Java-Based Pipeline Configurator
Misc Tab
Update: Sends configuration settings to the Pipeline
Save: Saves configuration settings in a file
Logout on Device Disconnects: Controls whether the Pipeline automatically logs out when a device disconnects from the its control port or when the Pipeline loses power
General UDP Checksum: Controls whether the Pipeline generates a UDP checksum whenever it sends out a UDP packet
Ethernet Interface: Specifies which of the two Ethernet connectors on the Pipeline you use to connect to the local-area network
APP Host Address: Specifies the IP address of the host that runs the APP Server utility
APP Host Port: Specifies the UDP port number monitored by the APP Server utility
Spoof Address: Specifies the IP address that will be assigned to a DHCP client when DHCP spoofing occurs
Subnet Mask: Specifies the subnet containing the IP address that will be assigned to a DHCP client when DHCP spoofing occurs
Renewal Time: Specifies the lease time, in seconds, for the IP address specified by the the Spoof Address setting
Syslog Host Address: Specifies the IP address of the host to which the Pipeline sends system logs
Facility Group: Controls where the host that receives system logs stores them
Read/Write Community: Specifies a read/write SNMP community name
Name: Specifies the name of the SNMP manager to which the Pipeline sends traps-PDUs (Protocol Data Units)
Manager Address: Specifies the IP address of the SNMP manager to which the Pipeline sends traps-PDUs (Protocol Data Units)
Community: Specifies an SNMP (Simple Network Management Protocol) community name
Trap Alarm Events: Controls whether the Pipeline traps SNMP Alarm events
Trap Security Events: Controls whether the Pipeline traps SNMP events related to system security
Usage: Click the Help button at any time to get online help for the settings in the current tab.
This opens a World Wide Browser, such as Netscape Navigator or Internet Explorer, and displays information about the settings.
To close the help display, close the browser as you would any other program. For example, in Windows 95, click the X button at the upper right of the window or choose Exit from the File menu.
With some browsers, a new window will open each time you click the Help button. If this happens, simply close each window when you're done with it.
Finding setting descriptions: At the beginning of each help window is a table of contents for the window. To go information about a particular setting, click the hyperlink (the underlined text in most browsers) for that setting in the contents. To return to the contents, use the control in your browser for going back, such as the Back button in Netscape Navigator or Internet Explorer 3.0.
Update
Description: Sends configuration settings to the Pipeline.
Usage: Click this button to send the settings shown in the Java-Based Pipeline Configurator to the Pipeline.
These new settings replace the previous settings in the Pipeline. You can use this button at any time; you do not have to enter values for all settings before updating the Pipeline.
Save
Description: Saves configuration settings in a file.
Usage: Click this to save the settings shown in the Java-Based Pipeline Configurator in a file on your computer.
You then use your operating system's facility for specifying a name and location for the file, such as the Save To dialog box in Windows 95.
You can later open a file in which you've saved settings by clicking the Open a Configuration File button in the first window that appears when you run the Java-Based Pipeline Configurator.
You can use this button at any time; you do not have to enter values for all settings before saving settings.
This setting is intended for use when two or more Ascend units on the same network are configured with redundant profiles and routes. It is not necessary to use this feature if you have a single Pipeline unit.
This feature was developed in response to a problem that occurred when two or more Ascend units on the same network were configured with redundant profiles and routes. If one of the redundant Pipeline units lost its dialout lines temporarily, it continued to receive outbound packets that should have been forwarded to the redundant Pipeline.
Usage: Enter whatever.
Causes the Pipeline to always advertise its IP routes. Use this setting unless you have redundant Ascend units or don't use dialout routes.
Always is the default.
Causes the Pipeline to stop advertising ("poison") its IP dialout routes if it temporarily loses the ability to dial out.
Usage: Check the box to enable automatic logout.
Usage:
Specify this setting if data integrity is of the highest concern for your environment, and having redundant checks is important; this setting is also appropriate if your UDP-based servers are located on the remote side of a WAN link that is prone to errors.
This is the default. Use the default if you plan to use the data integrity guarantee of the Ethernet or PPP checksum only.
If you connect an Ethernet transceiver to either connector (such as a transceiver that converts Thick Ethernet to Thin Ethernet), choose the connector to which the transceiver is attached.
Usage: Choose one of the following:
Specifies the 10Base-T (unshielded twisted pair) connector
Specifies the Thick Ethernet (10Base-5) connector
Usage: Check the box to enable security card authentication using an APP Server utility.
Enigma Logic SafeWord AS and Security Dynamics ACE authentication servers are examples of APP servers.
Usage: Enter the IP address of the authentication server.
111.65.212.100
Dependencies: Keep this additional information in mind:
Usage: Enter the UDP port number monitored by the APP server.
35
Dependencies: Keep this additional information in mind:
When DHCP spoofing is enabled, the Pipeline can act as a DHCP server for one IP address. When card-based security is used, the user must interact with the Pipeline to provide the card-based password. This interaction must occur over IP. However, the user doesn't have an IP address yet at the time when the password must be supplied.
To solve this "which came first" problem, the Pipeline supports DHCP spoofing. DHCP spoofing works like this:
Dependencies: For DHCP spoofing to work, you must also provide values for the Spoof Address, Subnet Mask, and Renewal Time settings.
Spoof Address
Description: This setting specifies the IP address that will be assigned to a DHCP client when DHCP spoofing occurs.
The address must be a valid address on the local network.
Usage: Enter the IP address.
222.65.212.99
Dependencies: For DHCP spoofing to work, you must also provide values for the Enable, Subnet Mask, and Renewal Time settings.
Subnet Mask
Description:
This specifies the subnet containing the IP address that will be assigned to a DHCP client when DHCP spoofing occurs.
Usage: Enter the number of bits for the subnet mask (a number from 0 to 31). The mask corresponding to this number is shown to the right of the number.
Dependencies: Keep this additional information in mind:
This value represents the amount of time the address will be assigned to the requesting client. After the specified number of seconds, the client must attempt to secure the IP address again. If an authenticated dial-up session is active, the Pipeline refuses the request, forcing the client to obtain its real IP address from the DHCP server on the remote network.
Usage: Enter a number between 3 and 65535.
60
Dependencies: For DHCP spoofing to work, you must also provide values for the Enable, Spoof Address, and Subnet Mask settings.
System Log settings
Log to Host
Description: This checkbox controls whether the Pipeline sends warning, notice, and Call Detail Reporting (CDR) records from system logs to the host specified by the Syslog Host Address setting.
CDR is a feature that provides a database of information about each call, including date, time, duration, called number, calling number, call direction, service type, and associated inverse multiplexing session and port. Because the network carrier bills for bandwidth on an as-used basis, and bills each connection in an inverse multiplexed call independently, you can use CDR to understand and manage bandwidth usage and the cost of each inverse multiplexed session.
Usage: Check the box to send warning, notice, and CDR records to the host specified by the Syslog Host Address setting.
Dependencies: For logging to a host to work, you must also provide values for the Syslog Host Address and Facility Group settings.
Syslog Host Address
Description: This setting specifies the IP address of the host to which the Pipeline sends system logs.
Usage: Enter the IP address of the host to receive system logs.
200.207.23.1
Dependencies: Keep this additional information in mind:
System logs sent while the value of Facility Group is the same are grouped together in the host's file system. That is, all system logs sent while Facility Group is Local0 are grouped together, all system logs sent while Facility Group is Local1 are grouped together, and so on.
Usage: Choose one of the following:
Local0 is the default.
SNMP settings
Read Community
Description: This setting specifies a read-only SNMP community name.
The Pipeline uses this name to authenticate the SNMP management station. If an SNMP manager sends this community name, it can access the Get and Get-Next SNMP agents.
SNMP (Simple Network Management Protocol) provides a way for computers to share networking information. In SNMP, two types of communicating devices exist: agents and managers. An agent provides networking information to a manager application running on another computer. The agents and managers share a database of information, called the Management Information Base (MIB).
SNMP security is implemented with the community name sent with each request. Ascend supports two community names: one with read-only access to the MIB (the Read Community setting), and the other with read/write access to the MIB (the Read/Write Community setting).
Usage: Enter the community name.
The name can contain up to 16 letters or numbers.
The default value is public
.
Read/Write Community
Description: This setting specifies a read/write SNMP community name.
The Pipeline uses this name to authenticate the SNMP management station. If an SNMP manager sends this community name, it can access the Get, Get-Next, and Set SNMP agents.
SNMP (Simple Network Management Protocol) provides a way for computers to share networking information. In SNMP, two types of communicating devices exist: agents and managers. An agent provides networking information to a manager application running on another computer. The agents and managers share a database of information, called the Management Information Base (MIB).
SNMP security is implemented with the community name sent with each request. Ascend supports two community names: one with read-only access to the MIB (the Read Community setting), and the other with read/write access to the MIB (the Read/Write Community setting).
Usage: Enter the community name.
The name can contain up to 16 letters or numbers.
The default value is write
.
Usage: Select a trap from the list and then provide values for the remaining SNMP Trap settings.
Name
Description: This setting specifies the name of the SNMP manager to which the Pipeline sends traps-PDUs (Protocol Data Units).
SNMP (Simple Network Management Protocol) provides a way for computers to share networking information. In SNMP, two types of communicating devices exist: agents and managers. An agent provides networking information to a manager application running on another computer. The agents and managers share a database of information, called the Management Information Base (MIB).
A trap is a mechanism in SNMP for reporting system change in real time. To report system change, the Pipeline sends a traps-PDU across the Ethernet interface to the SNMP manager. A complete list specifying the events that cause the Pipeline to send a traps-PDU appears in the Ascend Enterprise Traps MIB.
Usage: Enter the name of the SNMP manager.
A manager name can contain up to 31 characters.
Example: snmpmgr
Manager Address
Description: This setting specifies the IP address of the SNMP manager to which the Pipeline sends traps-PDUs (Protocol Data Units).
SNMP (Simple Network Management Protocol) provides a way for computers to share networking information. In SNMP, two types of communicating devices exist: agents and managers. An agent provides networking information to a manager application running on another computer. The agents and managers share a database of information, called the Management Information Base (MIB). A trap is a mechanism in SNMP for reporting system change in real time. To report system change, the Pipeline sends a traps-PDU across the Ethernet interface to the SNMP manager. A complete list specifying the events that cause the Pipeline to send a traps-PDU appears in the Ascend Enterprise Traps MIB.
Usage: Enter the IP address of the SNMP manager.
An IP address consists of four numbers between 0 and 255, separated by periods.
Example: 202.101.99.8
Dependencies: If you do not know the right IP address to enter, you must obtain it from the network administrator. Do not attempt to configure an IP address by guesswork!
Community
Description: This setting specifies an SNMP (Simple Network Management Protocol) community name.
The name you specify becomes a password that the Pipeline sends to the SNMP manager when an SNMP trap event occurs. The password authenticates the sender with the IP Address setting.
SNMP provides a way for computers to share networking information. In SNMP, two types of communicating devices exist: agents and managers. An agent (such as the Pipeline) provides networking information to a manager application running on another computer. The agents and managers share a database of information, called the Management Information Base (MIB).
A trap is a mechanism in SNMP for reporting system change in real time. To report system change, the Pipeline, sends a traps-PDU across the Ethernet interface to the SNMP manager. A complete list specifying the events that cause the Pipeline to send a traps-PDU appears in the Ascend Enterprise Traps MIB.
Usage: Enter the SNMP community name. The name can be up to 31 characters long and can include any combination of letters or numbers.
Example: ensenada
Dependencies: To turn off SNMP traps, leave this setting blank and set Manager Address to 0.0.0.0.
Trap Alarm Events
Description: This checkbox controls whether the Pipeline traps SNMP Alarm events.
SNMP (Simple Network Management Protocol) provides a way for computers to share networking information. In SNMP, two types of communicating devices exist: agents and managers. An agent (such as the Pipeline) provides networking information to a manager application running on another computer. The agents and managers share a database of information, called the Management Information Base (MIB). A trap is a mechanism in SNMP for reporting system change in real time. To report system change, the Pipeline sends a traps-PDU across the Ethernet interface to the SNMP manager. A complete list specifying the events that cause the Pipeline to send a traps-PDU appears in the Ascend Enterprise Traps MIB. Alarm events are defined in RFC 1215.
When Trap Alarm Events is checked, the Pipeline traps these events:
This event indicates that the Pipeline started up from a power-off condition.
This event indicates that the Pipeline started up from a power-on condition, typically by a system reset.
This event indicates that a WAN link or Ethernet interface has come online.
This event indicates that a WAN link or Ethernet interface has gone offline.
This is checked by default.
Trap Security Events
Description: This checkbox controls whether the Pipeline traps SNMP events related to system security.
SNMP (Simple Network Management Protocol) provides a way for computers to share networking information. In SNMP, two types of communicating devices exist: agents and managers. An agent (such as the Pipeline) provides networking information to a manager application running on another computer. The agents and managers share a database of information, called the Management Information Base (MIB). A trap is a mechanism in SNMP for reporting system change in real time. To report system change, the Pipeline sends a traps-PDU across the Ethernet interface to the SNMP manager. A complete list specifying the events that cause the Pipeline to send a traps-PDU appears in the Ascend Enterprise Traps MIB.
When Trap Security Events is checked, the Pipeline traps these events:
This event occurs when authentication has failed. See RFC 1215 for a full explanation of this event.
This event occurs when a VT100 or Telnet port changes its state.
This is unchecked by default.