M ELSA MicroLink Cable Manual TM
© 1999 ELSA AG, Aachen (Germany) While the information in this manual has been compiled with great care, it may not be deemed an assurance of product characteristics. ELSA shall be liable only to the degree specified in the terms of sale and delivery. The reproduction and distribution of the documentation and software supplied with this product and the use of its contents is subject to written authorization from ELSA.
Preface Thank you for placing your trust in this ELSA product. With the ELSA MicroLink Cable, you have chosen a modem that will open the door to the Internet for you with unparalleled speeds and remain online permanently. The highest quality standards in manufacturing and stringent quality control are the basis for high product standards and consistent product quality.
V Content Introducing the ELSA MicroLink Cable .....................................................................1 The ELSA MicroLink Cable takes the stage............................................................ 1 What does the unit look like? ............................................................................ 1 Node or hub?...................................................................................................... 3 The highlights of the ELSA MicroLink Cable .....................
English VI Content Security for your LAN............................................................................................ 30 Encryption ........................................................................................................ 31 TCP/IP packet filters ........................................................................................ 31 The hiding place—IP masquerading (NAT, PAT) ............................................ 31 IP routing......................................
VII Status/IP-router-statistics ............................................................................... 83 Status/config statistics.................................................................................... 85 Status/Queue-statistics ................................................................................... 85 Status/MCNS-statistics................................................................................... 87 Status/Init-status .............................................
Content English VIII ELSA Cable Modem
Introducing the ELSA MicroLink Cable 1 Introducing the ELSA MicroLink Cable Internet access is the main application for the ELSA MicroLink Cable. The operator of the cable network to which you have connected your modem may offer additional services or regional information. This chapter describes the display elements and connections of the modem, accessing the Internet, and the characteristics and techniques that ensure fast, secure data exchange.
2 Introducing the ELSA MicroLink Cable ON This LED flashes once when the power supply is switched on. After the self-test, either an error is output by a flashing light code or the device starts and the LED remains lit. Off Unit switched off, power supply plugged in red 1 x short Boot procedure (test and load) started red flashing Display of a boot error (flashing light code) red Standby Device ready for use This LED shows that the unit is in stand-by mode.
Introducing the ELSA MicroLink Cable LAN-Tx, -Rx, LAN-Coll, -Link 3 These LEDs show the corresponding network controller status: LAN -tx yellow Data packet sent from the device to the LAN LAN-Rx green Data packet received from the LAN LAN coll red Sending collision LAN-Link green Connection to LAN is established and ready Now turn the whole thing around and take a look at the rear.
4 Introducing the ELSA MicroLink Cable Node or hub? Please check the position of the Node/Hub switch when connecting the unit to the LAN: K As the factory default, the switch is set to 'Node'. In this setting, the device acts as a node on a network. It can, in this case, only be connected to a hub, not directly to the network card of a computer. K Set the switch to 'Hub' if you do not wish to connect the device to a hub but directly to a workstation.
Introducing the ELSA MicroLink Cable 5 Backbone Backbone: direct connection to the Internet The simple transfer rate between the network operator and participant does not by itself determine the speed at which the Internet can be accessed. The network operator must also forward data destined for the Internet to a backbone. The dimensioning of this connection ultimately determines the speed at which you can surf.
6 Introducing the ELSA MicroLink Cable Network operators can take advantage of this structure to provide regional content in addition to the Internet. This can be accomplished by setting up Web servers that do not need to be accessible from the Internet.
Introducing the ELSA MicroLink Cable 7 CE conformity and FCC radiation standard CE This equipment has been tested and found to comply with the limits of the European Council Directive on the approximation of the laws of the member states relating to electromagnetic compatibility (89/336/EEC) according to EN 55022 class B and EN55024. FCC This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the Federal Communications Commission (FCC) Rules.
8 Introducing the ELSA MicroLink Cable ELSA MicroLink Cable
9 Installation and configuration The aim of this chapter is to get you online as quickly as possible.
English 10 Installation and configuration First Steps 1 Give it some power First, give your device the power it needs through the power supply unit! 2 Onto the net Connect the unit to your local network using the twisted pair cable. Please check the position of the node/hub switch: 'Node' is the correct position when connecting the unit to a network. Switch to 'Hub' when connecting the unit directly to a workstation.
11 Quick Start: Quick configurations We're sure that after you've installed the hardware and software, you'll want to get going quickly without bothering with technical details. In the following sections, we'll show you how to set up your ELSA MicroLink Cable quickly for the most common applications—without bothering with the whys and wherefores. After the preparations that you should check in any case, we will introduce the configuration of the unit as a bridge and IP router.
English 12 Installation and configuration Internet Computer workstation in LAN IP address assignment MCNS/ DOCSIS Server with DHCP Headend Cable TV network ELSA MicroLink Cable as bridge In this example, only one computer is connected to the Internet via the ELSA MicroLink Cable. In principle however, several computers can be connected to the ELSA MicroLink Cable, using a hub for example, if the network operator permits.
13 The ELSA MicroLink Cable is now ready for use in bridge mode. Open your Web browser, and off you go into the Web with a whole new sensation of speed... If you can only access the Internet with a single computer while using this configuration, your cable network operator may have placed a limit on the maximum number of connected computers. Either ask your network operator to increase the number, or configure your ELSA MicroLink Cable as a router (with DHCP server and IP masquerading).
English 14 Installation and configuration b In order for a device to be able to assign addresses to other devices on a TCP/IP network, it first needs an IP address valid in the LAN itself (LAN-IP address). Click the entry in the device list to open the configuration dialog. If an entry doesn't exist yet, create a new one using Device E New. For the IP address, enter '10.0.0.254' or 'x.x.x.254', in which 'x.x.x' stands for the addresses previously in use in your network, if applicable.
15 f Go then to the 'Bridge' section and deactivate the option 'Bridge' on the 'General' tab. g Save the configuration with OK. The ELSA MicroLink Cable is now ready for use in router mode. Open your Web browser, and off you go into the Web with a whole new sensation of speed... If necessary, filters can be defined to restrict the exchange of data packets between the local network and the Internet.
English 16 Installation and configuration Assign fixed IP addresses in router mode with activated IP masquerading only. Otherwise, address conflicts with other users in your cable network may result when using router mode without IP masquerading, or bridge mode.
17 Configuration modes ELSA cable modems are always delivered with up-to-date software in which a number of the settings have already been prepared for you. It will nevertheless be necessary for you to add some information and configure them to your specific needs. These settings are made as part of the configuration process. This section will show you the programs and routes you can use to access the device and set it up.
18 Configuration modes English Starting inband configuration using ELSA LANconfig After the installation (double-click on 'autorun.exe') is complete, call up the ELSA LANconfig configuration tool, for example by clicking on Start E Programs E ELSAlan E ELSA LANconfig in the Windows task bar. ELSA LANconfig searches the local area network for ELSA MicroLink Cable devices. Just click on the Find button or call up the command with Device E Find to initiate a search for a new device manually.
19 Configuration commands Enter commands and path specifications using the normal DOS or UNIX conventions if you are using telnet or a terminal program to configure the device. Enter a forward slash or backslash to separate the path specifications. You do not need to write out commands and table entries in full; an unambiguous abbreviation will do. The entries for the categories MENU, VALUE, TABLE, TABINFO, ACTION and INFO will be displayed while configurations are made and may be modified.
English 20 Configuration modes Text entries with spaces are only accepted if they are placed in quotation marks, e.g. set/se/snmp/admin "The Administrator".
Configuration modes 21 English What's happening on the line? Trace Outputs Trace outputs may be used to monitor the internal processes in the cable modem during or after configuration. The trace outputs are slightly delayed behind the actual event, but are always in the correct sequence. This will not usually hamper interpretation of the displays but should be taken into consideration if making precise analyses.
English 22 Configuration modes This combination command ... brings up the following display for the trace: TCP-IP IP-Rt., IP-RIP, ICMP and ARP outputs Time Displays the system time in front of the actual trace output Source Includes a display of the protocol that has initiated the output in front of the trace. Any appended parameters are processed from left to right. This means that it is possible to call a parameter and then restrict it. Examples This code ... ...
K K 23 – The device no longer responds after loading the new firmware. If an error occurs during the upload, the router automatically reactivates the previous firmware version and reboots the device. 'Login': To avoid problems with faulty uploads there is the second option with which the firmware is uploaded and also immediately booted. – The difference to the first option is that the router then waits five minutes for a successful login to the device via outband or inband (via telnet).
24 Configuration modes English TFTP With TFTP you can use the writeflash command to install new firmware. To send a new firmware version which, for example, is in the 'LC_1000U.130' file, to a router with the IP address 194.162.200.17, you would enter the following command under Windows NT for example: tftp -i 194.162.200.17 put lc_1000u.130 writeflash This command sends the corresponding file to the router using the writeflash parameter. Binary file transfer must be set for TFTP.
25 SNMP V.
English 26 Configuration modes Bear in mind that the access protection given by the community mechanism in the SNMP V.1 is only very limited since the data, the MIB IDs and the communities are not encrypted in the UDP data blocks of requests and responses as they are transmitted. Deleting rows in tables using SNMP SNMP itself has no mechanisms intended for deleting. You therefore have to use a trick to delete entries from tables. If you need to delete a row, you have to change the index entry value, i.e.
27 b Open the corresponding table. If the table is empty, then empty columns will be displayed. c Click on Edit. It is now possible to display the values for every single column in the table. d Enter the index of the table and the value for the column to be subsequently placed, and click on Set at the right-hand side of the latter column. A new column with the new index and the value for another column should now appear.
Configuration modes English 28 ELSA MicroLink Cable
Operating modes and functions 29 Operating modes and functions This section is an introduction to the functions and operating modes of your device. It includes information on the following points: K K K K K Security for your configuration Security for your LAN IP routing Bridging DHCP server Along with the description of the individual points, we will also give you information to support you as you configure your device. Detailed sample configurations can be found in the Workshop.
30 Operating modes and functions a password to gain access to a network, a computer or another device. In order to do so, a computer can, for example, go through all the possible combinations of letter and numbers until the right password is found. As a measure of protection against such attacks, the maximum allowed number of unsuccessful attempts to Login can be set. If this limit is reached, the access will be barred for a certain length of time.
Operating modes and functions 31 Encryption Since cable modems transfer data via a cable shared by many participants, data should be encrypted to prevent access by the other participants. All data between the modem of the provider and the modem of the end users is automatically transferred in an encrypted state. This is where the DES encryption (Data Encryption Standard) with a code length of 56 comes in. In addition, the code in use is repeatedly changed during the transfer of data.
32 Operating modes and functions But this provokes objections from the network manager responsible for the security of data on the company's network: Every workstation computer on the WWW? Surely this means that anyone can get in from outside?—Not true! IP masquerading provides a hiding place for every computer while connected with the Internet. Only the router module of the unit and its IP address are visible on the Internet.
Operating modes and functions IP address IP netmask Router Distance 224.0.0.0 224.0.0.0 0.0.0.0 0 255.255.255.255 0.0.0.0 CABLE 1 192.168.130.0 255.255.255.0 191.168.140.123 1 33 What do the various entries on the list mean? K IP addresses and IP network masks This is the address of the destination network to which data packets may be sent and its associated network mask.
34 Operating modes and functions IP address IP netmask Router name Dist. This is what happens: 192.168.0.0 255.255.0.0 0.0.0.0 0 172.16.0.0 255.255.0.0 0.0.0.0 0 Excludes transmission of all data packets to networks using private address spaces. 10.0.0.0 255.0.0.0 0.0.0.0 0 224.0.0.0 224.0.0.0 0.0.0.0 0 CABLE 1 255.255.255.255 0.0.0.0 All data packets which cannot be allocated to the entries listed above are transmitted into the cable network.
Operating modes and functions 35 automatically incremented when the corresponding amount of time has elapsed. The distance is set to '16' after 3.5 minutes (route not reachable) and the route is deleted after 5.5 minutes. Now if the router receives an IP/RIP packet, it must decide whether or not to incorporate the route contained into its dynamic table. This is done as follows: K K K K The route is incorporated if it is not yet listed in the table (as long as there is enough space in the table).
36 Operating modes and functions Module/Local Routing On menu). This tells the router in your device to send the data packet to the other responsible router. The router will then no longer send any ICMP redirects. This may seem to be a good idea in principle, but local routing should still only be used as a last resort, since this function leads to doubling of the number of data packets being sent to the destination network required.
Operating modes and functions Cable TV network LAN of the user Cable IP address LAN IP address 37 MCNS ELSA MicroLink Cable Hub The cable modem is therefore assigned a cable IP address and a LAN IP address, each with its own appropriate network mask. Use the 'Masquerade' option to inform the cable modem which of the two addresses to use when transferring the packets. K K 'Off': No masquerading.
38 Operating modes and functions FTP server. The router knows the IP address of the FTP server in the LAN from the entry in the service table (in ELSA LANconfig in the 'TCP/IP' configuration section on the 'Masq.' tab or in the Setup/IP Router Module/Masquerading/Service Table menu). The packet is forwarded to this computer. All packets that come from the FTP server in the local network (answers from the server) are hidden behind the IP address of the router.
Operating modes and functions K K 39 Initially the router checks whether a DNS server has been entered in its own settings (in configuration tool ELSA LANconfig in the 'TCP/IP' configuration section on the 'Addresses' tab or in the /Setup/TCP-IP Module menu). If it finds it there, it will then retrieve the desired information from this server. If no DNS server has been entered in the cable modem, it tries to reach the network operator's DNS server to retrieve the IP address associated with the name.
40 Operating modes and functions What are the filter options? You may not always wish to transfer all data. Much of the data which is bouncing around in the LAN is of no interest to remote networks or computers. You can thus block transfer of the following data packets via the bridge: K K Broadcast packets: Data directed at all devices accessible in a network (Setup/ Bridge-Module/LAN-config/Broadcast).
Operating modes and functions 41 The cable modem really belongs to two LANs: K K On one side it is a part of the LAN of the cable network operator and forms a LAN together with the headend and all connected cable modems. The cable network operator assigns the IP addresses to the participants via DHCP. On the other side the cable modem forms a separate LAN with one or more connected computers. DHCP can also be used to manage addresses within your own LAN.
42 Operating modes and functions DHCP – 'on', 'off' or 'auto'? The DHCP server in the devices of ELSA can be set to three different states: K K K 'on': The DHCP server is permanently active. The configuration of the server (validity of the address pool) is checked when this value is entered. – When correctly configured, the device will be available to the network as a DHCP server. – In the event of an incorrect configuration (e.g.
Operating modes and functions 43 and the DHCP server attempts to reassign it this address if it has not already been assigned to another computer. The DHCP server also checks whether the address selected is still available in the local network. As soon as the uniqueness of an address has been established, the requesting computer is assigned the address found. Network mask assignment The network mask is assigned in the same way as the address.
44 Operating modes and functions For each request, a host can ask for a specific period of validity. However, a DHCP server can also assign the host a period of validity that differs from what it requested. The DHCP module provides two settings for influencing the period of validity: K Maximum lease time in minutes Here you can enter the maximum period of validity that the DHCP server assigns a host.
Operating modes and functions 45 The computer has made its initial request. The DHCP server verifies the uniqueness of the address that is to be assigned to the computer. K unknown While verifying uniqueness, it was determined that the address has already been assigned to another computer. Unfortunately, the DHCP server has no means of obtaining additional information on this computer. K status A computer has informed the DHCP server that it has a fixed IP address. This address can no longer be used.
46 Operating modes and functions ELSA MicroLink Cable
Technical basics 47 Technical basics This chapter is a short introduction into the technology used by your device. Network professionals will find themselves just skimming these pages, but novices will find this section to be very helpful for understanding the technical terms and processes. Cable modem technology The cable modem belongs to a new, promising generation of Internet access technology.
48 Technical basics computer. On the other side is the operator of the broadband cable network who would like to provide more than just radio and TV. A headend can accommodate up to 2000 individual users with cable modems like the ELSA MicroLink Cable. The headend functions as a multiport, however, giving every user access to the cable network at any time. Unlike access through analog or ISDN modems, there are no connection attempts that could fail because all of the provider's ports are already in use.
Technical basics 49 programs on their respective channels. Specific channels are also set up for the transmission of Internet content. Synchronizing Finding a channel in the broadband network After being switched on, the cable modem searches the entire frequency band for a channel used by the provider to send information from the Internet. Because the bandwidth is so great, the first time the log-on procedure might take a while.
50 Technical basics Network technology This section will give you a brief introduction to the basics of network technology. These descriptions do not cover all possible techniques, processes and terms associated with network technology. They only cover the topic to the degree necessary to provide an understanding of the product information. The network and its components Network, transmission medium, interfaces Whenever several computers communicate with one another, this connection is called a network.
Technical basics Host 51 Host Data packet Medium Access to the Internet is also established through point-to-point connections. Even though the data packets are sent from the host at the Internet user to the host at the Internet provider (server) via several routers, every data packet still has its own specific destination. Furthermore, the routers will only forward the data packets to one recipient. That's why we also call this connection unambiguous.
52 Technical basics Host: Sender Host Data packet with recipient information Host Host: Recipient Kinds of networks Protocol An important prerequisite for communications between computers is a common language among the hosts. In the world of network technology this language is called“network protocol” or simply“protocol”. TCP/IP The most broadly distributed network protocol is the TCP/IP (Transmission Control Protocol/Internet Protocol).
Technical basics 53 the actual information to be transmitted (useful data), the data packet also contains address and control information. IP address IP addresses are used in IP networks for communications between various devices. In this case, every host has its own unique address by which it can be identified unambiguously. What does an IP address look like? It consists of four bytes separated by dots, making a total of 32 bits. Each of the four bytes can take on values from 0 to 255, e.g. 192.168.130.
54 Technical basics And you can also see that there are more bits available to identify the individual hosts in a connected network if there are fewer bits in a netmask that contain a one. While only 254 different addresses could be allocated in the first example with the netmask 255.255.255.
Technical basics 55 There are two considerations when using these IP addresses: K K The IP addresses used in a private network should not leave this network, i.e. an Internet connection is only possible when using IP masquerading, for example. The packets for these IP addresses will not be routed in the Internet, i.e. backbone routers will simply reject such IP packets. Depending on the provider, serious consequences may result if such IP packets are released on the Internet.
56 Technical basics Host 'Smith' External host Marketing Example Inc.'s router Superordinate network: Example Inc. Development External router as a connection to other networks As an example, think of a company with one large network, in which the different divisions are incorporated as small subnets. The address of the network for the marketing division is made up hierarchically from the address of the company and that of the department.
Technical basics 57 All the router has to remember is that every address beginning with '192.168.100' is located within the network of Example Inc. Now imagine a router that is connected to the network of Example Inc. through an interface. If it receives a packet with destination address '192.168.100.4' and netmask '255.255.255.0', it will compare this with every network address it knows. In doing so it carries out a logical AND with the netmask, and compares the results with the network address: '192.
58 Technical basics MAC address Specific LAN addresses hardwired into the interfaces by their manufacturers are used to manage the transfer in the LAN. Since the LAN addresses are used for communication via the MAC protocol, they are called MAC addresses. They can be thought of as the fingerprint of the interface hardware. MAC addresses can look like this, for example: 0080-C7-6D-A4-6E. MAC addresses are independent of IP addresses.
Technical basics 59 i.e. all it has to remember is the network address and the netmask of the subnet in the LAN. IP host in the LAN LAN with router function IP host in the LAN The router in the LAN: knows only the address of the LAN In contrast, the host is confronted with a more difficult task than the router. In case of an interface with a point-to-point cable, the host knows that all packets that it sends through the interface automatically arrive at its router, for example.
60 Technical basics not find an entry in the table for a particular IP address (in our example '137.226.4.20'), it sends an ARP request packet to all hosts in the LAN (with the LAN broadcast address as a target address). Host 'Smith' ARP request to '137.226.4.20' Host 'Miller' This ARP request packet is simply a question to all hosts listening to the IP address '137.226.4.20'.
Technical basics 61 EB'” in the ARP table and tells its LAN interface: “Send this IP packet to the computer with the MAC address '00-10-5A-31-20-EB'”. Data transfer from the LAN onto the Internet Imagine the second task, sending an IP packet from host 'Smith' to the remote host 'External' with IP address 151.189.12.43. Host 'Smith' compares the IP address with its network address and realizes that host 'External' is located outside the LAN. So host 'External' can only be reached through the router.
62 Technical basics ELSA MicroLink Cable
Appendix 63 Appendix Technical data Technical data ELSA MicroLink Cable LAN interface Ethernet IEEE 802.3, 10Base-T (Twisted Pair, RJ45, Node/Hub switch) Cable TV interface MCNS DOCSIS (ITU-T J.
64 Appendix Technical data ELSA MicroLink Cable Package contents Accessories: AC adapter, F-to-IEC169-2 adapter, connector cable for cable TV network, 10Base-T cable Software: Configurations software ELSA LANconfig, TFTP client Documentation: Comprehensive manual and ELSA CD-ROM Installation Guide: German, English, French, Italian, Dutch, Spanish Warranty: 6 years ELSAcare: In the event of a warranty claim within the first 100 days following the purchase, replacement product will be provided
Appendix 65 Warranty conditions The ELSA AG warranty, valid as of June 01, 1998, is given to purchasers of ELSA products in addition to the warranty conditions provided by law and in accordance with the following conditions: 1 Warranty coverage a) The warranty covers the equipment delivered and all its parts.
66 Appendix c) if the damage occurred due to incorrect handling, especially to non-observance of the system description and the operating instructions, d) if the device was opened, repaired or modified by persons not authorized by ELSA, e) if the device shows any kind of mechanical damage, f) if in the case of an ELSA Monitor, damage to the cathode ray tube (CRT) has been caused especially by mechanical load (e.g.
Appendix 67 Declaration of conformity KONFORMITÄTSERKLÄRUNG DECLARATION OF CONFORMITY Diese Erklärung gilt für folgendes Erzeugnis: This declaration is valid for the following product: Geräteart: Modem Type of Device: MicroLinkTM Cable Typenbezeichnung: Product Name: Hiermit wird bestätigt, daß das Erzeugnis den folgenden Schutzanforderungen entspricht: This is to confirm that this product meets all essential protection requirements relating to the Niederspannungs Richtlinie (73/23/EWG) Low Volta
68 Appendix ELSA MicroLink Cable
Index 69 Index K A Access control .............................................. 30 Access protocols .......................................... 57 Access time .................................................. 90 Access-list .................................................... 93 Address Administration ................................ 17 Address administration ................................ 40 Address pool ......................................... 42, 102 Address ranges .................................
Index 70 K G Gateway ........................................... 32, 40, 43 K H Heap reserve ................................................ 90 Hierarchical IP addresses ............................. 55 Host .............................................................. 50 Hub ................................................................. 4 K I IANA ............................................................. 54 ICMP ....................................................... 96, 99 Inband ...............
Index Node ............................................................... 4 K O Objects .......................................................... 25 Online media ................................................ 17 Operating .......................................... 90, 92, 94 Operating modes .......................................... 29 Other ........................................................... 106 K P Packet ........................................................... 50 Password ................
Index 72 Trap ............................................................... 27 Trap-IP ........................................................ 101 Traps-active ................................................ 101 Type-of-service ............................................. 96 K U UDP ............................................................... 99 Upload .......................................................... 22 ELSA MicroLink Cable Upload-system ............................................
Description of the menu options R73 Description of the menu options The menu tree for ELSA MicroLink Cable configuration is divided up into status information, setup parameters, firmware information and 'other'. In order to help you familiarize yourself with the system, you will first be given an overview of the menu structure.
R74 Description of the menu options Overview of the menus Setup Status Name Operating-time Cable-module Current-time LAN-module Cable-statistics Bridge-module LAN-statistics TCP-IP-module Bridge-statistics IP-router-module TCP-IP-statistics SNMP-module IP-router-statistics DHCP-server-module Config-statistics Config-module Queue-statistics SYSLOG-module MCNS-statistics Init-status Firmware Version-table DHCP-client-status Table-firmsafe Output-internal-status messages Mode-firmsafe
Description of the menu options R75 Status The Status menu contains information on the current status and the internal sequences of operations in the LAN and in the cable network, which can relate to the data transmission route (e.g. registration with the headend) or to statistics (e.g. number of data blocks received and transmitted). The statistics displays are an important aid for verifying correct operation and optimizing parameter settings.
R76 Description of the menu options Status/Operating-time The operating time of the router since it was last started is displayed here in days, hours, minutes and seconds. Status/Current-time This displays the current device time transferred by the headend. Status/Cable-statistics This option allows you to display the various statistics parameters for the cable network port.
Description of the menu options /Cable-statistics Running status displays Cable-rx-MCNS-headervalid Number of MCNS headers correctly received Cable-FEC-lock-losts-notrecovered Number of cable FEC lock losses not synchronized Cable-FEC-lock-losts-recovered Number of cable FEC lock losses resynchronized Cable-TRC-lock-losts-notrecovered Number of cable TRC lock losses not synchronized Cable-TRC-lock-losts-recovered Number of cable TRC lock losses resynchronized Delete-values Deletes Cable statis
R78 Description of the menu options /LAN-statistics Running status displays WAN-rx-multicasts Number of multicasts received from the WAN WAN-rx-unicasts Number of unicasts received from the WAN Delete-values Deletes LAN statistics Status/Bridge-statistics This option allows you to display statistical information relating to the bridge.
Description of the menu options R79 Status/TCP-IP-statistics The TCP/IP-related statistics are shown here, broken down according to the various TCP/ IP sub-protocols.
R80 Description of the menu options Status/TCP-IP-statistics/IP-statistics These statistics include the following values: IP-LAN-rx Number of IP packets received from the LAN IP-LAN-tx Number of IP packets sent to the LAN IP-LAN-checksum-errors Number of IP packets incorrectly received from the LAN IP-LAN-service-errors Number of IP packets received from the LAN for an incorrect service IP-LAN-fragmentation-errors Number of packets from the LAN that actually should have been fragmented prior to tr
Description of the menu options R81 Status/TCP-IP-statistics/TCP-statistics These statistics include the following values: TCP-LAN-rx Number of TCP packets received from the LAN TCP-LAN-tx Number of TCP packets sent to the LAN TCP-LAN-tx-repeats Number of TCP packets repeatedly sent to the LAN TCP-LAN-checksum-errors Number of TCP packets incorrectly received from the LAN TCP-LAN-service-errors Number of TCP packets received from the LAN for an incorrect port TCP-LAN-connections Current number
R82 Description of the menu options TFTP-cable-rx-read-request Number of TFTP read requests received from the cable network TFTP-cable-rx-write-request Number of TFTP write requests received from the cable network TFTP-cable-rx-data Number of TFTP data packets received from the cable network TFTP-cable-rx-ack. Number of TFTP acknowledges received from the cable network TFTP-cable-rx-option-ack.
Description of the menu options Table-DHCP R83 There are entries with DHCP information in the DHCP table. It contains 16 entries (or multiples of 16). The table adapts dynamically to the given requirements and grows or shrinks accordingly.
R84 Description of the menu options Protocoltable The protocol table also supplies valuable information on the volume of packets transferred to the LAN or cable network. These values are broken down according to the various IP protocols, such as ICMP, TCP, UDP. A protocol table might have the following appearance: Protocol LAN-tx Cable-tx tcp 14 30 udp 15 50 icmp 60 40 Status/IP-router-statistics/RIP-statistics This option allows you to display the IP-RIP packets received by the device.
Description of the menu options R85 Status/Config-statistics This menu allows you to display the statistics from the remote configuration area. It allows you to retrieve information on the number of past and present configuration sessions at any time. The informaton is broken down into the categories LAN, WAN and outband port.
R86 Description of the menu options /Queue-statistics Statistics on the queue TFTP-server-queue-packets Number of packets in the receive queue of the TFTP server. DHCP-server-queue-packets Number of packets in the receive queue of the DHCP server. DHCP-client-queue-packets Number of packets in the receive queue of the DHCP clients IPr-RIP-queue-packets Number of packets in the receive queue of the IP-RIP module (for RIP queries, RIP propagations ...
Description of the menu options R87 Status/MCNS-statistics /MCSN-statistics MCNS-T1-timeouts Number of timeouts while waiting for the upstream channel descriptor MCNS-T2-timeouts Number of broadcast ranging timeouts MCNS-T3-timeouts Number of ranging response timeouts MCNS-T4-timeouts Number of unicast ranging timeouts MCNS-T6-timeouts Number of registration response timeouts MCNS-upstream-channel-descriptors Number of received upstream channel descriptors MCNS-ranging-requests Number of rang
R88 Description of the menu options /Cable-statistics Class-ID Class ID after registration Upstream channel-ID Number of the upstream channel Downstream channel-ID Number of the downstream channel Status/DHCP-client-statistics /DHCP-client-statistics State Status of the DHCP client, on or off Lease-time Validity for the values assigned Your-IP-address IP address assigned by the headend Your-IP netmask IP netmask assigned by the headend Gateway-IP-address IP address assigned by the headend fo
Description of the menu options Name /Setup System configuration IP-router-module IP router module settings SNMP-module Settings for configuration via SNMP DHCP-server-module DHCP server settings Config-module Configuration module settings R89 Here you can enter the device name (maximum 16 characters). The set of characters available includes uppercase and lowercase letters as well as some special characters.
R90 Description of the menu options Setup/Bridge-module This menu allows you to select the settings necessary for bridge mode. The menu has the following layout: Operating /Bridge-module Bridge settings Operating Bridge active or inactive Bridge-table Displays bridge table. LAN-config Settings for the LAN side Cable-config Settings for the cable side This option allows you to activate or deactivate the bridge. In the default configuration, the bridge is activated.
Description of the menu options R91 The pos setting for broadcast or multicast may lead to higher charges depending on the pricing model of the cable network operator during due to the higher data volume transferred. Setup/Bridge-module/LAN-configuration/Dest.-addresses This menu item enables all settings required to filter destination addresses. /Dest.
R92 Description of the menu options Operating /TCP-IP-module TCP/IP module settings LAN-IP-mask LAN's matching IP network mask Access-list Restricts access to internal functions via TCP/IP. Table-ARP ARP table for mapping an IP address onto a MAC address ARP-aging-min. Dwell time for entries in the ARP table TCP-aging-min. Time limit for configuration connections that are inactive TCP-max.-conn. Max.
Description of the menu options R93 If such an IP address already exists in the network, shut down the device using the address for the duration of the configuration and assign a different, free LAN IP address to the cable modem. Access-list The access to “internal functions” of the router may be controlled by an access list in TCP/IP applications.
R94 Description of the menu options The entries in the ARP table might, for example, have the following appearance if different devices with different IP addresses (192.168.139.20, 192.168.130.30) communicated with the router: IP-address Node-ID Last-access Connect 192.168.130.20 0000c0717860 6780443 tics local 192.168.130.30 0800091eebf4 6214514 tics local ARP-aging-min.
Description of the menu options R95 IP-routing-table The routing table can contain a maximum of 128 entries of destination network addresses or direct IP addresses with netmasks, and the names or IP addresses of other local routers. Alternatively, you can enter a setting by means of which packets to specific destination IP addresses are discarded and are not answered by proxy ARP. This is done by entering 0.0.0.0 for the name of the responsible router.
R96 Description of the menu options sends all other data packets into the cable network (insofar as these are not in forbidden areas): IP-address IP netmask Router-name Distance 192.168.0.0 255.255.0.0 0.0.0.0 0 172.16.0.0 255.240.0.0 0.0.0.0 0 10.2.0.0 255.255.255.0 10.1.0.99 0 10.0.0.0 255.0.0.0 0.0.0.0 0 255.255.255.255 0.0.0.0 Cable 0 Enable local routing for this function. Loc. routing Local routing enables the router to forward data packets via the local network.
Description of the menu options R97 Setup/IP-router-module/RIP-configuration This option allows you to enter settings for the management of IP-RIP packets. The menu has the following layout: RIP-type /RIP-configuration Settings for IP-RIP operation RIP-type RIP compatibility switch R1-mask Management of network masks Table-IP-RIP Dynamic IP routing table This option allows you to select the method to be used for handling the IP-RIP packets.
R98 Description of the menu options An IP-RIP routing table might, for example, have the following appearance: Cable-RIP LAN-RIP IP-address IP netmask Time Distance Router 223.245.254.0 255.255.255.0 1 1 192.38.9.100 223.245.257.0 255.255.255.0 1 1 192.38.9.200 Select whether RIP packets should be sent into the LAN or cable network here. Setup/IP-router-module/Masquerading This menu allows you to enter settings for the masquerading function.
Description of the menu options R99 telnet 192.38.50.100:27 to connect directly to a news server that can be reached via a router with the IP address 192.38.50.100. Tablemasquerading With IP masquerading, the IP addresses of computers in the local network are rendered invisible to external devices by means of a conversion of addresses and ports in the router. The dynamic masquerading table displays the IP addresses from the local network that the router is currently masking.
R10 0 Description of the menu options The setting all filters out every packet from the specified source network or to the destination network K Src-address, Src-netmask A subnetwork of the local network for which the filter is valid can be entered here. A source address of 0.0.0.0 means that the filter is applied to all computers. A network mask of 0.0.0.0 means that the filter is applied to all networks (which also means all computers). K S-st., S-end Source port range that is to be filtered.
Description of the menu options R10 1 Network masks and IP addresses of 0.0.0.0 can be used as “wildcards“. Specified computers and networks may be simultaneously subjected to targeted filtering while others pass the router unfiltered. The tables are processed from top to bottom. As soon as a matching filter is found, the packet is handled accordingly. Setup/SNMP-module This menu allows you to enter settings for configuration of the device via SNMP.
R10 2 Description of the menu options Off: The device does not operate as a DHCP server. Auto: The device regularly checks whether there is another DHCP server in the LAN. If not, it operates as a DHCP server and issues IP addresses to local clients. If there is no cable or LAN-IP address entered in the TCP/IP module (e.g. factory setting), the cable modem will issue IP addresses from the address range 10.0.0.2 - 10.0.0.253 to all DHCP clients in auto mode.
Description of the menu options R10 3 Default-leasetime-minute(s) Here you can enter the period of validity that is assigned if the host makes no request. Table-DHCP In the DCHP module, the 'Table-DCHP' option allows you to verify (or look up) the assignment of IP addresses to the relevant computers. This table has the following layout: The DEFAULT value of 500 minutes equals approximately 8 hours. IP-address Node-ID Timeout Hostname Type 10.1.1.
R10 4 Description of the menu options /Config-module Configuration module settings Login-errors Number for failed log-in attempts before the log-in block is activated Lock-minutes Duration of block and period until old log-in errors are forgotten. Language Configuration language Passwordrequired This specifies whether a new password should be requested every time a configuration is begun (On), or the password request should be suppressed (Off). The default setting for this option is Off.
Description of the menu options Version table Table firmsafe /Firmware Display and keyboard settings Timeout-firmesafe Time in minutes required to test new firmware Test-firmware Tests the inactive firmware Firmware-upload Initiates a firmware upload R10 5 The version table displays the firmware version and serial number of the device. Ifc Module Version Serial-number Ifc MicroLink Cable 1.00 22.03.99 0317.000.
R10 6 Description of the menu options K – If the device no longer responds and it is therefore impossible to log in, the firmware automatically loads the previous firmware version and reboots the device with it. 'manual': The third option allows you to set a period (Timeout firmsafe) beforehand for testing the new firmware. The device will start with the new firmware and wait for the preset period until the loaded firmware is manually activated and therefore becomes permanently effective.