The BANDIT Device in the Network

Size: px
Start display at page:

Download "The BANDIT Device in the Network"

Transcription

1 encor! enetworks TM Version A.1, March Encore Networks, Inc. All rights reserved. The BANDIT Device in the Network The BANDIT II and the BANDIT III, ROHS-compliant routers in the family of BANDIT (Broadband Access Network Device for Intelligent Termination ) products, provide a strong combination of security, diagnostics, and network management features for Virtual Private Network (VPN) applications and for support of legacy protocols over IP networks. The BANDIT II is a streamlined desktop model; it complies with the European Union s directive on Reduction of Hazardous Substances (ROHS). The BANDIT III is a full-featured tabletop model, built to withstand environments encountered in support of utility networks. It also complies with ROHS. The BANDIT II and the BANDIT III can support legacy protocols, or VPN tunnels, or both. When a VPN requires tunnel termination between the central office and its remote user sites, the BANDIT II and the BANDIT III can each terminate up to 30 VPN tunnels at remote locations. Access to Encore Networks extensive protocol library provides seamless connection to the Internet. And the BANDIT III s automatic dial backup feature guarantees reliable network performance. Figure 1-1 illustrates how a BANDIT product can play an integral part in typical network applications. Figure 1-1. Typical VPN Network Application For information on trademarks, safety, limitations of liability, and similar topics, see Notices. Home Module: Product Overview Document 1

2 Page 2 Product Overview Module, Document Features The BANDIT products support VPNs and perform legacy-to-ip protocol encapsulation. The BANDIT products provide a rich array of features: Hardware-assisted VPN security options Auto-initiated dial backup Extensive statistics for network monitoring Remote datascope for port capture Generic management capability via comprehensive SNMP and intelligent traps that guarantee data delivery Remote software control of clock source (internal clocking or loop-timed clocking) from the network RS-232 interface support (DCE or DTE) on all serial ports Direct Ethernet connections via 10/100-Base-T RJ45 connectors One or two CDMA, GPRS GSM, or EDGE GSM wireless connections Data routing over IP (Encapsulates specific protocols within IP packets and routes the IP packets to destination IP addresses.) Data routing over Frame Relay (Encapsulates and routes specific protocols over DLCs according to protocol addresses.) On the dual T1/E1 expansion port module: Drop-and-insert capability for transmission of data packets and voice packets over a common T1 or E1 line Support of legacy protocols transported over IP or Frame Relay Dedicated local Supervisory port with menu-driven interface Remote configuration and management via Telnet or SNMP, accessed through any IP data stream into the unit Multiple levels of password protection Reception and transmission of ping in IP environments Maintenance of configuration in non-volatile memory, to recover from power outages Inclusion of Flash memory to allow easy upgrades Connection to -24/-48 V DC or -12/-24 V DC power source, or to external low-voltage power supply for adaptability to 100V AC to 240V AC power source, or to both In addition, the BANDIT products allow you to connect virtually any data communications equipment to access Frame Relay network services. In this way, you can extend the useful life of installed applications and equipment that do not support direct connection to a Frame Relay network. 1.2 Functionality The BANDIT products support IP, Frame Relay, PPP, and X.25. The BANDIT III also supports a V.90/V.92 modem. The BANDIT II and the BANDIT III can each support up to

3 The BANDIT Device in the Network Page 3 30 VPN tunnels. In addition, the BANDIT II and BANDIT III support VPN clients for connection from remote, temporary sites. The BANDIT II or BANDIT III can function as any of the following devices: Network access device (using its FRAD functionality) IP router IP firewall Terminal server Wired or wireless gateway VPN gateway The Networking Environment The BANDIT products can operate in a broad range of communications environments and can support a wide variety of applications for example: Users with IBM equipment using the Synchronous Data Link Control (SDLC) protocol can enjoy the benefits of higher speed, greater reliability, and substantially reduced line costs inherent in most Frame Relay networks. Local Area Network (LAN) users can take advantage of built-in IP routing. Multiport units allow legacy applications such as SNA and asynchronous traffic to be carried along with LAN internetworking traffic through a single Frame Relay network interface. The BANDIT products can use generic route encapsulation (GRE) to carry Frame Relay over the Internet Protocol (IP). With this feature, all legacy protocols that Frame Relay can carry can travel over IP networks, including the internet. Equipment using asynchronous protocols through dial back-up modems, such as the Unix-to-Unix Copy Program (UUCP), can be connected through a highly reliable digital Frame Relay interface, which can be configured for speeds up to kbps. Users with an investment in X.25 networking equipment have two options: - They can use X.25 as a network protocol in the unit, assigning VCs to Data Link Connection Identifiers (DLCIs) in order to direct data through the network. - They can replace the underlying X.25 network with lower-cost, higher-performance Frame Relay service by using the unit to maintain an X.25-compatible interface to the terminal equipment (using the Annex G capability provided in the unit) Wireless Connectivity The BANDIT II and BANDIT III support connection to CDMA, EVDO, GPRS GSM, and EDGE GSM wireless networks Encapsulation, Routing, and Protocol Emulation The BANDIT products provide three levels of support encapsulation, routing, and protocol emulation depending on the specific protocol being carried.

4 Page 4 Product Overview Module, Document Encapsulation Encapsulation is a method of packaging data of one protocol into packets, cell, or frames of another protocol. This is used to send data of one protocol over a network of a different protocol. For example, one can send data of a given protocol over a Frame Relay network by adding Frame Relay formatting to the data. Encapsulation works with a wide variety of protocols because a device is not required to have knowledge of the original protocol (that is, the encapsulated protocol); it does not use any information contained in the original protocol to route the information. The BANDIT III can encapsulate data over the protocols listed in Table 1-1. Table 1-1. Protocol Routing Protocols Routing Method IP: SLIP, PPP, Ethernet, generic By IP address to support meshed LAN route encapsulation (GRE) environments Point-to-Point Protocol over By MAC address of the destination node, Ethernet (PPPoE) encapsulated inside Ethernet packets SDLC/SNA By SDLC address to emulate multi-drop lines X.25 By X.121 address to emulate a switched X.25 environment Frame Relay By DLCI to act as a Frame Relay concentrator or Frame Relay switch (feeding Frame Relay streams to other Frame Relay-compatible devices) In most types of networks, header information in the packets or cells of the encapsulating protocol are used to route the data to its destination. In Frame Relay networks, encapsulation results in a point-to-point circuit in which data cannot be routed independently. A multi-port unit can carry several of these point-to-point circuits over a single Frame Relay interface. With encapsulation, the unit determines which PVC to use based on the physical user port carrying the data. Frame Relay encapsulation in the BANDIT works as follows: 1 The unit accepts data from a terminal device. 2 The data is encapsulated with a Frame Relay-compatible packet header and trailing CRC. 3 The data is transmitted over a Frame Relay network. 4 The Frame Relay envelope is removed at the remote end to recreate the original protocol Routing Routing is a method of relaying data over networks. IP routing uses RIP or static tables to send packets to their destinations. A Frame Relay network uses addresses to determine the destination. For certain protocols, the BANDIT examines the addressing information contained in the original data to determine which PVC will carry the data. As a result, the unit can emulate multipoint networks by routing information according to the protocol address. Protocols are routed as shown in Table 1-1.

5 The BANDIT Device in the Network Page Protocol Emulation The BANDIT uses protocol emulation (also known as spoofing ) to act as a polling device when relaying traffic. Polled protocols use communications lines more efficiently, often using multi-drop architectures. To allow multiple devices to relay traffic through a single communications line, one device is configured as a master. This master device controls communications with all other devices on the line (the slaves). In this configuration, the master polls the slaves to see if they have any data to transmit. The master also selects slaves to receive its information Virtual Private Networks A virtual private network (VPN) comprises two or more private endpoints transmitting secure communication over a public network. Software at each endpoint encrypts data and then tunnels the data over the public network. Tunneling encapsulating data within secure packets isolates the private data from other traffic carried by the public network, providing secure transport over the network. The destination endpoint authenticates and decrypts the packets. The BANDIT II and BANDIT III support IPsec with DES, 3DES, and AES for virtual private networks. The BANDIT II and the BANDIT III can each handle up to 30 local VPN tunnel initiations and terminations. The BANDIT products use Encore Networks Selective Layer Encryption (SLE, patent pending) to optimize use of VPNs with the performanceenhancing proxies (PEPs) of satellite networks Firewall Security Protection The BANDIT II and BANDIT III support the firewall security protection listed below. Network Address Translation (NAT) - Syslog daemon support IP Filtering - Source host address - Source port number - Destination host address - Destination port number - Protocol (TCP, UDP, ICMP) - Flags (ACK, RST) - Address spoofing TCP/IP Environments The BANDIT products accept both native IP traffic from a direct Ethernet connection and IP data encapsulated in async/sync PPP (RFC 1331) or SLIP (RFC 1055). IP traffic is encapsulated according to the RFC 1490 standard. The encapsulated packets are then routed according to IP addressing. In addition, the BANDIT can convert IP over PPP to IP over Frame Relay, which provides non-frame Relay routers with a means of accessing Frame Relay networks.

6 Page 6 Product Overview Module, Document 1 The BANDIT can also use generic route encapsulation (GRE) to carry Frame Relay frames within IP packets. This allows Frame Relay networks another route into IP networks, including the internet Address Resolution Protocol The BANDIT supports the Address Resolution Protocol (ARP) on the Ethernet, mapping IP addresses to Medium Access Control (MAC) addresses. For example, if you want to make an IP connection between your host and another, you must specify in the configuration the IP Address of the destination host. In addition, you must specify the destination host s MAC address, which is physically encoded on a chip in the destination device. The softwareconfigured IP Addresses are mapped to their corresponding hardware-encoded MAC addresses in an ARP Table of Addresses. When you attempt to send data to a given IP address, the unit looks at its ARP Table to find the MAC address associated with that IP address. If no match is found, the unit broadcasts an ARP Request to the network, asking if any device in the network knows the MAC address for the IP Address you have specified. If your device receives a response (ARP Response) identifying the MAC address that corresponds to the IP Address, your unit enters this information into its ARP Table and initiates the connection you requested. The updated information in the ARP Table remains intact for a configured number of seconds or minutes. The reason the information is not held indefinitely is that if the chip that holds the MAC address in a given device is replaced with a new chip (and new hardwareencoded MAC address), the ARP Table will be out of date. By dropping entries from the ARP Table within a specified number of seconds or minutes, the device is forced to update the information constantly. The unit s ARP table stores up to 500 entries. Entries are aged and deleted after 20 minutes of inactivity. If the table is full, a new entry is written over the oldest entry Inverse Address Resolution Protocol The BANDIT products also respond to Inverse Address Resolution Protocol (Inverse ARP) requests on the Frame Relay network port per RFC 1293, allowing discovery of the IP address associated with a given MAC address. This means that, when an Inverse ARP request is received over one of the unit s DLCIs, the unit responds with its configured IP address. Although the BANDIT products respond to Inverse ARP requests, they do not generate Inverse ARP requests Frame Relay Transporting data over a Frame Relay network has many benefits: Can carry many connections over a single line. Shares bandwidth with multiple applications and/or call sessions. Can handle bursty traffic. Provides high speed and low delay similar to Time Division Multiplexing (TDM). In some areas, access (not based on amount of usage) to public Frame Relay services usually costs less than leased lines.

7 The BANDIT Device in the Network Page 7 The BANDIT provides a cost-efficient means for connecting legacy equipment to a Frame Relay network by translating protocols into a format that can be transmitted over a Frame Relay network. After the BANDIT translates the data, it routes the data across the Frame Relay network to another unit or Frame Relay-compatible device. When the data reach the destination device, they are translated back to the original protocol. The BANDIT can also concentrate and switch multiple sources of Frame Relay traffic simultaneously. 1.3 Network Management The BANDIT provides a way to monitor important Frame Relay, IP, and other information. You can establish network management as follows: The DB9 Supervisory port is an RS-232 DCE interface that allows you to connect a PC or other terminal to the BANDIT, so that you can configure and monitor the BANDIT device. Using Telnet or HyperTerminal, you have full access to configuration menus and statistics. Local or remote password-protected access is available from the WAN and LAN ports. The SNMP agent includes MIB extensions, traps for dynamic alarms, port capture, and guaranteed trap delivery.

8 Page 8 Product Overview Module, Document 1

enetworks TM BANDIT, C2C, and VSR-1200 Document Set List of Groups and Modules

enetworks TM BANDIT, C2C, and VSR-1200 Document Set List of Groups and Modules encor! enetworks TM Version A.4, January 2013 Document Part Number 16568.0000 2013 Encore Networks, Inc. All rights reserved. BANDIT, C2C, and VSR-1200 Document Set List of Groups and Modules The BANDIT,

More information

Configuring a BANDIT Product for Virtual Private Networks

Configuring a BANDIT Product for Virtual Private Networks encor! enetworks TM Version A, March 2008 2013 Encore Networks, Inc. All rights reserved. Configuring a BANDIT Product for Virtual Private Networks O ne of the principal features in the BANDIT family of

More information

! encor e networks TM

! encor e networks TM ! encor e networks TM Revision I.2, April 2009 Document Part Number 14973.1001 Copyright 2009 Encore Networks, Inc. All rights reserved. BANDIT, BANDIT IP, and BANDIT Plus Installation Guide for ELIOS

More information

! encor en etworks TM

! encor en etworks TM ! encor en etworks TM Version A, March 2010 2013 Encore Networks, Inc. All rights reserved. Configuring the BANDIT III s T1 E1 Card for a PCM Voice Network The T1 E1 card fits into the expansion slot on

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

This chapter discusses Synchronous Data Link Control (SDLC) protocols that you can configure on a BANDIT device s ports. See the following sections:

This chapter discusses Synchronous Data Link Control (SDLC) protocols that you can configure on a BANDIT device s ports. See the following sections: encor! enetworks TM Version A, September 2010 2010 Encore Networks, Inc. All rights reserved. SDLC Protocol Configuration This chapter discusses Synchronous Data Link Control (SDLC) protocols that you

More information

The BANDIT Products in Virtual Private Networks

The BANDIT Products in Virtual Private Networks encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their

More information

High Performance VPN Solutions Over Satellite Networks

High Performance VPN Solutions Over Satellite Networks High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have

More information

! encor e networks TM

! encor e networks TM ! encor e networks TM Version A, March 2008 Document Part Number 16568.0000 Copyright 2008 Encore Networks, Inc. All rights reserved. BANDIT II and BANDIT III Document Set List of Modules Note: For lists

More information

Post-Class Quiz: Telecommunication & Network Security Domain

Post-Class Quiz: Telecommunication & Network Security Domain 1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

Section 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture

Section 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture Chapter 11 SNMP and Port Data Capture This module discusses the Simple Network Management Protocol (SNMP) and the BANDIT device s Port Data Capture feature, and how they can be used to augment or enhance

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering Introduction Digi Connect Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering The Digi Connect supports five features which provide security and IP traffic forwarding when using incoming

More information

Load Balance Router R258V

Load Balance Router R258V Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest

More information

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by

More information

GPRS and 3G Services: Connectivity Options

GPRS and 3G Services: Connectivity Options GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview

More information

! encor e networks TM

! encor e networks TM ! encor e networks TM Revision B, March 2008 Document Part Number 15953.0001 Copyright 2008 Encore Networks, Inc. All rights reserved. BANDIT Products Wireless Access Guide For BANDIT, BANDIT IP, BANDIT

More information

GPRS / 3G Services: VPN solutions supported

GPRS / 3G Services: VPN solutions supported GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive

More information

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability. WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband

More information

GHz 2.4 802.11g. Wireless-G. User Guide. ADSL Gateway with 2 Phone Ports WIRELESS WAG54GP2. Model No.

GHz 2.4 802.11g. Wireless-G. User Guide. ADSL Gateway with 2 Phone Ports WIRELESS WAG54GP2. Model No. GHz 2.4 802.11g WIRELESS Wireless-G ADSL Gateway with 2 Phone Ports User Guide Model No. WAG54GP2 Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

More information

How To Set Up A Netvanta For A Pc Or Ipad (Netvanta) With A Network Card (Netvina) With An Ipa (Net Vanta) And A Ppl (Netvi) (Netva)

How To Set Up A Netvanta For A Pc Or Ipad (Netvanta) With A Network Card (Netvina) With An Ipa (Net Vanta) And A Ppl (Netvi) (Netva) VPN WAN LAN PWR STAT TD RD TD RD TD RD VPN WAN LAN PWR STAT TD RD TD RD TD RD NetVanta 3200 NetVanta 3200 NetVanta Series (with T1/FT1 or T1/FT1 + DSX-1 Network Interface Module) Quick Configuration Guide

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions Applications What are some of the applications for the Model 2120 Single Port Terminal Server? The Patton Single Port RS-232 Terminal Server provides the ability to bring virtually any RS-232 device onto

More information

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)

More information

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.

More information

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

L2F Case Study Overview

L2F Case Study Overview LF Case Study Overview Introduction This case study describes how one Internet service provider (ISP) plans, designs, and implements an access virtual private network (VPN) by using Layer Forwarding (LF)

More information

Gigabit Content Security Router

Gigabit Content Security Router Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

The Product Description of SmartAX. MT882 ADSL2+ Router

The Product Description of SmartAX. MT882 ADSL2+ Router The Product Description of SmartAX MT882 ADSL2+ Router HUAWEI Huawei Technologies Co., Ltd Table of Contents Product Description...1 1. Preface...1 2. Highlights...1 3. Features and Benefits...2 4. Technical

More information

Configure ISDN Backup and VPN Connection

Configure ISDN Backup and VPN Connection Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint

More information

TK700 +70 C -25 C 95% RH EMC TK701G TK701U TK704G TK704U TK704W. TK-Series Cellular Router

TK700 +70 C -25 C 95% RH EMC TK701G TK701U TK704G TK704U TK704W. TK-Series Cellular Router +70 C -25 C 95% RH EMC TK701G TK701U TK704G TK704U TK704W The industrial 2G GPRS- and 3G UMTS routers offered by Welotec enables the access to Ethernet devices or a local network remotely via mobile network

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

Using Remote Desktop Software with the LAN-Cell

Using Remote Desktop Software with the LAN-Cell Using Remote Desktop Software with the LAN-Cell Technote LCTN0010 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail:

More information

Configuring T1 and E1 WAN Interfaces

Configuring T1 and E1 WAN Interfaces Configuration Guide 5991-3823 December 2005 Configuring T1 and E1 WAN Interfaces This configuration guide explains the processes for configuring your Secure Router Operating System (SROS) T1/E1 product

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

WANic 800 & 805. 1 or 2 HSSI ports Up to 52 Mbps/port. WANic 850 & 855. 1 or 2 T3 or E3 ports Full-speed CSU/DSU. WANic 880.

WANic 800 & 805. 1 or 2 HSSI ports Up to 52 Mbps/port. WANic 850 & 855. 1 or 2 T3 or E3 ports Full-speed CSU/DSU. WANic 880. WANic P C I S O L U T I O N S WANic PCI cards are high-performance synchronous WAN adapters for use in standard Linux PCs and Industrial Series routers from ImageStream. WANic adapters include one, two,

More information

Avaya IP Office. Converged Communications. Contact Centres Unified Communication Services

Avaya IP Office. Converged Communications. Contact Centres Unified Communication Services Avaya IP Office Converged Communications Streamlining and simplifying communications by bringing your voice, data and Internet all together IP Telephony Contact Centres Unified Communication Services Simplicity

More information

Quidway AR 18-1X Series Router Datasheet

Quidway AR 18-1X Series Router Datasheet Quidway AR 18-1X Series Router Datasheet Table of Contents 1 Introduction... 1-2 2 Key Benefits... 2-4 2.1 Diverse and Flexible Interfaces... 2-4 2.2 Abundant Security functionality... 2-4 2.3 Easy Network

More information

Cisco 1600 Series Modular Desktop Access Routers

Cisco 1600 Series Modular Desktop Access Routers Cisco 1600 Series Modular Desktop Access Routers Product Overview The Cisco 1600 series have become the proven choice for data access for small branch offices and small businesses because they offer a

More information

Galileo International. Firewall & Proxy Specifications

Galileo International. Firewall & Proxy Specifications Galileo International Technical Support Documentation Firewall & Proxy Specifications For Focalpoint, Viewpoint & Focalpoint Print Manager (GALILEO and APOLLO PRODUCTION SYSTEMS) Copyright Copyright 2001

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

DSL-2600U. User Manual V 1.0

DSL-2600U. User Manual V 1.0 DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Enterprise Edge Communications Manager. Data Capabilities

Enterprise Edge Communications Manager. Data Capabilities Enterprise Edge Communications Manager Data Capabilities Data Module Objectives After the completion of this module you will be able to describe the following Data components of the Enterprise Edge Communications

More information

WAN Failover Scenarios Using Digi Wireless WAN Routers

WAN Failover Scenarios Using Digi Wireless WAN Routers WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Secure Remote Access at the Heart of the Small Business Network Highlights Dual WAN connections for load balancing and connection redundancy

More information

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c

Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c telco Leased Line CSU/DSU Local Telephone Company Owns the cables and has right of way

More information

3G uplink for Primary or Backup; Support L2TP VPN, Firewall, Anti-DoS, Anti-ARP, Anti-Scanning;

3G uplink for Primary or Backup; Support L2TP VPN, Firewall, Anti-DoS, Anti-ARP, Anti-Scanning; Gazelle R102i Manged Industrial-grade Ethernet Router Gazelle R102i is a managed industrial-grade Ethernet Router manufactured by Raisecom, which serves as ideal solution for outdoor networking deployment

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack Network Security Total solution for your network security With the growth of the Internet, malicious attacks are happening every minute, and intruders are trying to access your network, using expensive

More information

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller 52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities

More information

Product Overview. Features CHAPTER

Product Overview. Features CHAPTER CHAPTER 1 This chapter describes the Cisco IAD1101 integrated access device chassis, and the line interface modules supported by the Cisco IAD1101. This chapter includes the following sections: Features

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide VOIP-211RS/210RS/220RS/440S SIP VoIP Router User s Guide Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has

More information

Downloaded from www.manualslib.com manuals search engine

Downloaded from www.manualslib.com manuals search engine Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.

More information

Cisco RV215W Wireless-N VPN Router

Cisco RV215W Wireless-N VPN Router Data Sheet Cisco RV215W Wireless-N VPN Router Simple, Secure Connectivity for the Small Office and Home Office Figure 1. Cisco RV215W Wireless-N VPN Router The Cisco RV215W Wireless-N VPN Router provides

More information

How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker

How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1 Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides simple,

More information

Introduction. Technology background

Introduction. Technology background White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course

More information

DMP Network Monitoring

DMP Network Monitoring Contents Introduction... 1 The Monitoring Advantage.2 Savings... 2 Speed... 2 Quality of Service... 2 Security... 2 How to Further Minimize the Risk... 3 DMP Communication... 3 XT Series, XR100N, XR500N,

More information

Getting Started KX-TDA5480

Getting Started KX-TDA5480 4-Channel VoIP Gateway Card Getting Started KX-TDA5480 Model KX-TDA0484 Thank you for purchasing the Panasonic 4-Channel VoIP Gateway Card, KX-TDA5480/KX-TDA0484. Please read this manual carefully before

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

AP200 VoIP Gateway Series Design Features & Concept. 2002. 3.5 AddPac R&D Center

AP200 VoIP Gateway Series Design Features & Concept. 2002. 3.5 AddPac R&D Center AP200 VoIP Gateway Series Design Features & Concept 2002. 3.5 AddPac R&D Center Contents Design Features Design Specifications AP200 Series QoS Features AP200 Series PSTN Backup Features AP200 Series Easy

More information

EdgeMarc 4508T4/4508T4W Converged Networking Router

EdgeMarc 4508T4/4508T4W Converged Networking Router Introduction The EdgeMarc 4508T4W combines multiple voice and data features into a single, easy to use converged networking router. It includes models that have up to 4 T1 WAN interfaces or a single Ethernet

More information

Octal T1-10/100 RIOP Installation Guide

Octal T1-10/100 RIOP Installation Guide Octal T1-10/100 RIOP Installation Guide Compatible Systems Corporation 4730 Walnut Street Suite 102 Boulder, Colorado 80301 303-444-9532 800-356-0283 http://www.compatible.com Octal T1-10/100 RIOP Installation

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

X.25 over IP. The Challenge. How it Works. Solution

X.25 over IP. The Challenge. How it Works. Solution over IP The Challenge Legacy services such as are still in use worldwide for a range of applications. Over the years, many customers have made significant investments in equipment and processes that depend

More information

IP Router QUICK START GUIDE

IP Router QUICK START GUIDE IP Router QUICK START GUIDE Part Number: 002-0118-0210 Product Release: 2.97 August 2009 Copyright 2009 Force10 Networks Inc. All rights reserved. Force10 Networks reserves the right to change, modify,

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Getting Started. 16-Channel VoIP Gateway Card. Model No. KX-TDA0490

Getting Started. 16-Channel VoIP Gateway Card. Model No. KX-TDA0490 16-Channel VoIP Gateway Card Getting Started Model No. KX-TDA0490 Thank you for purchasing a Panasonic 16-Channel VoIP Gateway Card. Please read this manual carefully before using this product and save

More information

enetworks TM Using the Syslog Feature C.1 Configuring the Syslog Feature

enetworks TM Using the Syslog Feature C.1 Configuring the Syslog Feature encor! enetworks TM Version A, March 2010 2013 Encore Networks, Inc. All rights reserved. Using the Syslog Feature This document provides basic information for using the syslog feature in the ELIOS software.

More information

Leased Line PPP Connections Between IOS and HP Routers

Leased Line PPP Connections Between IOS and HP Routers Leased Line PPP Connections Between IOS and HP Routers This technical document describes how to connect an IOS Router to an HP Router using point-to-point protocol. An example of an IOS router connected

More information

GregSowell.com. Mikrotik Basics

GregSowell.com. Mikrotik Basics Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied

More information

Intranet Security Solution

Intranet Security Solution Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

Using a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note

Using a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note Using a Sierra Wireless AirLink Raven X or Raven-E with a Application Note Cisco routers deliver the performance, availability, and reliability required for scaling mission-critical business applications

More information

Unified Services Routers

Unified Services Routers High-Performance VPN Protocols IPSec PPTP L2TP SSL VPN Tunnels Up to 25 (DSR-250N) Up to 35 (DSR-500/500N) Up to 70 (DSR-1000/1000N) SSL VPN tunnels Up to 5 (DSR-250N) Up to 10 (DSR-500/500N) Up to 20

More information

TSC (Total Solution Communications Ltd)

TSC (Total Solution Communications Ltd) TSC (Total Solution Communications Ltd) 1 Parkway Drive, Mairangi Bay, North Harbour Phone: 09 477 2888 Fax: 09 477 2889 E-Mail: info@tsc.co.nz Web: www.tsc.co.nz A vaya IP Office Converged Communications

More information

Magnum Network Software DX

Magnum Network Software DX Magnum Network Software DX Software Release Notes Software Revision 3.0.1 RC5, Inc. www..com www..com/techsupport email: support@.com This document contains Confidential information or Trade Secrets, or

More information

ECB1220R. Wireless SOHO Router/Client Bridge

ECB1220R. Wireless SOHO Router/Client Bridge Wireless SOHO Router/Client Bridge 2.4GH 802.11 b/g 54Mbps PRODUCT DESCRIPTION ECB-1220R is a 2.4GHz 802.11b/g broadband Wi-Fi Router with advanced AP/Client Bridge/Repeater functions. So you could implement

More information

TDM services over IP networks

TDM services over IP networks Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router Gigabit Multi-Homing VPN Security Router Physical Port 1~2 x 10/100/1000 Base-T RJ-45, configurable with LAN 1 (Mirror Port) 3~4 x 10/100/1000 Base-T RJ-45, configurable with WAN 4 (WAN 4 / LAN2 / DMZ)

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents

Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents Title Six Steps To Getting Your Network Ready For Voice Over IP Date January 2005 Overview This provides enterprise network managers with a six step methodology, including predeployment testing and network

More information