPEEDLAN unit that uses a 2 Mbps radio.
Low - This setting limits the card to providing 1 Mbps of bandwidth. The receiver sensitivity of the radio with
this setting is –92 dBm.
Warning: This setting must be set to the same value on all XE units you wish to have communicate
together. Failure to set them to the same value will prevent any communications from taking place.
11 Mb RF Security Setup – These settings are used to encrypt data that will be transmitted by the 11 Mb RF
port and also to decrypt data that is received by 11 Mb RF port. You may define up to 4 encryption keys to be
used for decrypting incoming data and one key for encrypting outgoing data.
Check the box labeled “Enable Encryption” to enable the encryption features. You will still need to define at
least one encryption key before your wireless traffic will be transmitted using wireless data encryption.
The Encryption Key can be defined using either:
• 5 alphanumeric characters in the range of “a-z”, “A-Z”,
and “0-9”
• A 10 digit hexadecimal value using the range “A-F” and
“0-9”. If you choose to use the hexadecimal method, use
the prefix “0x” (zero, x) in defining the key
Examples:
• Alphanumeric: a5F2z
• Hexadecimal: 0xA95F2BR39K
Write down the values you enter as Encryption Keys and store
them in a secure place. The values you enter will only be visible
when they are entered for the first time. Each time this option is
displayed after the initial setup, the values will appear only as
“xxxxxxxxxx”
Warning: This setting must be set to the same value on all
XE units you wish to have communicate together. Failure
to set them to the same value will prevent any communications from taking place. (e.g. for multipoint
to work properly, the base station AND all of the satellite units must use the same Encryption Key
setting.
There is also an option to Deny non encrypted Data. This feature is disabled by default and is designed
primarily for multipoint SPEEDLAN installations where it may not be necessary to run using data encryption at
all locations. If you enable this option, any data received by this SPEEDLAN TM unit will not be passed to the
wired network interface.
24
SPEEDLAN TM
BRIDGING SETUP
SPEEDLAN TM
The SPEEDLAN TM is an IEEE 802.3
MAC- layer bridge. The bridge can be configured to bridge or pass any 802.3 frame
type protocols, including Novell IPX, TCP/
IP, AppleTalk, etc. The SPEEDLAN TM
can also be configured to filter packets by
their destination and origin. This is done using the unique MAC (Media Access Control) addresses that all network interface devices have assigned to them at the factory.
Protocol Filtering - By default, the
SPEEDLAN is configured to pass all network protocols. When you press the Edit
button, you will be presented with a list of
protocols which you can select for filtering.
After selecting the protocols, highlight them
on this screen and press the Bridge or Deny
buttons to set how each protocol will be
treated. The radio buttons in the Protocol
Filtering box determine how unselected protocols are treated.
Ethernet Protocols - Some common
Ethernet protocols and their associated
ID numbers have been placed in this
table. Simply select one from this list if
you wish to set a filter for it.
If the protocol you wish to filter is not
presented here, click Custom, Add and
enter the hex ID for that protocol.
27
SPEEDLAN TM
MAC Filtering - By default, the SPEEDLAN TM is configured to pass all traffic between all MAC-Address pairs. To add
an address pair into the filter, click on the Add button in the MAC
Filtering box. You will be prompted to enter the Remote Address, which will be the MAC Address that resides on the remote
side of the brouter, and the Local Address, which will be the
MAC Address that resides on the local side of your network.
The side of the bridge you configured determines the remote side
and local side (in the Interface Setup screen).
Permit Ethernet Multicasts - Standard Ethernet bridges will always forward multicast packets. Some protocols do not use multicast packets, such as TCP/IP and Novell IPX. If you do not use protocols that use
multicast packets, you can drop them by shutting off multicasts on the SPEEDLAN TM. Shutting off multicast
packets will reduce the traffic being sent across your wireless network link. This will also reduce the number of
interrupts that each computer connected to your network experiences.
Advanced Features - Clicking the Advanced button brings up this screen. Below are descriptions of the
settings and how they will effect your network.
Pass Bad Ethernet Source - The standard Ethernet bridges
we have tested will pass Ethernet packets with a broadcast or
multicast address as their source (i.e., packets with their first bit
set to 1). The Ethernet specification for Transparent (i.e. NonSource-Routing) Bridges does not allow these types of packets,
which are considered bad packets. Our studies have shown that
a common failure mode of many Ethernet interfaces and networking software is to transmit packets like these. If you do not
need to permit Source-Routing packets, we suggest that you
deny these packets. The default setting is selected to permit these
packets.
28
SPEEDLAN TM
Pass Unseen Ethernet Source - Standard Ethernet bridges will always forward packets with destination
addresses that have not been learned (i.e., have not previously been seen as a source address of a packet).
This characteristic is needed for the proper operation of an Ethernet bridge. The downside to this, as our
studies have shown, is that the failure mode of many Ethernet interface cards is to send out erroneous packets
with good CRCs but with random Ethernet destination and source addresses. Standard bridges will permit
these erroneous packets because they have not “learned” the random destination, and then add this packet’s
random source address to their finite learned table. This situation is not uncommon and can greatly hinder the
operation of standard bridges. If you choose to deny unlearned packets, the brouter will not forward unicast
packets to Ethernet addresses that have not already been seen as a source address. This scheme works for
most protocols because it relies on the characteristics of most upper-layer protocols to transmit ARP requests
or hello packets. It should be set to deny only by a qualified network engineer after careful testing and consideration. The default value for this setting is checked.
Enable Learned-Table Lockdown - A standard bridge watches the source address of each packet it receives
on any of its interfaces. As new addresses are seen, entries are added to the learned table that contains each
source address and the interface number that address was received on. If a source address is later seen on a
different interface, the bridge will immediately change the interface number in the learned-table entry. This
condition could happen in a correctly functioning network if someone moved a computer to a different part of
the network. This could also happen if someone was trying to capture network packets by spoofing the bridge.
Enabling learned-table lockdown will prevent the interface number from being changed once the source address has been seen. A standard bridge will also time-out the learned-table records every 10 minutes. If
learned-table lockdown is enabled, these records will not be timed out. Once a record is learned, it will not
change or be deleted until either the bridge reboots or the learned table become completely filled and needs to
be reset. (NOTE: A typical SPEEDLAN TM learned table can contain over 12,000 records.) The default
value for this setting is Disabled.
Enable Expanded IP ARP Support - Enabling this feature will cause the Bridge to also watch the IP/ARP
packets that occur on the network. The SPEEDLAN TM takes no action in response to IP/ARP packets
(since that is the role of an IP router) except to add the IP address to its IP/ARP table. This feature is helpful on
an IP network because it will build a database of MAC-layer-address-to-IP address pairs. An SNMP monitoring program, such as the SPEEDLAN TM Configurator, can at any time extract this information. NOTE: 1)
The IP/ARP table is never timed out in this mode. 2) This feature is not available if the brouter is routing IP. The
default value for this setting is Disabled.
Permit Ethernet Broadcasts - Standard Ethernet bridges will always forward broadcast packets. Many
protocols do not use broadcasts (e.g. AppleTalk Phase II, DECnet, and others). However, IP/ARP does use
broadcasts. If you do not use IP or any other protocol that requires broadcasts, you can deny them. Shutting
off broadcast packets will reduce the traffic being sent across your wireless network link. This will also greatly
reduce the number of interrupts that each computer connected to your network experiences. Networks with a
high number of broadcasts will slow down the processing of all attached computers, even those that aren’t
using the network.
Storm Thresholds - One of the unique and very useful features of the SPEEDLAN TM is its ability to keep
broadcast and multicast storms from spreading throughout a network. Network storms are common and can
cause bridges, routers, workstations, servers, and PCs to slow down or crash. Storms occur if network
equipment is configured incorrectly, if network software is not functioning properly, or poorly designed programs such as network games are used. These settings are disabled by default.
29
SPEEDLAN TM
Address Threshold - This setting determines the maximum number of broadcast
or multicast packets that can occur during
a one-second period before a storm condition is declared for a particular Ethernet
address (host). Once it is determined that
a storm is occurring, any additional broadcast or multicast packets from that host
address will be denied until the storm is
determined to be over. The storm will be
determined to be over when 30 seconds
have passed in which every one-second
period has less then the stated threshold in
broadcast or multicast packets. The settings for broadcast packets and multicast
packets are configured independently.
Interface Threshold - This setting determines the maximum number of broadcast
or multicast packets that can occur during
a one-second period before a storm is
declared for the assigned interface. Once
it is determined that a storm is occurring, any additional broadcast or multicast packets received on that
interface will be denied until the storm is determined to be over. The storm will be determined to be over once
a one-second period has occurred with no broadcast or multicast packets received on that interface. The
settings for broadcast packets and multicast packets are configured independently.
Preset Button - This button sets the broadcast and multicast storm thresholds to the recommended values.
These values have been determined to offer good protection without interfering with the operation of the
typical network. These values may need to be tuned for your particular network.
Tunnel Partners - Tunneling is a method of encapsulating
Ethernet packets received from the local interface in an IP/
UDP packet and sending them to one or more tunnel partners. Tunneling can be used to set up virtual Ethernet networks. In the General Setup menu, if the Remote Bridging
using IP Tunnels is enabled, Tunnel Partners can be set
up. This menu specifies the IP addresses of each of the
bridge/routers that are to participate in the tunnel group.
Specify the addresses of all the bridges that are participating in the tunnel group but DO NOT specify the IP addresses on this brouter.
30
SPEEDLAN TM
Encrypt Bridge Tunnel Packets - If purchased, brouters (from Wave Wireless) may contain a special software-encryption algorithm that is distinct from the optional SPEEDLAN encryption chip on the brouters. If
Data Encryption is enabled on the General Setup menu and if an Encryption Key is set up in the Data Encryption menu, enabling encryption here will cause all Ethernet packets transmitted to tunnel partners to be encrypted and encapsulated inside IP packets. The IP packet itself cannot be encrypted, because industrystandard IP routers, like those on the Internet, would not be able to forward the encrypted packets.
Generic Ethernet Tunneling
(Through an IP Network)
Standard Ethernet
Packet
Ethernet Packet
Encapsulated in
IP/UDP
LAN A
The three brouters are set up to tunnel one
or more protocols and each is a tunnel
partner to the other two brouters. This
configuration allows LAN A, LAN B, and
LAN C to become a virtual private Ethernet
network with the Internet as the transport
mechanism for data between them. The
encapsulated data packets can be optionally
encrypted to make the virtual private
network more secure.
Br
Standard
Ethernet
Packet
ge
idg
id
Br
Ethernet Packet
Encapsulated in
IP/UDP
LAN B
Local
Interface
Internet
or Campus
IP Network
Remote
Interface
idg
LAN C
31
SPEEDLAN TM
32
SPEEDLAN TM
Setting Up the IP Addresses (IP Host Setup)
33
SPEEDLAN TM
Use DHCP to set up the server and client IP addressing for the network. Use NAT to set up the translation
for incoming and outgoing network IP addresses.
If you do not understand the basics of IP addressing, DHCP, or NAT please read the next section,
Part I - Quick Overview of IP Addressing, below. Otherwise, skip to Part II - Setting Up the IP
Address, page 56 .
Part I - Quick Overview of IP Addressing
IP Addressing is important because it tells the network how to locate the computers or network equipment
connected to it. IP addresses are given so each computer or equipment on the network contains a unique
address. In addition, network addresses and node addresses, depending on the Class (A, B, C, etc),
contain their own unique address as well. IP addressing provides the following information:
• Provides communication between different platforms and diverse systems
• Provides universal data transfer over large geographic distances
• Has been “adopted” as a standard in the computer industry
What is an IP address?
An IP address contains 32 bits of information, which is divided into the following:
•
•
Two sections: the network address and the node address (also known as the host address)
To keep it simple, lets call it four bytes (octets)
Note: Each octet contains 8 bits, which are equivalent to 1 byte. Each octet is separated by a
period (.).
The following examples show the conversion of the same IP address into several different formats:
Decimal (130.57.30.56)
Hexadecimal (82.39.1E.38)
Binary (10000010.00111001.00011110.00111000).
Internet Address Classes
Understanding this methodology is difficult, even for customers. Therefore, let’s explain this in easier terms.
The first octet defines the “class” of the address, which is the only method to tell the size of the network
(how big) and where the internet address belongs. There are three main classes:
•
•
•
Class A: 35.0.0.0
Class B: 128.5.0.0
Class C: 192.33.33.0
-non-bolded text = Part of network address
-bolded text = Part of local address (node section)
This definition is not random; it is based on the fact that routers, by reading just the first three bits of the
address field, designate which network class it belongs to. This selection simplifies the way routers handle
the messages (packets) and speed up the forwarding process.
34
SPEEDLAN TM
In fact, IP defines five classes:
• Class A addresses use 8 bits (1 octet) for the network portion and 24 bits (3 octets) for the node
(or host) section of the address. This provides up to 128 networks with 16.7 million nodes for each
network.
• First byte is assigned as network address
• Remaining bytes used for node addresses
• Format: network, node, node, node
• In IP address 49.22.102.70, “49” is network address and “22.102.70” is the node
address – all machines on this network have the “49” network address assigned to them
• Maximum of 224 or 16,777,216 nodes
• Class B addresses use 16 bits (two octets) for the network portion and 16 bits for the node (or
host) section of the address. This provides up to 16, 384 networks with 64,534 nodes for each
network.
• First two bytes are assigned as network address
• Remaining bytes used for node addresses
• Format: network, network, node, node
• In IP address 130.57.30.56, “130.57” is the network address, and “30.56” is the
node address
• Maximum of 216 or a total of 65,534 nodes
• Class C addresses use 24 bits (3 octets) for the network portion and 8 bits (two octets) for the
node (or host) section of the address. This provides 16.7 million networks with 256 nodes for each
network.
• First three bytes are assigned as network address
• Remaining byte used for node address
• Format: network, network, network, node
• In IP address 198.21.74.102, “198.21.74” is the network address, and “102” is the
node address
• Maximum of 28 or 254 node addresses
• Class D
• Range is 224.0.0.0 to 239.255.255.255
• Used for multicast packets (i.e., host sends out router discovery packets to learn all of the
routers on the network)
• Class E
• Range is 240.0.0.0 to 255.255.255.255
• Reserved for future use
Note: Class D & E should NOT be assigned to net assignment of IP addresses. In addition, the
first octet, 127, is reserved.In each network definition, the first node number (i.e., “0”) is used to
define the network, as well as the last number (i.e., “255”). The last number is known as the
broadcast address.
Public IP addresses can be obtained from the following address:
Network Solutions
InterNIC Registration Services
505 Huntmar Park Drive
Herndon, VA 22070
hostmaster@internic.net
35
SPEEDLAN TM
Note: Non-public Addresses can include network address assigned from the network administrator or
from the IP provider. Also, there is one network in each class that is defined for private use, allowing
the creation of internal networks. These addresses are Class A: 10.0.0.0, Class B: 172.10.0.0, and
Class C: 192.168.0.0.
Subnetting a Network
The increasing number of hosts and networks make impractical address blocks that are not smaller
than 245. In order keep the IP address small, so routers can manage them without changing the
whole protocol, a smaller network definition is created. This is called a subnet. Subnets are intended to:
• Reduce network traffic
• Optimize performance
• Simplify management
• Create more effective and efficient addresses for large geographic distances
Default Subnet masks
• Class A: 255.0.0.0
• Class B: 255.255.0.0
• Class C: 255.255.255.0
Note: Subnet mask is bolded.
What is a Subnet?
This term allows you to create multiple networks within one Class A, B, or C network. Each data link
(octet) contains its own unique identifier also known as the subnet. Also, each node on the same data link
must belong on the same subnet as well.
What is a Subnet Mask?
This term allows you to mask section(s) (depending on the class specified) of the octets in the network
address. Each octet used in the subnet mask is assigned to a data link. The leftover octet(s) are assigned to
the remaining nodes.
For more information on subnetting, see the example below and figure on the next page.
Example of Subnetting:
For example, a Class C network (255.255.255.0) contains three masked octets (255.255.255). The last
octet (0) is leftover for remaining nodes (i.e., computers).
If Router D is reading IP Addresses 195.172.3.1 (let’s call this IP Address 1) and 195.172.3.64 (let’s call
this IP Address 2) on this Class C network, it would send IP Address 1 to Subnet A and IP Address 2 to
Subnet B. The remaining nodes in each subnet (A through D) on this network can contain up to 254 pieces
of network equipment (computers, printers, fax machines, bridges or routers (also know as brouters), etc.).
36
SPEEDLAN TM
Figure of Subnetting a Network
Internet
Subnet B
Subnet A
IP Address: 195.172.3.64
Subnet Mask: 255.255.255.192
IP Address: 195.172.3.1
Subnet Mask: 255.255.255.192
Router D
Computer
Computer
Computer
Computer
Computer
Long Street
Router A
Router B
Subnet D
IP Address: 195.172.3.192
Subnet Mask: 255.255.255.192
Subnet C
Computer
IP Address: 195.172.3.128
Subnet Mask: 255.255.255.192
Computer
Computer
Computer
Computer
Router C
Still confused?
An easier method to explain this concept is to use the classic “mailing” analogy used in IP addressing.
Consider that this network, called Long Street, is four blocks long. There are 254 houses on Long Street,
and each block contains 64 houses. Houses 1 to 63 reside on Block A. Houses 64 to 127 reside on Block
B. Houses 128 to 191 reside on Block C. Houses 192 to 254 reside on Block D. Think of each block as a
subnet. This means that Blocks A, B, C, and D are all part of Long Street, which is also known as the
network in this example. The mailman would organize the letters (or IP addresses for network equipment)
by creating four piles (one for each block, or subnet). As soon as the mailman picks up Pile A in his hand, he
knows which block to turn on. This same reasoning applies to Piles B, C, and D as well. Router D knows
exactly which subnet to transfer (or turn) the packets to by reading its IP and subnet mask address. Note
that each subnet on this network is 255.255.255.192. Why is 192 the last octet in the subnet mask and not
64? The last octet, 192, is the mask that allows 64 “houses” to know that the mailman (or router) is coming
in advance. The “houses” will know it’s mailman “Jim” by looking at the IP number.
Note: If the network is managed by a Simple Network Management Protocol for local or Internet
access, each brouter must contain a unique IP Address. This is one of the benefits of static or dynamic
addressing.
37
SPEEDLAN TM
How does a network administrator assign an IP address?
IP addresses are supplied by the network administrator (you), the ISP, or hosting company.
The two types of IP addressing – manual (static) and automatic (dynamic) addressing – are described
below.
Manual (static) Addressing - Each device connected to the Internet must have its own unique IP address.
Also, if a computer is being used as a server, you will assign it a permanent IP address. This enables other
computers to connect to it. Static addressing is also beneficial to users that need to maintain a “constant”
connection to the Internet. This will enable users to easily access the IP address.
Automatic (dynamic) Addressing - A DHCP (Dynamic Host Configuration Protocol) server assigns the
IP address to each computer as the computer connects to the network. If a computer moves to a new
network (i.e., great for temporary employees or mobile users), it must be assigned a new IP address for that
network. DHCP can be used to manage these assignments automatically. DHCP is described in further
detail below.
What is DHCP?
Dynamic Host Configuration Protocol (DHCP) allows network administrators (you) to assign static or
dynamic IP addresses for the period of time needed to connect to the Internet. Think of DHCP as leasing an
apartment. A prospective tenant may not need to live in an apartment for two years, maybe just a year.
Therefore, the tenant will only sign a one-year lease agreement. For example, each time a computer is set up
to connect to the Internet, the network administrator uses DHCP to automatically assign the computer a
unique IP address. That computer will give up its IP address when it is no longer needed (when the lease
has ended) allowing new a computer (or a new tenant) on the same network to use it. This benefits
educational and corporate settings where users often log on to different computers. In this case more IP
addresses outnumber computers because you can quickly reconfigure the network if needed from a
centralized location.
Servers that utilize DHCP help resolve security, costly IP addressing services, and compatibility problems.
DHCP is an alternative to BOOTP, which reduces the agony of assigning IP addresses and also provides
advanced configuration options.
Note: The figure on the next page may help you understand how a DHCP address is generally
assigned.
38
SPEEDLAN TM
Figure of DHCP Addressing
Client
1.
2.
3.
4.
DHCP
Server
The client asks DHCP server for IP address and configuration if needed.
The DHCP server assigns an available IP address to client.
The client takes IP address from DHCP server and requests for any configuration needed.
DHCP server confirms IP address and configuration.
What is NAT?
Network Address Translation (NAT) is the conversion of an Internet Protocol address (IP address) used
within one network to a different IP address within another network. One network is designated the inside
network and the other is the outside network.
Network Address Translation (NAT) occurs when there is a translation among an Internet Protocol (IP
address) used within one network (designated as inside network) to a different IP addresses within another
network (designated as outside network). Network Address Translators (NATs) allow companies to
decrease the number of global IP addresses. This enables companies to communicate with a single IP
address (or more than one IP address). For example, a company can provide its clients with one IP
address, allowing access to the company’s firewall only. This IP address is not a “real” address on the
company’s internal network, but it is successfully translated to the correct IP location through NAT
(i.e., NAT router). Therefore, the company controls access through firewalls and provides multiple IP
addresses to outside customers without excessive limited resources, or “global” Internet IP protocols.
39
SPEEDLAN TM
Outgoing NAT
As the packet is transmitted from the private network across the public network, the packet will be
re-addressed as 204.101.20.3 (public address of SPEEDLAN TM). When the packet returns to the
SPEEDLAN TM and then back to the private network, the packet will be re-addressed (the IP address of
the private network) by using the MAC address contained in the header to identify the destination.
40
SPEEDLAN TM
Incoming NAT
Incoming NAT allows you to specify ports on the private network that you would like to be available on
the public network. For example, if a web server on a server is IP Address 10.0.0.3, you can create a pair
that will specify that all requests received on the public IP address, Port 80, be forwarded to IP Address
10.0.0.3 on the private IP address, Port 80.
41
SPEEDLAN TM
Part II - Setting Up the IP Address
In this section you will first assign a static IP address or enable the DHCP client. Second, choose the
appropriate interface for the DHCP client. Third, enable the DHCP Server on the SPEEDLAN TM.
Note: Confirm the IP address of your SPEEDLAN TM units by performing the following tasks.
Open the SPEEDLAN TM Configurator. From the File menu, choose Open Remote Config.
Then, click Scan. The Scan dialog box appears. Select the appropriate brouter and click OK.
Click OK again. A message box appears confirming that the “Configuration has been read from the
Bridge” (i.e., 128.104.224.1). Click OK.
To set up the IP address, do one of the following:
1. Physically assign a static IP address (Static IP)
2. Enable DHCP client and choose appropriate interface (Dynamic).
Note: After following Option #2 above, proceed to Enabling the DHCP Server on the
SPEEDLAN, page 59.
Physically Assigning a Static IP Address
To physically assign a static IP address, do the following:
1. From the Setup menu, choose IP Setup. The IP Setup dialog box appears.
42
SPEEDLAN TM
2. Select the Specify an IP address option. Enter the following information:
•
•
Our IP Address – The unique number assigned by the network administrator, ISP or host
provider. This tells network the location (IP address) of the computer on the Internet (i.e.,
128.104.224.2).
Our Subnet Mask - This term allows network administrators to mask section(s) (depending on
the class specified) of the octets in the network address. Each octet used in the subnet mask is
assigned to a data link. The leftover octet(s) are assigned to the remaining nodes.
Note: For more information, see the figure called Subnetting a Network in the section called
Part I - A Quick Overview of IP Addressing, page 48. Once the packet has traveled to the
appropriate network, it goes through a masking process. A subnet mask is composed of zeros (0s)
and (1s). This tells the router which addresses to look under and which ones not to look under.
Therefore, subnet masking allows the router to transfer the packet traffic more quickly than a
network without a subnet. Again, this address is obtained from the network administrator, IP host, or
host provider.
•
•
Default Router IP – If you have an established network, use the IP address for the router
already set up for that network. If you do not have an established network, leave this entry
blank.
Default TTL – This information should already be entered. The IP host on the Internet will send
out each packet with a default “Time to Live” parameter. If you want to override the factory
default of 64 attempts, you can specify your new default here. This parameter should not be
changed unless you are very familiar with IP functionality and how the Time to Live parameter
will affect the method packets the treated by your network, as well as the network to which you
are bridged (or routed).
Note: Click Select to view the IP Mask List. Select the appropriate IP Mask and click OK.
3. After you have finished entering the appropriate information, click OK.
4. Now save the changes to the brouter. From the File menu, choose Save Config.
5. A message box appears informing you that the information will be saved to the brouter
(i.e., 128.104.22.4). Click Yes.
6. The Configurator confirms that the configuration has been saved. Click OK. Restart the computer.
Note: You are finished with this section. If you want to set up NAT, see Part III - Setting Up NAT,
page 61.
43
SPEEDLAN TM
Enabling the DHCP Client and Choosing the Appropriate Interface
To enable the DHCP client and choose the appropriate interface, do the following:
1. From the Setup menu, choose IP Setup. The IP Setup dialog box appears.
2. Select the Obtain an IP address from DHCP Server option.
3. Next, select the interface for Ethernet or wireless network from the Using Interface drop-down list.
Make sure that you select the interface that the DHCP server is located on.
Note: The information for Default TTL should already be entered. The IP host on the Internet
sends out each packet with a default “Time to Live” parameter. If you want to override the factory
default of 64 attempts, you can specify your new default here. This parameter should not be
changed unless you are very familiar with IP functionality and how the Time to Live parameter
will affect the method packets the treated by your network, as well as the network to which you
are bridged (or routed).
44
SPEEDLAN TM
Enabling the DHCP Server on the SPEEDLAN TM
To enable the DHCP Server on the SPEEDLAN TM, do the following:
1. From the Setup menu, choose General Setup. The General Setup dialog box appears.
2. Select the Enable DHCP Server check box; this will enable you to set up the DHCP Server.
Note: The only active NAT / DHCP check boxes in the NAPT / DHCP Features section (in the
dialog box above) are the following:
•
•
Enable Outgoing Network Address Translation - This feature enables a company to map
the private networks IP addresses into one or more global public network IP addresses. This
means that outsiders will only view the single (or more if designated) IP network address
assigned for global viewing on the Internet. For more information, see Part III - Setting Up
NAT, page 61.
Enable Incoming Network Address Translation - This feature enables a company to unmap
public network IP address into private network IP addresses. For more information, see
Part III - Setting Up NAT, page 61.
3. From the Setup menu, choose DHCP Server Setup. The DHCP Server Setup dialog box
appears (as shown on the next page).
45
SPEEDLAN TM
4. Enter the IP range and gateway/router
information:
• Offered IP Starting Address – This
is the start of the block of allowed IP
addresses. For example, the
“offered” IP address between a block
of 20 to 40 is 20.
• Offered IP Ending Address – This is
the end of the block of allowed IP
addresses. For example, the “ending”
IP address between a block of 20 and
40 is 40.
• Default Router Address – This is the
IP address of the default router that
allows clients to move outgoing packets
to a single router on the same subnet.
• Default Router Mask – This is the
router that initially accepts or transfers
packet to the directly connected
networks or static networks.
• Lease Time in Minutes – This is the
amount of minutes that the computer
can use the assigned IP address. When
the time is up, the IP address will be
reassigned to another computer.
Note: Click Select to view the IP Mask List. Select the appropriate IP Mask and click OK.
5. Enter the domain name information:
• 1st DNS Server IP – This setting will specify the client’s 1st DNS Server.
• 2nd DNS Server IP – This setting will specify the client’s secondary DNS server.
• 3rd DNS Server IP – If needed, this setting will specify the client’s third DNS server.
• Domain Name – This is the web domain name of the organization on the Internet such as
“www.speedlan.com”. It is not necessary to use the first portion of the domain name leaving
the entry as “Speedlan.com”.
6. Select the interface that you want to Enable DHCP on (i.e., Ethernet or wireless interface).
7. Click OK.
8. After you have finished entering the appropriate information, click OK.
9. Now save the changes to the bridge or router. From the File menu, choose Save Config.
10. A message box appears informing you that the information will be saved to the bridge or router.
Click Yes.
11. The Configurator confirms that the configuration has been saved. Click OK. Restart the computer.
46
SPEEDLAN TM
Part III - Setting UP NAT
This section explains how to setup outgoing and incoming Network Address Translation (NAT). For more
information on outgoing and incoming NAT, see pages 54 and 55.
To setup outgoing NAT, do the following:
1. From the Setup menu, choose General Setup. The General Setup dialog box appears.
2. Select the Enable Outcoming Network Address Translation check box. Click OK.
3. From the Setup menu, choose Outgoing Network Address Translation Setup.
4. The Outgoing Address Translation Setup dialog box appears (as shown on the next page).
47
SPEEDLAN TM
Note: NAT is a useful tool that will be enabled the majority of the time on the client or satellite side
of the SPEEDLAN ISP or SPEEDLAN MP. It is rarely enabled on the base unit. NAT is also
useful to have private networks connected to public networks (i.e., the Internet) without needed a
public IP address for every node. By using only one pulbic IP address, NAT controls who in the
private network made a request to an address in the public network. This translates the IP
addresses from one side to another, hiding the private network from the public. This means that the
public will view only one public and valid IP address.
5. Enter the appropriate outgoing information:
•
•
•
•
Public IP Address – This is the IP address for the outside network. If you have more than one
public address, you can assign it to node on a private network (One-to-One NAT). Therefore,
all requests for a particular IP address from the outside or public network will be translated to
the appropriate private IP address. This may be necessary if you have a server or workstation
(computer) that needs to be connected to a remote network.
Private IP Address – This is the IP address for the inside or private network only, which hides
behind the Public IP address.
Public IP Mask – This address assigns the Subnet mask to the Public (Ethernet) portion of the
SPEEDLAN unit.
Private IP Mask - This address assigns the Subnet mask to the private network interface.
Note: Click Select to view the IP Mask List. Select the appropriate IP Mask and click OK.
6. Click OK.
7. After you have finished entering the appropriate information, click OK.
8. Now save the changes to the bridge or router. From the File menu, choose Save Config.
9. A message box appears informing you that the information will be saved to the bridge or router.
Click Yes.
10. The Configurator confirms that the configuration has been saved. Click OK. Restart the computer.
48
SPEEDLAN TM
To set up incoming IP network address for NAT, do the following:
1. From the Setup menu, choose General Setup. The General Setup dialog box appears.
2. Select the Enable Incoming Network Address Translation check box. Click OK.
3. From the Setup menu, choose Incoming Network Address Translation Setup.
4. The Incoming Address Translation Setup dialog box appears (as shown on the next page).
49
SPEEDLAN TM
5. Enter the appropriate incoming information:
• Public IP Address – This is the IP address for the outside network. If you have more than one
public address you can assign it to a node on the private network (One-to-One NAT).
Therefore, all requests for a particular IP address from the outside or public network will be
translated to the appropriate private IP address. This may be necessary if you have a server or
workstation (or computer) that needs to be connected to a remote network.
• Private IP Address – This is the IP address for the inside network only, which hides behind the
public IP address.
• Private IP Mask - This address assigns the Subnet mask to the private network interface.
Note: Click Select to view the IP Mask List. Select the appropriate IP Mask and click OK.
50

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.2
Linearized                      : No
Modify Date                     : 2000:06:21 10:04:43
Title                           : speedlan xe 3000 & 6000 manual ver 3.3
Subject                         : speedlan xe 3000 & 6000 manual ver 3.3
Author                          : DFatone
Creator                         : Adobe PageMaker 6.52
Producer                        : Acrobat Distiller 4.0 for Windows
Create Date                     : 2000:06:21 10:02:28
Page Count                      : 50
EXIF Metadata provided by EXIF.tools
FCC ID Filing: NCBSLTM

Navigation menu