background image

MTPSR1-120                                                                                                                                          103

Glossary

T1 circuits are made up of a combination of Access and Long Haul facilities.

Local Management Interface (LMI): A specification for frame relay equipment that defines status information exchange.

Local Loop: A transmission path, typically twisted-pair wire, between an individual subscriber and the nearest public
telecommunications network switching center. The wires provide ISDN service, but require an NT1 at the user end and an
LT at the network end. (AKA, “loop” or “subscriber loop”.)

Logical Link Control (LLC2): In a local area network, the protocol that governs the exchange of transmission frames
between data stations independently of how the transmission medium is shared. The LLC2 protocol was developed by the
IEEE 802 commitee and is common to all LAN standards.

Logical Unit (LU): A type of network accessible unit that enables end users to gain access to network resources and
communicate with each other.

Long Haul: The T1 element that connects to the Access portion of the long distance company’s (LDC’s) central office. The
LDC is commonly called the point of presence (POP). Each LDC has a number of POPs, located throughout the country.
The LDC is also called an IEC (Inter Exchange Carrier).

Long Haul Communications: The type of phone call reaching outside of a local exchange (LE).

M

Management Information Base (MIB): A database of network management information used by the Common
Management Information Protocol (CMIP) and the Simple Network Management Protocol (SNMP).

Megacom: An AT&T service with a normal WATS line (typically T1) between the customer premise and the AT&T serving
class 4 CO are the customer’s responsibility.

MegaLink: BellSouth’s leased T1 service.

Message: Associated with such terms as packet, frame, and segment. 1. In information theory, an ordered series of
characters intended to convey information. 2. An assembly of characters and sometimes control codes that is transferred as
an entry from an originator to one or more recipients.

Modem: A communications device that enables a computer to transmit information over a telephone line. It converts the
computer’s digital signals into analog signals to send over a telephone line and converts them back to digital signals at the
receiving end. Modems can be internal and fit into an expansion slot, or external and connect to a serial port.

MultiLink/PPP (ML/PPP): A ‘bandwidth on demand’ technology that allows one logical PPP connection to add additional
channels (as in a second ISDN channel) when the bandwidth is needed (however the vendor defines that situation). It may
also be used with leased lines when the total bandwidth needed exceeds the available line speed - a form of inverse
muxing.

Multiplexer (Mux): 1. A device that takes several input signals and combines them into a single output signal in such a
manner that each of the input signals can be recovered. 2. A device capable of interleaving the events of two or more
activities or capable of distributing the events of an interleaved sequence to the respective activities. 3. Putting multiple
signals on a single channel.

Multiprotocol: A device that can interoperate with devices utilizing different network protocols.

Multithreading: The ability of a software system to be able to handle more than one transaction concurrently. This is
contrasted to the case where a single transaction is accepted and completely processed befor the next transaction
processing is started.

N

Nailed Connection: A permanent or dedicated circuit of a previously switched circuit or circuits.

Nailed-up Circuit: A semipermanent circuit established through a circuit-switching facility for point-to-point connectivity.

NAK (Negative Acknowledgment): Communications code used to indicate that a message was not properly received, or
that a terminal does not wish to transmit. Contrast with ACK.

Network: A group of computers connected by cables or other means and using software that enables them to share
equipment, such as printers and disk drives to exchange information.

Node: Any point within a network which has been assigned an address.

O

Object-Oriented: A method for structuring programs as hierarchically organized classes describing the data and operations
of objects that may interact with other objects.

Summary of Contents for PROXYSERVER MTPSR1-120

Page 1: ...Dual Ethernet ProxyServer Model MTPSR1 120 User Guide ...

Page 2: ...ithout obligation of Multi Tech Systems Inc to notify any person or organization of such revisions or changes Record of Revisions Revision Description A Manual released All pages at revision A 9 4 98 B Manual revised for software version 2 00 All pages at Revision B 2 19 99 C Manual revised for software version 3 00 All pages at Revision C 2 15 2000 Patents This Product is covered by one or more o...

Page 3: ...rical Physical 13 Chapter 2 Installation Safety Warnings 16 Unpacking Your Firewall 16 V 35 Shunt Procedure 17 Cabling Your Firewall 18 Chapter 3 Software Loading and Configuration Loading your Software 22 Wizard Setup 24 IP Wizard Setup 25 Default WAN Link Configuration 27 Chapter 4 Firewall Software Introduction 30 Before You Begin 30 Firewall Setup 31 Changing IP Parameters 32 Changing PPP SLIP...

Page 4: ...uction 74 Firewall Management Menu 75 Web Browser Management 76 Chapter 8 Warranty Service and Tech Support Introduction 80 Limited Warranty 80 On line Warranty Registration 80 Tech Support 81 Recording Firewall Information 81 Service 82 About the Internet 83 Ordering Accessories 83 Appendixes Appendix A TCP IP Transmission Control Protocol Internet Protocol Description 86 Appendix B Cabling Diagr...

Page 5: ...Chapter 1 Introduction and Description ...

Page 6: ...provides easy to use configuration menus Figure 1 1 Firewall MTPSR1 120 Preview of this Guide This guide describes the Firewall and tells you how to install and configure the unit The information contained in each chapter is as follows Chapter 1 Introduction and Description Chapter 1 describes the Firewall s front panel indicators and back panel connectors and switch and includes a list of relevan...

Page 7: ...NT PC users for Internet access via the Firewall Chapter 6 Remote Configuration Chapter 6 provides procedures for changing the configuration of a remote Firewall Using remote configuration you can change the configuration of a remote unit by simply connecting two modems between the Firewalls with a special remote configuration cable between the remote modem and the remote Firewall s command port a...

Page 8: ...or failed and shows if the power On Off switch on the back of the Firewall is turned On Figure 1 2 Front Panel ETHERNET 1 and 2 RCV Receive Data indicator blinks when packets are being received from the private Ethernet 1 or public Ethernet 2 LANs XMT Transmit Data indicator blinks when packets are being transmitted to the private Ethernet 1 or public Ethernet 2 LANs LNK Link indicator lights when...

Page 9: ...hunt must be moved from the default RS232 position to the V 35 position for details on this procedure refer to Chapter 2 V 35 Shunt Procedure Ethernet 1 and 2 10Base T Connectors The Ethernet 10Base T connectors are used to connect the Firewall to a 10 MB LAN using unshielded twisted cable Ethernet 1 connects the private LAN and Ethernet 2 connects the public LAN These connectors are RJ 45 jacks C...

Page 10: ...d to the ETHERNET 1 jack on the back panel of the Firewall Internet access is provided through a cable modem or DSL modem that is connected to the ETHERNET 2 jack on the Firewall MTPSR1 120 Firewall IP Address 192 168 0 101 Mask 255 255 255 0 Internet Novell Server IP Address 192 168 0 102 Windows NT Server IP Address 192 168 0 103 Mail Server IP Address 192 168 0 104 Workstation IP Address 192 16...

Page 11: ...ddress 192 168 0 102 Windows NT Server IP Address 192 168 0 103 Mail Server IP Address 192 168 0 104 Workstation IP Address 192 168 0 105 Workstation IP Address 192 168 0 106 Workstation IP Address 192 168 0 107 HUB TM TM LAN 1 Private LAN 2 Public Video Server IP Address 204 26 12 40 Web Server IP Address 204 26 12 20 FTP Server IP Address 204 26 12 30 HUB Private LAN Router IP address 204 26 12 ...

Page 12: ... Address 192 168 0 101 Mask 255 255 255 0 Internet Novell Server IP Address 192 168 0 102 Windows NT Server IP Address 192 168 0 103 Mail Server IP Address 192 168 0 104 Workstation IP Address 192 168 0 105 Workstation IP Address 192 168 0 106 Workstation IP Address 192 168 0 107 HUB TM TM LAN 1 Private LAN 2 Public Video Server IP Address 204 26 12 40 Web Server IP Address 204 26 12 20 FTP Server...

Page 13: ...T twisted pair RJ 45 jacks Command Port Single 19 2K bps asynchronous Command Port using an RJ 45 to DB 9 female cable WAN Link One RS232 V 35 port connector DB 25 female Electrical Physical Voltage 115 VAC Standard 240 Volts AC Optional Frequency 47 to 63 Hz Power Consumption 10 Watts Dimensions 1 625 high x 6 wide x 9 deep 5 63 cm high x 22 34 cm wide x 22 34 cm deep Weight 2 pounds 92 kg ...

Page 14: ...14 MTPSR1 120 Firewall User Guide ...

Page 15: ...Chapter 2 Installation ...

Page 16: ...k of electrical shock from lightning 7 Do not use the phone to report a gas leak in the vicinity of the leak 8 To reduce the risk of fire use only No 26 AWG or larger Telecommunication line cord Unpacking Your Firewall The shipping box contains the Firewall external power supply power cord Command Port RJ 45 to DB 9 cable your Quick Start Guide and a CD ROM with the Firewall Software and the Firew...

Page 17: ...abinet Mounting Screw 3 While supporting the back panel turn the Firewall right side up tilt the back panel down and slide the circuit board assembly out of the chassis 4 Place the circuit board assembly on a flat grounded surface 5 Carefully remove the shunt from the RS232 position and insert it in the V 35 position Figure 2 3 5 6 7 8 V 35 Shunt Position RS232C Shunt Position Back Panel Connector...

Page 18: ...lows details the steps for connecting the cables to your Firewall Power Connection Secure LAN Internet LAN WAN Connection 2 ETHERNET COMMAND 10BASET 10BASET ON OFF 1 RS232 V 35 POWER Command Cable supplied Figure 2 4 Cable Connections 1 With the ON OFF switch set to OFF connect one end of the power supply to a live AC outlet and connect the other end to the Firewall as shown in Figure 2 4 The powe...

Page 19: ... However if the RS232 V 35 connector on the Firewall is going to be connected to a WAN device i e connecting your secure private LAN to an ISP connect one end of an RS232 or V 35 interface cable to the RS232 V 35 connector on the back of the Firewall Connect the other end of this cable to the WAN device 6 Apply power to the Firewall by setting the ON OFF switch on the back panel to the ON position...

Page 20: ...20 Dual Ethernet ProxyServer User Guide ...

Page 21: ...Chapter 3 Software Loading and Configuration ...

Page 22: ...rectly from a COM port of a local PC For configuring over a network your PC must first be configured for network communications i e TCP IP stack must be installed and both the PC and the Firewall must be on the same physical LAN segment If you need to load the TCP IP stack refer to Chapter 5 Client Setup 2 Insert the Firewall CD ROM into the CD ROM drive on your local PC The CD ROM should start au...

Page 23: ... 300 6 The Select Program Folder dialog box enables you to name the program group for the Firewall 3 00 icons You can either select the default name Firewall Version 3 00 or name it anything you like Click Next or press Enter to continue 7 The next dialog box enables you to designate the COM port of your PC that is connected to the Firewall On the Select Port field click the down arrow and select ...

Page 24: ...g the basic information needed to configure your Firewall This screen will guide you through entering the IP Address Net Mask and Default Route for your Secure private LAN Then you can set up for static or dynamic addressing on the Internet LAN Port set up the Gateway Parameters and then do the same for the WAN port if it is used 9 Click Yes to run the Wizard Setup Clicking No takes you to the pro...

Page 25: ...to the unique parameters for your Secure private LAN connected to the ETHERNET 1 Port Follow the onscreen instructions Secured LAN ETHERNET 1 Setup 11 If an Internet public LAN is connected to the ETHERNET 2 Port click the Internet LAN option in the Select Port window then either leave the DHCP Client option enabled or disable uncheck it and assign the proper IP Address Net Mask and DNS Server add...

Page 26: ...dress Mask option enabled or disable uncheck it and assign the proper IP Address and Net Mask for your WAN port If your connection to the Internet is through the WAN port follow the onscreen instructions select WAN in the Gateway Parameters group then enter a Host Name in the field provided 13 Click OK when you are finished configuring the IP parameters The Default WAN Link s Setup dialog box is d...

Page 27: ...up dialog box the Default WAN Link s Setup dialog box will appear as follows with the Enable checked and everything active proceed to step 15 to complete the information needed on the dialog box 15 Click the down arrow for Modem Type and select from the listing the type of device that is connected to the RS232 V 35 connector then click the down arrow for Speed and if necessary reduce the setting t...

Page 28: ...you can now install on your PC s hard drive either Acrobat Reader by clicking the Acrobat Reader icon or the User Guide To install the User Guide click the Install Manuals icon and the file will install at C Program Files Multi Tech Systems Inc PSR1 120 Documentation unless you browse and select an alternate directory for installation 23 At this time your Firewall is operational Now verify that ea...

Page 29: ...Chapter 4 Firewall Software ...

Page 30: ...moves the Firewall configuration software from your PC The Upgrade Firewall feature checks the Firewall downloads the default setup then downloads two binary files newboot bin and fwxxx bin that upgrade the Firewall User Filter Management enables you to establish a User Database add Groups and Users to the database and assign authentications to the Groups and the User Monitoring feature enables yo...

Page 31: ...display and change the IP settings define the WAN ports change features such as the Internet DHCP Server Proxy Server and Virtual Servers display statistics on the WAN port control activation of Telnet TFTP and Web servers and dumb terminal management test the communications link print messages received from the target Firewall and download setup information to the Firewall In addition to the Stat...

Page 32: ...up will vary depending on the LAN configuration The Internet LAN Port Parameters group defines the static or dynamic addressing scheme for the public LAN connected to ETHERNET 2 on the back panel of the Firewall DHCP Client The DHCP Dynamic Host Configuration Protocol Client option can be used if your Internet Services Provider ISP is able to dynamically provide the registered Internet IP addresse...

Page 33: ... should enter the Host Name if any you received from your service provider DNS Server This field identifies the IP address of the domain name server responsible for resolving domain names for the client systems If you use the Internet LAN port and DHCP is enabled leave the default 0 0 0 0 and the DHCP Server will supply the IP address however if you use the WAN port you will need to enter the DNS ...

Page 34: ...mple Static Route IP Address 200 1 1 0 indicates that PC clients on Routers with IP addresses beginning with 200 1 1 will be included on the static route The Gateway Address must be the IP address of the local router Gateway Address 192 168 2 1 on the next hop toward the target host and the port i e LAN with which it is associated The Address Mask is the IP subnetwork mask 255 255 255 0 of the tar...

Page 35: ... also enabled Verify with your ISP to ensure that they support VJC The Data Compression option on this dialog box compresses the entire data packet DO NOT ENABLE this option if you are downloading from the Internet data that is already compressed the extra attempt to compress the packet data will probably greatly slow down the download process If your ISP supports SLIP Serial Line Internet Protoco...

Page 36: ...etup dialog box will appear in the Dial Number window of the Connection Method group If the DCE device connected to the RS232 V 35 port on the Firewall is a synchronous device then the Mode group on this dialog box has to be changed to Synchronous and the clocking of the device determined If the DCE device provides the clocking then the External Clock option needs to be enabled If the clocking is ...

Page 37: ... Range field Excluded addresses individual IP addresses or ranges of addresses are computers with static IP addresses e g a DNS server a WINS server and the DHCP server itself You can also add delete edit and bind addresses using the corresponding buttons in this group The Option Types and Values group at the bottom of the dialog box enables you to customize the configuration of the client platfor...

Page 38: ...ications is important as new software programs are continually being developed to perform useful tasks For example you may want to add new database managers spreadsheets communications packages graphics programs etc anything that would make your job easier Editing considerations might involve enabling disabling protocols individually both TCP and UDP are enabled by default changing the Port Name i...

Page 39: ... these items are selected or entered clicking OK will add the new port usage to the existing list of supported usages To further enhance the security of the firewall network you can if necessary change the FTP Control Port and Data Port numbers from their reserved values 21 and 20 respectively as shown below on the FTP Port Numbers Configuration dialog box If you do change these numbers be sure to...

Page 40: ...dress so the router knows where the traffic is coming from and where to send the reply In our Internet connection shown above we have assigned an IP address of 192 168 0 20 to the Web server address 192 168 0 30 to the FTP server address 192 168 0 40 to the Mail or E Mail server and address 192 168 0 101 to the Firewall To reduce the number of static IP addresses a virtual server feature in the Fi...

Page 41: ...filter by functionality the activity of the traffic to and from the Internet The addresses that we assigned to our servers in the virtual server example are unregistered addresses that are only seen by the Firewall These local IP addresses are arbitrarily assigned to servers in our virtual server connection example These local addresses are then individually mapped one at a time to the global addr...

Page 42: ... list on the Virtual Server Setup dialog box as shown on the following screen Had we accessed the Internet through the Firewall s WAN port instead of the Router we could ve mapped the three servers on the Private LAN to a Global Dynamic WAN port address Everything else on the Virtual Server Setup dialog box would be the same as shown on the above screen ...

Page 43: ...e 1 to 16 characters and is not case sensitive Then verify that all needed applications are enabled To disable support for any of the applications Telnet TFTP Web Server or Dumb Terminal Management click the corresponding check box to clear it For more information on using these remote configuration applications refer to Chapter 5 Clicking the SNTP Simple Network Time Protocol button on the Applic...

Page 44: ...e Internet account The maximum baud rate and modem type are also displayed In the Current Connection group the Connect String field displays a message e g CONNECT 115200 reported by the modem when the call connected The Port Status field displays the current status of the selected port e g PPP Client Up The IP Address group displays the parameters of the current connection and the Uptime field sho...

Page 45: ...nables the other two tabs so you can then set up Users and Groups and later manage and monitor them Note If Enable UserDataBase is later disabled unchecked the various groups of Blocked Sites and Allowed Sites that you have set up will be applied to everyone on your network i e there will be NO AUTHENTICATION In normal usage however with Enable UserDataBase enabled checked the Web sites requiring ...

Page 46: ...efined as administrative units comprised of one or more users with similar needs for network resources Once users are placed in groups resource access can be managed on a group basis rather than an individual basis For example it is much easier to manage five groups of 20 each than 100 individual users Groups or Workgroups are assigned names for organizational purposes and convenience and the grou...

Page 47: ...ted site For a more detailed description of User Management refer to the Helps provided with your Firewall software Access Rights The Access Rights tab on the UserFilter Database dialog box enables you to add ranges of IP addresses where no authentication is needed i e all Groups will have free access all the time Here too you can add ranges of application ports together with the corresponding pro...

Page 48: ...amp the entries In addition to Close and Help buttons this dialog box includes a Refresh Server List button and a History button Clicking the History button displays a History screen below which enables you to view today s history or the history of events that occurred on a different day that you select This History dialog box comes up initially with today s date however you can use the drop down ...

Page 49: ...Chapter 5 Client Setup ...

Page 50: ...et port and assigned user names and passwords to the WAN links All these factors play a role in client configuration Make certain that you are aware of the decisions made prior to setting up client PCs PC To access the Firewall your PC must have communications capability including hardware such as a network card and any necessary software If the Firewall does not automatically assign an IP address...

Page 51: ...les only Please select options appropriate to your system 1 Click Start Settings Control Panel then double click the Network icon The Network dialog box Configuration tab is displayed which shows all the network components e g clients adapters protocols and any services installed on your PC 2 If TCP IP is listed proceed to step 3 otherwise refer to Installing TCP IP Win98 95 at the end of this sec...

Page 52: ...n if necessary click the box to the left of TCP IP so this entry is enabled checked When you are finished click OK to return to the Network dialog box Note There may be other protocols listed and enabled under your Ethernet adapter This does not affect the TCP IP protocol Rather it simply means your computer will accept messages using those protocols as well as TCP IP 5 Select TCP IP then click Pr...

Page 53: ...all DHCP status with your network administrator then proceed to step 7 for DHCP assigned addressing or to step 8 for manual addressing 7 If DHCP Services are active on the Firewall default verify that the Obtain an IP address automatically option is selected You are done go to step 17 to reboot your PC and attempt to open an Internet session 8 If DHCP Services are NOT active on the Firewall you wi...

Page 54: ...ress This address is entered in dotted decimal notation and is comprised of four groups octets separated by periods or dots If a group has fewer than 3 digits type the necessary digits and press the space bar to move to the next group When you are finished verify that the IP address is identical to the IP address you were given for your PC 10 Click the Gateway tab ...

Page 55: ... In the New gateway field enter the IP address of the Firewall s Ethernet port and click Add The new gateway address is displayed in the list of Installed gateways 12 Click the DNS Configuration tab Verify that Enable DNS is selected checked ...

Page 56: ...st below the address field Your network may have more than one DNS server allowing you to use a secondary DNS server if the primary DNS server is not available If this is the case add the IP address of the secondary DNS server using the same procedure as with the first Note The address that is displayed first at the top of the list is the primary server the first one searched You can drag and drop...

Page 57: ...ing steps 18 and 19 If you encounter problems contact your administrator 18 Initiate an Internet session by double clicking your browser icon or try to FTP a file Note The Firewall operates transparently so there should not be a need for any special proxy settings on your IP applications e g browser Telnet or FTP Set up each application as No Proxy or equivalent or connect to the Internet over the...

Page 58: ...t click the manufacturer option Microsoft in the example to highlight it A list of available protocols will appear in the Network Protocols list 4 In the Network Protocols list select TCP IP and click OK 5 Exit the add option Click the OK button Note If Windows does not find the necessary files on the hard drive click Have Disk and follow the onscreen instructions for loading TCP IP from the insta...

Page 59: ... appropriate to your network 1 Click Start Settings Control Panel Double click the Network icon 2 The Network dialog box is displayed Click the Protocols tab A list of protocols currently present on your PC is displayed Check the installed protocols If you find TCP IP Protocol listed proceed to step 4 If TCP IP is not listed you must install it prior to proceeding Refer to Installing TCP IP WinNT ...

Page 60: ...e entry for your Ethernet card adapter to expand the list of bindings Verify that TCP IP Protocol is included in the bindings below your adapter Note There may be other protocols in the list under your Ethernet adapter This does not affect the TCP IP protocol Rather it simply means your computer will accept messages using those protocols as well as TCP IP 6 Click the Protocols tab ...

Page 61: ...e to assign your IP address manually Verify the Firewall DHCP status with your network administrator then proceed to step 9 for DHCP assigned addressing or to step 10 for manual addressing 9 If DHCP Services are active on the Firewall the default verify that the Obtain an IP address from a DHCP server option is enabled checked At this point you are done Go to step 20 and attempt to open an Interne...

Page 62: ...or dots If a group has fewer than 3 digits type the necessary digits and press the space bar to move to the next group When you are finished verify that the IP address is identical to the IP address you were given for your PC 12 In the Subnet Mask field type the subnetwork mask assigned by your administrator When you are finished verify the new mask 13 In the Default Gateway field type the IP addr...

Page 63: ... organization s domain name usually the organization name followed by one of the following extensions com edu gov org mil or net For example multitech com 17 In the DNS Server Search Order group click Add The TCP IP DNS Server dialog box is displayed 18 In the DNS Server field place the cursor in the first group and type the IP address of your LAN s DNS server provided by your network administrato...

Page 64: ...K You are returned to the Network dialog box Use the following checklist to record all the configuration settings for future use IP Address PC IP Address ProxyServer Host User Name Domain DNS Server Address Network Adapter Manufacturer Model Number Configuration Checklist 20 Reboot the PC for changes to take effect At this point your client setup is complete Test your setup by performing steps 21 ...

Page 65: ...ayed with a list of available protocol options Highlight TCP IP Protocol and click OK If necessary e g the operating system does not find the necessary files on the hard drive click the Have Disk button then follow the instructions provided onscreen 3 You are returned to the Network dialog 4 Reboot your PC for changes to take effect 5 Open the Control Panel and double click the Network icon to ret...

Page 66: ...66 MTPSR1 120 Firewall User Guide ...

Page 67: ...Chapter 6 Remote Configuration ...

Page 68: ...onfiguration Modem based 1 At the remote site disconnect the serial cable from the PC to the Command port jack on the Firewall 2 At the remote site connect a special cable Remote Configuration Cable between the Command Port jack on the back panel of the Firewall and the DB 25 RS232 connector on the modem The special cable is a serial cable with male connectors on both ends Connect the modem to you...

Page 69: ...h dialog box and field within a dialog box 10 After you have changed the configuration of the remote Firewall click Download Setup to update the configuration The remote Firewall will be brought down the new configuration written to the unit and the unit will reboot 11 Click Exit when the downloading is complete 12 The Hangup connection with Router dialog box is displayed Click Yes to disconnect t...

Page 70: ...n Port Setup icon in the Firewall Version 3 00 program group 3 The Port Setup dialog box is displayed Verify that IP is selected in the Communication Type group In the Firewall IP Address field enter the IP Address of the remote Firewall unit Click OK when you are satisfied with your selections 4 Run the Firewall Configuration program Click Start Programs Firewall Version 3 00 Firewall Configurati...

Page 71: ...wnload Setup to update the configuration The remote Firewall will be brought down the new configuration written to the unit and the unit will reboot 9 Click Exit when the downloading is complete 10 Double click the Firewall Configuration icon in the Program Manager screen once more to verify that the Firewall is running ...

Page 72: ...72 MTPSR1 120 Firewall User Guide ...

Page 73: ...Chapter 7 Firewall Management ...

Page 74: ...n work in your environment refer to Chapter 4 in this User Guide For a detailed description of each parameter refer to the on line Help provided within your Firewall software The TCP IP stack has to be loaded before the Telnet client can run and the Telnet Server option in the Firewall software has to be enabled To access the Telnet Client double click the Telnet icon A blank Telnet screen is disp...

Page 75: ...able you to gather various kinds of statistics or display a System Information screen Firewall Configuration Selecting Option 2 displays the Firewall Configuration menu with options that enable you to configure Firewall parameters set up various servers or reset the Firewall For more details on Firewall configuration refer to Chapter 4 Firewall Software and the Helps WAN Device Configuration Selec...

Page 76: ...ault users can access the Firewall by entering its IP address in the destination field of their Web browser The following screen appears The User Name and Password on this screen can be ignored unless you have enabled and set up a username database To log in to the Firewall configuration program click the words click here The Enter Network Password screen is displayed Type supervisor in the User N...

Page 77: ...ewall Management From this screen you can either access any of the configuration options or switch to the Standard View below to access the same options Refer to Chapter 4 Firewall Software for descriptions of the various options ...

Page 78: ...78 MTPSR1 120 Firewall User Guide ...

Page 79: ...Chapter 8 Warranty Service and Tech Support ...

Page 80: ...BY DISCLAIMED This warranty does not apply to any products which have been damaged by lightning storms water or power surges or which have been neglected altered abused used for a purpose other than the one for which they were manufactured repaired by the customer or any party without MTS s written authorization or used in any manner inconsistent with MTS s instructions MTS s entire obligation und...

Page 81: ...is connected to the RS232 V 35 connector on the back panel of your Firewall before calling tech support Also note the status of your Firewall including LED indicators screen messages diagnostic test results problems with a specific application etc Use the space below to note the Firewall status ________________________________________________________________________________________________________...

Page 82: ...nt if the Firewall is out of warranty Check with your technical support specialist for the standard repair charge for your Firewall if possible note the name of the technical support specialist with whom you spoke If you need to inquire about the status of the returned product be prepared to provide the serial number of the product sent Send your Firewall to this address MULTI TECH SYSTEMS INC 220...

Page 83: ...b site at http www multitech com and an FTP site at ftp ftp multitech com Ordering Accessories SupplyNet Inc supplies replacement transformers cables and connectors for select Multi Tech products You can place an order with SupplyNet via mail phone fax or the Internet at Mail SupplyNet Inc 614 Corporate Way Valley Cottage NY 10989 Phone 800 826 0279 Fax 914 267 2420 Email info thesupplynet com Int...

Page 84: ...84 MTPSR1 120 Firewall User Guide ...

Page 85: ...Appendixes ...

Page 86: ...tagram to another host on the same network the sending application must know both the IP and MAC addresses of the intended receiver Unfortunately the IP process may not know the MAC address of the receiver The Address Resolution Protocol ARP described in RFC 826 http info internet isi edu 80 in notes rfc files rfc826 txt provides a mechanism for a host to determine a receiver s MAC address from th...

Page 87: ...info internet isi edu 80 in notes rfc files rfc1945 txt being the most current HTML WWW pages are written in the Hypertext Markup Language HTML an ASCII based platform independent formatting language per RFC 1866 http info internet isi edu 80 in notes rfc files rfc1866 txt Finger used to determine the status of other hosts and or users per RFC 1288 http info internet isi edu 80 in notes rfc files ...

Page 88: ...ork and host Network addresses come in five classes A B C D and E Each class of network address is allocated a certain number of host addresses For example a class B network can have a maximum of 65 534 hosts while a class C network can have only 254 The class A and B addresses have been exhausted and the class D and E addresses are reserved for special use Consequently companies now seeking an In...

Page 89: ...Clock A Receive Clock A External TX Clock B Receive Clock B Transmit Clock A Transmit Clock B 1 7 4 5 6 8 20 2 3 12 22 23 17 25 18 15 21 1 7 4 5 6 8 20 2 3 12 22 23 17 25 18 15 21 To WAN Device To WAN Port Ethernet Cables 10BaseT Pin Circuit Signal Name 1 TD Data Transmit Positive 2 TD Data Transmit Negative 3 RD Data Receive Positive 6 RD Data Receive Negative Command Port Cable RJ 45 PIN NO 4 7 ...

Page 90: ...inal Ready Transmit Data A Receive Data A Transmit Data B Receive Data B External TX Clock A Receive Clock A External TX Clock B Receive Clock B Transmit Clock A Transmit Clock B A B C D E F H P R S T U V W X Y a 1 7 4 5 6 8 20 2 3 12 22 23 17 25 18 15 21 The RS 232C Interface circuits have been designed to meet the electrical specifications given in EIA Electronic Industries Association RS 232C a...

Page 91: ...you will find in the Help file in your Firewall software Following the list of commands is an example script Commands by Function Dial Connection and Remote ACTIVATEDOD BAUDRATE BREAK GETCTS GETDCD HANGUP PARITYR GETC RGETS RXFLUSH SETDTR SETRTS STOPBITS THISLAYERUP TRANSMIT TXFLUSH WAITFOR Mathematical functions DEC INC Miscellaneous EXIT WAIT Program constructs FOR IF PROC SWITCH WHILE String op...

Page 92: ...1 shell_menu choice shell_menu_response 1 transmit A wait 1 transmit T M waitfor OK 10 transmit A wait 1 transmit T wait 1 transmit DT963 M if waitfor login_prompt 60 then transmit user_name transmit M if waitfor password_prompt timeout then transmit password transmit M if waitfor shell_menu timeout then transmit shell_menu_response transmit M else transmit Shell Menu Not Received M endif else tra...

Page 93: ...ent and receiver Connect the equipment to an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC rules Operation is subject to the following two conditions 1 This device may not cause harmful interference 2 This device must accept any interference received including...

Page 94: ...94 MTPSR1 120 Dual Ethernet ProxyServer User Guide ...

Page 95: ...Glossary of Terms ...

Page 96: ... possible characters The extended ASCII file provides 255 characters Asynchronous Transfer Mode ATM A very high speed method of transmission that uses fixed size cells of 53 bytes to transfer information over fiber also known as cell relay AT Commands A standard set of commands used to configure various modem parameters establish connections and disconnect The AT is used to get the attention of th...

Page 97: ...t use the same logical link control protocol but that can use different medium access control protocols A bridge forwards a frame to another bridge based on the medium access control MAC address 3 In the connection of local loops channels or rings the equipment and techniques used to match circuits and to facilitate accurate data transmission Buffer A temporary storage register or Random Access Me...

Page 98: ...elay service provider Compression 1 The process of eliminating gaps empty fields redundancies and unnecessary data to shorten the length of records or blocks 2 In SNA the replacement of a string of up to 64 repeated characters by an encoded control byte to reduce the length of the data stream to the LU LU session partner The encoded control byte is followed by the character that was repeated unles...

Page 99: ... g a sequence of voltage pulses Digital devices such as terminals and computers transmit data as a series of electrical pulses which have discrete jumps rather than gradual changes Digital Signaling Rates DSn A hierarchical system for transmission rates where DS0 is 64 Kbps equivalent to ISDN B channel and DS1 is 1 5 Mbps equivalent to ISDN PRI Digital Transmission A method of electronic informati...

Page 100: ...ns together With this method a congestion condition is identified and fixed before it becomes critical Contrast with implicit congestion Extended Super Frame ESF One of two popular formats for framing bits on a T1 line ESF framing has a 24 frame Superframe where robbed bit signaling is inserted in the LSB bit 8 of the DS 0 byte of frames 6 12 18 and 24 ESF has more T1 error measurement capabilitie...

Page 101: ...networks or systems of different architectures A bridge interconnects networks or systems with the same or similar architectures 2 A network that connects hosts Graphical User Interface GUI A type of computer interface consisting of a visual metaphor of a real world scene often of a desktop Within that scene are icons representing actual objects that the user can access and manipulate with a point...

Page 102: ... a Touch Tone phone Ericsson and a KTS Key Telephone Set L LAPB Link Access Procedure Balanced based on the X 25 Layer 2 specification A full duplex point to point bit synchronous protocol commonly used as a data link control protocol to interface X 25 DTEs LAPB is the link initialization procedure that establishes and maintains communications between the DTE and the DCE LAPD Link Access Protocol ...

Page 103: ...a computer to transmit information over a telephone line It converts the computer s digital signals into analog signals to send over a telephone line and converts them back to digital signals at the receiving end Modems can be internal and fit into an expansion slot or external and connect to a serial port MultiLink PPP ML PPP A bandwidth on demand technology that allows one logical PPP connection...

Page 104: ...d by the process of transmission Commonly used data field lengths in packets are 128 or 256 bytes 5 The field structure and format defined in the CCITT X 25 recommendation Packet Assembler Dissembler PAD Used by devices to communicate over X 25 networks by building or stripping X 25 information on or from a packet Packet Data The information format packetized used for packet mode calls Packet Mode...

Page 105: ...primary workspace All data must be stored in RAM even for a short while before software can use the processor to manipulate the data Before a PC can do anything useful it must move programs from disk to RAM When you turn it off all information in RAM is lost Rate Enforcement The concept in frame relay where frames sent faster than the CIR are to be carried only if the bandwidth is available otherw...

Page 106: ...odem and use a handset to talk to another user at the same time over the same connection The alternative making a second call can be expensive or even impossible The uses for SVD are telecommuting videoconferencing distant learning tech support etc Stop Bit One of the variables used for timing in asynchronous data transmission Depending on the devices each character may be trailed by 1 1 5 or 2 st...

Page 107: ...s an external T1 CSU Transmission Control Protocol Internet Program TCP IP A multilayer set of protocols developed by the US Department of Defense to link dissimilar computers across dissimilar and unreliable LANs Terminal The screen and keyboard device used in a mainframe environment for interactive data entry Terminals have no box which is to say they have no file storage or processing capabilit...

Page 108: ... using HDLC or other character oriented protocol V 54 The ITU T standard for local and remote loopback tests in modems DCEs and DTEs The four basic tests are local digital loopback tests DTE send and receive circuits local analog loopback tests local modem operation remote analog loopback tests comm link to the remote modem and remote digital loopback tests remote modem operation Virtual Circuit A...

Page 109: ...t 9 DCE See Data Communications Equipment DHCP Client 32 DHCP Relay Agent 32 DHCP Server 37 DNS 87 Download Firmware 30 E Enabling the DHCP Server 37 Ethernet 1 and 2 Connectors 9 F Finger 87 Firewall Configuration 31 Front Panel 8 LEDs 8 FTP 87 G Gopher 87 H HTML 87 HTTP 87 I Installing TCP IP Win95 98 58 Installing TCP IP WinNT 65 Internet 83 Internet Gateway Parameters 33 Internet LAN Port Para...

Page 110: ...P Parameters 32 Proxy Applications 38 WAN Port Parameters 35 Specifications 11 T TCP IP 86 Tech Support 81 Technical Specifications 11 Telnet 87 Client 74 Traceroute 87 Transmission Control Protoco 86 Typical Applications Configuration 1 Cable DSL Modem 10 Configuration 2 Existing Dual LAN with Router11 Configuration 3 New Dual LAN with T1 DSU 12 U Uninstall Proxy Server Configuration 30 Unpacking...

Reviews: