Page 146 / 161 Scroll up to view Page 141 - 145
146
Appendix A
CONFIG Commands
you have assigned a name to your Cayman Gateway, you can enter that name in
the
Address
text field of your browser to open a connection to your Cayman Gate-
way.
.
Specifies the types of log messages you want the Cayman Gateway to record. All
messages with a level number equal to or greater than the level you specify are
recorded. For example, if you specify set system diagnostic-level 3, the diagnostic
log will retain high-level informational messages (level 3), warnings (level 4), and
failure messages (level 5).
Use the following values for the
level
argument:
1
or
low
- Low-level informational messages or greater; includes trivial status
messages.
2
or
medium
- Medium-level informational messages or greater; includes sta-
tus messages that can help monitor network traffic.
3
or
high
- High-level informational messages or greater; includes status mes-
sages that may be significant but do not constitute errors.
4
or
warning
- Warnings or greater; includes recoverable error conditions
and useful operator information.
5
or
failure
- Failures; includes messages describing error conditions that
may not be recoverable.
Specifies the administrator or user password for a Cayman Gateway. When you
enter the
set system password
command, you are prompted to enter the
old password (if any) and new password. You are prompted to repeat the new
password to verify that you entered it correctly the first time. To prevent anyone
from observing the password you enter, characters in the old and new passwords
are not displayed as you type them.
A password can be as many as eight characters. Passwords are case-sensitive.
Passwords go into effect immediately. You do not have to restart the Cayman
Gateway for the password to take effect. Assigning an administrator or user pass-
word to a Cayman Gateway does not affect communications through the device.
Some broadband cable-oriented Service Providers use the
System
Name
as an important identification and support parameter. If your
Gateway is part of this type of network, do
NOT
alter the System Name
unless specifically instructed by your Service Provider
BOTH
set system diagnostic-level
level
BOTH
set system password { admin | user }
Downloaded from
www.Manualslib.com
manuals search engine
Page 147 / 161
147
Appendix A
CONFIG Commands
Traffic Shaping Settings
Traffic shaping lets you control how much traffic can flow through an Ethernet
interface by limiting the size of the WAN “pipe.” This function is most suitable for
Internet Service Providers or multi-interface routers.
When you use the traffic-shaping option to set the maximum speed for a router
port, the router will silently discard any packets that exceed the maximum port
speed.
Enables or disables traffic-shaping in the Cayman Gateway.
Enables or disables traffic-shaping on the designated Ethernet interface.
Specifies the maximum number of bits that can be transmitted.
ENET
set trafficshape option { on | off }
ENET
set trafficshape ethernet option { on | off }
ENET
set trafficshape ethernet rate [ 56000 - 10000000 ]
Downloaded from
www.Manualslib.com
manuals search engine
Page 148 / 161
148
Appendix B
Glossary
Appendix B
10Base2
IEEE 802.3 specification for Ethernet that uses thin coaxial cable to run
at 10 Mbps. Limited to 185 meters per segment. 10Base5 IEEE 802.3
baseband physical layer specification for Ethernet that uses thick
coaxial cable to run at 10 Mbps. Limited to 500 meters per segment.
10Base-T
IEEE 802.3 specification for Ethernet that uses unshielded twisted pair
(UTP) wiring with RJ-45 eight-conductor plugs at each end. Runs at 10
Mbps.
-----A-----
ACK
Acknowledgment. Message sent from one network device to another
to indicate that some event has occurred. See NAK.
access rate
Transmission speed, in bits per second, of the circuit between the end
user and the network.
adapter
Board installed in a computer system to provide network communica-
tion capability to and from that computer system.
address mask
See subnet mask.
ADSL
Asymmetric Digital Subscriber Line. Modems attached to twisted pair
copper wiring that transmit 1.5-9 Mbps downstream (to the sub-
scriber) and 16 -640 kbps upstream, depending on line distance.
AH
The
A
uthentication
H
eader provides data origin authentication, con-
nectionless integrity, and anti-replay protection services. It protects
all data in a datagram from tampering, including the fields in the
header that do not change in transit. Does not provide confidentiality.
ANSI
American National Standards Institute.
ASCII
American Standard Code for Information Interchange (pronounced
ASK-ee). Code in which numbers from 0 to 255 represent individual
characters, such as letters, numbers, and punctuation marks; used in
text representation and communication protocols.
asynchronous
communication
Network system that allows data to be sent at irregular intervals by
preceding each octet with a start bit and following it with a stop bit.
Compare synchronous communication.
AUI
Attachment Unit Interface. Connector by which a thick (802.3) Ethernet
transceiver cable is attached to a networked device.
Auth Protocol
Authentication Protocol for IP packet header. The three parameter val-
ues are None, Encapsulating Security Payload (ESP) and Authentication
Header (AH).
-----B-----
backbone
The segment of the network used as the primary path for transporting
traffic between network segments.
baud rate
Unit of signaling speed equal to the number of number of times per
second a signal in a communications channel varies between states.
Baud is synonymous with bits per second (bps) if each signal repre-
sents one bit.
binary
Numbering system that uses only zeros and ones.
Blowfish
A 64-bit block cipher, contains a variable length key of maximum 448
bits.
Downloaded from
www.Manualslib.com
manuals search engine
Page 149 / 161
149
Appendix B
bps
Bits per second. A measure of data transmission speed.
BRI
Basic Rate Interface. ISDN standard for provision of low-speed ISDN
services (two B channels (64 kbps each) and one D channel (16 kbps))
over a single wire pair.
bridge
Device that passes packets between two network segments according
to the packets' destination address.
broadcast
Message sent to all nodes on a network.
broadcast address
Special IP address reserved for simultaneous broadcast to all network
nodes.
buffer
Storage area used to hold data until it can be forwarded.
-----C-----
carrier
Signal suitable for transmission of information.
CAST
Encryption algorithm using variable key length of maximum 128 bits.
CCITT
Comité Consultatif International Télégraphique et Téléphonique or
Consultative Committee for International Telegraph and Telephone.
An international organization responsible for developing telecommu-
nication standards.
CD
Carrier Detect.
CHAP
Challenge-Handshake Authentication Protocol. Security protocol in
PPP that prevents unauthorized access to network services. See RFC
1334 for PAP specifications Compare PAP.
client
Network node that requests services from a server.
CPE
Customer Premises Equipment. Terminating equipment such as termi-
nals, telephones and modems that connects a customer site to the
telephone company network.
CO
Central Office. Typically a local telephone company facility responsible
for connecting all lines in an area.
compression
Operation performed on a data set that reduces its size to improve
storage or transmission rate.
crossover cable
Cable that lets you connect a port on one Ethernet hub to a port on
another Ethernet hub. You can order an Ethernet crossover cable from
network supply companies such as Black Box.
CSU/DSU
Channel Service Unit/Data Service Unit. Device responsible for con-
necting a digital circuit, such as a T1 link, with a terminal or data com-
munications device.
CTS
Clear to Send. Circuit activated in hardware flow control when a
modem (or other DCE) is ready to accept data from the computer (or
other DTE). Compare RTS, xon/xoff.
-----D-----
data bits
Number of bits used to make up a character.
datagram
Logical grouping of information sent as a network-layer unit. Compare
frame, packet.
DCE
Digital Communication Equipment. Device that connects the commu-
nication circuit to the network end node (DTE). A modem and a CSU/
DSU are examples of a DCE.
dedicated line
Communication circuit that is used exclusively to connect two network
devices. Compare dial on demand.
DES
D
ata
E
ncryption
S
tandard is a 56-bit encryption algorithm developed
by the U.S. National Bureau of Standards (now the National Institute of
Standards and Technology).
Downloaded from
www.Manualslib.com
manuals search engine
Page 150 / 161
150
Appendix B
3DES
Triple DES, with a 168 bit encryption key, is the most accepted variant
of DES.
DH Group
Diffie-Hellman is a public key algorithm used between two systems to
determine and deliver secret keys used for encryption. Groups 1, 2
and 5 are supported. Also, see Diffie-Hellman listing.
DHCP
Dynamic Host Configuration Protocol. A network configuration proto-
col that lets a router or other device assign IP addresses and supply
other network configuration information to computers on your net-
work.
dial in
Port setting that specifies that other routers can initiate a connection
to the local router but that the local router cannot initiate a connection
to other routers. A port can be set as both dial in and dial out. Com-
pare dial out.
dial on demand
Communication circuit opened over standard telephone lines when a
network connection is needed.
dial out
Port setting that specifies that it can initiate a connection to other
routers but that other routers cannot initiate a connection to it. A port
can be set as both dial in and dial out. Compare dial in.
Diffie-
Hellman
A group of key-agreement algorithms that let two computers compute
a key independently without exchanging the actual key. It can gener-
ate an unbiased secret key over an insecure medium.
domain name
Name identifying an organization on the Internet. Domain names con-
sists of sets of characters separated by periods (dots). The last set of
characters identifies the type of organization (.GOV, .COM, .EDU) or
geographical location (.US, .SE).
domain name server
Network computer that matches host names to IP addresses in
response to Domain Name System (DNS) requests.
Domain Name System
(DNS)
Standard method of identifying computers by name rather than by
numeric IP address.
DSL
Digital Subscriber Line. Modems on either end of a single twisted pair
wire that delivers ISDN Basic Rate Access.
DTE
Data Terminal Equipment. Network node that passes information to a
DCE (modem) for transmission. A computer or router communicating
through a modem is an example of a DTE device.
DTR
Data Terminal Ready. Circuit activated to indicate to a modem (or
other DCE) that the computer (or other DTE) is ready to send and
receive data.
-----E-----
echo interval
Frequency with which the router sends out echo requests.
Enable
This toggle button is used to enable/disable the configured tunnel.
encapsulation
Technique used to enclose information formatted for one protocol,
such as AppleTalk, within a packet formatted for a different protocol,
such as TCP/IP.
Encrypt Protocol
Encryption protocol for the tunnel session.
Parameter values supported include NONE or ESP.
encryption
The application of a specific algorithm to a data set so that anyone
without the encryption key cannot understand the information.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top