S&C Instruction Sheet 1074-530
21
Network Configuration
The dialog shown in Figure 38 will open when a MAC-specific key is used to encrypt
or decrypt the configuration file. A network configuration file should only be encrypted
with a MAC address once when the radio is initially deployed. If the radio has already been
deployed, then a different encryption/decryption key should be used.
Figure 38. Configuration File MAC Address specification for MAC-specific encryption/
decryption.
Configuration files are always encrypted to prevent tampering with radio configuration
and to prevent snooping radio configurations during configuration uploads. When a keyset
is used to encrypt/decrypt the configuration, the target radio must have that same keyset
loaded to successfully upload and implement the network configuration.
Click on any of the tabs shown in Figure 36 on page 20 to setup the network
configuration for the area listed in that tab. Network configuration functions parallel
the corresponding tabs in the SpeedNet Client Tool, but instead of applying to the radio
the client is connected to, the settings developed in the network configuration are saved
in a file that can be uploaded and applied to the corresponding radio by using the cli-
ent tool’s
Set Network Configuration
function described in the “Security Window,
Encryption Tab” section on page 41.
The network configuration areas are described below.
Figure 39. Network Configuration of Ethernet Interface.
Figure 39 shows the
Network Configuration
window for configuring the Ethernet
interface. The
IP Address
,
Subnet Mask,
and
MTU
settings function the same as in
the corresponding
SpeedNet Client
window as described in the “Interfaces Window,
Ethernet Tab” section starting on page 29. There is no
Apply
button on this window since
application to a radio is deferred until uploaded using the SpeedNet Client tool.
Please note that on a given SpeedNet ME Radio mesh, the configurations of all the
Ethernet interfaces should differ such that there is no overlap between the Ethernet port
subnets or between the Ethernet port subnets and the wireless subnet.